Presentation is loading. Please wait.

Presentation is loading. Please wait.

All Contents © 2009 Burton Group. All rights reserved. Leveraging Relationships and Managing Identity – Two Sides of the Social Networking Coin 29 September.

Similar presentations


Presentation on theme: "All Contents © 2009 Burton Group. All rights reserved. Leveraging Relationships and Managing Identity – Two Sides of the Social Networking Coin 29 September."— Presentation transcript:

1 All Contents © 2009 Burton Group. All rights reserved. Leveraging Relationships and Managing Identity – Two Sides of the Social Networking Coin 29 September 2009 Alice Wang awang@burtongroup.com Mike Gotta mgotta@burtongroup.com mikeg.typepad.com

2 Two Sides Of The Social Networking Coin 2 zxcvxvxcccb zxcvbcvxvxcccb@bah.com +1-234-567-9012 Source: Booz Allen Hamilton

3 Two Sides Of The Social Networking Coin Benefits expected from social tools and applications Connect people internally and externally Break down organizational barriers and information silos Promote employee innovation Address generational shifts; meet technology expectations of younger workers Support strategic talent and learning initiatives However – open and transparent environments can raise identity and security concerns 3

4 Use Case #1: Social Network Site 4 Enterprise Identity HRMSDirectoryOther Systems-of-Record Trusted Identity Sources zxcvbcvxvxcccb@bah.com +1-234-567-9012 zxcvbcvxvxcccb@bah.com +1-234-567-9012 zxcvxvxcccb

5 Use Case #1: Social Network Site 5 Internal Social Identity Personal Claims zxcvbcvxvxcccb@bah.com +1-234-567-9012 zxcvbcvxvxcccb@bah.com +1-234-567-9012 zxcvxvxcccb

6 Employee Profile #4 Employee Profile #3 Employee Profile #2 Employee Profile Women’s Support Group Outreach Network Community Of Practice Internal “Facebook Site” A single profile? Multiple profiles? Federated profiles? Use Case #2: Profile Proliferation 6 Women Returning To Work After Extended Leave Professional Exchange of Best Practices Gay & Lesbian Community

7 Over-sharing via social conversation and community actions Employee Profile Use Case #3: Activity Streams & Profiles 7 Jane Doe: Joined Community: “Women Supporting Women” John Doe: “Working on a big M&A deal, need to work late tonight… stay tuned!” Fred Smith: &#%^%$* we just lost the Company ABC account… Jane Doe: Joined Community: “Gay & Lesbian Employees Outreach” Betty Smith: @Bob Jones That patient ID number is 123456789 Bob Jones: @SamJ I’ve changed the access controls so you can get into the workspace “Women Supporting Women” “Gay & Lesbian Employees” Outreach Automatic posting of community actions Activity streams & “Enterprise Twitter” messages

8 Use Case #4: First Comes Aggregation 8 External Social Identities Personal Claims zxcvbcvxvxcccb@bah.com +1-234-567-9012 zxcvbcvxvxcccb@bah.com +1-234-567-9012 zxcvxvxcccb

9 Is it me? How much is being shared? Under what controls? Use Case #4: Followed By Correlation 9 Unification of an employee’s social structures “The Work Me” “The Citizen Me” Profile Groups Contacts Profile Status Message Activities Photos Profile Following / Followers “Tweets” Enterprise Identity Enterprise “Social Identity” My politics My groups My music My friends

10 Use Case #5: Leveraging Consumer Tools 10 “The Employee Me” Enterprise roles and identities can collide with personal use of social media “The Citizen Me”

11 Use Case #6: Enterprise Roles 11 HRMSDirectoryOther Systems-of-Record Trusted Identity Sources Role Management Applications Business Process Management (BPM) Systems Enterprise Portals Role Sources Authentication, Authorization, Provisioning, RBAC, etc. Enterprise Roles My Roles IT Architect SME on “ABC” Approver for access to “XYZ” Certified on “123” zxcvbcvxvxcccb@bah.com +1-234-567-9012 zxcvbcvxvxcccb@bah.com +1-234-567-9012 zxcvxvxcccb

12 Social Roles Use Case #6: Emergence Of “Social Roles” 12 “Answer Person” “Wiki Gardener” “Idea Person” “News Filter” Social Role Attributes Social Data Aggregation & Correlation Social Network Analysis

13 Use Case #7: Analyzing Relationships Social analytics Assess, correlate, and visualize relationship structures Within the enterprise, discovery of latent connections most valuable Evolution of tool capabilities can discover too much information on organizational structures, activities, and relationships 13 Source: Telligent Needs to figure out how to help a company deal with export / import regulations in country XYZ Has dealt with import / export problems in country XYZ for years in past job role Node 8 To Node 10 To Node 14 To Node 15 Members Of Investigation Unit

14 Awareness & Management Of Risks Use Case concerns relevant to identity and security teams Profiles And Profiling Credibility of profile and social claims Possible bias against employees by co-workers based on race, diversity, affiliation information made open and transparent via social media tools Information Security Intellectual property, compliance, e-Discovery, monitoring… Aggregation / correlation capabilities Data management and data integration (profiles, roles, etc) Privacy Adherence to regulatory statutes, level of employee controls, possible stalking situations (hostile workplace) Social Network Analysis Makes relationships visible that perhaps should not (“connecting the dots”) May lead to “befriend / defraud” situations, social engineering 14

15 Recommendations Moving forward with social media and social networking efforts Social media and social networking are strategic initiatives that are here to stay – saying “no” is not the right approach A decision-making framework and governance model is an essential component of any strategy Policies and procedures need to focus on the human element and avoid technology as a panacea Identity and security objectives need to be viewed on the same level as desires for openness and transparency IT teams that should be viewed as key stakeholders in social media and social networking strategies include: Groups responsible for collaboration and community efforts Identity management and security groups Information management and data analysis groups 15

16 All Contents © 2009 Burton Group. All rights reserved. Q&A 16


Download ppt "All Contents © 2009 Burton Group. All rights reserved. Leveraging Relationships and Managing Identity – Two Sides of the Social Networking Coin 29 September."

Similar presentations


Ads by Google