SlideShare une entreprise Scribd logo
1  sur  22
Managing social software applications in
the corporate and public sector
environments
Louise F. Spiteri
School of Information Management
Louise.Spiteri@dal.ca

Maritime Information Management
Day_2009
Definition of social software
CMS Watch (cmswatch.com) defines social software as:
“Tools for collaboration and networking within and beyond the
enterprise.”

Social software supports collaboration, knowledge creation, sharing
and publication, identifying experts and getting access to expert
opinions worldwide. It leaves the control of knowledge with the
individuals owning it.

Maritime Information Management
Day_2009
The push for social software

Today, employees looking for greater flexibility as well as support for
more ad-hoc processes are frequently using a more bottom-up
approach to electronic collaboration, in some cases circumventing
official information systems, using freely-available tools on the public
Web.
Exposure to technology and tools such as Facebook, iTunes,
YouTube, and Wikipedia, is raising the bar on use expectations
concerning interfaces, collaboration and content access, not only on
the Web, but on the intranet as well.
Maritime Information Management
Day_2009
Comparison of software
Traditional

Social

Start point: Project
Structure before use
Top down
Knowledge belongs to experts
Central control
Formal
Rigid
Slow
Expensive

Start point: Users
Structure emerges with use
Bottom up
Everyone is knowledgeable
User control
Informal & easy to use
Flexible
Quick
Free or inexpensive

Maritime Information Management
Day_2009
Importance of Enterprise 2.0 technologies
A 2008 survey of over 400 business conducted by the
Association for Information and Image Management (AIIM)
found that:
44% of respondents said that Enterprise 2.0 technologies are
“imperative” or of “significant importance” for their organization.
27% of respondents said that technologies such as RSS, blogs,
and wikis have an impact on business goals and success.
74% of the respondents, however, claim to have only a vague
familiarity with the technologies.
Maritime Information Management
Day_2009
Key areas of social software

Maritime Information Management
Day_2009
Examples of social software vendors
Social software suites
•
•
•
•
•

Drupal
Awareness Networks
Connectbeam
Jive Software
Traction Software

Blog software
•
•
•

Public networks
•

Wiki software

•

Atlassian
Mediawiki
Socialtext

•

•

•
•

SixApart
Automatic
Google Blogger

LinkedIn
Facebook
XING

http://www.cmswatch.com/social/vendors/
Maritime Information Management
Day_2009
Wikis
Wikis are primarily used for collaborative work on documents and
can be used for many different applications. Since the wikis are so
easy to use by people of all levels of technical expertise, the uses are
only limited by the end user’s imagination. Examples of Wiki
applications include:
Cooperative authoring environment
Rapid production of Web pages for subsequent publishing
Newsletters
Committee minutes
Technical documentation
Maritime Information Management
Day_2009
Potential drawbacks of Wikis
The major concern in the use of wikis is the validity of the information
that the various authors have added.
In the case of Wikipedia, if someone adds inaccurate information
others will correct the information.
In the enterprise, it is expected that the same thing will happen. Most
articles will be the best the end user can contribute, because they
would not want to ruin their reputation among colleagues and peers.

Maritime Information Management
Day_2009
Blogs
Enterprises can use blogs to create powerful knowledge bases of
company information and employee sharing and continual learning.
Companies can use blogs to communicate with employees and
customers.
Leaders can use their blogs to update employees.
Blogs can be used to replace email and can also provide an archive
of all communications.
Maritime Information Management
Day_2009
Potential drawbacks of Blogs
Blog risks include:
Copyright infringement
Invasion of privacy
Defamation, sexual harassment and other legal claims;
Trade secret theft, financial disclosures, and other security
breaches;
Productivity drains
Mismanagement of electronic business records

Maritime Information Management
Day_2009
Social tagging applications
Tagging has acquired popularity as a flexible approach to classifying
information. Tagging allows individuals to use their own terms to
describe a resource, without the need to select terms from a
taxonomy.

Maritime Information Management
Day_2009
Enterprise social bookmarking: Considerations
Corporate firewalls may prevent access to public bookmarking
resources to anyone outside the organization.
Public sharing of bookmarks to intranet resources may be of concern
as proprietary information could be leaked.
The success of internet-based social bookmarking , however,
suggests that enterprises or organizations would benefit from a social
bookmarking system. IBM, for example, has created its own internal
bookmarking system called Dogear.
Maritime Information Management
Day_2009
Enterprise social tagging applications
Social bookmarking can assist your enterprise by:
Providing research analysts with a place to share research findings
Helping to form and support social networks around interest areas

Enhancing the value of other information retrieval and aggregation
capabilities on your intranet
By using the emergent folksonomy to augment your corporate subject
taxonomy strategy

Maritime Information Management
Day_2009
Enterprise social tagging applications
The same tagging mechanism that is used in social
bookmarking sites could be modified for bookmarking
people in an enterprise:
Tagging may be an effective way to organize contacts

Social tags may inform others about someone’s interests, skills,
and expertise
People-tagging benefits from properties unique to the enterprise,
including a pre-populated directory.
Maritime Information Management
Day_2009
Enterprise social networking
An example of an enterprise social networking applications is
Beehive, developed for IBM employees to help connect with coworkers (used by 40,000 employees).
The intent of Beehive is to provide a Facebook-like environment,
geared more toward professional interaction, although personal
interaction is also a legitimate part of the experience.
Users can develop their profiles and post information, including a
"Hive Five" listing that describes the areas about which they are
passionate.
Maritime Information Management
Day_2009
Potential drawbacks of enterprise bookmarking
Polysemy: The tag port could refer to a sweet fortified wine, a porthole, a place
for loading and unloading ships, the left-hand side of a ship or aircraft, or a
channel endpoint in a communications system.
Idiosyncrasies: Some tags may have little meaning to anyone but their
creator, e.g., Neat_stuff; criggo
Variant spellings: humor, humour
Collapsing or awkward compound terms: e.g. starwars, star_wars
Singular and plural variants: comic, comics
Maritime Information Management
Day_2009
RSS feeds
With the creation of wikis, blogs, and enterprise bookmarking, and
tagging, new information is generated all of the time. The user will
find it hard to keep returning to all of the wikis, blogs, bookmarks, and
new tags that have been created.

Enterprise RSS may help solve the overload on infrastructure such
as email boxes and multiple user computers requesting feeds by
including feeds in an enterprise RSS product. The feeds are read by
an RSS feed reader server and then delivered to the user in an
enterprise, thus reducing network traffic.

Maritime Information Management
Day_2009
Information management concerns in an
Enterprise 2.0 environment
Protecting the security, accuracy, and integrity of the information.
Managing the creation, collection, storage, and dissemination of vast
amounts of unstructured and constantly changing information.

Controlling access to particular levels and types of information.
Assessing the legal implication of vast amounts of information in
scattered systems and databases.

Maritime Information Management
Day_2009
Information management policies
Before implementing any of the enterprise 2.0 applications, policies
should be written and reviewed with all employees, whether the
websites will be internal or external or both.
Copyright laws should be reviewed and a policy of no tolerance for
copyright infringement should be in place.
Develop comprehensive policies that ensure that IM or Web 2.0
applications are managed consistently across the agency.

Maritime Information Management
Day_2009
Information management policies
Address the authorized use of technology and provide guidelines for
the management of the records generated during the use of Blogs,
Wikis, etc.
Explain clearly that users may have no expectation of privacy.

Maritime Information Management
Day_2009
Compliance
The Canadian General Standards Board’ s Electronic Records as
Documentary Evidence (CAN/CGSB-72.34-2005) outlines the main
requirements for ensuring that electronic records generated from electronic
information systems are reliable, authentic and trustworthy.
CAN/CGSB-72.34-2005 is intended to assist both the public and private
sectors in meeting one of the evidentiary requirements for acceptance of
electronic records in legal proceedings.
Government of Canada. Canadian General Standards Board. (2006). CGSB releases new national
standard on electronic records as documentary evidence. Retrieved June 15, 2009, from
http://www.pwgsc.gc.ca/cgsb/info/news/calibre/011_001/article01-e.html

Maritime Information Management
Day_2009

Contenu connexe

Tendances

L3 cs110 jcu-sindoni rev10092011
L3 cs110 jcu-sindoni rev10092011L3 cs110 jcu-sindoni rev10092011
L3 cs110 jcu-sindoni rev10092011Giuseppe Sindoni
 
How to make the most out of the Next Generation of Web Experience Management
How to make the most out of the Next Generation of Web Experience ManagementHow to make the most out of the Next Generation of Web Experience Management
How to make the most out of the Next Generation of Web Experience ManagementThe Internet Show ME 2011
 
Web 2.0 lib_2.0_1
Web 2.0 lib_2.0_1Web 2.0 lib_2.0_1
Web 2.0 lib_2.0_1smtcd
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...Authentic8
 
Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...
Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...
Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...Co-Operative Systems
 
Emakina Academy - Gurus - 20070614
Emakina Academy - Gurus -  20070614Emakina Academy - Gurus -  20070614
Emakina Academy - Gurus - 20070614Marin
 
True Compliance for Social Media
True Compliance for Social MediaTrue Compliance for Social Media
True Compliance for Social MediaActiance, Inc.
 
Social Networking Sites and Equal Opportunity: The Impact of Accessibility
Social Networking Sites and Equal Opportunity: The Impact of AccessibilitySocial Networking Sites and Equal Opportunity: The Impact of Accessibility
Social Networking Sites and Equal Opportunity: The Impact of AccessibilityUltan O'Broin
 
Openness And Social Networking (odp)
Openness And Social Networking (odp)Openness And Social Networking (odp)
Openness And Social Networking (odp)Colin
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethetecnologico de tuxtepec
 
Openness And Social Networking
Openness And Social NetworkingOpenness And Social Networking
Openness And Social NetworkingColin
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productGFI Software
 

Tendances (18)

L3 cs110 jcu-sindoni rev10092011
L3 cs110 jcu-sindoni rev10092011L3 cs110 jcu-sindoni rev10092011
L3 cs110 jcu-sindoni rev10092011
 
Empowerment Technology - Learning Content
Empowerment Technology -  Learning ContentEmpowerment Technology -  Learning Content
Empowerment Technology - Learning Content
 
Etech ppt
Etech pptEtech ppt
Etech ppt
 
How to make the most out of the Next Generation of Web Experience Management
How to make the most out of the Next Generation of Web Experience ManagementHow to make the most out of the Next Generation of Web Experience Management
How to make the most out of the Next Generation of Web Experience Management
 
Web 2.0 lib_2.0_1
Web 2.0 lib_2.0_1Web 2.0 lib_2.0_1
Web 2.0 lib_2.0_1
 
Social Media and Identity
Social Media and IdentitySocial Media and Identity
Social Media and Identity
 
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
IT vs. Users? How Law Firms Can Maximize Security While Granting Access to th...
 
Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...
Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...
Infobulletin Oct14 - Smartwatches watching you?, Blanket Wi-Fi, Tether your p...
 
Emakina Academy - Gurus - 20070614
Emakina Academy - Gurus -  20070614Emakina Academy - Gurus -  20070614
Emakina Academy - Gurus - 20070614
 
True Compliance for Social Media
True Compliance for Social MediaTrue Compliance for Social Media
True Compliance for Social Media
 
Social Networking Sites and Equal Opportunity: The Impact of Accessibility
Social Networking Sites and Equal Opportunity: The Impact of AccessibilitySocial Networking Sites and Equal Opportunity: The Impact of Accessibility
Social Networking Sites and Equal Opportunity: The Impact of Accessibility
 
Sophos social-media-wpna
Sophos social-media-wpnaSophos social-media-wpna
Sophos social-media-wpna
 
Openness And Social Networking (odp)
Openness And Social Networking (odp)Openness And Social Networking (odp)
Openness And Social Networking (odp)
 
Web 2.0 MSC 2010
Web 2.0 MSC 2010Web 2.0 MSC 2010
Web 2.0 MSC 2010
 
Security in social network araceli&arlethe
Security in social network araceli&arletheSecurity in social network araceli&arlethe
Security in social network araceli&arlethe
 
Openness And Social Networking
Openness And Social NetworkingOpenness And Social Networking
Openness And Social Networking
 
News letter oct 12
News letter oct 12News letter oct 12
News letter oct 12
 
How to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware productHow to tell if that pop-up window is offering you a rogue anti-malware product
How to tell if that pop-up window is offering you a rogue anti-malware product
 

Similaire à Managing social software applications in the corporate and public sector environments

Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Centre for Advanced Management Education
 
Defense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 ArticleDefense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 ArticlePete Modigliani
 
Web 2.0 goes to work for business: Enabling the power of participation
Web 2.0 goes to work for business: Enabling the power of participationWeb 2.0 goes to work for business: Enabling the power of participation
Web 2.0 goes to work for business: Enabling the power of participationRoss Dawson
 
253 By Dr. Patricia Franks and Robert Smallwood .docx
253   By Dr. Patricia Franks and Robert Smallwood   .docx253   By Dr. Patricia Franks and Robert Smallwood   .docx
253 By Dr. Patricia Franks and Robert Smallwood .docxlorainedeserre
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChaptemariuse18nolet
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxvrickens
 
20110518-1 ARMA Central Iowa Intro
20110518-1 ARMA Central Iowa Intro20110518-1 ARMA Central Iowa Intro
20110518-1 ARMA Central Iowa IntroJesse Wilkins
 
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceSharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceJoel Oleson
 
IBM Connections Cloud introduction
IBM Connections Cloud introductionIBM Connections Cloud introduction
IBM Connections Cloud introductionMaurice Teeuwe
 
Community Management
Community ManagementCommunity Management
Community ManagementRoger Pilney
 
Inv310 agility-through-standards-socialbiz -2012016a
Inv310  agility-through-standards-socialbiz -2012016aInv310  agility-through-standards-socialbiz -2012016a
Inv310 agility-through-standards-socialbiz -2012016aAngel Diaz
 
Liferay overview
Liferay overviewLiferay overview
Liferay overviewAbhishekSRC
 

Similaire à Managing social software applications in the corporate and public sector environments (20)

Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...Managing social software applications in the corporate and public sector envi...
Managing social software applications in the corporate and public sector envi...
 
Defense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 ArticleDefense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 Article
 
Web 2.0 goes to work for business: Enabling the power of participation
Web 2.0 goes to work for business: Enabling the power of participationWeb 2.0 goes to work for business: Enabling the power of participation
Web 2.0 goes to work for business: Enabling the power of participation
 
253 By Dr. Patricia Franks and Robert Smallwood .docx
253   By Dr. Patricia Franks and Robert Smallwood   .docx253   By Dr. Patricia Franks and Robert Smallwood   .docx
253 By Dr. Patricia Franks and Robert Smallwood .docx
 
Web 2.0 for Business
Web 2.0 for BusinessWeb 2.0 for Business
Web 2.0 for Business
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapteIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte
 
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docxIT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
IT 833 INFORMATION GOVERNANCEDr. Isaac T. GbenleChapte.docx
 
20110518-1 ARMA Central Iowa Intro
20110518-1 ARMA Central Iowa Intro20110518-1 ARMA Central Iowa Intro
20110518-1 ARMA Central Iowa Intro
 
ICT.pptx
ICT.pptxICT.pptx
ICT.pptx
 
Enterprise 2.0 Workshop
Enterprise 2.0 WorkshopEnterprise 2.0 Workshop
Enterprise 2.0 Workshop
 
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and ComplianceSharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
SharePoint 2013 and Office 365 - Collaboration, Cloud and Compliance
 
IBM Connections Cloud introduction
IBM Connections Cloud introductionIBM Connections Cloud introduction
IBM Connections Cloud introduction
 
20130522 keynote isbg
20130522 keynote   isbg20130522 keynote   isbg
20130522 keynote isbg
 
Web 20 For Acra
Web 20 For AcraWeb 20 For Acra
Web 20 For Acra
 
Community Management
Community ManagementCommunity Management
Community Management
 
Community Management
Community ManagementCommunity Management
Community Management
 
Inv310 agility-through-standards-socialbiz -2012016a
Inv310  agility-through-standards-socialbiz -2012016aInv310  agility-through-standards-socialbiz -2012016a
Inv310 agility-through-standards-socialbiz -2012016a
 
Liferay overview
Liferay overviewLiferay overview
Liferay overview
 
Intranet 2 0 Tools
Intranet 2 0 ToolsIntranet 2 0 Tools
Intranet 2 0 Tools
 
PPT on Web 2.0
PPT on Web 2.0PPT on Web 2.0
PPT on Web 2.0
 

Plus de Louise Spiteri

Your organization and Big Data: Managing, access, privacy, & security
Your organization and Big Data: Managing, access, privacy, & security Your organization and Big Data: Managing, access, privacy, & security
Your organization and Big Data: Managing, access, privacy, & security Louise Spiteri
 
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...Louise Spiteri
 
User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?
User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?
User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?Louise Spiteri
 
Records Continuum Model
Records Continuum ModelRecords Continuum Model
Records Continuum ModelLouise Spiteri
 
Community Engagement: The New Social Media Mantra for Academic Libraries?
Community Engagement: The New Social Media Mantra for Academic Libraries?Community Engagement: The New Social Media Mantra for Academic Libraries?
Community Engagement: The New Social Media Mantra for Academic Libraries?Louise Spiteri
 
Social Discovery Tools: Cataloguing Meets User Convenience
Social Discovery Tools: Cataloguing Meets User ConvenienceSocial Discovery Tools: Cataloguing Meets User Convenience
Social Discovery Tools: Cataloguing Meets User ConvenienceLouise Spiteri
 
Social tagging, facets, and social spaces
Social tagging, facets, and social spacesSocial tagging, facets, and social spaces
Social tagging, facets, and social spacesLouise Spiteri
 
Concept theory and the role of conceptual coherence in assessments of similarity
Concept theory and the role of conceptual coherence in assessments of similarityConcept theory and the role of conceptual coherence in assessments of similarity
Concept theory and the role of conceptual coherence in assessments of similarityLouise Spiteri
 
Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...
Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...
Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...Louise Spiteri
 
The Public Library Catalogue as a Social Space
The Public Library Catalogue as a Social SpaceThe Public Library Catalogue as a Social Space
The Public Library Catalogue as a Social SpaceLouise Spiteri
 
RDA, FRBR, and FRAD: Connecting the dots
RDA, FRBR, and FRAD: Connecting the dotsRDA, FRBR, and FRAD: Connecting the dots
RDA, FRBR, and FRAD: Connecting the dotsLouise Spiteri
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12Louise Spiteri
 
Ala alise preparing lis professionals_spiteri_2012-01-18
Ala alise preparing lis professionals_spiteri_2012-01-18Ala alise preparing lis professionals_spiteri_2012-01-18
Ala alise preparing lis professionals_spiteri_2012-01-18Louise Spiteri
 
Indexing presentation 2013 06-04
Indexing presentation 2013 06-04Indexing presentation 2013 06-04
Indexing presentation 2013 06-04Louise Spiteri
 

Plus de Louise Spiteri (14)

Your organization and Big Data: Managing, access, privacy, & security
Your organization and Big Data: Managing, access, privacy, & security Your organization and Big Data: Managing, access, privacy, & security
Your organization and Big Data: Managing, access, privacy, & security
 
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
OPACs, users, and readers’ advisory: Exploring the implication of user-genera...
 
User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?
User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?
User-Generated Metadata: Boon or Bust for Indexing and Controlled Vocabularies?
 
Records Continuum Model
Records Continuum ModelRecords Continuum Model
Records Continuum Model
 
Community Engagement: The New Social Media Mantra for Academic Libraries?
Community Engagement: The New Social Media Mantra for Academic Libraries?Community Engagement: The New Social Media Mantra for Academic Libraries?
Community Engagement: The New Social Media Mantra for Academic Libraries?
 
Social Discovery Tools: Cataloguing Meets User Convenience
Social Discovery Tools: Cataloguing Meets User ConvenienceSocial Discovery Tools: Cataloguing Meets User Convenience
Social Discovery Tools: Cataloguing Meets User Convenience
 
Social tagging, facets, and social spaces
Social tagging, facets, and social spacesSocial tagging, facets, and social spaces
Social tagging, facets, and social spaces
 
Concept theory and the role of conceptual coherence in assessments of similarity
Concept theory and the role of conceptual coherence in assessments of similarityConcept theory and the role of conceptual coherence in assessments of similarity
Concept theory and the role of conceptual coherence in assessments of similarity
 
Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...
Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...
Social Cataloguing Sites: Features and Implications for Cataloguing Practice ...
 
The Public Library Catalogue as a Social Space
The Public Library Catalogue as a Social SpaceThe Public Library Catalogue as a Social Space
The Public Library Catalogue as a Social Space
 
RDA, FRBR, and FRAD: Connecting the dots
RDA, FRBR, and FRAD: Connecting the dotsRDA, FRBR, and FRAD: Connecting the dots
RDA, FRBR, and FRAD: Connecting the dots
 
Social media 2013 06-12
Social media 2013 06-12Social media 2013 06-12
Social media 2013 06-12
 
Ala alise preparing lis professionals_spiteri_2012-01-18
Ala alise preparing lis professionals_spiteri_2012-01-18Ala alise preparing lis professionals_spiteri_2012-01-18
Ala alise preparing lis professionals_spiteri_2012-01-18
 
Indexing presentation 2013 06-04
Indexing presentation 2013 06-04Indexing presentation 2013 06-04
Indexing presentation 2013 06-04
 

Managing social software applications in the corporate and public sector environments

  • 1. Managing social software applications in the corporate and public sector environments Louise F. Spiteri School of Information Management Louise.Spiteri@dal.ca Maritime Information Management Day_2009
  • 2. Definition of social software CMS Watch (cmswatch.com) defines social software as: “Tools for collaboration and networking within and beyond the enterprise.” Social software supports collaboration, knowledge creation, sharing and publication, identifying experts and getting access to expert opinions worldwide. It leaves the control of knowledge with the individuals owning it. Maritime Information Management Day_2009
  • 3. The push for social software Today, employees looking for greater flexibility as well as support for more ad-hoc processes are frequently using a more bottom-up approach to electronic collaboration, in some cases circumventing official information systems, using freely-available tools on the public Web. Exposure to technology and tools such as Facebook, iTunes, YouTube, and Wikipedia, is raising the bar on use expectations concerning interfaces, collaboration and content access, not only on the Web, but on the intranet as well. Maritime Information Management Day_2009
  • 4. Comparison of software Traditional Social Start point: Project Structure before use Top down Knowledge belongs to experts Central control Formal Rigid Slow Expensive Start point: Users Structure emerges with use Bottom up Everyone is knowledgeable User control Informal & easy to use Flexible Quick Free or inexpensive Maritime Information Management Day_2009
  • 5. Importance of Enterprise 2.0 technologies A 2008 survey of over 400 business conducted by the Association for Information and Image Management (AIIM) found that: 44% of respondents said that Enterprise 2.0 technologies are “imperative” or of “significant importance” for their organization. 27% of respondents said that technologies such as RSS, blogs, and wikis have an impact on business goals and success. 74% of the respondents, however, claim to have only a vague familiarity with the technologies. Maritime Information Management Day_2009
  • 6. Key areas of social software Maritime Information Management Day_2009
  • 7. Examples of social software vendors Social software suites • • • • • Drupal Awareness Networks Connectbeam Jive Software Traction Software Blog software • • • Public networks • Wiki software • Atlassian Mediawiki Socialtext • • • • SixApart Automatic Google Blogger LinkedIn Facebook XING http://www.cmswatch.com/social/vendors/ Maritime Information Management Day_2009
  • 8. Wikis Wikis are primarily used for collaborative work on documents and can be used for many different applications. Since the wikis are so easy to use by people of all levels of technical expertise, the uses are only limited by the end user’s imagination. Examples of Wiki applications include: Cooperative authoring environment Rapid production of Web pages for subsequent publishing Newsletters Committee minutes Technical documentation Maritime Information Management Day_2009
  • 9. Potential drawbacks of Wikis The major concern in the use of wikis is the validity of the information that the various authors have added. In the case of Wikipedia, if someone adds inaccurate information others will correct the information. In the enterprise, it is expected that the same thing will happen. Most articles will be the best the end user can contribute, because they would not want to ruin their reputation among colleagues and peers. Maritime Information Management Day_2009
  • 10. Blogs Enterprises can use blogs to create powerful knowledge bases of company information and employee sharing and continual learning. Companies can use blogs to communicate with employees and customers. Leaders can use their blogs to update employees. Blogs can be used to replace email and can also provide an archive of all communications. Maritime Information Management Day_2009
  • 11. Potential drawbacks of Blogs Blog risks include: Copyright infringement Invasion of privacy Defamation, sexual harassment and other legal claims; Trade secret theft, financial disclosures, and other security breaches; Productivity drains Mismanagement of electronic business records Maritime Information Management Day_2009
  • 12. Social tagging applications Tagging has acquired popularity as a flexible approach to classifying information. Tagging allows individuals to use their own terms to describe a resource, without the need to select terms from a taxonomy. Maritime Information Management Day_2009
  • 13. Enterprise social bookmarking: Considerations Corporate firewalls may prevent access to public bookmarking resources to anyone outside the organization. Public sharing of bookmarks to intranet resources may be of concern as proprietary information could be leaked. The success of internet-based social bookmarking , however, suggests that enterprises or organizations would benefit from a social bookmarking system. IBM, for example, has created its own internal bookmarking system called Dogear. Maritime Information Management Day_2009
  • 14. Enterprise social tagging applications Social bookmarking can assist your enterprise by: Providing research analysts with a place to share research findings Helping to form and support social networks around interest areas Enhancing the value of other information retrieval and aggregation capabilities on your intranet By using the emergent folksonomy to augment your corporate subject taxonomy strategy Maritime Information Management Day_2009
  • 15. Enterprise social tagging applications The same tagging mechanism that is used in social bookmarking sites could be modified for bookmarking people in an enterprise: Tagging may be an effective way to organize contacts Social tags may inform others about someone’s interests, skills, and expertise People-tagging benefits from properties unique to the enterprise, including a pre-populated directory. Maritime Information Management Day_2009
  • 16. Enterprise social networking An example of an enterprise social networking applications is Beehive, developed for IBM employees to help connect with coworkers (used by 40,000 employees). The intent of Beehive is to provide a Facebook-like environment, geared more toward professional interaction, although personal interaction is also a legitimate part of the experience. Users can develop their profiles and post information, including a "Hive Five" listing that describes the areas about which they are passionate. Maritime Information Management Day_2009
  • 17. Potential drawbacks of enterprise bookmarking Polysemy: The tag port could refer to a sweet fortified wine, a porthole, a place for loading and unloading ships, the left-hand side of a ship or aircraft, or a channel endpoint in a communications system. Idiosyncrasies: Some tags may have little meaning to anyone but their creator, e.g., Neat_stuff; criggo Variant spellings: humor, humour Collapsing or awkward compound terms: e.g. starwars, star_wars Singular and plural variants: comic, comics Maritime Information Management Day_2009
  • 18. RSS feeds With the creation of wikis, blogs, and enterprise bookmarking, and tagging, new information is generated all of the time. The user will find it hard to keep returning to all of the wikis, blogs, bookmarks, and new tags that have been created. Enterprise RSS may help solve the overload on infrastructure such as email boxes and multiple user computers requesting feeds by including feeds in an enterprise RSS product. The feeds are read by an RSS feed reader server and then delivered to the user in an enterprise, thus reducing network traffic. Maritime Information Management Day_2009
  • 19. Information management concerns in an Enterprise 2.0 environment Protecting the security, accuracy, and integrity of the information. Managing the creation, collection, storage, and dissemination of vast amounts of unstructured and constantly changing information. Controlling access to particular levels and types of information. Assessing the legal implication of vast amounts of information in scattered systems and databases. Maritime Information Management Day_2009
  • 20. Information management policies Before implementing any of the enterprise 2.0 applications, policies should be written and reviewed with all employees, whether the websites will be internal or external or both. Copyright laws should be reviewed and a policy of no tolerance for copyright infringement should be in place. Develop comprehensive policies that ensure that IM or Web 2.0 applications are managed consistently across the agency. Maritime Information Management Day_2009
  • 21. Information management policies Address the authorized use of technology and provide guidelines for the management of the records generated during the use of Blogs, Wikis, etc. Explain clearly that users may have no expectation of privacy. Maritime Information Management Day_2009
  • 22. Compliance The Canadian General Standards Board’ s Electronic Records as Documentary Evidence (CAN/CGSB-72.34-2005) outlines the main requirements for ensuring that electronic records generated from electronic information systems are reliable, authentic and trustworthy. CAN/CGSB-72.34-2005 is intended to assist both the public and private sectors in meeting one of the evidentiary requirements for acceptance of electronic records in legal proceedings. Government of Canada. Canadian General Standards Board. (2006). CGSB releases new national standard on electronic records as documentary evidence. Retrieved June 15, 2009, from http://www.pwgsc.gc.ca/cgsb/info/news/calibre/011_001/article01-e.html Maritime Information Management Day_2009