Page 351 - Using MIS
P. 351

Q7  How Can Organizations Address SMIS Security Concerns?   319

                                                                        ESN Deployment Best Practices

                                         Strategy     1. Dene how ESN supports the organization’s existing goals and objectives.
                                                      2. Dene success metrics.
                                                      3. Communicate the ESN strategy to all users.
                                                      4. Convey an expectation of organization-wide ESN adoption.
                                         Sponsorship  5. Identify an executive sponsor to promote the ESN.
                                                      6. Identify ESN champions within each organizational unit.
                                                      7. Encourage champions to recruit users.
                                                      8. Identify groups that would benet most from the ESN.
                                         Support      9. Provide all users access to the ESN.
                                                      10. Mandate processes to be used within the ESN.
                                                      11. Provide incentives for ESN adoption and use.
                                                      12. Provide employee training and ESN demonstrations.

                                         Success      13. Measure ESN e‰ectiveness via success metrics.
                                                      14. Evaluate how ESN supports the organization’s strategy.
            Figure 8-11                               15. Promote ESN success stories.
            ESN Implementation Best                   16. Continuously look for ways to use the ESN more e‰ectively.
            Practices



                                           In order to ensure a successful implementation of an ESN, organizations can also follow
                                       industry  best practices,  or  methods  that  have  been  shown  to  produce  successful  results  in
                                       prior implementations. You’ll learn more about systems implementation in Chapter 12. When
                                       implementing an ESN, successful companies follow a process of four stages having the elements
                                       shown in Figure 8-11. Read through the items and reflect on what you went through when you
                                       first started using SM. Think about how important your friends were in your decision to start
                                       using SM. Having an internal champion or defender of your internal ESN is equally important.

                            Q7         How Can Organizations Address SMIS Security

                                       Concerns?


                                       As you have seen, social media revolutionizes the ways that organizations communicate.
                                       Twenty years ago, most organizations managed all public and internal messaging with the high-
                                       est degree of control. Every press conference, press release, public interview, presentation, and
                                       even academic paper needed to be preapproved by both the legal and marketing departments.
                                       Such approval could take weeks or months.
                                           Today, progressive organizations have turned that model on its head. Employees are encour-
                                       aged to engage with communities and, in most organizations, to identify themselves with their
                                       employer while doing so. All of this participation, all of this engagement, however, comes with
                                       risks. In this question, we will discuss the need for a social media policy, consider risks from non-
                                       employee user-generated content, and look at risks from employee use of social media.

                                       Managing the Risk of Employee Communication

                                       The first step that any organization should take is to develop and publicize a  social media
                                       policy, which is a statement that delineates employees’ rights and responsibilities. You can
                                                                                                  38
                                       find an index to 100 different policies at the Social Media Today Web site.  In general, the more


                                       38 “Social Media Employee Policy Examples from Over 100 Organizations,” Social Media Today, http://
                                       socialmediatoday.com/ralphpaglia/141903/social-media-employee-policy-examples-over-100-companies-and-
                                       organizations.
   346   347   348   349   350   351   352   353   354   355   356