+ All Categories
Home > Documents > All Contents © 2009 Burton Group. All rights reserved. Leveraging Relationships and Managing...

All Contents © 2009 Burton Group. All rights reserved. Leveraging Relationships and Managing...

Date post: 17-Dec-2015
Category:
Upload: gerard-nash
View: 213 times
Download: 0 times
Share this document with a friend
Popular Tags:
16
All Contents © 2009 Burton Group. All rights reserved. Leveraging Relationships and Managing Identity – Two Sides of the Social Networking Coin 29 September 2009 Alice Wang [email protected] Mike Gotta [email protected] mikeg.typepad.com
Transcript

All Contents © 2009 Burton Group. All rights reserved.

Leveraging Relationships and Managing Identity – Two Sides of the Social

Networking Coin

29 September 2009

Alice Wang

[email protected]

Mike Gotta

[email protected]

mikeg.typepad.com

Two Sides Of The Social Networking Coin 2

zxcvxvxcccb

[email protected]

[email protected]+1-234-567-9012

+1-234-567-9012

Source: Booz Allen Hamilton

Two Sides Of The Social Networking Coin

Benefits expected from social tools and applications

• Connect people internally and externally • Break down organizational barriers and information silos• Promote employee innovation• Address generational shifts; meet technology expectations of

younger workers• Support strategic talent and learning initiatives

However – open and transparent environments can raise identity and security concerns

3

Use Case #1: Social Network Site 4

Enterprise Identity HRMS Directory Other Systems-of-Record

Trusted Identity Sources

[email protected]+1-234-567-9012

[email protected]+1-234-567-9012zxcvxvxcccb

Use Case #1: Social Network Site 5

Internal Social IdentityPersonalClaims

[email protected]+1-234-567-9012

[email protected]+1-234-567-9012zxcvxvxcccb

EmployeEmployee Profile e Profile

#4#4

EmployeEmployee Profile e Profile

#3#3

EmployeEmployee Profile e Profile

#2#2

A single profile? Multiple profiles? Federated profiles?

Use Case #2: Profile Proliferation 6

Women Returning To Work After Extended

Leave

ProfessionalExchange of

Best Practices

Gay & Lesbian

Community

Over-sharing via social conversation and community actions

EmployeEmployee Profilee Profile

Use Case #3: Activity Streams & Profiles 7

Jane Doe: Joined Community: “Women Supporting Women”

John Doe: “Working on a big M&A deal,need to work late tonight… stay tuned!”

Fred Smith: &#%^%$* we just lost the Company ABC account…

Jane Doe: Joined Community: “Gay & Lesbian Employees Outreach”

Betty Smith: @Bob Jones That patientID number is 123456789

Bob Jones: @SamJ I’ve changed the access controls so you can get into the workspace

“Women Supporting Women”

“Gay & Lesbian Employees” Outreach

Automatic posting of community

actions

Activity streams & “Enterprise

Twitter” messages

Use Case #4: First Comes Aggregation 8

External Social Identities

PersonalClaims

[email protected]+1-234-567-9012

[email protected]+1-234-567-9012zxcvxvxcccb

Is it me? How much is being shared? Under what controls?

Use Case #4: Followed By Correlation 9

Unification of an employee’s social

structures

“TheWorkMe”

“TheCitizen

Me”

ProfileGroupsContacts

ProfileStatus MessageActivitiesPhotos

ProfileFollowing / Followers“Tweets”

Enterprise IdentityEnterprise “Social Identity”

My politicsMy groupsMy musicMy friends

Use Case #5: Leveraging Consumer Tools 10

“TheEmployee

Me”

Enterprise roles and identities can collide with personal use of

social media“TheCitizen

Me”

Use Case #6: Enterprise Roles 11

HRMS Directory Other Systems-of-Record

Trusted Identity Sources

Role Management Applications

Business ProcessManagement (BPM)Systems

Enterprise Portals

Role Sources

Authentication,Authorization,Provisioning,RBAC, etc.

Enterprise Roles

My Roles• IT Architect• SME on “ABC”• Approver for access to “XYZ”• Certified on “123”

[email protected]+1-234-567-9012

[email protected]+1-234-567-9012zxcvxvxcccb

Social Roles

Use Case #6: Emergence Of “Social Roles”12

“Answer Person” “Wiki Gardener” “Idea Person” “News Filter”

Social Role Attributes

Social Data Aggregation & Correlation

Social Network Analysis

Use Case #7: Analyzing Relationships

Social analytics• Assess, correlate, and visualize relationship structures• Within the enterprise, discovery of latent connections most valuable• Evolution of tool capabilities can discover too much information on

organizational structures, activities, and relationships

13

Source: Telligent

Needs to figure out how to help a

company deal with export / import

regulations in country XYZ

Has dealt with import / export

problems in country XYZ for years in past

job role

Node 8To Node 10To Node 14To Node 15

Members Of Investigation

Unit

Awareness & Management Of Risks

Use Case concerns relevant to identity and security teams

• Profiles And Profiling• Credibility of profile and social claims• Possible bias against employees by co-workers based on race, diversity,

affiliation information made open and transparent via social media tools

• Information Security• Intellectual property, compliance, e-Discovery, monitoring…• Aggregation / correlation capabilities• Data management and data integration (profiles, roles, etc)

• Privacy• Adherence to regulatory statutes, level of employee controls, possible stalking

situations (hostile workplace)

• Social Network Analysis• Makes relationships visible that perhaps should not (“connecting the dots”)• May lead to “befriend / defraud” situations, social engineering

14

Recommendations

Moving forward with social media and social networking efforts

• Social media and social networking are strategic initiatives that are here to stay – saying “no” is not the right approach

• A decision-making framework and governance model is an essential component of any strategy

• Policies and procedures need to focus on the human element and avoid technology as a panacea

• Identity and security objectives need to be viewed on the same level as desires for openness and transparency

• IT teams that should be viewed as key stakeholders in social media and social networking strategies include:

• Groups responsible for collaboration and community efforts • Identity management and security groups• Information management and data analysis groups

15

All Contents © 2009 Burton Group. All rights reserved.

Q&A

16


Recommended