Page 351 - Using MIS
P. 351
Q7 How Can Organizations Address SMIS Security Concerns? 319
ESN Deployment Best Practices
Strategy 1. Dene how ESN supports the organization’s existing goals and objectives.
2. Dene success metrics.
3. Communicate the ESN strategy to all users.
4. Convey an expectation of organization-wide ESN adoption.
Sponsorship 5. Identify an executive sponsor to promote the ESN.
6. Identify ESN champions within each organizational unit.
7. Encourage champions to recruit users.
8. Identify groups that would benet most from the ESN.
Support 9. Provide all users access to the ESN.
10. Mandate processes to be used within the ESN.
11. Provide incentives for ESN adoption and use.
12. Provide employee training and ESN demonstrations.
Success 13. Measure ESN eectiveness via success metrics.
14. Evaluate how ESN supports the organization’s strategy.
Figure 8-11 15. Promote ESN success stories.
ESN Implementation Best 16. Continuously look for ways to use the ESN more eectively.
Practices
In order to ensure a successful implementation of an ESN, organizations can also follow
industry best practices, or methods that have been shown to produce successful results in
prior implementations. You’ll learn more about systems implementation in Chapter 12. When
implementing an ESN, successful companies follow a process of four stages having the elements
shown in Figure 8-11. Read through the items and reflect on what you went through when you
first started using SM. Think about how important your friends were in your decision to start
using SM. Having an internal champion or defender of your internal ESN is equally important.
Q7 How Can Organizations Address SMIS Security
Concerns?
As you have seen, social media revolutionizes the ways that organizations communicate.
Twenty years ago, most organizations managed all public and internal messaging with the high-
est degree of control. Every press conference, press release, public interview, presentation, and
even academic paper needed to be preapproved by both the legal and marketing departments.
Such approval could take weeks or months.
Today, progressive organizations have turned that model on its head. Employees are encour-
aged to engage with communities and, in most organizations, to identify themselves with their
employer while doing so. All of this participation, all of this engagement, however, comes with
risks. In this question, we will discuss the need for a social media policy, consider risks from non-
employee user-generated content, and look at risks from employee use of social media.
Managing the Risk of Employee Communication
The first step that any organization should take is to develop and publicize a social media
policy, which is a statement that delineates employees’ rights and responsibilities. You can
38
find an index to 100 different policies at the Social Media Today Web site. In general, the more
38 “Social Media Employee Policy Examples from Over 100 Organizations,” Social Media Today, http://
socialmediatoday.com/ralphpaglia/141903/social-media-employee-policy-examples-over-100-companies-and-
organizations.