Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

16
All Contents © 2009 Burton Group. All rights reserved. Leveraging Relationships and Managing Identity – Two Sides of the Social Networking Coin 29 September 2009 Alice Wang [email protected] Mike Gotta [email protected] mikeg.typepad.com

description

Leveraging Relationships and Managing Identity – Two Sides of the Social Networking Coin 29 September 2009. Alice Wang [email protected] Mike Gotta [email protected] mikeg.typepad.com. Two Sides Of The Social Networking Coin. +1-234-567-9012. [email protected]. zxcvxvxcccb. - PowerPoint PPT Presentation

Transcript of Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

Page 1: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

All Contents © 2009 Burton Group. All rights reserved.

Leveraging Relationships and Managing Identity – Two Sides of the Social

Networking Coin

29 September 2009

Alice Wang

[email protected]

Mike Gotta

[email protected]

mikeg.typepad.com

Page 2: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

Two Sides Of The Social Networking Coin 2

zxcvxvxcccb

[email protected]

[email protected]+1-234-567-9012

+1-234-567-9012

Source: Booz Allen Hamilton

Page 3: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

Two Sides Of The Social Networking Coin

Benefits expected from social tools and applications

• Connect people internally and externally • Break down organizational barriers and information silos• Promote employee innovation• Address generational shifts; meet technology expectations of

younger workers• Support strategic talent and learning initiatives

However – open and transparent environments can raise identity and security concerns

3

Page 4: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

Use Case #1: Social Network Site 4

Enterprise Identity HRMS Directory Other Systems-of-Record

Trusted Identity Sources

[email protected]+1-234-567-9012

[email protected]+1-234-567-9012zxcvxvxcccb

Page 5: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

Use Case #1: Social Network Site 5

Internal Social IdentityPersonalClaims

[email protected]+1-234-567-9012

[email protected]+1-234-567-9012zxcvxvxcccb

Page 6: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

EmployeEmployee Profile e Profile

#4#4

EmployeEmployee Profile e Profile

#3#3

EmployeEmployee Profile e Profile

#2#2

A single profile? Multiple profiles? Federated profiles?

Use Case #2: Profile Proliferation 6

Women Returning To Work After Extended

Leave

ProfessionalExchange of

Best Practices

Gay & Lesbian

Community

Page 7: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

Over-sharing via social conversation and community actions

EmployeEmployee Profilee Profile

Use Case #3: Activity Streams & Profiles 7

Jane Doe: Joined Community: “Women Supporting Women”

John Doe: “Working on a big M&A deal,need to work late tonight… stay tuned!”

Fred Smith: &#%^%$* we just lost the Company ABC account…

Jane Doe: Joined Community: “Gay & Lesbian Employees Outreach”

Betty Smith: @Bob Jones That patientID number is 123456789

Bob Jones: @SamJ I’ve changed the access controls so you can get into the workspace

“Women Supporting Women”

“Gay & Lesbian Employees” Outreach

Automatic posting of community

actions

Activity streams & “Enterprise

Twitter” messages

Page 8: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

Use Case #4: First Comes Aggregation 8

External Social Identities

PersonalClaims

[email protected]+1-234-567-9012

[email protected]+1-234-567-9012zxcvxvxcccb

Page 9: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

Is it me? How much is being shared? Under what controls?

Use Case #4: Followed By Correlation 9

Unification of an employee’s social

structures

“TheWorkMe”

“TheCitizen

Me”

ProfileGroupsContacts

ProfileStatus MessageActivitiesPhotos

ProfileFollowing / Followers“Tweets”

Enterprise IdentityEnterprise “Social Identity”

My politicsMy groupsMy musicMy friends

Page 10: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

Use Case #5: Leveraging Consumer Tools 10

“TheEmployee

Me”

Enterprise roles and identities can collide with personal use of

social media“TheCitizen

Me”

Page 11: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

Use Case #6: Enterprise Roles 11

HRMS Directory Other Systems-of-Record

Trusted Identity Sources

Role Management Applications

Business ProcessManagement (BPM)Systems

Enterprise Portals

Role Sources

Authentication,Authorization,Provisioning,RBAC, etc.

Enterprise Roles

My Roles• IT Architect• SME on “ABC”• Approver for access to “XYZ”• Certified on “123”

[email protected]+1-234-567-9012

[email protected]+1-234-567-9012zxcvxvxcccb

Page 12: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

Social Roles

Use Case #6: Emergence Of “Social Roles”12

“Answer Person” “Wiki Gardener” “Idea Person” “News Filter”

Social Role Attributes

Social Data Aggregation & Correlation

Social Network Analysis

Page 13: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

Use Case #7: Analyzing Relationships

Social analytics• Assess, correlate, and visualize relationship structures• Within the enterprise, discovery of latent connections most valuable• Evolution of tool capabilities can discover too much information on

organizational structures, activities, and relationships

13

Source: Telligent

Needs to figure out how to help a

company deal with export / import

regulations in country XYZ

Has dealt with import / export

problems in country XYZ for years in past

job role

Node 8To Node 10To Node 14To Node 15

Members Of Investigation

Unit

Page 14: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

Awareness & Management Of Risks

Use Case concerns relevant to identity and security teams

• Profiles And Profiling• Credibility of profile and social claims• Possible bias against employees by co-workers based on race, diversity,

affiliation information made open and transparent via social media tools

• Information Security• Intellectual property, compliance, e-Discovery, monitoring…• Aggregation / correlation capabilities• Data management and data integration (profiles, roles, etc)

• Privacy• Adherence to regulatory statutes, level of employee controls, possible stalking

situations (hostile workplace)

• Social Network Analysis• Makes relationships visible that perhaps should not (“connecting the dots”)• May lead to “befriend / defraud” situations, social engineering

14

Page 15: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

Recommendations

Moving forward with social media and social networking efforts

• Social media and social networking are strategic initiatives that are here to stay – saying “no” is not the right approach

• A decision-making framework and governance model is an essential component of any strategy

• Policies and procedures need to focus on the human element and avoid technology as a panacea

• Identity and security objectives need to be viewed on the same level as desires for openness and transparency

• IT teams that should be viewed as key stakeholders in social media and social networking strategies include:

• Groups responsible for collaboration and community efforts • Identity management and security groups• Information management and data analysis groups

15

Page 16: Alice Wang  awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad

All Contents © 2009 Burton Group. All rights reserved.

Q&A

16