SlideShare una empresa de Scribd logo
1 de 10
Descargar para leer sin conexión
Best Practices




 Challenges and Best Practices for
 Knowledge Management using
 Enterprise Social Networks




Enterprise Social Network Adoption Challenges
and Best Practices
Best Practices




Overview
Most enterprises looking to deploy Enterprise Social Network Platforms are extremely cautious about adopting one. The main
questions that emerge in their mind are:
 1. What if this becomes a platform for grapevine or gossip instead of productive and professional activity?
 2. How to control or monitor the enterprise social media conversations in a open and professional manner without invading
    privacy of an individual at work place?
 3. Should we push the social collaboration or shall the business let the social conversations happen on their own and remain
    unseen without nudging the collaboration in the work place?
 4. How will we control or report abuse as and when it happens? What if this snowballs into a contractual or political issue?
 5. Can company secrets be leaked? Invite law suits or similar such events?

The list goes on and on....In most cases these concerns are not as big as they are made out to be. However these continue to
remain challenges for adoption of the Enterprise Social Networks within businesses as a means for Better Knowledge Management.


Challenges
There are several challenges faced by Management while deploying Enterprise Social Network patterns for workforce. Most of these
challenges spiral into strong perception of deployment of Enterprise Social Networks being risky with potential to create unwanted
chaos. The message around how it can dramatically change the Knowledge Management culture is often hidden in the various
perceptions that are formed around its adoption.

Through this table below we have highlighted some of the challenges faced and why these challenges are more around the
perception instead of real risks or concerns.

    Perceived Challenges Management may               Why the risks/concern is legitimate but is more of a
    face while deploying Enterprise Social            perception and can be mitigated by understanding it clearly
    Networks                                          first before Best Practices are applied.

    Inappropriate content and abuse on the            Internet is anonymous. One can be who they wish to be. This is
    social conversations enabled in the               not the case with Enterprise Social Networks and conversations.
    enterprise
                                                          1. Identity is revealed in case of a Business social network
                                                             that ensures that User identity is visible and managed
                                                             correctly

                                                          2. Within the business community a form of "Self Policing"
                                                             emerges and becomes the norm that allows offensive
                                                             comments to not only be spotted by others but acts as a
                                                             deterrent for any trouble makers.

                                                          3. In business social network the formal managers and
                                                             leaders also participate. This automatically ensures that
                                                             the followers are aware of being monitored and counseled
                                                             in case they over step.

                                                          4. Younger workforce is social media savvy and learning


                                                       www.infoaxon.com
Best Practices


                                                     slowly how to behave on social media. The same
                                                     consciousness is carried over to social networks.

Content is inaccurate                            1. As long as the content put by employees and leaders on
                                                    enterprise social network is open for scrutiny chances are
                                                    that inaccurate content will be spotted much sooner and
                                                    pointed out by other work force.
Content that is put on social wall
conversations even though it is                  2. However it is important that some form of workflow or
                                                    moderation is also put in place for document posts, audio
professional activity and inappropriate
                                                    and video initially so that the message is clear that
may be inaccurate representation of
                                                    inaccurate content is being watched.
facts and can either confuse or mislead
the work force.

Too much transparency                            1. This is very much a legitimate concern but transparency
                                                    can be managed well and can lead to a strong brand and
There are often concerns that too much              perception of a open and transparent organization.
about the company and its policies or
day to day decisions is "going out" and          2. Educating the workforce clear non negotiable when it
                                                    comes to posting company documents or information can
can lead to too much transparency and
                                                    be outlined by HR teams.
problems in workplace because of it.
                                                 3. Managers and Leaders are also part of the social
                                                    conversations and can monitor any violations and raise
                                                    and counsel over a period of time to minimize such
                                                    occurrences.

                                                4. On the contrary, the transparency and social chatter
                                                     around HR policies or similar other events is a great input
                                                     to Management provided this is reported, understood and
                                                     responded positively.
Insufficient Facilitation of Participation   One of the main challenges is also that management is not
(By Management)                              equipped to encourage or foster participation.

                                             Management needs to work with employees in terms of
                                             communicating that the Social Network deployment is not just a
                                             new technology development but also a new way or culture of
                                             doing daily communication and participation.

                                             Management needs to be involved much more heavily in declaring
                                             and nurturing Communities of Practices (CoPs) within the
                                             business.

High Barriers to Participation (By           High barrier for participation means that people do not easily
employees)                                   contribute to online discussions and share their knowledge
                                             publicly.

                                             There are multiple reasons for this kind of behavior: not being
                                             used to using one’s own name in online communities can cause
                                             shyness, and the communication culture of the organization may
                                             be too formal and hierarchical to allow for low-barrier
                                             contributions and unstructured participation.

                                             The most important reason for having a high barrier for
                                             participation, however, is the fact that the participation is not
                                             encouraged enough by the platform, the content or effective


                                              www.infoaxon.com
Best Practices


                                                          community management.

                                                          Management must make sure that employees have clear
                                                          understanding of their own rights and responsibilities as active
A                                                         users of the new systems.                                            lot of
the
concerns related to risks of Social Media are legitimate concerns but these risks and concerns are actually on closer view much
unfoveral reasons for this:


   Best Practices
   Integrate Social Network into Business Ways of Working

   The Social Network should not just become a set of Wall posts and updates done by employees in their spare time. Actually the
   Social Network has ability to replace in some cases existing processes or move along with the other existing business processes to
   ensure better outcomes.

   One of the simple use cases for this best practice is move of email communication to the social network thus reducing clutter. For
   e.g. status meeting reports can simply be published as a announcement alert or wall posting to a large number of users instead of
   a select few. This will involve entire teams and bring in a culture of openness visible within the workplace.


   Make Reporting Abuse "Visible"

   One of the most basic practice is to make it easy for the community users participating in a social conversation to report abuse to
   moderators.
   This is done by ensuring that reporting abuse feature is visible and promoted actively by business marketing teams and actively
   talked about in the organization before the launch of the social network.
   For e.g. while showing nested comments of a conversation an access Web UI button to report abuse around the comment made
   with the Comment name attached will be very useful and give an impression that the business is monitoring and providing due
   weight age to practice of reporting abuse.


   Build a Abuse Monitoring Structure

   In parallel to have a reporting abuse feature it is also important to draw in user community champions and provide a more "Self
   Policing" flavor to monitoring abuse. Reported abuse features should regularly be monitored by the community champion members
   and offenders counseled or in extreme cases disciplined.

       1. Keep the community of self policing moderators fully represented from the workforce itself. Avoid managers or senior staff
          that may not be actively participating in the social conversations in the first place.
       2. Choose community moderators that can handle the issues with calm and have ability to counsel the staff if and when such
          event occurs.

   In terms of best practices any organization adopting Enterprise Social Network has to ensure following:

       1. Make sure your organization is not only on board but knows where it's going and gets the kind of participation that truly
          makes a difference in productivity, creativity, and collaboration.
       2. Make sure the social media in your workplace has the same characteristics as social media in employee personal life



                                                            www.infoaxon.com
Best Practices


Building Communities of Practices

Communities of Practices (CoPs) is a well formed Knowledge Management strategy.

Research conveys that many of the exchanges of practical information and problem-solving happened during informal gatherings
where experts of some topic of interest exchanged stories about their experience.
In CoP environments, novices could also consult with experts in a non-threatening environment. Through this process, gaps in the
practice were identified and solutions were proposed.

Individuals might apply the solution in their own practice, and the outcomes were fed back to their colleagues for further
refinement of the solution. Eventually these informal communications became the means for sharing information for improving
practice and generating new knowledge and skills.

Community relationships between different business practices should ride on the Enterprise Social Network Foundation. Following
concrete steps are needed alongside the Enterprise Social Network:

    1. Identify and Form Communities of Practices within the business.

    2. Promotion of Workspaces as Communities of Practices on the Social Network itself. These Sites may exist across functional
       areas and reflect a particular interest area such as "Customer Service".
    3. Enable automated wall postings whenever a new article has been added (as announcement feed) to promote the practice
       area

    4. Use Groups and discussions as a means to spread awareness and learning around a Practice Area.



Strong Moderation Capability

A business should assign a team of moderators for the enterprise social network to sustain and thrive. Initially it will be a new tool
for the work force to form communities of interest and exchange ideas and suggestions. Lot of these features are new to the
workplace. We need a team of moderators that can shape the conversations and evaluate whether violations are happening.

Also the moderation team can inject high quality content that attracts and encourages others users to contribute more to this
activity.


Linking with Outcomes

Ultimately the social conversations, blogs, wikis, posts to the social network in a business context must be linked to some outcome
that the business wishes to realize.

Shaping this is quite a challenge because more social networks have emerged from a personal context and most users would
naturally be inclined to keep conversations at a personal level during social conversations.

Shaping these conversations in such a way that they can be linked to a business event or an outcome requires moderators to also
take control and guide the social chatter.

Management can set goals such as "Implementing 5 ideas" this month from the workforce on better delivery of services to
customers. These ideas are then collected and put into shape as actual actions by the management team.

                                                          www.infoaxon.com
Best Practices




"Measure" and Report Social Conversations

Management has taken a leap of faith when it comes to deploying enterprise social network within the business. Therefore a
mechanism to report social conversations and objectively view the insights that these conversations highlight for the business will
continue to benefit the business and will also help value the social network in the work place as a strategic tool.
The enterprise social conversations can be collected in the knowledge repository and using text and semantic analysis a better
reporting structure should be created.

For e.g. total conversations of a month can be analyzed and the overall "Buzz" at the work place can be articulated in the form of
reporting that measures different grades such as "High Morale" , "Neutral Feedbacks", "Growing Angst" so that these reports can
reflect the HR practices and influence any other decision making.



Make it part of Regular Employee Interaction

Equipped with better social network reporting, management and HR teams can engage employees in a very different manner as
today.
    1. Collecting comments from audiences before a HR review cycle
    2. Referring to specific posts or views expressed during Management catch up meetings




Suggest Tools
InfoAxon suggests following technology and tools to:

    1. Assist in faster adoption of Social Network within the enterprise
    2. Report Abuse and Monitoring of Social Network
    3. Social Network Analytics Tools

"Pull" Tools and Techniques

Building Social Network for enterprises can benefit from "pull" created through a much more personalized and "Public Social Media"
look and feel. Employees that already access public social media sites such as Facebook, Twitter and Tumblr etc. are already aware
of Social Network usability patterns and features. It is easier to adopt enterprise social network technology that is similar in look
and feel or derived from public social network design patterns.

For e.g.

    1. Interactive Chat can be added alongside Social Network to reduce the overall email traffic and create a major PULL factor
       allowing users to integrate with existing Social Network Platform.

    2. Rating features provided to contributors to rate documents and content shared through social media. This increases
       participation and fosters self ranking of content by the community instead of through organizational workflows. These
       ranks can be attractively tagged as "X people rated this highly with ranking XXXXXX"



                                                         www.infoaxon.com
Best Practices




    3. Provide   attractive and useful personal productivity applications such as:
           a.    Weather
           b.    News
           c.    Subscribe to external web sites.
           d.    Links
           e.    Discussion forums
           f.    FAQ Knowledge Bases

Abuse Monitoring

Enterprise Social Network wall updates and conversations should be treated as "knowledge items" that contain snippets of text
conversations describing a state of mind or event. This is precious data which can be analyzed further for measuring and
monitoring abuse on the enterprise social network sites.

For e.g. using Web harvesting and Semantic programming techniques and open source tools it is possible to crawl a database of
the conversation snippets and updates and report through special keywords whether abuse is taking place. If such a pattern match
is found the moderators are alerted.

Using a rules engine and a "Abuse Dictionary" patterns will be matched and abuse reported and highlighted.




                                                          www.infoaxon.com
Best Practices




Social Network Analytics

Social Network Analytics is a emerging science and analytical practice around data collected through social network patterns. There
are several ways in which this can be done and InfoAxon can provide add on plug-ins to achieve this.

    1. Using Open Source tools such as Pentaho, Social Network analytics InfoAxon plug-in can be used to direct "Social Network"
        activity feeds to analytical tools. Using these plug-ins these activity feeds are analyzed against a rules engine and:
            a. Abuse, usability patterns, social media metrics can be measured.
            b. What content is being shared and where (from which site and users) this is being shared with the social network.
            c. How many "abuse" patterns are originating from each site and which site users are most "abusive" on enterprise
                  social network.


    2. "Listening" platform and Dashboard that shows violations and activity feeds with such violations being trapped and shown
       real time to the users. The Dashboard will consist of
            a. Abuse reporting dashlets that allow administrators to view entire links of abusing content posted. Administrators
               can then moderate and flag comment as abusive and remove it from the social network.




                                                        www.infoaxon.com
Best Practices




Our Customer Showcase




                        www.infoaxon.com
About InfoAxon Technologies
                             InfoAxon is a leading provider of enterprise services and business
                             solutions powered by open source. We design, architect and support
                             complete “Enterprise Solution Platforms” using Open Standards, Web 2.0
                             next generation technologies and Open Source Frameworks providing
                             end-to-end solutions to business problems.

                             India’s First Global Open Source Integration Company
                             We are India's First Global Open Source Integration Company providing
                             business solutions in areas of Content & Knowledge Management,
                             Web2.0 Collaboration and Business Intelligence powered by our
                             unique open source ‘Platforming’ expertise.




INDIA OFFICE:                                            UK OFFICE:
InfoAxon Technologies Ltd.                               InfoAxon Technologies UK Ltd.
A-105, Sector-63,                                        Building A, Trinity Court,
Electronic City,                                         Wokingham Road,
NODIA-201307, U.P                                        Bracknell, Berkshire RG42 1PL,
India                                                    United Kingdom
Phone:+91 120 4350040,                                   Phone: +44 1344 668048,
Fax:+ 91 120 4350065                                     Fax: +44 1344 668148


Website: www.infoaxon.com | Blog: http://blog.infoaxon.com | E-mail: contactus@infoaxon.com

Más contenido relacionado

La actualidad más candente

Effective Team Collaboration Made Simple - Lumo Flow Whitepaper
Effective Team Collaboration Made Simple - Lumo Flow WhitepaperEffective Team Collaboration Made Simple - Lumo Flow Whitepaper
Effective Team Collaboration Made Simple - Lumo Flow Whitepaperguest7d0219
 
EngagmentDB Report, July 2009
EngagmentDB Report, July 2009EngagmentDB Report, July 2009
EngagmentDB Report, July 2009Charlene Li
 
Social Media Policy Sample Policy
Social Media Policy Sample PolicySocial Media Policy Sample Policy
Social Media Policy Sample PolicyMichelle Golden
 
Social business - why does it matter?
Social business - why does it matter?Social business - why does it matter?
Social business - why does it matter?Volume Ltd
 
Security essentials for CIOs - Navigating the risks and rewards of social media
Security essentials for CIOs - Navigating the risks and rewards of social mediaSecurity essentials for CIOs - Navigating the risks and rewards of social media
Security essentials for CIOs - Navigating the risks and rewards of social mediaJoao Perez
 
Webjam - Forget Technology: The Real Business Value of Enterprise Social Netw...
Webjam - Forget Technology: The Real Business Value of Enterprise Social Netw...Webjam - Forget Technology: The Real Business Value of Enterprise Social Netw...
Webjam - Forget Technology: The Real Business Value of Enterprise Social Netw...WebjamMark2
 
Lotusphere 2012: Learning the Ways of the Social Dragon
Lotusphere 2012: Learning the Ways of the Social DragonLotusphere 2012: Learning the Ways of the Social Dragon
Lotusphere 2012: Learning the Ways of the Social DragonKathy (Kat) Mandelstein
 
Social Learning
Social LearningSocial Learning
Social LearningLearn.com
 
Leading Virtual Effectiveness: Four Strategies for Effective Communication
Leading Virtual Effectiveness: Four Strategies for Effective CommunicationLeading Virtual Effectiveness: Four Strategies for Effective Communication
Leading Virtual Effectiveness: Four Strategies for Effective CommunicationCitrix Online
 

La actualidad más candente (12)

Effective Team Collaboration Made Simple - Lumo Flow Whitepaper
Effective Team Collaboration Made Simple - Lumo Flow WhitepaperEffective Team Collaboration Made Simple - Lumo Flow Whitepaper
Effective Team Collaboration Made Simple - Lumo Flow Whitepaper
 
EngagmentDB Report, July 2009
EngagmentDB Report, July 2009EngagmentDB Report, July 2009
EngagmentDB Report, July 2009
 
Social Media Policy Sample Policy
Social Media Policy Sample PolicySocial Media Policy Sample Policy
Social Media Policy Sample Policy
 
Sophos social-media-wpna
Sophos social-media-wpnaSophos social-media-wpna
Sophos social-media-wpna
 
Facilitator guide
Facilitator guideFacilitator guide
Facilitator guide
 
Social business - why does it matter?
Social business - why does it matter?Social business - why does it matter?
Social business - why does it matter?
 
Wk8 mag
Wk8 magWk8 mag
Wk8 mag
 
Security essentials for CIOs - Navigating the risks and rewards of social media
Security essentials for CIOs - Navigating the risks and rewards of social mediaSecurity essentials for CIOs - Navigating the risks and rewards of social media
Security essentials for CIOs - Navigating the risks and rewards of social media
 
Webjam - Forget Technology: The Real Business Value of Enterprise Social Netw...
Webjam - Forget Technology: The Real Business Value of Enterprise Social Netw...Webjam - Forget Technology: The Real Business Value of Enterprise Social Netw...
Webjam - Forget Technology: The Real Business Value of Enterprise Social Netw...
 
Lotusphere 2012: Learning the Ways of the Social Dragon
Lotusphere 2012: Learning the Ways of the Social DragonLotusphere 2012: Learning the Ways of the Social Dragon
Lotusphere 2012: Learning the Ways of the Social Dragon
 
Social Learning
Social LearningSocial Learning
Social Learning
 
Leading Virtual Effectiveness: Four Strategies for Effective Communication
Leading Virtual Effectiveness: Four Strategies for Effective CommunicationLeading Virtual Effectiveness: Four Strategies for Effective Communication
Leading Virtual Effectiveness: Four Strategies for Effective Communication
 

Destacado

Knowledge Enabled Insurance Slide Share
Knowledge Enabled Insurance Slide ShareKnowledge Enabled Insurance Slide Share
Knowledge Enabled Insurance Slide ShareSameer Mittal
 
Vineet Dahiya - Liferay Inc - Training Certificate Q4AIEO0L3D5S2GB
Vineet Dahiya - Liferay Inc - Training Certificate Q4AIEO0L3D5S2GBVineet Dahiya - Liferay Inc - Training Certificate Q4AIEO0L3D5S2GB
Vineet Dahiya - Liferay Inc - Training Certificate Q4AIEO0L3D5S2GBInfoAxon Technologies Limited
 
Build Open Source Business Intelligence Platform Successfully
 Build Open Source Business Intelligence Platform Successfully Build Open Source Business Intelligence Platform Successfully
Build Open Source Business Intelligence Platform SuccessfullyInfoAxon Technologies Limited
 
Social Network in Argentina
Social Network in ArgentinaSocial Network in Argentina
Social Network in ArgentinaPeter Zhang
 
3 online community & social networks
3 online community & social networks3 online community & social networks
3 online community & social networksCOMP 113
 
The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...guest636475b
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guideYury Chemerkin
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.Yury Chemerkin
 
NE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSISNE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSISrathnaarul
 
Social network websites: best practices from leading services
Social network websites: best practices from leading servicesSocial network websites: best practices from leading services
Social network websites: best practices from leading servicesFabernovel
 
Social networking sites definition
Social networking sites definitionSocial networking sites definition
Social networking sites definitionMaxim Boiko Savenko
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking PresentationAnusorn Kansap
 

Destacado (19)

Knowledge Enabled Insurance Slide Share
Knowledge Enabled Insurance Slide ShareKnowledge Enabled Insurance Slide Share
Knowledge Enabled Insurance Slide Share
 
Vineet Dahiya - Liferay Inc - Training Certificate Q4AIEO0L3D5S2GB
Vineet Dahiya - Liferay Inc - Training Certificate Q4AIEO0L3D5S2GBVineet Dahiya - Liferay Inc - Training Certificate Q4AIEO0L3D5S2GB
Vineet Dahiya - Liferay Inc - Training Certificate Q4AIEO0L3D5S2GB
 
Build Open Source Business Intelligence Platform Successfully
 Build Open Source Business Intelligence Platform Successfully Build Open Source Business Intelligence Platform Successfully
Build Open Source Business Intelligence Platform Successfully
 
Social network
Social networkSocial network
Social network
 
Social Network in Argentina
Social Network in ArgentinaSocial Network in Argentina
Social Network in Argentina
 
Knowledge Enabled Insurance Organization
Knowledge Enabled Insurance OrganizationKnowledge Enabled Insurance Organization
Knowledge Enabled Insurance Organization
 
3 online community & social networks
3 online community & social networks3 online community & social networks
3 online community & social networks
 
InfoAxon powered Liferay Solutions
InfoAxon powered Liferay SolutionsInfoAxon powered Liferay Solutions
InfoAxon powered Liferay Solutions
 
The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...The Design of an Online Social Network Site for Emergency Management: A One-S...
The Design of an Online Social Network Site for Emergency Management: A One-S...
 
Liferay Portal Customizing to Business Needs
Liferay Portal Customizing to Business NeedsLiferay Portal Customizing to Business Needs
Liferay Portal Customizing to Business Needs
 
Social network privacy guide
Social network privacy guideSocial network privacy guide
Social network privacy guide
 
Social network final minutes
Social network final minutesSocial network final minutes
Social network final minutes
 
Social network privacy.
Social network privacy.Social network privacy.
Social network privacy.
 
Making a decision between Liferay and Drupal
Making a decision between Liferay and DrupalMaking a decision between Liferay and Drupal
Making a decision between Liferay and Drupal
 
NE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSISNE7012- SOCIAL NETWORK ANALYSIS
NE7012- SOCIAL NETWORK ANALYSIS
 
Slidehare
SlidehareSlidehare
Slidehare
 
Social network websites: best practices from leading services
Social network websites: best practices from leading servicesSocial network websites: best practices from leading services
Social network websites: best practices from leading services
 
Social networking sites definition
Social networking sites definitionSocial networking sites definition
Social networking sites definition
 
Social Networking Presentation
Social Networking PresentationSocial Networking Presentation
Social Networking Presentation
 

Similar a Enterprise social network challenges & best practices

Developing effectie social media policies.pdf
Developing effectie social media policies.pdfDeveloping effectie social media policies.pdf
Developing effectie social media policies.pdfAnjanette Delgado
 
Disclosure Best Practices Toolkit
Disclosure Best Practices ToolkitDisclosure Best Practices Toolkit
Disclosure Best Practices ToolkitBoris Loukanov
 
Essential guide to social media for executives
Essential guide to social media for executivesEssential guide to social media for executives
Essential guide to social media for executivesKwazi Communications
 
Employee Engagement and Social Media Pecha Kucha - Caroline Kealey
Employee Engagement and Social Media Pecha Kucha - Caroline KealeyEmployee Engagement and Social Media Pecha Kucha - Caroline Kealey
Employee Engagement and Social Media Pecha Kucha - Caroline KealeyCarolineKealey
 
Taking social networking to the next level
Taking social networking to the next levelTaking social networking to the next level
Taking social networking to the next levelAndrea Baker
 
Collaborative Enterprise & Social Media : definition, reasons & goals, implem...
Collaborative Enterprise & Social Media : definition, reasons & goals, implem...Collaborative Enterprise & Social Media : definition, reasons & goals, implem...
Collaborative Enterprise & Social Media : definition, reasons & goals, implem...Frédéric Williquet
 
5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social SoftwareRalph Paglia
 
Social Software - Driving Adoption
Social Software - Driving AdoptionSocial Software - Driving Adoption
Social Software - Driving AdoptionBen Willis
 
Social Media Governance - Beyond the Risks
Social Media Governance - Beyond the RisksSocial Media Governance - Beyond the Risks
Social Media Governance - Beyond the RisksWalter Adamson
 
Social Media Governance - how it works in organisations
Social Media Governance - how it works in organisationsSocial Media Governance - how it works in organisations
Social Media Governance - how it works in organisationsiGo2 Pty Ltd
 
Need for a Social Media Policy: What You Need In Your Policy
Need for a Social Media Policy: What You Need In Your PolicyNeed for a Social Media Policy: What You Need In Your Policy
Need for a Social Media Policy: What You Need In Your PolicyCompliance Consultant
 
Social - Good for Business?
Social - Good for Business?Social - Good for Business?
Social - Good for Business?BBDO
 
What Is Social Business ? A SideraWorks Brief
What Is Social Business ? A SideraWorks BriefWhat Is Social Business ? A SideraWorks Brief
What Is Social Business ? A SideraWorks BriefXVA Labs
 
SMBF Inside The Firewall
SMBF Inside The FirewallSMBF Inside The Firewall
SMBF Inside The FirewallLee White
 
Paper id 21201424
Paper id 21201424Paper id 21201424
Paper id 21201424IJRAT
 
Social Media Primer For Large Corporations
Social Media Primer For Large CorporationsSocial Media Primer For Large Corporations
Social Media Primer For Large CorporationsCarsten Cumbrowski
 

Similar a Enterprise social network challenges & best practices (20)

Developing effectie social media policies.pdf
Developing effectie social media policies.pdfDeveloping effectie social media policies.pdf
Developing effectie social media policies.pdf
 
Disclosure Best Practices Toolkit
Disclosure Best Practices ToolkitDisclosure Best Practices Toolkit
Disclosure Best Practices Toolkit
 
Essential guide to social media for executives
Essential guide to social media for executivesEssential guide to social media for executives
Essential guide to social media for executives
 
Employee Engagement and Social Media Pecha Kucha - Caroline Kealey
Employee Engagement and Social Media Pecha Kucha - Caroline KealeyEmployee Engagement and Social Media Pecha Kucha - Caroline Kealey
Employee Engagement and Social Media Pecha Kucha - Caroline Kealey
 
Taking social networking to the next level
Taking social networking to the next levelTaking social networking to the next level
Taking social networking to the next level
 
Collaborative Enterprise & Social Media : definition, reasons & goals, implem...
Collaborative Enterprise & Social Media : definition, reasons & goals, implem...Collaborative Enterprise & Social Media : definition, reasons & goals, implem...
Collaborative Enterprise & Social Media : definition, reasons & goals, implem...
 
5 Requirementsfor Enterpris Social Software
5 Requirementsfor Enterpris Social Software5 Requirementsfor Enterpris Social Software
5 Requirementsfor Enterpris Social Software
 
5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software5 Requirements for Enterpris Social Software
5 Requirements for Enterpris Social Software
 
Social Software - Driving Adoption
Social Software - Driving AdoptionSocial Software - Driving Adoption
Social Software - Driving Adoption
 
Social Media Governance - Beyond the Risks
Social Media Governance - Beyond the RisksSocial Media Governance - Beyond the Risks
Social Media Governance - Beyond the Risks
 
Social Media Governance - how it works in organisations
Social Media Governance - how it works in organisationsSocial Media Governance - how it works in organisations
Social Media Governance - how it works in organisations
 
Need for a Social Media Policy: What You Need In Your Policy
Need for a Social Media Policy: What You Need In Your PolicyNeed for a Social Media Policy: What You Need In Your Policy
Need for a Social Media Policy: What You Need In Your Policy
 
Social - Good for Business?
Social - Good for Business?Social - Good for Business?
Social - Good for Business?
 
5 pitfalls & framework for collaboration
5 pitfalls & framework for collaboration5 pitfalls & framework for collaboration
5 pitfalls & framework for collaboration
 
What Is Social Business ? A SideraWorks Brief
What Is Social Business ? A SideraWorks BriefWhat Is Social Business ? A SideraWorks Brief
What Is Social Business ? A SideraWorks Brief
 
SMBF Inside The Firewall
SMBF Inside The FirewallSMBF Inside The Firewall
SMBF Inside The Firewall
 
knowledge management document
knowledge management documentknowledge management document
knowledge management document
 
Paper id 21201424
Paper id 21201424Paper id 21201424
Paper id 21201424
 
Social Network Toolkit Exec Summary
Social Network Toolkit Exec SummarySocial Network Toolkit Exec Summary
Social Network Toolkit Exec Summary
 
Social Media Primer For Large Corporations
Social Media Primer For Large CorporationsSocial Media Primer For Large Corporations
Social Media Primer For Large Corporations
 

Más de InfoAxon Technologies Limited

How can Digital Engagement transform Customer Service in Insurance Industry?
How can Digital Engagement transform Customer Service in Insurance Industry?How can Digital Engagement transform Customer Service in Insurance Industry?
How can Digital Engagement transform Customer Service in Insurance Industry?InfoAxon Technologies Limited
 
A behind the scene look at Britam Digital Transformation
A behind the scene look at Britam Digital TransformationA behind the scene look at Britam Digital Transformation
A behind the scene look at Britam Digital TransformationInfoAxon Technologies Limited
 
Open source Platforming for Pentaho Based BI Solutions
Open source Platforming for Pentaho Based BI SolutionsOpen source Platforming for Pentaho Based BI Solutions
Open source Platforming for Pentaho Based BI SolutionsInfoAxon Technologies Limited
 
Business Intelligence Solution for Social Housing - Case study
Business Intelligence Solution for Social Housing - Case studyBusiness Intelligence Solution for Social Housing - Case study
Business Intelligence Solution for Social Housing - Case studyInfoAxon Technologies Limited
 
Business Planning & Performance Management System for Castrol Bike Zone - Cas...
Business Planning & Performance Management System for Castrol Bike Zone - Cas...Business Planning & Performance Management System for Castrol Bike Zone - Cas...
Business Planning & Performance Management System for Castrol Bike Zone - Cas...InfoAxon Technologies Limited
 
Advanced Data analysis & Business Intelligence solution solution for C&R - Ca...
Advanced Data analysis & Business Intelligence solution solution for C&R - Ca...Advanced Data analysis & Business Intelligence solution solution for C&R - Ca...
Advanced Data analysis & Business Intelligence solution solution for C&R - Ca...InfoAxon Technologies Limited
 
White Label Knowledge Management Platform for MyAIDS Nexus - Case Study
White Label Knowledge Management Platform for MyAIDS Nexus - Case Study White Label Knowledge Management Platform for MyAIDS Nexus - Case Study
White Label Knowledge Management Platform for MyAIDS Nexus - Case Study InfoAxon Technologies Limited
 
InfoAxon profiled as a leading open source solutions company from India in Gl...
InfoAxon profiled as a leading open source solutions company from India in Gl...InfoAxon profiled as a leading open source solutions company from India in Gl...
InfoAxon profiled as a leading open source solutions company from India in Gl...InfoAxon Technologies Limited
 
LINUX For You magazine covers InfoAxon for success achieved in delivering ope...
LINUX For You magazine covers InfoAxon for success achieved in delivering ope...LINUX For You magazine covers InfoAxon for success achieved in delivering ope...
LINUX For You magazine covers InfoAxon for success achieved in delivering ope...InfoAxon Technologies Limited
 
InformationWeek covers InfoAxon Technologies for Nagios Implementation
InformationWeek covers InfoAxon Technologies for Nagios Implementation InformationWeek covers InfoAxon Technologies for Nagios Implementation
InformationWeek covers InfoAxon Technologies for Nagios Implementation InfoAxon Technologies Limited
 
AdUniverse - A KM Platform for Advertising and Media Agencies
AdUniverse - A KM Platform for Advertising and Media AgenciesAdUniverse - A KM Platform for Advertising and Media Agencies
AdUniverse - A KM Platform for Advertising and Media AgenciesInfoAxon Technologies Limited
 

Más de InfoAxon Technologies Limited (20)

API Pylon Webinar Slides
API Pylon Webinar SlidesAPI Pylon Webinar Slides
API Pylon Webinar Slides
 
How can Digital Engagement transform Customer Service in Insurance Industry?
How can Digital Engagement transform Customer Service in Insurance Industry?How can Digital Engagement transform Customer Service in Insurance Industry?
How can Digital Engagement transform Customer Service in Insurance Industry?
 
A behind the scene look at Britam Digital Transformation
A behind the scene look at Britam Digital TransformationA behind the scene look at Britam Digital Transformation
A behind the scene look at Britam Digital Transformation
 
Gartner-Digital-Experience-Platforms-MQ-q118
Gartner-Digital-Experience-Platforms-MQ-q118Gartner-Digital-Experience-Platforms-MQ-q118
Gartner-Digital-Experience-Platforms-MQ-q118
 
Britam Digital Transformation case study
Britam Digital Transformation case studyBritam Digital Transformation case study
Britam Digital Transformation case study
 
Citixsys case study
Citixsys case studyCitixsys case study
Citixsys case study
 
IMRB case study
IMRB case studyIMRB case study
IMRB case study
 
InfoAxon's Open Source Skill Profile
InfoAxon's Open Source Skill ProfileInfoAxon's Open Source Skill Profile
InfoAxon's Open Source Skill Profile
 
Open source Platforming for Pentaho Based BI Solutions
Open source Platforming for Pentaho Based BI SolutionsOpen source Platforming for Pentaho Based BI Solutions
Open source Platforming for Pentaho Based BI Solutions
 
Knowledge Exchange Platform for UNDP - Case Study
Knowledge Exchange Platform for UNDP - Case StudyKnowledge Exchange Platform for UNDP - Case Study
Knowledge Exchange Platform for UNDP - Case Study
 
Business Intelligence Solution for Social Housing - Case study
Business Intelligence Solution for Social Housing - Case studyBusiness Intelligence Solution for Social Housing - Case study
Business Intelligence Solution for Social Housing - Case study
 
Business Planning & Performance Management System for Castrol Bike Zone - Cas...
Business Planning & Performance Management System for Castrol Bike Zone - Cas...Business Planning & Performance Management System for Castrol Bike Zone - Cas...
Business Planning & Performance Management System for Castrol Bike Zone - Cas...
 
Advanced Data analysis & Business Intelligence solution solution for C&R - Ca...
Advanced Data analysis & Business Intelligence solution solution for C&R - Ca...Advanced Data analysis & Business Intelligence solution solution for C&R - Ca...
Advanced Data analysis & Business Intelligence solution solution for C&R - Ca...
 
InfoAxon Powered Alfresco
InfoAxon Powered AlfrescoInfoAxon Powered Alfresco
InfoAxon Powered Alfresco
 
White Label Knowledge Management Platform for MyAIDS Nexus - Case Study
White Label Knowledge Management Platform for MyAIDS Nexus - Case Study White Label Knowledge Management Platform for MyAIDS Nexus - Case Study
White Label Knowledge Management Platform for MyAIDS Nexus - Case Study
 
InfoAxon profiled as a leading open source solutions company from India in Gl...
InfoAxon profiled as a leading open source solutions company from India in Gl...InfoAxon profiled as a leading open source solutions company from India in Gl...
InfoAxon profiled as a leading open source solutions company from India in Gl...
 
LINUX For You magazine covers InfoAxon for success achieved in delivering ope...
LINUX For You magazine covers InfoAxon for success achieved in delivering ope...LINUX For You magazine covers InfoAxon for success achieved in delivering ope...
LINUX For You magazine covers InfoAxon for success achieved in delivering ope...
 
InformationWeek covers InfoAxon Technologies for Nagios Implementation
InformationWeek covers InfoAxon Technologies for Nagios Implementation InformationWeek covers InfoAxon Technologies for Nagios Implementation
InformationWeek covers InfoAxon Technologies for Nagios Implementation
 
Open Source BI
Open Source BIOpen Source BI
Open Source BI
 
AdUniverse - A KM Platform for Advertising and Media Agencies
AdUniverse - A KM Platform for Advertising and Media AgenciesAdUniverse - A KM Platform for Advertising and Media Agencies
AdUniverse - A KM Platform for Advertising and Media Agencies
 

Último

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopBachir Benyammi
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1DianaGray10
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationIES VE
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaborationbruanjhuli
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxGDSC PJATK
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAshyamraj55
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesDavid Newbury
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UbiTrack UK
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1DianaGray10
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding TeamAdam Moalla
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.francesco barbera
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxMatsuo Lab
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfAnna Loughnan Colquhoun
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfDianaGray10
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7DianaGray10
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6DianaGray10
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPathCommunity
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024SkyPlanner
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureEric D. Schabell
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsSeth Reyes
 

Último (20)

NIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 WorkshopNIST Cybersecurity Framework (CSF) 2.0 Workshop
NIST Cybersecurity Framework (CSF) 2.0 Workshop
 
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1UiPath Platform: The Backend Engine Powering Your Automation - Session 1
UiPath Platform: The Backend Engine Powering Your Automation - Session 1
 
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve DecarbonizationUsing IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
Using IESVE for Loads, Sizing and Heat Pump Modeling to Achieve Decarbonization
 
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online CollaborationCOMPUTER 10: Lesson 7 - File Storage and Online Collaboration
COMPUTER 10: Lesson 7 - File Storage and Online Collaboration
 
Cybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptxCybersecurity Workshop #1.pptx
Cybersecurity Workshop #1.pptx
 
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPAAnypoint Code Builder , Google Pub sub connector and MuleSoft RPA
Anypoint Code Builder , Google Pub sub connector and MuleSoft RPA
 
Linked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond OntologiesLinked Data in Production: Moving Beyond Ontologies
Linked Data in Production: Moving Beyond Ontologies
 
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
UWB Technology for Enhanced Indoor and Outdoor Positioning in Physiological M...
 
Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1Secure your environment with UiPath and CyberArk technologies - Session 1
Secure your environment with UiPath and CyberArk technologies - Session 1
 
9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team9 Steps For Building Winning Founding Team
9 Steps For Building Winning Founding Team
 
Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.Digital magic. A small project for controlling smart light bulbs.
Digital magic. A small project for controlling smart light bulbs.
 
Introduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptxIntroduction to Matsuo Laboratory (ENG).pptx
Introduction to Matsuo Laboratory (ENG).pptx
 
Spring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdfSpring24-Release Overview - Wellingtion User Group-1.pdf
Spring24-Release Overview - Wellingtion User Group-1.pdf
 
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdfUiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
UiPath Solutions Management Preview - Northern CA Chapter - March 22.pdf
 
UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7UiPath Studio Web workshop series - Day 7
UiPath Studio Web workshop series - Day 7
 
UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6UiPath Studio Web workshop series - Day 6
UiPath Studio Web workshop series - Day 6
 
UiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation DevelopersUiPath Community: AI for UiPath Automation Developers
UiPath Community: AI for UiPath Automation Developers
 
Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024Salesforce Miami User Group Event - 1st Quarter 2024
Salesforce Miami User Group Event - 1st Quarter 2024
 
OpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability AdventureOpenShift Commons Paris - Choose Your Own Observability Adventure
OpenShift Commons Paris - Choose Your Own Observability Adventure
 
Computer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and HazardsComputer 10: Lesson 10 - Online Crimes and Hazards
Computer 10: Lesson 10 - Online Crimes and Hazards
 

Enterprise social network challenges & best practices

  • 1. Best Practices Challenges and Best Practices for Knowledge Management using Enterprise Social Networks Enterprise Social Network Adoption Challenges and Best Practices
  • 2. Best Practices Overview Most enterprises looking to deploy Enterprise Social Network Platforms are extremely cautious about adopting one. The main questions that emerge in their mind are: 1. What if this becomes a platform for grapevine or gossip instead of productive and professional activity? 2. How to control or monitor the enterprise social media conversations in a open and professional manner without invading privacy of an individual at work place? 3. Should we push the social collaboration or shall the business let the social conversations happen on their own and remain unseen without nudging the collaboration in the work place? 4. How will we control or report abuse as and when it happens? What if this snowballs into a contractual or political issue? 5. Can company secrets be leaked? Invite law suits or similar such events? The list goes on and on....In most cases these concerns are not as big as they are made out to be. However these continue to remain challenges for adoption of the Enterprise Social Networks within businesses as a means for Better Knowledge Management. Challenges There are several challenges faced by Management while deploying Enterprise Social Network patterns for workforce. Most of these challenges spiral into strong perception of deployment of Enterprise Social Networks being risky with potential to create unwanted chaos. The message around how it can dramatically change the Knowledge Management culture is often hidden in the various perceptions that are formed around its adoption. Through this table below we have highlighted some of the challenges faced and why these challenges are more around the perception instead of real risks or concerns. Perceived Challenges Management may Why the risks/concern is legitimate but is more of a face while deploying Enterprise Social perception and can be mitigated by understanding it clearly Networks first before Best Practices are applied. Inappropriate content and abuse on the Internet is anonymous. One can be who they wish to be. This is social conversations enabled in the not the case with Enterprise Social Networks and conversations. enterprise 1. Identity is revealed in case of a Business social network that ensures that User identity is visible and managed correctly 2. Within the business community a form of "Self Policing" emerges and becomes the norm that allows offensive comments to not only be spotted by others but acts as a deterrent for any trouble makers. 3. In business social network the formal managers and leaders also participate. This automatically ensures that the followers are aware of being monitored and counseled in case they over step. 4. Younger workforce is social media savvy and learning www.infoaxon.com
  • 3. Best Practices slowly how to behave on social media. The same consciousness is carried over to social networks. Content is inaccurate 1. As long as the content put by employees and leaders on enterprise social network is open for scrutiny chances are that inaccurate content will be spotted much sooner and pointed out by other work force. Content that is put on social wall conversations even though it is 2. However it is important that some form of workflow or moderation is also put in place for document posts, audio professional activity and inappropriate and video initially so that the message is clear that may be inaccurate representation of inaccurate content is being watched. facts and can either confuse or mislead the work force. Too much transparency 1. This is very much a legitimate concern but transparency can be managed well and can lead to a strong brand and There are often concerns that too much perception of a open and transparent organization. about the company and its policies or day to day decisions is "going out" and 2. Educating the workforce clear non negotiable when it comes to posting company documents or information can can lead to too much transparency and be outlined by HR teams. problems in workplace because of it. 3. Managers and Leaders are also part of the social conversations and can monitor any violations and raise and counsel over a period of time to minimize such occurrences. 4. On the contrary, the transparency and social chatter around HR policies or similar other events is a great input to Management provided this is reported, understood and responded positively. Insufficient Facilitation of Participation One of the main challenges is also that management is not (By Management) equipped to encourage or foster participation. Management needs to work with employees in terms of communicating that the Social Network deployment is not just a new technology development but also a new way or culture of doing daily communication and participation. Management needs to be involved much more heavily in declaring and nurturing Communities of Practices (CoPs) within the business. High Barriers to Participation (By High barrier for participation means that people do not easily employees) contribute to online discussions and share their knowledge publicly. There are multiple reasons for this kind of behavior: not being used to using one’s own name in online communities can cause shyness, and the communication culture of the organization may be too formal and hierarchical to allow for low-barrier contributions and unstructured participation. The most important reason for having a high barrier for participation, however, is the fact that the participation is not encouraged enough by the platform, the content or effective www.infoaxon.com
  • 4. Best Practices community management. Management must make sure that employees have clear understanding of their own rights and responsibilities as active A users of the new systems. lot of the concerns related to risks of Social Media are legitimate concerns but these risks and concerns are actually on closer view much unfoveral reasons for this: Best Practices Integrate Social Network into Business Ways of Working The Social Network should not just become a set of Wall posts and updates done by employees in their spare time. Actually the Social Network has ability to replace in some cases existing processes or move along with the other existing business processes to ensure better outcomes. One of the simple use cases for this best practice is move of email communication to the social network thus reducing clutter. For e.g. status meeting reports can simply be published as a announcement alert or wall posting to a large number of users instead of a select few. This will involve entire teams and bring in a culture of openness visible within the workplace. Make Reporting Abuse "Visible" One of the most basic practice is to make it easy for the community users participating in a social conversation to report abuse to moderators. This is done by ensuring that reporting abuse feature is visible and promoted actively by business marketing teams and actively talked about in the organization before the launch of the social network. For e.g. while showing nested comments of a conversation an access Web UI button to report abuse around the comment made with the Comment name attached will be very useful and give an impression that the business is monitoring and providing due weight age to practice of reporting abuse. Build a Abuse Monitoring Structure In parallel to have a reporting abuse feature it is also important to draw in user community champions and provide a more "Self Policing" flavor to monitoring abuse. Reported abuse features should regularly be monitored by the community champion members and offenders counseled or in extreme cases disciplined. 1. Keep the community of self policing moderators fully represented from the workforce itself. Avoid managers or senior staff that may not be actively participating in the social conversations in the first place. 2. Choose community moderators that can handle the issues with calm and have ability to counsel the staff if and when such event occurs. In terms of best practices any organization adopting Enterprise Social Network has to ensure following: 1. Make sure your organization is not only on board but knows where it's going and gets the kind of participation that truly makes a difference in productivity, creativity, and collaboration. 2. Make sure the social media in your workplace has the same characteristics as social media in employee personal life www.infoaxon.com
  • 5. Best Practices Building Communities of Practices Communities of Practices (CoPs) is a well formed Knowledge Management strategy. Research conveys that many of the exchanges of practical information and problem-solving happened during informal gatherings where experts of some topic of interest exchanged stories about their experience. In CoP environments, novices could also consult with experts in a non-threatening environment. Through this process, gaps in the practice were identified and solutions were proposed. Individuals might apply the solution in their own practice, and the outcomes were fed back to their colleagues for further refinement of the solution. Eventually these informal communications became the means for sharing information for improving practice and generating new knowledge and skills. Community relationships between different business practices should ride on the Enterprise Social Network Foundation. Following concrete steps are needed alongside the Enterprise Social Network: 1. Identify and Form Communities of Practices within the business. 2. Promotion of Workspaces as Communities of Practices on the Social Network itself. These Sites may exist across functional areas and reflect a particular interest area such as "Customer Service". 3. Enable automated wall postings whenever a new article has been added (as announcement feed) to promote the practice area 4. Use Groups and discussions as a means to spread awareness and learning around a Practice Area. Strong Moderation Capability A business should assign a team of moderators for the enterprise social network to sustain and thrive. Initially it will be a new tool for the work force to form communities of interest and exchange ideas and suggestions. Lot of these features are new to the workplace. We need a team of moderators that can shape the conversations and evaluate whether violations are happening. Also the moderation team can inject high quality content that attracts and encourages others users to contribute more to this activity. Linking with Outcomes Ultimately the social conversations, blogs, wikis, posts to the social network in a business context must be linked to some outcome that the business wishes to realize. Shaping this is quite a challenge because more social networks have emerged from a personal context and most users would naturally be inclined to keep conversations at a personal level during social conversations. Shaping these conversations in such a way that they can be linked to a business event or an outcome requires moderators to also take control and guide the social chatter. Management can set goals such as "Implementing 5 ideas" this month from the workforce on better delivery of services to customers. These ideas are then collected and put into shape as actual actions by the management team. www.infoaxon.com
  • 6. Best Practices "Measure" and Report Social Conversations Management has taken a leap of faith when it comes to deploying enterprise social network within the business. Therefore a mechanism to report social conversations and objectively view the insights that these conversations highlight for the business will continue to benefit the business and will also help value the social network in the work place as a strategic tool. The enterprise social conversations can be collected in the knowledge repository and using text and semantic analysis a better reporting structure should be created. For e.g. total conversations of a month can be analyzed and the overall "Buzz" at the work place can be articulated in the form of reporting that measures different grades such as "High Morale" , "Neutral Feedbacks", "Growing Angst" so that these reports can reflect the HR practices and influence any other decision making. Make it part of Regular Employee Interaction Equipped with better social network reporting, management and HR teams can engage employees in a very different manner as today. 1. Collecting comments from audiences before a HR review cycle 2. Referring to specific posts or views expressed during Management catch up meetings Suggest Tools InfoAxon suggests following technology and tools to: 1. Assist in faster adoption of Social Network within the enterprise 2. Report Abuse and Monitoring of Social Network 3. Social Network Analytics Tools "Pull" Tools and Techniques Building Social Network for enterprises can benefit from "pull" created through a much more personalized and "Public Social Media" look and feel. Employees that already access public social media sites such as Facebook, Twitter and Tumblr etc. are already aware of Social Network usability patterns and features. It is easier to adopt enterprise social network technology that is similar in look and feel or derived from public social network design patterns. For e.g. 1. Interactive Chat can be added alongside Social Network to reduce the overall email traffic and create a major PULL factor allowing users to integrate with existing Social Network Platform. 2. Rating features provided to contributors to rate documents and content shared through social media. This increases participation and fosters self ranking of content by the community instead of through organizational workflows. These ranks can be attractively tagged as "X people rated this highly with ranking XXXXXX" www.infoaxon.com
  • 7. Best Practices 3. Provide attractive and useful personal productivity applications such as: a. Weather b. News c. Subscribe to external web sites. d. Links e. Discussion forums f. FAQ Knowledge Bases Abuse Monitoring Enterprise Social Network wall updates and conversations should be treated as "knowledge items" that contain snippets of text conversations describing a state of mind or event. This is precious data which can be analyzed further for measuring and monitoring abuse on the enterprise social network sites. For e.g. using Web harvesting and Semantic programming techniques and open source tools it is possible to crawl a database of the conversation snippets and updates and report through special keywords whether abuse is taking place. If such a pattern match is found the moderators are alerted. Using a rules engine and a "Abuse Dictionary" patterns will be matched and abuse reported and highlighted. www.infoaxon.com
  • 8. Best Practices Social Network Analytics Social Network Analytics is a emerging science and analytical practice around data collected through social network patterns. There are several ways in which this can be done and InfoAxon can provide add on plug-ins to achieve this. 1. Using Open Source tools such as Pentaho, Social Network analytics InfoAxon plug-in can be used to direct "Social Network" activity feeds to analytical tools. Using these plug-ins these activity feeds are analyzed against a rules engine and: a. Abuse, usability patterns, social media metrics can be measured. b. What content is being shared and where (from which site and users) this is being shared with the social network. c. How many "abuse" patterns are originating from each site and which site users are most "abusive" on enterprise social network. 2. "Listening" platform and Dashboard that shows violations and activity feeds with such violations being trapped and shown real time to the users. The Dashboard will consist of a. Abuse reporting dashlets that allow administrators to view entire links of abusing content posted. Administrators can then moderate and flag comment as abusive and remove it from the social network. www.infoaxon.com
  • 9. Best Practices Our Customer Showcase www.infoaxon.com
  • 10. About InfoAxon Technologies InfoAxon is a leading provider of enterprise services and business solutions powered by open source. We design, architect and support complete “Enterprise Solution Platforms” using Open Standards, Web 2.0 next generation technologies and Open Source Frameworks providing end-to-end solutions to business problems. India’s First Global Open Source Integration Company We are India's First Global Open Source Integration Company providing business solutions in areas of Content & Knowledge Management, Web2.0 Collaboration and Business Intelligence powered by our unique open source ‘Platforming’ expertise. INDIA OFFICE: UK OFFICE: InfoAxon Technologies Ltd. InfoAxon Technologies UK Ltd. A-105, Sector-63, Building A, Trinity Court, Electronic City, Wokingham Road, NODIA-201307, U.P Bracknell, Berkshire RG42 1PL, India United Kingdom Phone:+91 120 4350040, Phone: +44 1344 668048, Fax:+ 91 120 4350065 Fax: +44 1344 668148 Website: www.infoaxon.com | Blog: http://blog.infoaxon.com | E-mail: contactus@infoaxon.com