SlideShare una empresa de Scribd logo
1 de 43
Social Business: Using Social Processes and Technologies To Achieve Strategic Objectives Jesse Wilkins, CRM Director, Systems of Engagement AIIM International September 13, 2011
About AIIM International - Members in 146 countries Independent - Unbiased and vendor neutral Implementation Focused - Processes, not just technology  Industry Intermediary - users, suppliers, consultants, analysts, and the channel http://www.aiim.org
Jesse Wilkins, CRM Director, Systems of Engagement, AIIM Background in electronic records management, email management, ECM, and social technologies Frequent industry speaker and author AIIM ERM and E2.0 Expert Blogger Instructor for AIIM Certificate Programs
A technology inflection point Implications The social business roadmap
A technology inflection point
Systems of Record
Systems of Record
Systems of Record Systems of Record Command and control Transaction-oriented Data-centric User learns system Security is key issue Source = AIIM and TCG Advisors
Systems of Engagement
Systems of Engagement Systems of Record
A technology inflection point Implications
The Next Decade of Enterprise IT Systems of Engagement Systems of Record Command and control Open and accessible Transaction-oriented Interaction-oriented Document-centric User-centric Limited deployment Ubiquitous deployment Central IT-provisioned Self-provisioned
“A new class of company is emerging—one that uses collaborative Web 2.0 technologies intensively to connect the internal efforts of employees and to extend the organization’s reach to customers, partners, and suppliers.  We call this new kind of company the networked enterprise.”
The End of IT Autocracy
Technology touches everyone. Everyone carries technology expectations into the workplace. Why do I feel so powerful as a consumer and so lame as an employee? Photo source = http://www.flickr.com/photos/notionscapital/5225049493/
A technology inflection point Implications The social business roadmap
If you don’t know where you’re going…. 19
AIIM Social Business Roadmap Download at aiim.org/roadmap
The social business roadmap Describes steps to implement social business NOT necessarily linear Will vary substantially between organizations
Empowerment Not a step in the roadmap, but necessary precursor to successful social business initiatives Transparency Trust Technology 22
Emergence Experimental use of technologies “Under the radar” Proof of concept 23
Emergence Experimental use of technologies Proof of concept
Strategy Formalization of approach Social business assessment Planning and project management Internal marketing and communication Social business team Organization-specific                                 roadmap 25
Development Identify desired capabilities and deployment options Procure and implement tools Develop and deliver                                      training and support Build integration 26
Source: Govloop.com Development 27
Development 28
Development
Monitoring Listen to conversations before jumping into them Look for tone and sentiment Watch for complaints Set up queries and alerts Empower community                               managers 30
Monitoring 31
Participation Seed content into tools Use the tools! Consistent messaging across tools Be patient 33
Participation 34
Engagement Move from listening and broadcasting to engagement Plan for engagement Authenticity and personality key 35
Engagement
Engagement The US Air Force’s Rules of Engagement for Blogging 37
Governance Policies and guidelines Restrictions on tools and content Internal monitoring Records management Legal issues 38
Governance
Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.” Policy 2.0 – in 140 characters
Optimization Encourage uptake of the tools Monitor efficacy of tools Measure and analyze tools and processes Continue to educate users and    stakeholders Identify changes to tools                                   and new tools
Conclusion Social business processes and tools are here TODAY Significant business benefits from their use It can be done responsibly It’s time to lead our organizations
Jesse Wilkins, CRM, CDIA+, ermm Director, Systems of Engagement AIIM International              +1 (303) 574-0749 direct 		jwilkins@aiim.org  		http://www.twitter.com/jessewilkins 		http://www.linkedin.com/in/jessewilkins 		http://www.facebook.com/jessewilkins 		http://www.slideshare.net/jessewilkins For more information

Más contenido relacionado

Destacado

Destacado (14)

Energy Efficient Lighting
Energy Efficient LightingEnergy Efficient Lighting
Energy Efficient Lighting
 
Yunnan environmental development institute
Yunnan environmental development instituteYunnan environmental development institute
Yunnan environmental development institute
 
Ulasan jurnal e learning bagi subjek KPT 6044
Ulasan jurnal e learning bagi subjek KPT 6044Ulasan jurnal e learning bagi subjek KPT 6044
Ulasan jurnal e learning bagi subjek KPT 6044
 
Art and Sustainability
Art and SustainabilityArt and Sustainability
Art and Sustainability
 
Sustainable Procurement Strategy for Glumac's LBC Office in Shanghai
Sustainable Procurement Strategy for Glumac's LBC Office in ShanghaiSustainable Procurement Strategy for Glumac's LBC Office in Shanghai
Sustainable Procurement Strategy for Glumac's LBC Office in Shanghai
 
00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo00 14092011-0900-derick-de leo
00 14092011-0900-derick-de leo
 
Pandora FMS: Apache server monitoring
Pandora FMS: Apache server monitoring Pandora FMS: Apache server monitoring
Pandora FMS: Apache server monitoring
 
Shanghai Young Bakers
Shanghai Young BakersShanghai Young Bakers
Shanghai Young Bakers
 
Managing Landscapes for the Diversity in the Upper Mekong Region
Managing Landscapes for the Diversity in the Upper Mekong RegionManaging Landscapes for the Diversity in the Upper Mekong Region
Managing Landscapes for the Diversity in the Upper Mekong Region
 
Learning from Nature, Beyond Carbon Zero
Learning from Nature, Beyond Carbon ZeroLearning from Nature, Beyond Carbon Zero
Learning from Nature, Beyond Carbon Zero
 
Thesis Presentatn
Thesis PresentatnThesis Presentatn
Thesis Presentatn
 
Kajian tinjauan penggunaan web sebagai medium p&p
Kajian tinjauan penggunaan web sebagai medium p&pKajian tinjauan penggunaan web sebagai medium p&p
Kajian tinjauan penggunaan web sebagai medium p&p
 
What happened in Durban (Climate Change Conference)?
What happened in Durban (Climate Change Conference)?What happened in Durban (Climate Change Conference)?
What happened in Durban (Climate Change Conference)?
 
Chinese and Canadian Sustainable Design Practices
Chinese and Canadian Sustainable Design PracticesChinese and Canadian Sustainable Design Practices
Chinese and Canadian Sustainable Design Practices
 

Similar a Social Business: Utilizando tecnologias e processos sociais para atingir os objetivos estratégicos

20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governanceJesse Wilkins
 
20110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 2020110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 20Jesse Wilkins
 
Social business-roadmap2011
Social business-roadmap2011Social business-roadmap2011
Social business-roadmap2011Claude Super
 
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...Jesse Wilkins
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...Atle Skjekkeland
 
Mapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementMapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementNexgate
 
Governing Social Media
Governing Social MediaGoverning Social Media
Governing Social MediaDoug Cornelius
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0Jesse Wilkins
 
Taking social networking to the next level
Taking social networking to the next levelTaking social networking to the next level
Taking social networking to the next levelAndrea Baker
 
Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360Simplify360
 
4 nurturing the it committee ppt-sg-k2 (final)
4   nurturing the it committee ppt-sg-k2 (final)4   nurturing the it committee ppt-sg-k2 (final)
4 nurturing the it committee ppt-sg-k2 (final)LinkedIn Singapore
 
Social Media Strategies for Business - Social Media Governance
Social Media Strategies for Business - Social Media GovernanceSocial Media Strategies for Business - Social Media Governance
Social Media Strategies for Business - Social Media GovernanceAri Newman
 
20160317 ARMA Wyoming Governance for Social Media
20160317 ARMA Wyoming Governance for Social Media20160317 ARMA Wyoming Governance for Social Media
20160317 ARMA Wyoming Governance for Social MediaJesse Wilkins
 
B2B Technology Marketing in Social Media
B2B Technology Marketing in Social MediaB2B Technology Marketing in Social Media
B2B Technology Marketing in Social MediaRacepoint Global
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information GovernanceAtle Skjekkeland
 
Social business: from #buzz to #benefits
Social business: from #buzz to #benefitsSocial business: from #buzz to #benefits
Social business: from #buzz to #benefitsVelrada
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security ProgramShauna_Cox
 

Similar a Social Business: Utilizando tecnologias e processos sociais para atingir os objetivos estratégicos (20)

20110720 fose 2011 sm governance
20110720 fose 2011 sm governance20110720 fose 2011 sm governance
20110720 fose 2011 sm governance
 
20110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 2020110407 NARA E-Records Forum on RM 20
20110407 NARA E-Records Forum on RM 20
 
Social business-roadmap2011
Social business-roadmap2011Social business-roadmap2011
Social business-roadmap2011
 
AIIM Social Business Roadmap
AIIM Social Business RoadmapAIIM Social Business Roadmap
AIIM Social Business Roadmap
 
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
20110110 ARMA Dallas Managing Web 2.0 Records: Facebook, Twitter and Everythi...
 
Managing Web 2.0 Records.
Managing Web 2.0 Records.Managing Web 2.0 Records.
Managing Web 2.0 Records.
 
How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...How will social media and other new technologies impact our industry the next...
How will social media and other new technologies impact our industry the next...
 
Risky business of social media
Risky business of social mediaRisky business of social media
Risky business of social media
 
Mapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk ManagementMapping Roles and Responsibilities for Social Media Risk Management
Mapping Roles and Responsibilities for Social Media Risk Management
 
Governing Social Media
Governing Social MediaGoverning Social Media
Governing Social Media
 
20110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.020110427 ARMA Houston Keynote Records Management 2.0
20110427 ARMA Houston Keynote Records Management 2.0
 
Taking social networking to the next level
Taking social networking to the next levelTaking social networking to the next level
Taking social networking to the next level
 
Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360Manage your Online Reputation with Simplify360
Manage your Online Reputation with Simplify360
 
4 nurturing the it committee ppt-sg-k2 (final)
4   nurturing the it committee ppt-sg-k2 (final)4   nurturing the it committee ppt-sg-k2 (final)
4 nurturing the it committee ppt-sg-k2 (final)
 
Social Media Strategies for Business - Social Media Governance
Social Media Strategies for Business - Social Media GovernanceSocial Media Strategies for Business - Social Media Governance
Social Media Strategies for Business - Social Media Governance
 
20160317 ARMA Wyoming Governance for Social Media
20160317 ARMA Wyoming Governance for Social Media20160317 ARMA Wyoming Governance for Social Media
20160317 ARMA Wyoming Governance for Social Media
 
B2B Technology Marketing in Social Media
B2B Technology Marketing in Social MediaB2B Technology Marketing in Social Media
B2B Technology Marketing in Social Media
 
What is Information Governance
What is Information GovernanceWhat is Information Governance
What is Information Governance
 
Social business: from #buzz to #benefits
Social business: from #buzz to #benefitsSocial business: from #buzz to #benefits
Social business: from #buzz to #benefits
 
Developing an Information Security Program
Developing an Information Security ProgramDeveloping an Information Security Program
Developing an Information Security Program
 

Más de guiabusinessmedia

01 14092011-1530-paulo-carneiro
01 14092011-1530-paulo-carneiro01 14092011-1530-paulo-carneiro
01 14092011-1530-paulo-carneiroguiabusinessmedia
 
02 14092011-0915-walter-koch
02 14092011-0915-walter-koch02 14092011-0915-walter-koch
02 14092011-0915-walter-kochguiabusinessmedia
 
01 14092011-1130-anderson-sabino
01 14092011-1130-anderson-sabino01 14092011-1130-anderson-sabino
01 14092011-1130-anderson-sabinoguiabusinessmedia
 
00 14092011-1430-sergio-penedo
00 14092011-1430-sergio-penedo00 14092011-1430-sergio-penedo
00 14092011-1430-sergio-penedoguiabusinessmedia
 
00 14092011-1045-fabio-nunes
00 14092011-1045-fabio-nunes00 14092011-1045-fabio-nunes
00 14092011-1045-fabio-nunesguiabusinessmedia
 
00 13092011-1600-governança-da-gestão-documental
00 13092011-1600-governança-da-gestão-documental00 13092011-1600-governança-da-gestão-documental
00 13092011-1600-governança-da-gestão-documentalguiabusinessmedia
 
00 13092011-1430-anderson-germano
00 13092011-1430-anderson-germano00 13092011-1430-anderson-germano
00 13092011-1430-anderson-germanoguiabusinessmedia
 
00 13092011-1345-eduardo-gutierrez
00 13092011-1345-eduardo-gutierrez00 13092011-1345-eduardo-gutierrez
00 13092011-1345-eduardo-gutierrezguiabusinessmedia
 
00 14092011-1530-edison-puig-maldonado
00 14092011-1530-edison-puig-maldonado00 14092011-1530-edison-puig-maldonado
00 14092011-1530-edison-puig-maldonadoguiabusinessmedia
 

Más de guiabusinessmedia (9)

01 14092011-1530-paulo-carneiro
01 14092011-1530-paulo-carneiro01 14092011-1530-paulo-carneiro
01 14092011-1530-paulo-carneiro
 
02 14092011-0915-walter-koch
02 14092011-0915-walter-koch02 14092011-0915-walter-koch
02 14092011-0915-walter-koch
 
01 14092011-1130-anderson-sabino
01 14092011-1130-anderson-sabino01 14092011-1130-anderson-sabino
01 14092011-1130-anderson-sabino
 
00 14092011-1430-sergio-penedo
00 14092011-1430-sergio-penedo00 14092011-1430-sergio-penedo
00 14092011-1430-sergio-penedo
 
00 14092011-1045-fabio-nunes
00 14092011-1045-fabio-nunes00 14092011-1045-fabio-nunes
00 14092011-1045-fabio-nunes
 
00 13092011-1600-governança-da-gestão-documental
00 13092011-1600-governança-da-gestão-documental00 13092011-1600-governança-da-gestão-documental
00 13092011-1600-governança-da-gestão-documental
 
00 13092011-1430-anderson-germano
00 13092011-1430-anderson-germano00 13092011-1430-anderson-germano
00 13092011-1430-anderson-germano
 
00 13092011-1345-eduardo-gutierrez
00 13092011-1345-eduardo-gutierrez00 13092011-1345-eduardo-gutierrez
00 13092011-1345-eduardo-gutierrez
 
00 14092011-1530-edison-puig-maldonado
00 14092011-1530-edison-puig-maldonado00 14092011-1530-edison-puig-maldonado
00 14092011-1530-edison-puig-maldonado
 

Último

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterMydbops
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rick Flair
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfIngrid Airi González
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Strongerpanagenda
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 

Último (20)

Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Scale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL RouterScale your database traffic with Read & Write split using MySQL Router
Scale your database traffic with Read & Write split using MySQL Router
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...Rise of the Machines: Known As Drones...
Rise of the Machines: Known As Drones...
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Generative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdfGenerative Artificial Intelligence: How generative AI works.pdf
Generative Artificial Intelligence: How generative AI works.pdf
 
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better StrongerModern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
Modern Roaming for Notes and Nomad – Cheaper Faster Better Stronger
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 

Social Business: Utilizando tecnologias e processos sociais para atingir os objetivos estratégicos

  • 1. Social Business: Using Social Processes and Technologies To Achieve Strategic Objectives Jesse Wilkins, CRM Director, Systems of Engagement AIIM International September 13, 2011
  • 2. About AIIM International - Members in 146 countries Independent - Unbiased and vendor neutral Implementation Focused - Processes, not just technology Industry Intermediary - users, suppliers, consultants, analysts, and the channel http://www.aiim.org
  • 3. Jesse Wilkins, CRM Director, Systems of Engagement, AIIM Background in electronic records management, email management, ECM, and social technologies Frequent industry speaker and author AIIM ERM and E2.0 Expert Blogger Instructor for AIIM Certificate Programs
  • 4. A technology inflection point Implications The social business roadmap
  • 8. Systems of Record Systems of Record Command and control Transaction-oriented Data-centric User learns system Security is key issue Source = AIIM and TCG Advisors
  • 10. Systems of Engagement Systems of Record
  • 11. A technology inflection point Implications
  • 12. The Next Decade of Enterprise IT Systems of Engagement Systems of Record Command and control Open and accessible Transaction-oriented Interaction-oriented Document-centric User-centric Limited deployment Ubiquitous deployment Central IT-provisioned Self-provisioned
  • 13.
  • 14. “A new class of company is emerging—one that uses collaborative Web 2.0 technologies intensively to connect the internal efforts of employees and to extend the organization’s reach to customers, partners, and suppliers. We call this new kind of company the networked enterprise.”
  • 15. The End of IT Autocracy
  • 16. Technology touches everyone. Everyone carries technology expectations into the workplace. Why do I feel so powerful as a consumer and so lame as an employee? Photo source = http://www.flickr.com/photos/notionscapital/5225049493/
  • 17.
  • 18. A technology inflection point Implications The social business roadmap
  • 19. If you don’t know where you’re going…. 19
  • 20. AIIM Social Business Roadmap Download at aiim.org/roadmap
  • 21. The social business roadmap Describes steps to implement social business NOT necessarily linear Will vary substantially between organizations
  • 22. Empowerment Not a step in the roadmap, but necessary precursor to successful social business initiatives Transparency Trust Technology 22
  • 23. Emergence Experimental use of technologies “Under the radar” Proof of concept 23
  • 24. Emergence Experimental use of technologies Proof of concept
  • 25. Strategy Formalization of approach Social business assessment Planning and project management Internal marketing and communication Social business team Organization-specific roadmap 25
  • 26. Development Identify desired capabilities and deployment options Procure and implement tools Develop and deliver training and support Build integration 26
  • 30. Monitoring Listen to conversations before jumping into them Look for tone and sentiment Watch for complaints Set up queries and alerts Empower community managers 30
  • 32.
  • 33. Participation Seed content into tools Use the tools! Consistent messaging across tools Be patient 33
  • 35. Engagement Move from listening and broadcasting to engagement Plan for engagement Authenticity and personality key 35
  • 37. Engagement The US Air Force’s Rules of Engagement for Blogging 37
  • 38. Governance Policies and guidelines Restrictions on tools and content Internal monitoring Records management Legal issues 38
  • 40. Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.” Policy 2.0 – in 140 characters
  • 41. Optimization Encourage uptake of the tools Monitor efficacy of tools Measure and analyze tools and processes Continue to educate users and stakeholders Identify changes to tools and new tools
  • 42. Conclusion Social business processes and tools are here TODAY Significant business benefits from their use It can be done responsibly It’s time to lead our organizations
  • 43. Jesse Wilkins, CRM, CDIA+, ermm Director, Systems of Engagement AIIM International +1 (303) 574-0749 direct jwilkins@aiim.org http://www.twitter.com/jessewilkins http://www.linkedin.com/in/jessewilkins http://www.facebook.com/jessewilkins http://www.slideshare.net/jessewilkins For more information

Notas del editor

  1. During my professional lifetime, I have seen at least 4 major enterprise IT transformations, and they seem to be occurring with increasing acceleration. When I first came into the workforce, the enterprise IT norm was centered on mainframe computers focused on batch-processed financial applications. This was the era of Burroughs and Univac and NCR and Control Data and Honeywell. This era was soon eclipsed by the rise of minicomputers.Minis were themselves eclipsed by the PC revolution, stitched together in Local Area Networks. Steroids in the form of the internet changed everything about how we connected PCs together distributed documents and information around our organizations. And then along came Google and our expectations about enterprise IT and simplicity of use morphed once again.
  2. 1518We have spent the past several decades of IT investment focused on deploying 'systems of record.'  Transaction systems for global commerce . . . Financials, Order Processing, Inventory, HR, CRM, Supply Chain . . .Mainframes, minis, client-server, PC, Internet-enabled, SaaSDrove three decades of investmentData centers everywhereDatabases, OLTP, reporting and analyticsNetwork as a transport mechanismThese systems accomplished two important things: First, they centralized, standardized, and automated business transactions on a global basis, thereby better enabling world trade.  Second, they gave top management a global view of the state of the business, thereby better enabling global business management.   Spending on the Enterprise Content Management technologies that are at the core of Systems of Record will continue -- and will actually expand as these solutions become more available and relevant to small and mid-sized organizations
  3. The challenges here are enormous. Expectations of Enterprise IT are rising. The business, still reeling from the crash of 2008, is questioning the rigidity and cost of legacy systems. The focus of IT is changing from a traditional focus on standardizing and automating back-end manual processes – a focus on CONTROL – to a focus on empowering and connecting knowledge workers and improving knowledge worker productivity and innovation. in the world of Systems of Engagement – no one on the user side cares about any of this. However, because these systems are being used by enterprises, they will inevitably be subject to the same legal and social restrictions as traditional enterprise content, and therein lies the rub. Today that rub is significantly limiting endorsement and adoption of consumer-style communication and collaboration facilities around the world, and it will continue to do so until the content management industry and its customers develop protocols and policies to address its issues.
  4. The challenges here are enormous. Expectations of Enterprise IT are rising. The business, still reeling from the crash of 2008, is questioning the rigidity and cost of legacy systems. The focus of IT is changing from a traditional focus on standardizing and automating back-end manual processes – a focus on CONTROL – to a focus on empowering and connecting knowledge workers and improving knowledge worker productivity and innovation.
  5. 1050“A new class of company is emerging—one that uses collaborative Web 2.0 technologies intensively to connect the internal efforts of employees and to extend the organization’s reach to customers, partners, and suppliers. We call this new kind of company the networked enterprise.”
  6. 350,000 apps in the iStoreOver 10 billion downloads
  7. 1541 The roadmap provide organizations with a formal framework for evaluating and implementing social processes and technologies both inside and outside the firewallNot for just implementing a social technology, but benefiting from social processes and technologiesLeverage innovation from the massesMake it lean and agile; Fail fastRoadmap developed based on outcomes of Moore project and research the last 3 years from our 65,000 community membersQUESTION: What is necessary to achieve innovation from the masses (Empowerment covered on next slide)?
  8. 1542: Question: What are the prerequisites for Social Business?0. Empowerment: personal projects, measure outcomes, freedom to experiment- Transparency requires that the organization move from a culture of knowledge hoarding to one of knowledge sharing.- Trust requires that the organization trust its users to do what is right, while supporting them with the training and governance required for them to be accountable for that trust.- And technology requires willingness to allow employees to experiment with new tools and processes, trusting that they will not abuse them and permitting them to “fail fast.”
  9. 1543 How do you identify and set a Strategy? Answer: Need proof of concept1. Emergence (or Concepts/Skunkworks): Biz and IT innovation from the massesIn this step the organization is not using social technologies in any formal or organized way. Instead, individuals or small groups within the organization are experimenting with social technologies to determine whether there is business value to them.- 1.1 Encourage innovation- 1.2 Find external reference examples- 1.3 PrototypeQUESTION 1: Anybody has additional factors or tasks that will encourage Emergence (Innovation from the masses)?QUESTION 2: How important is it to show ROI?
  10. 1549
  11. Identifying what tools to use – here, wiki, blog, user ratings of appsSetting up navigation and classificationDeploying social sharing widgets (which ones, how)
  12. 1544 One of the most famous cases studies of Emergence is the beginning of Intellipedia. Now this has led to an entire suite of collaborative tools behind the firewall. Led by champions Don Burke, Sean Dennehy, and Andrea Baker of the Intellipedia Development cell. Social Business tools were brought in for testing in quick and short pilots: urls were shared with test users and programs either stuck or failed-fast. Today the tool set available to users is not as wide as it is on the open net, but it is focused based on best use cases and adoption by the internal community. Tools are inter-connected and a single sign on is available.
  13. 1551 Monitoring/Listening: Viral implementationInitially the organization should spend time listening to the conversations taking place in and around a particular tool to get a sense of the nature of the tool, the content of the conversations, the target audiences, and who the leading participants are.This is perhaps more visible in externally focused processes but is important for internal ones as well.QUESTION: How do you support a viral adoption? Answer: rumors, communication, ambassadors, show people, show benefits- 4.1 Listen to internal sites and comments- 4.2 Listen to external sites and comments- 4.3 Set up queries and alerts- 4.4 Empower community managers
  14. 1555 http://www.onesocialmedia.com/2011/02/social-media-listening-in-real-time-case-study-toyota-of-des-moines/Social Media account manager was lucky enough to have seen this post only 5 minutes after it had been posted. Because the Facebook post was fairly recent, I decided to call someone at Toyota of Des Moines. I wanted to see if they could find the displeased customer before she left the dealership, in hopes that they could try to work through the issue with her in person. As luck would have it, the customer was still at the dealership at the time that I called to inform them of the post. They were able to talk with her, to let her know that they saw her Facebook post, and that they wanted to work through the issue with her. 
  15. 1553. Participation: Getting all relevant people to get involvedOnce the organization has done some listening it will be able to participate more meaningfully and should begin doing so according to what it has learned about the target market and the nature of the conversations on the various tools.QUESTION: How do you get all relevant people involved? Answer: Demonstrate benefits, carrot/stick, etc.- 5.1 Seed content into the tools5.2 Ensure consistent messaging across platformsAnd split this step into stages; e.g first get people to register
  16. Move from listening and broadcasting to engagementPlan for engagementTriage for comments, external mentionsEngagement on public, commercial, and third-party sitesAuthenticity and personality
  17. 1559 CNN iReporterhttp://ireport.cnn.com/community/assignmentCNN’s iReport assignment desk is an example of community evolution of technology and communication. Eachday and throughout the day as news breaks, the editors of the iReport page put up assignments to the citizenjournalists to help get real and participatory news live from wherever in the world it is happening. They haveembraced the evolution of technology by asking for submissions as the technology evolves and connecting itwith social media through hashtags on Twitter.This creates additional conversation around not only contributions, but the delivery medium itself. Those noteven connected to CNN are able to participate in the conversation because it is being held at the widest possibledistribution point or audience, out in the open on social media streams.
  18. 1610
  19. 1604
  20. Here’s a very succinct Twitter policy from a blog by an HR-focused law firm, GruntledEmployees.com. “Our Twitter policy: Be professional, kind, discreet, authentic. Represent us well. Remember that you can’t control it once you hit “update.””Pretty good, right? Now, you could argue that this policy is missing a lot of the stuff I just mentioned. But I don’t know that I agree – authentic, professional, discreet, represent us well – that’s pretty close. And regardless of what you think might be missing, I’d argue that if your employees follow this policy, you won’t have many issues with them. And note that this policy is itself Tweetable. [twitter] Policy 2.0 – in 140 characters, courtesy of gruntledemployees.com. http://is.gd/8BpjT[/twitter]