SlideShare una empresa de Scribd logo
1 de 29
Descargar para leer sin conexión
Implementing
  Enterprise 2.0 in a
Controlled Environment:
   Lessons Learned
            Carl Frappaolo
      Information Architected, Inc.
The company
treads a delicate
balance between
social computing
   and privacy.
Oh Really
            Really ?
Risk                                     Knowledge
Management                                  Management
Control & Secure                   Collaborate & Innovate
Information Architecture / Sourcing Strategy
        BPM            Portals       Search      Visualization
      Workflow        Websites

    Authentication                  Taxonomy
                      IRM/ERM        Facets      Collaboration

         ID           Contextual     Content        Social
                                                   Network
     Extraction        Filtering    Analytics     Computing

     Document           DRM                       Tagging &
    Management          DAM        ePublishing      Voting

      Records          Content                   Community
    Management       Management      COLD         Analytics

      Email IM       Shared Drives html Multimedia DBs …
“Enterprise 2.0 platforms, are by their nature more
open, transparent, and visible than
communication channels like email. Most of my
work has stressed the benefits of using these
platforms, but there are also potential
drawbacks…
Perhaps the most obvious of
these goes by the label
‘security.’ It's the fear that
the wrong content will show up
on the platform, and/or that it
will be viewed by the wrong
people.” - Prof. Andrew McAfee
“You have to deal with
   this. Times have
      changed. “
 “This is the biggest
  unspoken hurdle
companies will face in
     this area.”
2 General Findings
• Very few best practices exist
• There is no single “approach” or
  perspective
CULTURE
> vertical industry & European presence
Privacy = Security =
 Legal Compliance
Build on the Past
Challenge
Assumptions
Think Anew
Lowest
 Common
Denominator
Policy

Technology-driven
  Enforcement
“There are no
new risks - just
     more
opportunity for
them to occur”
Opt-in
• Popular & Simple
• Challenges Exist
  • Granularity
  • Criticality
  • Basic rights
  • “Practical” / pressure
  • Reciprocity issues
  • Potentially undermines the initiative
  • Innatley revealing
  • Poor analytics
Piloting
• Not Universally Used
• Introduction to E2.0 and Security
• Scale and Scope are Critical to Value
• Start in areas where content is not
confidential
Automated Tracking &
       Reporting
• Not reliable or always permitted
• Can constitute a violation in itself
• Exceptions
 •“Having our solution provide abuse reports was a huge
 win. These tools make it easier for employees to create
 anything, We can see if an employee posts something
 inappropriate.”
Avoid
• Bookmarking
• Tagging
• Voting
• Social Network Analysis
Approaches
• Cyclical
• Ongoing
• Situational
•“This is not a one-and-done situation”
Policy Guidelines
• KISS
• High level
• Formally “informal”
• Allow for interpretation
• Stress individual accountability / ethics
Other Words of Advice
• Know how/where your software gathers
  personal data
• Understand user concerns
• Bring all parties to the table as early as
  possible
• Don’t own the content
• Policy policy policy ... evolve, evolve, evolve
• Remember these concerns are solvable
CIO: ...Does the Enterprise 2.0 industry need
to do something to improve security?
McAfee: ... very little, if anything, needs to be
done with it. I ask for horror stories all the time
when I talk to groups, especially compliance or
security-related horror stories. My collection is
empty. People know how to
do their jobs. By this point,
none of these tools are a
week old, so the rules for
using them aren't unclear. ...
Jane Doe v. Norwalk
Community College
      EFF v US
    TEKsystems
 Souvalian v. Google
  Crispin v. Audigier
Risk                                     Knowledge
Management                                  Management
Control & Secure                   Collaborate & Innovate
Information Architecture / Sourcing Strategy
        BPM            Portals       Search      Visualization
      Workflow        Websites

    Authentication                  Taxonomy
                      IRM/ERM        Facets      Collaboration

         ID           Contextual     Content        Social
                                                   Network
     Extraction        Filtering    Analytics     Computing

     Document           DRM                       Tagging &
    Management          DAM        ePublishing      Voting

      Records    Content                         Community
    Management Management            COLD         Analytics

      Email IM       Shared Drives html Multimedia DBs …
“Ask what is the lost potential value if
compliance is strictly enforced.”

“If we do this then what can go wrong? What is
the potential damage if that happens?”

“Our goal was to enable usage of technology to
the highest degree PRACTICAL”
“For us the local laws have been trumped by
the greater good of the business.”

“The business models and advantages offered
by E2.0 are compelling and so you have to
work through the risk issues.”

“How we balance the legitimate demand for
appropriate privacy and security against the
need for knowledge exchange to support an
effective and efficient community is the
defining issue of the 21st century.”
Social Media Policies:
http://alturl.com/kvra

Thank you Doug Cornelius
Let’s Get 2.0
    www.informationarchitected.com
    Facebook: Information Architected
      Text
    Twitter: @IAI


    cf@informationarchitected.com
    Facebook: Carl Frappaolo
    Twitter: @carlfrappaolo

Más contenido relacionado

La actualidad más candente

Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Logindrummondreed
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy IllusionMary Aviles
 
Mitre: People in Progress
Mitre: People in ProgressMitre: People in Progress
Mitre: People in ProgressSoCo Partners
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Chuck Brooks
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspectiveSravan Ankaraju
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
 
Master Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian LeeMaster Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian LeeIan Lee
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Devendra kashyap
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchLaVerne Kemp
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation finalsunnyjoshi88
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challengemsdee3362
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the newsunnyjoshi88
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOsIBM Security
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010thaiantivirus
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityMighty Guides, Inc.
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based securityArun Gopinath
 

La actualidad más candente (18)

Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Login
 
The Privacy Illusion
The Privacy IllusionThe Privacy Illusion
The Privacy Illusion
 
Mitre: People in Progress
Mitre: People in ProgressMitre: People in Progress
Mitre: People in Progress
 
Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks Technology Evangelism & Thought Leadership by Chuck Brooks
Technology Evangelism & Thought Leadership by Chuck Brooks
 
Putting data science into perspective
Putting data science into perspectivePutting data science into perspective
Putting data science into perspective
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0
 
Master Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian LeeMaster Thesis Security in Distributed Databases- Ian Lee
Master Thesis Security in Distributed Databases- Ian Lee
 
Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland Cybrary's navigating a security wasteland
Cybrary's navigating a security wasteland
 
Cyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act researchCyber intelligence sharing and protection act research
Cyber intelligence sharing and protection act research
 
Gebm os presentation final
Gebm os presentation finalGebm os presentation final
Gebm os presentation final
 
DBryant-Cybersecurity Challenge
DBryant-Cybersecurity ChallengeDBryant-Cybersecurity Challenge
DBryant-Cybersecurity Challenge
 
The Future of Cybersecurity
The Future of CybersecurityThe Future of Cybersecurity
The Future of Cybersecurity
 
Online security – an assessment of the new
Online security – an assessment of the newOnline security – an assessment of the new
Online security – an assessment of the new
 
Ten Security Essentials for CIOs
Ten Security Essentials for CIOsTen Security Essentials for CIOs
Ten Security Essentials for CIOs
 
Security annual report_mid2010
Security annual report_mid2010Security annual report_mid2010
Security annual report_mid2010
 
Information Security for Small Business
Information Security for Small BusinessInformation Security for Small Business
Information Security for Small Business
 
Carbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint SecurityCarbon Black: 32 Security Experts on Changing Endpoint Security
Carbon Black: 32 Security Experts on Changing Endpoint Security
 
Secure by design building id based security
Secure by design building id based securitySecure by design building id based security
Secure by design building id based security
 

Destacado

Knowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New GenerationKnowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New GenerationCarl Frappaolo
 
Enterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the BoxEnterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the BoxCarl Frappaolo
 
Middleware in the cloud platform-v2
Middleware in the cloud   platform-v2Middleware in the cloud   platform-v2
Middleware in the cloud platform-v2Hammad Rajjoub
 
Cómo sería un periódico en el 2025
Cómo sería un periódico en el 2025Cómo sería un periódico en el 2025
Cómo sería un periódico en el 2025Adriàn Rodriguez
 
Enterprise 2.0 : Leveraging collaboration platforms to foster knowledge, inno...
Enterprise 2.0 : Leveraging collaboration platforms to foster knowledge, inno...Enterprise 2.0 : Leveraging collaboration platforms to foster knowledge, inno...
Enterprise 2.0 : Leveraging collaboration platforms to foster knowledge, inno...Cecil Dijoux
 
Web 2.0 In The Enterprise
Web 2.0 In The EnterpriseWeb 2.0 In The Enterprise
Web 2.0 In The EnterpriseLyndon Cerejo
 
Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0Carl Frappaolo
 
ECM Strategy Development
ECM Strategy DevelopmentECM Strategy Development
ECM Strategy DevelopmentCarl Frappaolo
 
Using Enterprise 2.0 in Knowledge Management
Using Enterprise 2.0 in Knowledge ManagementUsing Enterprise 2.0 in Knowledge Management
Using Enterprise 2.0 in Knowledge ManagementMichelle Farabough
 
Can E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural BarrierCan E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural BarrierCarl Frappaolo
 
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?Carl Frappaolo
 
Knowledge Management in Enterprise 2.0 - Part 4
Knowledge Management in Enterprise 2.0 - Part 4Knowledge Management in Enterprise 2.0 - Part 4
Knowledge Management in Enterprise 2.0 - Part 4Telekom MMS
 
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native MiddlewareTrends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native MiddlewareKai Wähner
 
Getting Real About Enterprise 2.0
Getting Real About Enterprise 2.0Getting Real About Enterprise 2.0
Getting Real About Enterprise 2.0Acando Consulting
 
DevOps, containers & microservices: Separating the hype from the reality
DevOps, containers & microservices: Separating the hype from the realityDevOps, containers & microservices: Separating the hype from the reality
DevOps, containers & microservices: Separating the hype from the realityDonnie Berkholz
 
Case Study: How to move from a Monolith to Cloud, Containers and Microservices
Case Study: How to move from a Monolith to Cloud, Containers and MicroservicesCase Study: How to move from a Monolith to Cloud, Containers and Microservices
Case Study: How to move from a Monolith to Cloud, Containers and MicroservicesKai Wähner
 
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...Kai Wähner
 
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...Kai Wähner
 

Destacado (20)

Knowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New GenerationKnowledge Managemnt: Has the Torch Been Passed to a New Generation
Knowledge Managemnt: Has the Torch Been Passed to a New Generation
 
Measuring Knowledge
Measuring KnowledgeMeasuring Knowledge
Measuring Knowledge
 
Enterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the BoxEnterprise Search - Thinking Outside the Box
Enterprise Search - Thinking Outside the Box
 
Middleware in the cloud platform-v2
Middleware in the cloud   platform-v2Middleware in the cloud   platform-v2
Middleware in the cloud platform-v2
 
Cómo sería un periódico en el 2025
Cómo sería un periódico en el 2025Cómo sería un periódico en el 2025
Cómo sería un periódico en el 2025
 
Enterprise 2.0 : Leveraging collaboration platforms to foster knowledge, inno...
Enterprise 2.0 : Leveraging collaboration platforms to foster knowledge, inno...Enterprise 2.0 : Leveraging collaboration platforms to foster knowledge, inno...
Enterprise 2.0 : Leveraging collaboration platforms to foster knowledge, inno...
 
Web 2.0 In The Enterprise
Web 2.0 In The EnterpriseWeb 2.0 In The Enterprise
Web 2.0 In The Enterprise
 
Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0Knowledge Management and Enterprise 2.0
Knowledge Management and Enterprise 2.0
 
ECM Strategy Development
ECM Strategy DevelopmentECM Strategy Development
ECM Strategy Development
 
Using Enterprise 2.0 in Knowledge Management
Using Enterprise 2.0 in Knowledge ManagementUsing Enterprise 2.0 in Knowledge Management
Using Enterprise 2.0 in Knowledge Management
 
Can E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural BarrierCan E2.0 Break Through the KM Cultural Barrier
Can E2.0 Break Through the KM Cultural Barrier
 
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
Can Enterprise 2.0 Break the Knowledge Management Culture Barrier?
 
Knowledge Management in Enterprise 2.0 - Part 4
Knowledge Management in Enterprise 2.0 - Part 4Knowledge Management in Enterprise 2.0 - Part 4
Knowledge Management in Enterprise 2.0 - Part 4
 
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native MiddlewareTrends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
 
Getting Real About Enterprise 2.0
Getting Real About Enterprise 2.0Getting Real About Enterprise 2.0
Getting Real About Enterprise 2.0
 
DevOps, containers & microservices: Separating the hype from the reality
DevOps, containers & microservices: Separating the hype from the realityDevOps, containers & microservices: Separating the hype from the reality
DevOps, containers & microservices: Separating the hype from the reality
 
Case Study: How to move from a Monolith to Cloud, Containers and Microservices
Case Study: How to move from a Monolith to Cloud, Containers and MicroservicesCase Study: How to move from a Monolith to Cloud, Containers and Microservices
Case Study: How to move from a Monolith to Cloud, Containers and Microservices
 
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
Cloud Native Middleware Microservices - Lessons Learned with Docker, Kubernet...
 
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
Microservices, Containers, Docker and a Cloud-Native Architecture in the Midd...
 
Business Model Innovation Matters
Business Model Innovation MattersBusiness Model Innovation Matters
Business Model Innovation Matters
 

Similar a Implementing Enterprise 2.0 in a Controlled Environment: Lessons Learned

Extreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to KnowExtreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to KnowJohn Mancini
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseLance Peterman
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementJumpCloud
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperBen Rothke
 
KMWorld Martin Briefing
KMWorld Martin BriefingKMWorld Martin Briefing
KMWorld Martin Briefingmartingarland
 
Smart Contracts AI Article
Smart Contracts AI ArticleSmart Contracts AI Article
Smart Contracts AI ArticleShannon Copeland
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media GovernanceJesse Wilkins
 
Enterprise 2.0 using sharepoint and yammer
Enterprise 2.0 using sharepoint and yammerEnterprise 2.0 using sharepoint and yammer
Enterprise 2.0 using sharepoint and yammeraufaittechnologies
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondLydia Shepherd
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook EraJohn Mancini
 
Why Should Consultants and Systems Integrators Become Certified Information P...
Why Should Consultants and Systems Integrators Become Certified Information P...Why Should Consultants and Systems Integrators Become Certified Information P...
Why Should Consultants and Systems Integrators Become Certified Information P...John Mancini
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemBernard Marr
 
New Information Certification
New Information CertificationNew Information Certification
New Information CertificationAtle Skjekkeland
 
Web Governance: Where Strategy Meets Structure
Web Governance: Where Strategy Meets StructureWeb Governance: Where Strategy Meets Structure
Web Governance: Where Strategy Meets StructureLisa Welchman
 
Big data and the challenge of extreme information
Big data and the challenge of extreme informationBig data and the challenge of extreme information
Big data and the challenge of extreme informationJohn Mancini
 
Your clouds must be transparent - an intro to Cloud Security Alliance
Your clouds must be transparent - an intro to Cloud Security AllianceYour clouds must be transparent - an intro to Cloud Security Alliance
Your clouds must be transparent - an intro to Cloud Security AllianceDavid Jones
 
In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...John Mancini
 
Digital Renaissance - Alfresco EMEA Partner Day
Digital Renaissance - Alfresco EMEA Partner DayDigital Renaissance - Alfresco EMEA Partner Day
Digital Renaissance - Alfresco EMEA Partner DayJohn Newton
 

Similar a Implementing Enterprise 2.0 in a Controlled Environment: Lessons Learned (20)

Extreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to KnowExtreme Information - 8 Charts That Tell You Everything You Need to Know
Extreme Information - 8 Charts That Tell You Everything You Need to Know
 
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century EnterpriseIdentity & Access Management - Securing Your Data in the 21st Century Enterprise
Identity & Access Management - Securing Your Data in the 21st Century Enterprise
 
The 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity ManagementThe 2016 Guide to IT Identity Management
The 2016 Guide to IT Identity Management
 
The Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White PaperThe Need for DLP now - A Clearswift White Paper
The Need for DLP now - A Clearswift White Paper
 
KMWorld Martin Briefing
KMWorld Martin BriefingKMWorld Martin Briefing
KMWorld Martin Briefing
 
Big Data Dectives
Big Data DectivesBig Data Dectives
Big Data Dectives
 
Smart Contracts AI Article
Smart Contracts AI ArticleSmart Contracts AI Article
Smart Contracts AI Article
 
20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance20120208 ARMA Detroit Social Media Governance
20120208 ARMA Detroit Social Media Governance
 
Enterprise 2.0 using sharepoint and yammer
Enterprise 2.0 using sharepoint and yammerEnterprise 2.0 using sharepoint and yammer
Enterprise 2.0 using sharepoint and yammer
 
Norman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respondNorman Broadbent Cybersecurity Report - How should boards respond
Norman Broadbent Cybersecurity Report - How should boards respond
 
Information governance in the Facebook Era
Information governance in the Facebook EraInformation governance in the Facebook Era
Information governance in the Facebook Era
 
Why Should Consultants and Systems Integrators Become Certified Information P...
Why Should Consultants and Systems Integrators Become Certified Information P...Why Should Consultants and Systems Integrators Become Certified Information P...
Why Should Consultants and Systems Integrators Become Certified Information P...
 
What is killing ecm
What is killing ecmWhat is killing ecm
What is killing ecm
 
Why Cybersecurity is a Data Problem
Why Cybersecurity is a Data ProblemWhy Cybersecurity is a Data Problem
Why Cybersecurity is a Data Problem
 
New Information Certification
New Information CertificationNew Information Certification
New Information Certification
 
Web Governance: Where Strategy Meets Structure
Web Governance: Where Strategy Meets StructureWeb Governance: Where Strategy Meets Structure
Web Governance: Where Strategy Meets Structure
 
Big data and the challenge of extreme information
Big data and the challenge of extreme informationBig data and the challenge of extreme information
Big data and the challenge of extreme information
 
Your clouds must be transparent - an intro to Cloud Security Alliance
Your clouds must be transparent - an intro to Cloud Security AllianceYour clouds must be transparent - an intro to Cloud Security Alliance
Your clouds must be transparent - an intro to Cloud Security Alliance
 
In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...In the social, mobile and cloud era, what does it take to be an Information P...
In the social, mobile and cloud era, what does it take to be an Information P...
 
Digital Renaissance - Alfresco EMEA Partner Day
Digital Renaissance - Alfresco EMEA Partner DayDigital Renaissance - Alfresco EMEA Partner Day
Digital Renaissance - Alfresco EMEA Partner Day
 

Más de Carl Frappaolo

SharePoint: Truth and Fiction
SharePoint: Truth and FictionSharePoint: Truth and Fiction
SharePoint: Truth and FictionCarl Frappaolo
 
Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0Carl Frappaolo
 
5 08 Findability Webinar
5 08 Findability Webinar5 08 Findability Webinar
5 08 Findability WebinarCarl Frappaolo
 
Enterprise 2.0 Market Study
Enterprise 2.0 Market StudyEnterprise 2.0 Market Study
Enterprise 2.0 Market StudyCarl Frappaolo
 
ECM and Enterprise 2.0
ECM and Enterprise 2.0ECM and Enterprise 2.0
ECM and Enterprise 2.0Carl Frappaolo
 
Collaborate to Compete
Collaborate to CompeteCollaborate to Compete
Collaborate to CompeteCarl Frappaolo
 
Universal Search webinar
Universal Search webinarUniversal Search webinar
Universal Search webinarCarl Frappaolo
 
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskAIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskCarl Frappaolo
 
ECM and Enterprise 2.0
ECM and Enterprise 2.0ECM and Enterprise 2.0
ECM and Enterprise 2.0Carl Frappaolo
 

Más de Carl Frappaolo (12)

SharePoint: Truth and Fiction
SharePoint: Truth and FictionSharePoint: Truth and Fiction
SharePoint: Truth and Fiction
 
BPM Market IQ
BPM Market IQBPM Market IQ
BPM Market IQ
 
Findability Market IQ
Findability Market IQFindability Market IQ
Findability Market IQ
 
Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0Knowledge Management 2.0 - Enterprise 2.0
Knowledge Management 2.0 - Enterprise 2.0
 
5 08 Findability Webinar
5 08 Findability Webinar5 08 Findability Webinar
5 08 Findability Webinar
 
Enterprise 2.0 Market Study
Enterprise 2.0 Market StudyEnterprise 2.0 Market Study
Enterprise 2.0 Market Study
 
ECM and Enterprise 2.0
ECM and Enterprise 2.0ECM and Enterprise 2.0
ECM and Enterprise 2.0
 
Collaborate to Compete
Collaborate to CompeteCollaborate to Compete
Collaborate to Compete
 
Universal Search webinar
Universal Search webinarUniversal Search webinar
Universal Search webinar
 
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and RiskAIIM Webinar Content Security at the Fulcrum of Innovation and Risk
AIIM Webinar Content Security at the Fulcrum of Innovation and Risk
 
IRM and E-discovery
IRM and E-discoveryIRM and E-discovery
IRM and E-discovery
 
ECM and Enterprise 2.0
ECM and Enterprise 2.0ECM and Enterprise 2.0
ECM and Enterprise 2.0
 

Último

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Último (20)

Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Implementing Enterprise 2.0 in a Controlled Environment: Lessons Learned

  • 1. Implementing Enterprise 2.0 in a Controlled Environment: Lessons Learned Carl Frappaolo Information Architected, Inc.
  • 2. The company treads a delicate balance between social computing and privacy.
  • 3. Oh Really Really ?
  • 4. Risk Knowledge Management Management Control & Secure Collaborate & Innovate Information Architecture / Sourcing Strategy BPM Portals Search Visualization Workflow Websites Authentication Taxonomy IRM/ERM Facets Collaboration ID Contextual Content Social Network Extraction Filtering Analytics Computing Document DRM Tagging & Management DAM ePublishing Voting Records Content Community Management Management COLD Analytics Email IM Shared Drives html Multimedia DBs …
  • 5. “Enterprise 2.0 platforms, are by their nature more open, transparent, and visible than communication channels like email. Most of my work has stressed the benefits of using these platforms, but there are also potential drawbacks… Perhaps the most obvious of these goes by the label ‘security.’ It's the fear that the wrong content will show up on the platform, and/or that it will be viewed by the wrong people.” - Prof. Andrew McAfee
  • 6.
  • 7. “You have to deal with this. Times have changed. “ “This is the biggest unspoken hurdle companies will face in this area.”
  • 8. 2 General Findings • Very few best practices exist • There is no single “approach” or perspective
  • 9. CULTURE > vertical industry & European presence
  • 10. Privacy = Security = Legal Compliance
  • 11. Build on the Past
  • 15. “There are no new risks - just more opportunity for them to occur”
  • 16. Opt-in • Popular & Simple • Challenges Exist • Granularity • Criticality • Basic rights • “Practical” / pressure • Reciprocity issues • Potentially undermines the initiative • Innatley revealing • Poor analytics
  • 17. Piloting • Not Universally Used • Introduction to E2.0 and Security • Scale and Scope are Critical to Value • Start in areas where content is not confidential
  • 18. Automated Tracking & Reporting • Not reliable or always permitted • Can constitute a violation in itself • Exceptions •“Having our solution provide abuse reports was a huge win. These tools make it easier for employees to create anything, We can see if an employee posts something inappropriate.”
  • 19. Avoid • Bookmarking • Tagging • Voting • Social Network Analysis
  • 20. Approaches • Cyclical • Ongoing • Situational •“This is not a one-and-done situation”
  • 21. Policy Guidelines • KISS • High level • Formally “informal” • Allow for interpretation • Stress individual accountability / ethics
  • 22. Other Words of Advice • Know how/where your software gathers personal data • Understand user concerns • Bring all parties to the table as early as possible • Don’t own the content • Policy policy policy ... evolve, evolve, evolve • Remember these concerns are solvable
  • 23. CIO: ...Does the Enterprise 2.0 industry need to do something to improve security? McAfee: ... very little, if anything, needs to be done with it. I ask for horror stories all the time when I talk to groups, especially compliance or security-related horror stories. My collection is empty. People know how to do their jobs. By this point, none of these tools are a week old, so the rules for using them aren't unclear. ...
  • 24. Jane Doe v. Norwalk Community College EFF v US TEKsystems Souvalian v. Google Crispin v. Audigier
  • 25. Risk Knowledge Management Management Control & Secure Collaborate & Innovate Information Architecture / Sourcing Strategy BPM Portals Search Visualization Workflow Websites Authentication Taxonomy IRM/ERM Facets Collaboration ID Contextual Content Social Network Extraction Filtering Analytics Computing Document DRM Tagging & Management DAM ePublishing Voting Records Content Community Management Management COLD Analytics Email IM Shared Drives html Multimedia DBs …
  • 26. “Ask what is the lost potential value if compliance is strictly enforced.” “If we do this then what can go wrong? What is the potential damage if that happens?” “Our goal was to enable usage of technology to the highest degree PRACTICAL”
  • 27. “For us the local laws have been trumped by the greater good of the business.” “The business models and advantages offered by E2.0 are compelling and so you have to work through the risk issues.” “How we balance the legitimate demand for appropriate privacy and security against the need for knowledge exchange to support an effective and efficient community is the defining issue of the 21st century.”
  • 29. Let’s Get 2.0 www.informationarchitected.com Facebook: Information Architected Text Twitter: @IAI cf@informationarchitected.com Facebook: Carl Frappaolo Twitter: @carlfrappaolo