SlideShare una empresa de Scribd logo
1 de 32
Architecting the Building Blocks of
Enterprise Social Networking
Michael Gotta
Senior Technology Solutions Manager
Enterprise Social Software
mikeg.typepad.com (personal blog)

@MikeGotta (Twitter)




© 2010 Cisco and/or its affiliates. All rights reserved.
  2011                                                     Cisco Confidential   1
Communities             Projects


                           Conversations                                                      Processes

                                                                         People
                                                                           to
                                                                         People

           Teams                                                                                    Information
                                                              People     Media People
                                                                To                  to
                                                              Artifact            Activity


                                                                         ―Ties‖


© 2010 Cisco and/or its affiliates. All rights reserved.                                              Cisco Confidential   2
Business Value                 Organizational
                                                                  Value
                       Expertise location                  Employee
                       Exception handling                   engagement
                       Process cycle time                  Talent discovery
                       Project coordination                Social learning
                       Information sharing                 Onboarding new hires
                       Innovation                          Participatory culture




© 2010 Cisco and/or its affiliates. All rights reserved.                        Cisco Confidential   3
Well-Known                                                                Emergent
                                                            Traditional           E2.0 &
                                                           Collaboration        Social Media
                            Unified                                                             Enterprise 2.0,
                         Communications                                                         Social Media…


                               Traditional                                                    Semantics and
                              Collaboration                              Social           Semantics Analytics
                                                                                              Social
                                             Unified
                                          Communications
                                                                        Network            & Social
                                                                       Site (SNS)          Analytics
                       Enterprise Content
                                                                                                 Visualization
                         Management




                                                            Enterprise
                                                             Content            Visualization
                                                           Management


© 2010 Cisco and/or its affiliates. All rights reserved.                                                         Cisco Confidential   4
Any Application                                   Any Content / Site            Any Device
                                      (Internal / External)                              (Internal / External)       (@Work or @Home)

―E2.0‖




                                                                                                                          Communications
                                                                         “Social-enabled” Applications




                                                                                                                          Video & Unified




                                                                                                                                                      Activity Streams
                                        Search Services




                                                                                                          Forums
―E1.0‖                                                       Blog            Wiki           Tags
                                                                                                        Workspaces
                                                                   Social Feedback
Common                                                      (“Like”, “Follow”, “Rate”, “Reputation”…)   Communities
Services
                                                                               Metadata and Content Services

                                                                                      Profile & Social Graph

                                                                                     Semantics and Analytics

                                                                              Federation & Integration Services

                                                                  Network, Infrastructure & Management Services

 © 2010 Cisco and/or its affiliates. All rights reserved.                                                                                   Cisco Confidential           5
EA Role                                    IA Role
                   Enterprise Architect                                   Information Architect
                      Organizational Architect                                   Social Insight
               Sociologist and/or Anthropologist                       Visualization, Semantics, Social Data
                                                                                    Stewardship

                                                            People
                                                           To People
                                                           Alignment
                            Solution Role                                   Technology Role
            Applications Architecture                                   Products & Infrastructure
                    Community Management                                         Social Platform
          Social Network Analysis, UXP design                                Graph Engines, Event
                                                                        Processing, Policy-based Controls


© 2010 Cisco and/or its affiliates. All rights reserved.                                           Cisco Confidential   6
Business Value                                         Personal Value              Organizational
                                                                                              Value
 Expertise location                                        Identity                   Employee
 Exception handling                                                                     engagement
                                                            Contacts & information
 Process cycle time                                                                    Talent discovery
                                                            Sense of community
 Project coordination                                                                  Social learning
                                                            Visibility & reputation
 Information sharing                                                                   Onboarding new hires
                                                            Social capital
 Innovation                                                                            Participatory culture
                                                            Skills/competencies
                                                            Career advancement




© 2010 Cisco and/or its affiliates. All rights reserved.                                             Cisco Confidential   7
Formation, Cultivation
                                                                     Front Stage                   Back Stage
& Mobilization Contexts
                                                                                          Job
                                                             People, information, commu
                        Seeking                                                           opportunities, mentors, advi
                                                             nities
                                                                                          ce, personal motivations

                        Purpose                              Assigned work, visibly       Cultivation of social
                                                             volunteer                    resources (CSR)
                                                             Newly                        Learn local
               Transitions                                   hired, promotion, next       folklore, gain/build co-
                                                             project, new team…           worker support

                                                             M&A, outsourced, reduction   Career issues, emotional
                  Disruption
                                                             in force, retirement         support (personal)




  © 2010 Cisco and/or its affiliates. All rights reserved.                                                    Cisco Confidential   8
Social Networking
                                                            Design Considerations



                Theory                                     Methods         Practices     Technology

Sociology                                                                              E-Mail
Anthropology                                                                           Discussion Forums
Psychology                                                                             Instant Messaging
Communications                                                                         Social Network Sites
Organizational                                                                         E2.0 / Social Media
 Development                                                                              Tools



© 2010 Cisco and/or its affiliates. All rights reserved.                                       Cisco Confidential   9
My Other
My “Enterprise Identity”                                                                     Social Identities
Mike Gotta EMPLOYEE #
           TITLE
           DEPARTMENT
           CONTACY INFO                                                                        My Activities
           REPORTINT CHAIN
           JOB TITLE / ROLE                                                                  Blogs      Wikis

        My “Claimed Identity”
                                                                                            My Social Feedback
EXPERTISE                               EDUCATION
INTERESTS                               SKILLS
HOBBIES                                 PERSONAL TAGS



               Ascribed                                    +   Claimed    +     Performed      +     Reciprocated



                                                                  Enterprise Identity                                               10
© 2010 Cisco and/or its affiliates. All rights reserved.                                                       Cisco Confidential
Social Role
                                          “Answer Person”                                    Enterprise Identity
                                                           Discussion
                       Wiki                                                                     Jessica Savage
                                                             Forum
                                                                                                JOB TITLE: CALL CENTER AGENT
                                                                                                EMPLOYEE #: 00124
                                                                        Community
                                                                                                DEPARTMENT #: 015
                                                                                                HOBBIES: XXX, YYY, ZZZ



                                                                                             “My Questions
                                                                                Blog and
                                                                                              & Answers”
                                                                                Micro-blog




© 2010 Cisco and/or its affiliates. All rights reserved.                                                         Cisco Confidential   11
Teams                                                       Communities


“Project-based” Ties                                                          Interest-based Ties


                        Corporate




      Business                             Business                                Processes
       Units                                Units           Social Networks


  Reporting-based                                                              Role-based Ties
       Ties
 © 2010 Cisco and/or its affiliates. All rights reserved.                               Cisco Confidential   12
Follow Person     My Filtered View

                                                                               Tag Content
“Project-based” Ties

                                                           Activity Stream
                                                                             Post Blog Entry


                                                                              Ask Question


                                                                             Follow Tag/Topic
           Interest-based
                Ties                                                         Schedule Meeting


                                                                             Share Exception


                                                                             Join Community

                                                                                Start Web
                                                                                                Helps mediate
        Role-based Ties                                                        Conference       “Latent Ties”
© 2010 Cisco and/or its affiliates. All rights reserved.                                                    Cisco Confidential   13
Follow Person                                                My Filtered View

                                 Tag Content                                              Recommendations

                                                                     Social Networking
      Activity Stream




                             Post Blog Entry                                             Alerts & Notifications

                                Ask Question
                                                                                                  Patterns
                                                                        Analytics




                                                                    Data        Social
                                                                    Store       Graph

                                                           Policy                        Policy



© 2010 Cisco and/or its affiliates. All rights reserved.                                                 Cisco Confidential   14
Object                        +                      Data     +     Interaction       +     Appropriation      +    Sharing   +      Analytics




                                                                  Cultivation                              Identity
                                                                   of Social                             Construction
                                                                  Resources Status                 Questions




                                                                                      Digital
                                                                      Events       Social Object               Content
                                                                                           Work



                                                                               Exception
                                                                                                    Meetings
                                                                   Network Handling
                                                                  Mobilization                             Affiliations




© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                Cisco Confidential   15
Social Networking
                                                                 Design Considerations



                Theory                                         Methods          Practices   Technology

                                                           Interviews
                                                           Surveys
                                                           Ethnography
                                                           Sampling &
                                                             Measurement
                                                           Social Network
                                                             Analysis


© 2010 Cisco and/or its affiliates. All rights reserved.                                        Cisco Confidential   16
• Think about the people with whom you interact regularly during your
       day-to-day work activities. Estimate what proportion of those people
       with whom you interact regularly in a work related context work internal
       to Company ABC as opposed to external to Company ABC (i.e., a
       customer, partner).
                  • Slide the bar to the point on the line you feel best reflects the percentage of
                    time you spend interacting with people internal to Company ABC as
                    opposed to people external to Company ABC.

• Now think just about the people within Company ABC with whom you
       interact regularly during your day-to-day work activities. Estimate what
       proportion of those people with whom you interact regularly work within
       Name-Of-Manager’s-Group and the corresponding groups in your
       business unit as opposed to the rest of Company ABC.
                  • Slide the bar to the point on the line you feel best reflects the percentage of
                    time you spend interacting with people inside Name-Of-Manager’s-Group
                    as opposed to outside it.

© 2010 Cisco and/or its affiliates. All rights reserved.                                  Cisco Confidential   17
• Now, think specifically about the people within Name-Of-Manager’s-
       Group and the corresponding external groups with whom you interact
       regularly. Please list their full names in each box below. Feel free to list
       as many or as few people as you think applies to you.
• You will be asked a few follow-up questions about each of these people
       on the next few pages. 30 spaces are provided for you to list names on
       this page. You do not have to list 30 names and fill in every space.
• Only list the names of people you feel best represent those within Name-
       Of-Manager’s-Group with whom you interact regularly. If you are unsure
       whether or not the individual is part of the survey pool, please go ahead
       and list them anyway.




© 2010 Cisco and/or its affiliates. All rights reserved.                    Cisco Confidential   18
• For each individual previously identified, please select the method(s) of
       communication you use to collaborate with them. Select all that apply.
            Interaction Types: F2F, e-mail, phone, IM, web conferencing, SNS, etc.

• How frequently do you communicate with each person within the context of your
       job? .
            Range: 1 (rarely) – 7 (very often)

• How frequently do you go to each person for advice, information, or assistance
       to do your job better?
            Range: 1 (rarely) – 7 (very often)

• How comfortable would you feel approaching each person to discuss sensitive
       topics?
            Range: 1 (very uncomfortable) – 7 (very comfortable)
• How frequently do you go to each person to assist you with innovation, problem
  solving, and coming up with new solutions?
            Range: 1 (rarely) – 7 (very often)

© 2010 Cisco and/or its affiliates. All rights reserved.                             Cisco Confidential   19
Groups




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   20
Team ABC



           Team XYZ




© 2010 Cisco and/or its affiliates. All rights reserved.          Cisco Confidential   21
Groups




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   22
One way relation (not reciprocal                         Groups
   ties) indicates interaction as
   broadcast message or channel
   switching




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   23
Social Networking
                                                            Design Considerations



                Theory                                     Methods         Practices        Technology

                                                                       Community-building
                                                                         Frameworks
                                                                       Adoption Tactics
                                                                       Change
                                                                         Management
                                                                         Programs
                                                                       ―Social BPM‖


© 2010 Cisco and/or its affiliates. All rights reserved.                                        Cisco Confidential   24
HR &                         +     Corporate    +           Audit &    +   Business   +         IT         +     Research
        Legal                            Communications           Compliance        Units           Organization         Group(s)




                                                            Planning,
                                                                                        Financial
                                                           Marketing &
                                                                                       Management
                                                            Education




                                                                           Change
                                                                         Management
                                                                          Program


                                                             Project                    Resource
                                                           Management                  Management




© 2010 Cisco and/or its affiliates. All rights reserved.                                                               Cisco Confidential   25
Early                “Seeding
                                                           Adopter                Tactics”
                                                           Outreach
                                     User
                                  Experience                                                   Media
                                    Design                                                   Literacies



                                                                      Adoption
     Applied                                                          Program                     Community
    Research                                                                                      Engagement
                                                                        Change
                                                           Governance
                                                                      Management
                                                            Program
                                                                       Program


© 2010 Cisco and/or its affiliates. All rights reserved.                                             Cisco Confidential   26
• New methods are likely
                                                                  needed
                                                                • Blend and connect methods
• Theory is relevant but needs to                                 to existing frameworks as it
    be expressed in your own                                      makes sense
    organizational context
                                                                • Skills and competencies
• Research needs to be                                            likely to come externally but
    applied to your own                                           should be grown internally
    situation                                                     over time
• Theory needs to be
    linked in a life-cycle
    manner




           • Expect push-back, this model relies on a lot of qualitative approaches

           • Blend and connect practices into existing approaches (e.g., Community
                  Management, Social BPM)
           • Feedback loop based on experiences should flow back to affect assumptions
 © 2010 Cisco and/or its affiliates. All rights reserved.                         Cisco Confidential   27
• Albrechtslund, A. (2008). Online Social Networking as
       Participatory Surveillance. First Monday, 13(3). Retrieved from
       http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/
       2142/1949
• boyd, d. (2011, October 15). Embracing a Culture of Connectivity
       | Berkman Center. (video). Retrieved from
       http://cyber.law.harvard.edu/interactive/events/2011/05/danahboy
       d
• boyd, danahm, & Ellison, N. B. (2007). Social Network Sites:
       Definition, History, and Scholarship. Journal of
       Computer‐Mediated Communication, 13(1), 210-230.
       doi:10.1111/j.1083-6101.2007.00393.x Retrieved from
       http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html


© 2010 Cisco and/or its affiliates. All rights reserved.           Cisco Confidential   28
• Ellison, N., (2011, October 15). Benefits of Facebook ―Friends‖ |
       Berkman Center. Retrieved from
       http://cyber.law.harvard.edu/interactive/events/luncheon/2011/06/
       ellison
• Engeström, J. (2005). Why some social network services work
       and others don’t — Or: the case for object-centered sociality ::
       Zengestrom. (n.d.). Retrieved October 25, 2011, from
       http://www.zengestrom.com/blog/2005/04/why-some-social-
       network-services-work-and-others-dont-or-the-case-for-object-
       centered-sociality.html
• Engeström, J. (2007). What makes a good social object ::
       Zengestrom. (n.d.). Retrieved October 25, 2011, from
       http://www.zengestrom.com/blog/2007/08/what-makes-a-good-
       social-object.html

© 2010 Cisco and/or its affiliates. All rights reserved.          Cisco Confidential   29
• Gleave, E., Welser, H. T., Lento, T. M., & Smith, M. A. (2009). A
       Conceptual and Operational Definition of ―Social Role‖ in Online
       Community. 42nd Hawaii International Conference on System
       Sciences, 2009. HICSS ’09 (pp. 1-11). Presented at the 42nd
       Hawaii International Conference on System Sciences, 2009.
       HICSS ’09, IEEE. doi:10.1109/HICSS.2009.6
• Jenkins, H. (2009). Confronting the Challenges of Participatory
       Culture: Media Education for the 21st Century. The MIT Press.
       Retrieved
       fromhttp://digitallearning.macfound.org/site/apps/nlnet/content2.a
       spx?c=enJLKQNlFiG&b=2108773&ct=3017973&notoc=1




© 2010 Cisco and/or its affiliates. All rights reserved.           Cisco Confidential   30
• Pearson, E. (2009). All the World Wide Web’s a stage: The
       performance of identity in online social networks. First
       Monday, 14(3), 1–7. Retrieved from
       http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/vie
       w/2162/2127

Annotated Bibliography
• Collaboration Thinking, Mike
       Gotta, http://mikeg.typepad.com/perceptions/2011/11/annotated-
       bibliography-background-for-literature-review-project.html
Literature Review
• Check back in early December


© 2010 Cisco and/or its affiliates. All rights reserved.            Cisco Confidential   31
Thank you.




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   32

Más contenido relacionado

La actualidad más candente

Emerging trends (internal presentation)
Emerging trends (internal presentation)Emerging trends (internal presentation)
Emerging trends (internal presentation)Andrea Pesoli
 
Social Computing and Product Development
Social Computing and Product Development Social Computing and Product Development
Social Computing and Product Development PTC
 
Social Business - The Business Value in Social Networks
Social Business - The Business Value in Social NetworksSocial Business - The Business Value in Social Networks
Social Business - The Business Value in Social NetworksBilal Jaffery
 
Web 2.0 Business Models
Web 2.0 Business ModelsWeb 2.0 Business Models
Web 2.0 Business ModelsTeemu Arina
 
Intranet, Web 2.0, Enterprise 2.0
Intranet, Web 2.0, Enterprise 2.0Intranet, Web 2.0, Enterprise 2.0
Intranet, Web 2.0, Enterprise 2.0Andrea Pesoli
 
Using Social Media for Continuity & Emergency Management
Using Social Media for Continuity & Emergency ManagementUsing Social Media for Continuity & Emergency Management
Using Social Media for Continuity & Emergency ManagementGeorges Cowan
 
Esm fy13 leadership
Esm fy13 leadershipEsm fy13 leadership
Esm fy13 leadershipCisco
 
Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011bluechipper
 
Webinar: Enterprise Social Networking to Foster Employee Engagement
Webinar: Enterprise Social Networking  to Foster Employee Engagement Webinar: Enterprise Social Networking  to Foster Employee Engagement
Webinar: Enterprise Social Networking to Foster Employee Engagement tibbr
 
IBM Social Portal 2012 (Korean)
IBM Social Portal 2012 (Korean)IBM Social Portal 2012 (Korean)
IBM Social Portal 2012 (Korean)Do Hyun Kim
 
Content Convergence, Integration, Performance
Content Convergence, Integration, PerformanceContent Convergence, Integration, Performance
Content Convergence, Integration, PerformanceJoe Gollner
 
E government avoiding a Dot Gov Bubble
E government   avoiding a Dot Gov BubbleE government   avoiding a Dot Gov Bubble
E government avoiding a Dot Gov BubbleDaniel Gruia
 

La actualidad más candente (16)

1109 siit jfriedrich v02
1109 siit jfriedrich v021109 siit jfriedrich v02
1109 siit jfriedrich v02
 
Emerging trends (internal presentation)
Emerging trends (internal presentation)Emerging trends (internal presentation)
Emerging trends (internal presentation)
 
Izmir2010 anttila
Izmir2010 anttilaIzmir2010 anttila
Izmir2010 anttila
 
Social Computing and Product Development
Social Computing and Product Development Social Computing and Product Development
Social Computing and Product Development
 
Social Business - The Business Value in Social Networks
Social Business - The Business Value in Social NetworksSocial Business - The Business Value in Social Networks
Social Business - The Business Value in Social Networks
 
Anatomy of the MMO
Anatomy of the MMOAnatomy of the MMO
Anatomy of the MMO
 
Campus Channel Network
Campus Channel NetworkCampus Channel Network
Campus Channel Network
 
Web 2.0 Business Models
Web 2.0 Business ModelsWeb 2.0 Business Models
Web 2.0 Business Models
 
Intranet, Web 2.0, Enterprise 2.0
Intranet, Web 2.0, Enterprise 2.0Intranet, Web 2.0, Enterprise 2.0
Intranet, Web 2.0, Enterprise 2.0
 
Using Social Media for Continuity & Emergency Management
Using Social Media for Continuity & Emergency ManagementUsing Social Media for Continuity & Emergency Management
Using Social Media for Continuity & Emergency Management
 
Esm fy13 leadership
Esm fy13 leadershipEsm fy13 leadership
Esm fy13 leadership
 
Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011Cisco it collaboration for blue chip 03 2011
Cisco it collaboration for blue chip 03 2011
 
Webinar: Enterprise Social Networking to Foster Employee Engagement
Webinar: Enterprise Social Networking  to Foster Employee Engagement Webinar: Enterprise Social Networking  to Foster Employee Engagement
Webinar: Enterprise Social Networking to Foster Employee Engagement
 
IBM Social Portal 2012 (Korean)
IBM Social Portal 2012 (Korean)IBM Social Portal 2012 (Korean)
IBM Social Portal 2012 (Korean)
 
Content Convergence, Integration, Performance
Content Convergence, Integration, PerformanceContent Convergence, Integration, Performance
Content Convergence, Integration, Performance
 
E government avoiding a Dot Gov Bubble
E government   avoiding a Dot Gov BubbleE government   avoiding a Dot Gov Bubble
E government avoiding a Dot Gov Bubble
 

Similar a Architecting the Building Blocks of Enterprise Social Networking

Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...Mike Gotta
 
00 융복합형태 콘텐츠 서비스 환경 v0.7 20110527
00 융복합형태 콘텐츠 서비스 환경 v0.7 2011052700 융복합형태 콘텐츠 서비스 환경 v0.7 20110527
00 융복합형태 콘텐츠 서비스 환경 v0.7 20110527Kyung Rog Kim
 
STKI 2012 summit presentation knowledge management and learning tools
STKI 2012 summit presentation knowledge management and learning toolsSTKI 2012 summit presentation knowledge management and learning tools
STKI 2012 summit presentation knowledge management and learning toolsliza_Bodogin
 
The Cisco Social Journey Continues: From Operations to Intelligence & Innov...
The Cisco Social Journey Continues: From Operations to Intelligence & Innov...The Cisco Social Journey Continues: From Operations to Intelligence & Innov...
The Cisco Social Journey Continues: From Operations to Intelligence & Innov...LaSandra Brill
 
Lessons learnt from implementing enterprise social software at cisco
Lessons learnt from implementing enterprise social software at ciscoLessons learnt from implementing enterprise social software at cisco
Lessons learnt from implementing enterprise social software at ciscoUnified Communications Online
 
Servion Presentation 20 April 2011
Servion Presentation 20 April 2011Servion Presentation 20 April 2011
Servion Presentation 20 April 2011Peter Borup Jakobsen
 
Share point 2013 finally getting social
Share point 2013   finally getting socialShare point 2013   finally getting social
Share point 2013 finally getting socialMark Reuter
 
Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010
Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010
Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010Dion Hinchcliffe
 
CSC Case Study: Socializing Your Intranet? Secrets to Success
CSC Case Study: Socializing Your Intranet? Secrets to SuccessCSC Case Study: Socializing Your Intranet? Secrets to Success
CSC Case Study: Socializing Your Intranet? Secrets to SuccessClaire Flanagan, MBA
 
CSC Case Study: Socializing Your Intranet? Secrets to Success
CSC Case Study: Socializing Your Intranet? Secrets to SuccessCSC Case Study: Socializing Your Intranet? Secrets to Success
CSC Case Study: Socializing Your Intranet? Secrets to SuccessClaire Flanagan, MBA
 
Social Business Collaboration Framework For Success - Workshop
Social Business Collaboration Framework For Success - WorkshopSocial Business Collaboration Framework For Success - Workshop
Social Business Collaboration Framework For Success - WorkshopClaire Flanagan, MBA
 
Qontext Social Collaboration Platform - An Overview
Qontext Social Collaboration Platform - An OverviewQontext Social Collaboration Platform - An Overview
Qontext Social Collaboration Platform - An OverviewQontext
 
Cisco IT's Journey to Enterprise 2.0 and Beyond - #E2Conf-16
Cisco IT's Journey to Enterprise 2.0 and Beyond - #E2Conf-16Cisco IT's Journey to Enterprise 2.0 and Beyond - #E2Conf-16
Cisco IT's Journey to Enterprise 2.0 and Beyond - #E2Conf-16lliu
 
Lee Bryant at SBS2010
Lee Bryant at SBS2010Lee Bryant at SBS2010
Lee Bryant at SBS2010Dachis Group
 
Creating a corporate intranet portal and enable the evolution of the digital ...
Creating a corporate intranet portal and enable the evolution of the digital ...Creating a corporate intranet portal and enable the evolution of the digital ...
Creating a corporate intranet portal and enable the evolution of the digital ...Thomas Maeder
 
Making the Invisible Visible - Cornerstone Convergence Keynote Presentation -...
Making the Invisible Visible - Cornerstone Convergence Keynote Presentation -...Making the Invisible Visible - Cornerstone Convergence Keynote Presentation -...
Making the Invisible Visible - Cornerstone Convergence Keynote Presentation -...Jason Corsello
 

Similar a Architecting the Building Blocks of Enterprise Social Networking (20)

Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
Design Considerations For Enterprise Social Networks: Identity, Graphs, Strea...
 
00 융복합형태 콘텐츠 서비스 환경 v0.7 20110527
00 융복합형태 콘텐츠 서비스 환경 v0.7 2011052700 융복합형태 콘텐츠 서비스 환경 v0.7 20110527
00 융복합형태 콘텐츠 서비스 환경 v0.7 20110527
 
E2 0 Partner
E2 0 PartnerE2 0 Partner
E2 0 Partner
 
STKI 2012 summit presentation knowledge management and learning tools
STKI 2012 summit presentation knowledge management and learning toolsSTKI 2012 summit presentation knowledge management and learning tools
STKI 2012 summit presentation knowledge management and learning tools
 
The Cisco Social Journey Continues: From Operations to Intelligence & Innov...
The Cisco Social Journey Continues: From Operations to Intelligence & Innov...The Cisco Social Journey Continues: From Operations to Intelligence & Innov...
The Cisco Social Journey Continues: From Operations to Intelligence & Innov...
 
Lessons learnt from implementing enterprise social software at cisco
Lessons learnt from implementing enterprise social software at ciscoLessons learnt from implementing enterprise social software at cisco
Lessons learnt from implementing enterprise social software at cisco
 
Servion Presentation 20 April 2011
Servion Presentation 20 April 2011Servion Presentation 20 April 2011
Servion Presentation 20 April 2011
 
Share point 2013 finally getting social
Share point 2013   finally getting socialShare point 2013   finally getting social
Share point 2013 finally getting social
 
Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010
Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010
Cloud and E2.0: Connecting the Dots - OSCON Cloud Summit - 2010
 
CSC Case Study: Socializing Your Intranet? Secrets to Success
CSC Case Study: Socializing Your Intranet? Secrets to SuccessCSC Case Study: Socializing Your Intranet? Secrets to Success
CSC Case Study: Socializing Your Intranet? Secrets to Success
 
CSC Case Study: Socializing Your Intranet? Secrets to Success
CSC Case Study: Socializing Your Intranet? Secrets to SuccessCSC Case Study: Socializing Your Intranet? Secrets to Success
CSC Case Study: Socializing Your Intranet? Secrets to Success
 
Social Business Collaboration Framework For Success - Workshop
Social Business Collaboration Framework For Success - WorkshopSocial Business Collaboration Framework For Success - Workshop
Social Business Collaboration Framework For Success - Workshop
 
N2Y4 Cisco Keynote
N2Y4 Cisco KeynoteN2Y4 Cisco Keynote
N2Y4 Cisco Keynote
 
Qontext Social Collaboration Platform - An Overview
Qontext Social Collaboration Platform - An OverviewQontext Social Collaboration Platform - An Overview
Qontext Social Collaboration Platform - An Overview
 
Cisco IT's Journey to Enterprise 2.0 and Beyond - #E2Conf-16
Cisco IT's Journey to Enterprise 2.0 and Beyond - #E2Conf-16Cisco IT's Journey to Enterprise 2.0 and Beyond - #E2Conf-16
Cisco IT's Journey to Enterprise 2.0 and Beyond - #E2Conf-16
 
Lee Bryant at SBS2010
Lee Bryant at SBS2010Lee Bryant at SBS2010
Lee Bryant at SBS2010
 
Creating a corporate intranet portal and enable the evolution of the digital ...
Creating a corporate intranet portal and enable the evolution of the digital ...Creating a corporate intranet portal and enable the evolution of the digital ...
Creating a corporate intranet portal and enable the evolution of the digital ...
 
Fox BBA in MIS
Fox BBA in MISFox BBA in MIS
Fox BBA in MIS
 
UiTforum 2012- Sociale media - Jo Caudron
UiTforum 2012- Sociale media - Jo CaudronUiTforum 2012- Sociale media - Jo Caudron
UiTforum 2012- Sociale media - Jo Caudron
 
Making the Invisible Visible - Cornerstone Convergence Keynote Presentation -...
Making the Invisible Visible - Cornerstone Convergence Keynote Presentation -...Making the Invisible Visible - Cornerstone Convergence Keynote Presentation -...
Making the Invisible Visible - Cornerstone Convergence Keynote Presentation -...
 

Más de Mike Gotta

Enterprise social graph aii m final
Enterprise social graph aii m finalEnterprise social graph aii m final
Enterprise social graph aii m finalMike Gotta
 
The Human Network: Adding Social Context To Enterprise Architecture
The Human Network: Adding Social Context To Enterprise ArchitectureThe Human Network: Adding Social Context To Enterprise Architecture
The Human Network: Adding Social Context To Enterprise ArchitectureMike Gotta
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleMike Gotta
 
Driving Organizational Change With Social & Collaborative Technologies
Driving Organizational Change With Social & Collaborative TechnologiesDriving Organizational Change With Social & Collaborative Technologies
Driving Organizational Change With Social & Collaborative TechnologiesMike Gotta
 
Bg Concordia Socnet Identity Final
Bg Concordia Socnet Identity FinalBg Concordia Socnet Identity Final
Bg Concordia Socnet Identity FinalMike Gotta
 
H C I Business Relationships Learning Final
H C I  Business  Relationships  Learning  FinalH C I  Business  Relationships  Learning  Final
H C I Business Relationships Learning FinalMike Gotta
 
Bg Social Networks
Bg Social NetworksBg Social Networks
Bg Social NetworksMike Gotta
 
Harnessing Collective Intelligence: Shifting Power To The Edge
Harnessing  Collective Intelligence: Shifting Power To The EdgeHarnessing  Collective Intelligence: Shifting Power To The Edge
Harnessing Collective Intelligence: Shifting Power To The EdgeMike Gotta
 
Global Collaboration: Both Art & Science
Global Collaboration: Both Art & ScienceGlobal Collaboration: Both Art & Science
Global Collaboration: Both Art & ScienceMike Gotta
 

Más de Mike Gotta (9)

Enterprise social graph aii m final
Enterprise social graph aii m finalEnterprise social graph aii m final
Enterprise social graph aii m final
 
The Human Network: Adding Social Context To Enterprise Architecture
The Human Network: Adding Social Context To Enterprise ArchitectureThe Human Network: Adding Social Context To Enterprise Architecture
The Human Network: Adding Social Context To Enterprise Architecture
 
Social Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary TaleSocial Media & Social Networking: A Cautionary Tale
Social Media & Social Networking: A Cautionary Tale
 
Driving Organizational Change With Social & Collaborative Technologies
Driving Organizational Change With Social & Collaborative TechnologiesDriving Organizational Change With Social & Collaborative Technologies
Driving Organizational Change With Social & Collaborative Technologies
 
Bg Concordia Socnet Identity Final
Bg Concordia Socnet Identity FinalBg Concordia Socnet Identity Final
Bg Concordia Socnet Identity Final
 
H C I Business Relationships Learning Final
H C I  Business  Relationships  Learning  FinalH C I  Business  Relationships  Learning  Final
H C I Business Relationships Learning Final
 
Bg Social Networks
Bg Social NetworksBg Social Networks
Bg Social Networks
 
Harnessing Collective Intelligence: Shifting Power To The Edge
Harnessing  Collective Intelligence: Shifting Power To The EdgeHarnessing  Collective Intelligence: Shifting Power To The Edge
Harnessing Collective Intelligence: Shifting Power To The Edge
 
Global Collaboration: Both Art & Science
Global Collaboration: Both Art & ScienceGlobal Collaboration: Both Art & Science
Global Collaboration: Both Art & Science
 

Último

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 

Último (20)

The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 

Architecting the Building Blocks of Enterprise Social Networking

  • 1. Architecting the Building Blocks of Enterprise Social Networking Michael Gotta Senior Technology Solutions Manager Enterprise Social Software mikeg.typepad.com (personal blog) @MikeGotta (Twitter) © 2010 Cisco and/or its affiliates. All rights reserved. 2011 Cisco Confidential 1
  • 2. Communities Projects Conversations Processes People to People Teams Information People Media People To to Artifact Activity ―Ties‖ © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 2
  • 3. Business Value Organizational Value  Expertise location  Employee  Exception handling engagement  Process cycle time  Talent discovery  Project coordination  Social learning  Information sharing  Onboarding new hires  Innovation  Participatory culture © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. Well-Known Emergent Traditional E2.0 & Collaboration Social Media Unified Enterprise 2.0, Communications Social Media… Traditional Semantics and Collaboration Social Semantics Analytics Social Unified Communications Network & Social Site (SNS) Analytics Enterprise Content Visualization Management Enterprise Content Visualization Management © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 4
  • 5. Any Application Any Content / Site Any Device (Internal / External) (Internal / External) (@Work or @Home) ―E2.0‖ Communications “Social-enabled” Applications Video & Unified Activity Streams Search Services Forums ―E1.0‖ Blog Wiki Tags Workspaces Social Feedback Common (“Like”, “Follow”, “Rate”, “Reputation”…) Communities Services Metadata and Content Services Profile & Social Graph Semantics and Analytics Federation & Integration Services Network, Infrastructure & Management Services © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. EA Role IA Role Enterprise Architect Information Architect Organizational Architect Social Insight Sociologist and/or Anthropologist Visualization, Semantics, Social Data Stewardship People To People Alignment Solution Role Technology Role Applications Architecture Products & Infrastructure Community Management Social Platform Social Network Analysis, UXP design Graph Engines, Event Processing, Policy-based Controls © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. Business Value Personal Value Organizational Value  Expertise location  Identity  Employee  Exception handling engagement  Contacts & information  Process cycle time  Talent discovery  Sense of community  Project coordination  Social learning  Visibility & reputation  Information sharing  Onboarding new hires  Social capital  Innovation  Participatory culture  Skills/competencies  Career advancement © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8. Formation, Cultivation Front Stage Back Stage & Mobilization Contexts Job People, information, commu Seeking opportunities, mentors, advi nities ce, personal motivations Purpose Assigned work, visibly Cultivation of social volunteer resources (CSR) Newly Learn local Transitions hired, promotion, next folklore, gain/build co- project, new team… worker support M&A, outsourced, reduction Career issues, emotional Disruption in force, retirement support (personal) © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 8
  • 9. Social Networking Design Considerations Theory Methods Practices Technology Sociology E-Mail Anthropology Discussion Forums Psychology Instant Messaging Communications Social Network Sites Organizational E2.0 / Social Media Development Tools © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. My Other My “Enterprise Identity” Social Identities Mike Gotta EMPLOYEE # TITLE DEPARTMENT CONTACY INFO My Activities REPORTINT CHAIN JOB TITLE / ROLE Blogs Wikis My “Claimed Identity” My Social Feedback EXPERTISE EDUCATION INTERESTS SKILLS HOBBIES PERSONAL TAGS Ascribed + Claimed + Performed + Reciprocated Enterprise Identity 10 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 11. Social Role “Answer Person” Enterprise Identity Discussion Wiki Jessica Savage Forum JOB TITLE: CALL CENTER AGENT EMPLOYEE #: 00124 Community DEPARTMENT #: 015 HOBBIES: XXX, YYY, ZZZ “My Questions Blog and & Answers” Micro-blog © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 11
  • 12. Teams Communities “Project-based” Ties Interest-based Ties Corporate Business Business Processes Units Units Social Networks Reporting-based Role-based Ties Ties © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 12
  • 13. Follow Person My Filtered View Tag Content “Project-based” Ties Activity Stream Post Blog Entry Ask Question Follow Tag/Topic Interest-based Ties Schedule Meeting Share Exception Join Community Start Web Helps mediate Role-based Ties Conference “Latent Ties” © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 13
  • 14. Follow Person My Filtered View Tag Content Recommendations Social Networking Activity Stream Post Blog Entry Alerts & Notifications Ask Question Patterns Analytics Data Social Store Graph Policy Policy © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 14
  • 15. Object + Data + Interaction + Appropriation + Sharing + Analytics Cultivation Identity of Social Construction Resources Status Questions Digital Events Social Object Content Work Exception Meetings Network Handling Mobilization Affiliations © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. Social Networking Design Considerations Theory Methods Practices Technology Interviews Surveys Ethnography Sampling & Measurement Social Network Analysis © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 16
  • 17. • Think about the people with whom you interact regularly during your day-to-day work activities. Estimate what proportion of those people with whom you interact regularly in a work related context work internal to Company ABC as opposed to external to Company ABC (i.e., a customer, partner). • Slide the bar to the point on the line you feel best reflects the percentage of time you spend interacting with people internal to Company ABC as opposed to people external to Company ABC. • Now think just about the people within Company ABC with whom you interact regularly during your day-to-day work activities. Estimate what proportion of those people with whom you interact regularly work within Name-Of-Manager’s-Group and the corresponding groups in your business unit as opposed to the rest of Company ABC. • Slide the bar to the point on the line you feel best reflects the percentage of time you spend interacting with people inside Name-Of-Manager’s-Group as opposed to outside it. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 17
  • 18. • Now, think specifically about the people within Name-Of-Manager’s- Group and the corresponding external groups with whom you interact regularly. Please list their full names in each box below. Feel free to list as many or as few people as you think applies to you. • You will be asked a few follow-up questions about each of these people on the next few pages. 30 spaces are provided for you to list names on this page. You do not have to list 30 names and fill in every space. • Only list the names of people you feel best represent those within Name- Of-Manager’s-Group with whom you interact regularly. If you are unsure whether or not the individual is part of the survey pool, please go ahead and list them anyway. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 18
  • 19. • For each individual previously identified, please select the method(s) of communication you use to collaborate with them. Select all that apply. Interaction Types: F2F, e-mail, phone, IM, web conferencing, SNS, etc. • How frequently do you communicate with each person within the context of your job? . Range: 1 (rarely) – 7 (very often) • How frequently do you go to each person for advice, information, or assistance to do your job better? Range: 1 (rarely) – 7 (very often) • How comfortable would you feel approaching each person to discuss sensitive topics? Range: 1 (very uncomfortable) – 7 (very comfortable) • How frequently do you go to each person to assist you with innovation, problem solving, and coming up with new solutions? Range: 1 (rarely) – 7 (very often) © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20. Groups © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 20
  • 21. Team ABC Team XYZ © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 21
  • 22. Groups © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. One way relation (not reciprocal Groups ties) indicates interaction as broadcast message or channel switching © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. Social Networking Design Considerations Theory Methods Practices Technology Community-building Frameworks Adoption Tactics Change Management Programs ―Social BPM‖ © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 24
  • 25. HR & + Corporate + Audit & + Business + IT + Research Legal Communications Compliance Units Organization Group(s) Planning, Financial Marketing & Management Education Change Management Program Project Resource Management Management © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
  • 26. Early “Seeding Adopter Tactics” Outreach User Experience Media Design Literacies Adoption Applied Program Community Research Engagement Change Governance Management Program Program © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
  • 27. • New methods are likely needed • Blend and connect methods • Theory is relevant but needs to to existing frameworks as it be expressed in your own makes sense organizational context • Skills and competencies • Research needs to be likely to come externally but applied to your own should be grown internally situation over time • Theory needs to be linked in a life-cycle manner • Expect push-back, this model relies on a lot of qualitative approaches • Blend and connect practices into existing approaches (e.g., Community Management, Social BPM) • Feedback loop based on experiences should flow back to affect assumptions © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
  • 28. • Albrechtslund, A. (2008). Online Social Networking as Participatory Surveillance. First Monday, 13(3). Retrieved from http://www.uic.edu/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/ 2142/1949 • boyd, d. (2011, October 15). Embracing a Culture of Connectivity | Berkman Center. (video). Retrieved from http://cyber.law.harvard.edu/interactive/events/2011/05/danahboy d • boyd, danahm, & Ellison, N. B. (2007). Social Network Sites: Definition, History, and Scholarship. Journal of Computer‐Mediated Communication, 13(1), 210-230. doi:10.1111/j.1083-6101.2007.00393.x Retrieved from http://jcmc.indiana.edu/vol13/issue1/boyd.ellison.html © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
  • 29. • Ellison, N., (2011, October 15). Benefits of Facebook ―Friends‖ | Berkman Center. Retrieved from http://cyber.law.harvard.edu/interactive/events/luncheon/2011/06/ ellison • Engeström, J. (2005). Why some social network services work and others don’t — Or: the case for object-centered sociality :: Zengestrom. (n.d.). Retrieved October 25, 2011, from http://www.zengestrom.com/blog/2005/04/why-some-social- network-services-work-and-others-dont-or-the-case-for-object- centered-sociality.html • Engeström, J. (2007). What makes a good social object :: Zengestrom. (n.d.). Retrieved October 25, 2011, from http://www.zengestrom.com/blog/2007/08/what-makes-a-good- social-object.html © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
  • 30. • Gleave, E., Welser, H. T., Lento, T. M., & Smith, M. A. (2009). A Conceptual and Operational Definition of ―Social Role‖ in Online Community. 42nd Hawaii International Conference on System Sciences, 2009. HICSS ’09 (pp. 1-11). Presented at the 42nd Hawaii International Conference on System Sciences, 2009. HICSS ’09, IEEE. doi:10.1109/HICSS.2009.6 • Jenkins, H. (2009). Confronting the Challenges of Participatory Culture: Media Education for the 21st Century. The MIT Press. Retrieved fromhttp://digitallearning.macfound.org/site/apps/nlnet/content2.a spx?c=enJLKQNlFiG&b=2108773&ct=3017973&notoc=1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
  • 31. • Pearson, E. (2009). All the World Wide Web’s a stage: The performance of identity in online social networks. First Monday, 14(3), 1–7. Retrieved from http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/vie w/2162/2127 Annotated Bibliography • Collaboration Thinking, Mike Gotta, http://mikeg.typepad.com/perceptions/2011/11/annotated- bibliography-background-for-literature-review-project.html Literature Review • Check back in early December © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
  • 32. Thank you. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32