Internal social networks

Download Internal social networks

Post on 01-Nov-2014

688 views

Category:

Technology

3 download

Embed Size (px)

DESCRIPTION

Conference given during the EU Commission Digital Compettence Day on March 26, 2013 in Brussels

TRANSCRIPT

<ul><li> 1. DIGITAL COMPETENCE DAY AT THE EU COMMISSION MARCH 26, 2013 Internal social networks Risks&amp;opportunities Jacques Folon Partner Edge Consulting Me. de conf. Universit de LIge Charg de cours ICHEC Prof. invitUniversit de Metz </li> <li> 2. Cette prsentation est surwww.slideshare.net/folonelle est votre disposition </li> <li> 3. MY DIGITAL IDENTITYhttp://jacquesfolon.tel </li> <li> 4. First part :Risks1. Data privacy2. Data security3. Intellectualproperty4. What about an internalcommunity manager? </li> <li> 5. 1.0 Data privacy </li> <li> 6. 1.1.Data privacy basics Basic principles: the Data controller(i.e. the EU COMMISSION) collect and processpersonal data onlywhenthisislegallypermitted respect certain obligationsregarding the processing of personal data (details on nextslide) ; respond to complaintsregardingbreaches of data protection rules; collaboratewith national data Source: http://ec.europa.eu/justice/data-protection/index_en.htm </li> <li> 7. 1.2. Data privacyrules for data controllers Personal Data must be processed legally and fairly; collected for explicit and legitimate purposes and used accordingly; adequate, relevant and not excessive in relation to the purposes for which it is collected and/or further processed; accurate, and updated where necessary; kept any longer than strictly necessary; rectified, removed or blocked by the data subject if incorrect; Protected against accidental or unlawful destruction, loss, alteration and disclosure, particularly when processing involves data transmission over networks. Source: http://ec.europa.eu/justice/data-protection/index_en.htm </li> <li> 8. 1.3. Data privacy&amp; internal social media questions Whichprecisepurpose ? Whatkind of personal data willbestored? Are data stored in Europe ? Are they in the Cloud ? Data privacy commission adviceneeded? Whatwillbe the securitypolicy? What about the content of ex-employees? Is a code of conductenough? SO IT S AN IMPORTANT ISSUE !!! </li> <li> 9. 2.0. Data securitySOURCE DE LIMAGE: http://www.techzim.co.zw/2010/05/why-organisations-should-worry-about-security-2/ </li> <li> 10. Source : https://www.britestream.com/difference.html. </li> <li> 11. How many information? 67 </li> <li> 12. Employees share (too) many information and also with third parties </li> <li> 13. Where do one steal Which devices are data? stolen?Banks USBHospitals LaptopsMinistries Hard disksPolice PapersNewspapers BindersTelecoms Cars... </li> <li> 14. TELEWORKING </li> <li> 15. What are Control limitations? </li> <li> 16. 3.0. INTELLECTUAL PROPERTY Source de limage: http://www.maniacworld.com/copy-and-paste-babies.html </li> <li> 17. Copyright infringmentSource: http://en.wikipedia.org/wiki/File:Plagiarism_vs_Copyright_Infringement.png </li> <li> 18. Employersresponsibility ! What about externalprotectedworks? What about creation by employees? What about import of protectedworks by employees? What about sub- contractorsprotectedworks? What about advertisingcampaign? What about pressclipping? What about externaltrademarks What about employees images? What do youthink of a code of conduct? http://amirrezashamloo.blogspot.be/2010/10/copyright-symbol-and-related-symbols.html </li> <li> 19. 4.0. INTERNAL COMMUNITY MANAGERPICTURE CREDIT: http://fromthiscorner.blogspot.be/2012/10/the-community-manager-role.html </li> <li> 20. Whos in charge if ?http://www.capreseaux.fr/community-management/ </li> <li> 21. Second part: Added valuehttp://www.mckinsey.com/insights/mgi/research/technology_and_innovation/the_social_economy </li> <li> 22. Reading and answering e-mail. Approximately 28%, or about 11.2 hours,of the average interaction workersworkweekisspentreading andanswering e-mails. The studyindicatesthatbecause of private socialmediasability to makesearchable content out of all posted messages, theamount of time spentwith e-mail canbereduced by as much as 35%, orabout 4 hours. </li> <li> 23. Searching and gathering information. 19%, about 7.6 hours, of theaverage interaction workersworkhours are spentsearching for internalinformation only certain employeespossess. Again, because of enterprisesocial mediasability to store all messages as searchable content, thisfigure canbereduced by nearly 35% to about 4.9 hours per week,whichamounts to a savings of 2.7 hours per week per interaction worker. </li> <li> 24. Communicating and collaboratinginternally. Using phones, e-mail, andin-person interaction to communicate consumes about 5.6 hours of theaverage interaction workersworkweek. Becauseyoucandirectly messageanyone in the organizationwithoutcluttering up an e-mail inboxwith acollaboration tool, yourorganizationcanrealize up to a 35% timesavings, or about 2.0 hours per interaction worker. </li> <li> 25. Role-specifictasks. Tasksspecific to a particular job consume themostamount of time for anyrole, averaging out to about 15.6 hours perweek. Internal social media increases the productivity of thesetasks byabout 15%, or approximately 2.3 hours per week. Onewaytheyenhancejob-specificproductivity lies in theirability to centralize aljob functionsat one hub, soyouremployeesbeginusing all otherapplications there. </li> <li> 26. http://fr.slideshare.net/brainopera/seduction-of-the-swarm </li> <li> 27. http://fr.slideshare.net/brainopera/seduction-of-the-swarm </li> <li> 28. Source de limage: http://agiledudes.com/wp-content/uploads/brain-transfer.jpg </li> <li> 29. http://fr.slideshare.net/brainopera/seduction-of-the-swarm </li> <li> 30. http://fr.slideshare.net/brainopera/seduction-of-the-swarm </li> <li> 31. http://fr.slideshare.net/brainopera/seduction-of-the-swarm </li> <li> 32. Reeds Law The value of networks scales exponentially with the size of the network.http://fr.slideshare.net/eekim/achieving-collective-intelligence </li> <li> 33. Brookss Law Adding people to a complex project makes it take longer.http://fr.slideshare.net/eekim/achieving-collective-intelligence </li> <li> 34. Network Network Potential Frictionhttp://fr.slideshare.net/eekim/achieving-collective-intelligence </li> <li> 35. We Want Reed to Win!http://fr.slideshare.net/eekim/achieving-collective-intelligence </li> <li> 36. http://fr.slideshare.net/brainopera/seduction-of-the-swarm </li> <li> 37. Otheradded value KM Collective intelligence Co-working Network management BUT The vendorsalreadytoldyou, is nt it? </li> <li> 38. Conclusion Do not forgetprivacy issues CC/CO 81 Control or not control IPR regulation s/b reminded Internal code of conduct BUT There are some important added value </li> <li> 39. Internal code of conduct main rules Define the internal and external social media Intellectualpropertyrules Data privacyexplanations Confidential information Anonimityisforbidden Penalties And Which communication for the code of conduct? How to have itapproved? </li> <li> 40. Any questions ?Crdit image: http://jillsbooks.wordpress.com/2010/09/15/hellooooo-anybody-out-there/raise-your-hand-2/ 45 </li> </ul>