Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad
description
Transcript of Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad
![Page 1: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/1.jpg)
All Contents © 2009 Burton Group. All rights reserved.
Leveraging Relationships and Managing Identity – Two Sides of the Social
Networking Coin
29 September 2009
Alice Wang
Mike Gotta
mikeg.typepad.com
![Page 2: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/2.jpg)
Two Sides Of The Social Networking Coin 2
zxcvxvxcccb
[email protected]+1-234-567-9012
+1-234-567-9012
Source: Booz Allen Hamilton
![Page 3: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/3.jpg)
Two Sides Of The Social Networking Coin
Benefits expected from social tools and applications
• Connect people internally and externally • Break down organizational barriers and information silos• Promote employee innovation• Address generational shifts; meet technology expectations of
younger workers• Support strategic talent and learning initiatives
However – open and transparent environments can raise identity and security concerns
3
![Page 4: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/4.jpg)
Use Case #1: Social Network Site 4
Enterprise Identity HRMS Directory Other Systems-of-Record
Trusted Identity Sources
[email protected]+1-234-567-9012
[email protected]+1-234-567-9012zxcvxvxcccb
![Page 5: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/5.jpg)
Use Case #1: Social Network Site 5
Internal Social IdentityPersonalClaims
[email protected]+1-234-567-9012
[email protected]+1-234-567-9012zxcvxvxcccb
![Page 6: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/6.jpg)
EmployeEmployee Profile e Profile
#4#4
EmployeEmployee Profile e Profile
#3#3
EmployeEmployee Profile e Profile
#2#2
A single profile? Multiple profiles? Federated profiles?
Use Case #2: Profile Proliferation 6
Women Returning To Work After Extended
Leave
ProfessionalExchange of
Best Practices
Gay & Lesbian
Community
![Page 7: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/7.jpg)
Over-sharing via social conversation and community actions
EmployeEmployee Profilee Profile
Use Case #3: Activity Streams & Profiles 7
Jane Doe: Joined Community: “Women Supporting Women”
John Doe: “Working on a big M&A deal,need to work late tonight… stay tuned!”
Fred Smith: &#%^%$* we just lost the Company ABC account…
Jane Doe: Joined Community: “Gay & Lesbian Employees Outreach”
Betty Smith: @Bob Jones That patientID number is 123456789
Bob Jones: @SamJ I’ve changed the access controls so you can get into the workspace
“Women Supporting Women”
“Gay & Lesbian Employees” Outreach
Automatic posting of community
actions
Activity streams & “Enterprise
Twitter” messages
![Page 8: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/8.jpg)
Use Case #4: First Comes Aggregation 8
External Social Identities
PersonalClaims
[email protected]+1-234-567-9012
[email protected]+1-234-567-9012zxcvxvxcccb
![Page 9: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/9.jpg)
Is it me? How much is being shared? Under what controls?
Use Case #4: Followed By Correlation 9
Unification of an employee’s social
structures
“TheWorkMe”
“TheCitizen
Me”
ProfileGroupsContacts
ProfileStatus MessageActivitiesPhotos
ProfileFollowing / Followers“Tweets”
Enterprise IdentityEnterprise “Social Identity”
My politicsMy groupsMy musicMy friends
![Page 10: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/10.jpg)
Use Case #5: Leveraging Consumer Tools 10
“TheEmployee
Me”
Enterprise roles and identities can collide with personal use of
social media“TheCitizen
Me”
![Page 11: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/11.jpg)
Use Case #6: Enterprise Roles 11
HRMS Directory Other Systems-of-Record
Trusted Identity Sources
Role Management Applications
Business ProcessManagement (BPM)Systems
Enterprise Portals
Role Sources
Authentication,Authorization,Provisioning,RBAC, etc.
Enterprise Roles
My Roles• IT Architect• SME on “ABC”• Approver for access to “XYZ”• Certified on “123”
[email protected]+1-234-567-9012
[email protected]+1-234-567-9012zxcvxvxcccb
![Page 12: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/12.jpg)
Social Roles
Use Case #6: Emergence Of “Social Roles”12
“Answer Person” “Wiki Gardener” “Idea Person” “News Filter”
Social Role Attributes
Social Data Aggregation & Correlation
Social Network Analysis
![Page 13: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/13.jpg)
Use Case #7: Analyzing Relationships
Social analytics• Assess, correlate, and visualize relationship structures• Within the enterprise, discovery of latent connections most valuable• Evolution of tool capabilities can discover too much information on
organizational structures, activities, and relationships
13
Source: Telligent
Needs to figure out how to help a
company deal with export / import
regulations in country XYZ
Has dealt with import / export
problems in country XYZ for years in past
job role
Node 8To Node 10To Node 14To Node 15
Members Of Investigation
Unit
![Page 14: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/14.jpg)
Awareness & Management Of Risks
Use Case concerns relevant to identity and security teams
• Profiles And Profiling• Credibility of profile and social claims• Possible bias against employees by co-workers based on race, diversity,
affiliation information made open and transparent via social media tools
• Information Security• Intellectual property, compliance, e-Discovery, monitoring…• Aggregation / correlation capabilities• Data management and data integration (profiles, roles, etc)
• Privacy• Adherence to regulatory statutes, level of employee controls, possible stalking
situations (hostile workplace)
• Social Network Analysis• Makes relationships visible that perhaps should not (“connecting the dots”)• May lead to “befriend / defraud” situations, social engineering
14
![Page 15: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/15.jpg)
Recommendations
Moving forward with social media and social networking efforts
• Social media and social networking are strategic initiatives that are here to stay – saying “no” is not the right approach
• A decision-making framework and governance model is an essential component of any strategy
• Policies and procedures need to focus on the human element and avoid technology as a panacea
• Identity and security objectives need to be viewed on the same level as desires for openness and transparency
• IT teams that should be viewed as key stakeholders in social media and social networking strategies include:
• Groups responsible for collaboration and community efforts • Identity management and security groups• Information management and data analysis groups
15
![Page 16: Alice Wang awang@burtongroup Mike Gotta mgotta@burtongroup mikeg.typepad](https://reader035.fdocuments.us/reader035/viewer/2022062803/56814657550346895db3727c/html5/thumbnails/16.jpg)
All Contents © 2009 Burton Group. All rights reserved.
Q&A
16