alice wang awang@burtongroup mike gotta mgotta@burtongroup mikeg.typepad
DESCRIPTION
Leveraging Relationships and Managing Identity – Two Sides of the Social Networking Coin 29 September 2009. Alice Wang [email protected] Mike Gotta [email protected] mikeg.typepad.com. Two Sides Of The Social Networking Coin. +1-234-567-9012. [email protected]. zxcvxvxcccb. - PowerPoint PPT PresentationTRANSCRIPT
All Contents © 2009 Burton Group. All rights reserved.
Leveraging Relationships and Managing Identity – Two Sides of the Social
Networking Coin
29 September 2009
Alice Wang
Mike Gotta
mikeg.typepad.com
Two Sides Of The Social Networking Coin 2
zxcvxvxcccb
[email protected]+1-234-567-9012
+1-234-567-9012
Source: Booz Allen Hamilton
Two Sides Of The Social Networking Coin
Benefits expected from social tools and applications
• Connect people internally and externally • Break down organizational barriers and information silos• Promote employee innovation• Address generational shifts; meet technology expectations of
younger workers• Support strategic talent and learning initiatives
However – open and transparent environments can raise identity and security concerns
3
Use Case #1: Social Network Site 4
Enterprise Identity HRMS Directory Other Systems-of-Record
Trusted Identity Sources
[email protected]+1-234-567-9012
[email protected]+1-234-567-9012zxcvxvxcccb
Use Case #1: Social Network Site 5
Internal Social IdentityPersonalClaims
[email protected]+1-234-567-9012
[email protected]+1-234-567-9012zxcvxvxcccb
EmployeEmployee Profile e Profile
#4#4
EmployeEmployee Profile e Profile
#3#3
EmployeEmployee Profile e Profile
#2#2
A single profile? Multiple profiles? Federated profiles?
Use Case #2: Profile Proliferation 6
Women Returning To Work After Extended
Leave
ProfessionalExchange of
Best Practices
Gay & Lesbian
Community
Over-sharing via social conversation and community actions
EmployeEmployee Profilee Profile
Use Case #3: Activity Streams & Profiles 7
Jane Doe: Joined Community: “Women Supporting Women”
John Doe: “Working on a big M&A deal,need to work late tonight… stay tuned!”
Fred Smith: &#%^%$* we just lost the Company ABC account…
Jane Doe: Joined Community: “Gay & Lesbian Employees Outreach”
Betty Smith: @Bob Jones That patientID number is 123456789
Bob Jones: @SamJ I’ve changed the access controls so you can get into the workspace
“Women Supporting Women”
“Gay & Lesbian Employees” Outreach
Automatic posting of community
actions
Activity streams & “Enterprise
Twitter” messages
Use Case #4: First Comes Aggregation 8
External Social Identities
PersonalClaims
[email protected]+1-234-567-9012
[email protected]+1-234-567-9012zxcvxvxcccb
Is it me? How much is being shared? Under what controls?
Use Case #4: Followed By Correlation 9
Unification of an employee’s social
structures
“TheWorkMe”
“TheCitizen
Me”
ProfileGroupsContacts
ProfileStatus MessageActivitiesPhotos
ProfileFollowing / Followers“Tweets”
Enterprise IdentityEnterprise “Social Identity”
My politicsMy groupsMy musicMy friends
Use Case #5: Leveraging Consumer Tools 10
“TheEmployee
Me”
Enterprise roles and identities can collide with personal use of
social media“TheCitizen
Me”
Use Case #6: Enterprise Roles 11
HRMS Directory Other Systems-of-Record
Trusted Identity Sources
Role Management Applications
Business ProcessManagement (BPM)Systems
Enterprise Portals
Role Sources
Authentication,Authorization,Provisioning,RBAC, etc.
Enterprise Roles
My Roles• IT Architect• SME on “ABC”• Approver for access to “XYZ”• Certified on “123”
[email protected]+1-234-567-9012
[email protected]+1-234-567-9012zxcvxvxcccb
Social Roles
Use Case #6: Emergence Of “Social Roles”12
“Answer Person” “Wiki Gardener” “Idea Person” “News Filter”
Social Role Attributes
Social Data Aggregation & Correlation
Social Network Analysis
Use Case #7: Analyzing Relationships
Social analytics• Assess, correlate, and visualize relationship structures• Within the enterprise, discovery of latent connections most valuable• Evolution of tool capabilities can discover too much information on
organizational structures, activities, and relationships
13
Source: Telligent
Needs to figure out how to help a
company deal with export / import
regulations in country XYZ
Has dealt with import / export
problems in country XYZ for years in past
job role
Node 8To Node 10To Node 14To Node 15
Members Of Investigation
Unit
Awareness & Management Of Risks
Use Case concerns relevant to identity and security teams
• Profiles And Profiling• Credibility of profile and social claims• Possible bias against employees by co-workers based on race, diversity,
affiliation information made open and transparent via social media tools
• Information Security• Intellectual property, compliance, e-Discovery, monitoring…• Aggregation / correlation capabilities• Data management and data integration (profiles, roles, etc)
• Privacy• Adherence to regulatory statutes, level of employee controls, possible stalking
situations (hostile workplace)
• Social Network Analysis• Makes relationships visible that perhaps should not (“connecting the dots”)• May lead to “befriend / defraud” situations, social engineering
14
Recommendations
Moving forward with social media and social networking efforts
• Social media and social networking are strategic initiatives that are here to stay – saying “no” is not the right approach
• A decision-making framework and governance model is an essential component of any strategy
• Policies and procedures need to focus on the human element and avoid technology as a panacea
• Identity and security objectives need to be viewed on the same level as desires for openness and transparency
• IT teams that should be viewed as key stakeholders in social media and social networking strategies include:
• Groups responsible for collaboration and community efforts • Identity management and security groups• Information management and data analysis groups
15
All Contents © 2009 Burton Group. All rights reserved.
Q&A
16