SlideShare a Scribd company logo
1 of 66
Online social networking and the workplace Presented by: 	Micheal Axelsen	Director	Applied Insight Pty Ltd
Cheer up, it could be worse Maybe you can go dive in a swimming pool full of my money to make you feel better. @Rynobi:  You're a bank. You made a $1.6 billion first-quarter profit. Cheer up. RT @westpac: Oh so very over it today. Finally! A bank that feels existential pain."
INTRODUCTION
About this presentation Key Issues How to stop your online life from affecting:  your career  your employer  perhaps your reputation! Objectives Identify and discuss how online social networking can affect the workplace Discuss employer and employee rights and responsibilities Provide practical hints and tips for maintaining appropriate privacy when using social networking websites.  Provide a framework for businesses to use in developing their policies and procedures for online social networking.
About this presentation Agenda Social networking overview and who’s using it So... that hollow empty feeling was my career? Social networking and the workplace Practical hints and tips Rights and responsibilities Developing OSN policies and procedures Conclusion
Expectations What are your expectations from this session? Strawpoll:  Who uses social networking websites? MySpace, FaceBook, Friendster, MyYahoo, Twitter, Flickr, Photobucket, SchoolFriends, Blogger, LiveJournal, Tumblr, Microsoft Live... Blogs/Vlogs? Others? Strawpoll:  Who didn’t know about these websites? Strawpoll:  Anybody here ever ‘Vlog Naked’? (sorry, just wondering)
Social Networking overview: who’s using it
The growth of online social networking September 2006 – Facebook in Australia March 2010 – Facebook now claims 7.8 million Australian users Appears to be here for some time, in some form Employees expect to have access, customers expect to use it to discuss and evaluate businesses A general distrust of advertising, but a trust of an online user
What is online social networking? Online social networking includes: Text (blog posts, comments on blogs, mailing lists or forums, microblogging – Twitter, pwnce) Video (video-blog posts on for example YouTube, Google Video) Photographs or artwork (for example, Flickr or Photobucket,  Audio (for example, podcasts)  Dedicated online social networking websites such as MySpace or Facebook – also Google Buzz (?)
Why is online social networking growing? Our lives are increasingly digital We often meet friends and family online, and make friends online. Allows us to achieve work/life balance With growth of Web 2.0, higher access to easy to use technology – no specialist expertise required
Is it different? Not really, people always talked to each other and said ‘stuff’ – blowing off steam Trouble is those conversations at barbecues were never indexed by Google. Frequently we forget the context of the forum – and its accessibility – and say ‘regrettable’ things.
So that hollow empty feeling was my career?
Last year’s video is tomorrow’s viral
Things that make you go ‘hmm’ Censored Ex-boyfriend site
Oh-kaaay
Recent examples
Social networking & the workplace
Public and digital lives Alritey. The names Ryan workin at #### #### At the moment to get the money to go out and enjoy my much appreciated young life. As far as i know i enjoy life to the max, i love to get wrecked, mwi and be around mates and loud music. No better way to spend a weekend than gettin out my #### in one way or another and be surrounded by loud music and knowing that i have a stunning girlfriend when i go home.
The risks to business:  seven risks Productivity Losses Legal Reputation Viruses and spyware Privacy breaches and identity theft Social engineering Inadvertent release of information
Some business examples of issues Staff issues: Employees sacked for blogging Using firm email addresses to argue with clients  Embarrassing photos of office Christmas parties Employees with ‘lewd’ Facebook sites  Customer/online reputation issues: Suing Whirlpool Twitter & Best-Buy Comcast technician falling asleep while on hold – Youtube FTW!
Internal and external privacy issues, and other related issues Productivity cost (cyber-slacking) Phishing attacks, risk of spyware, viruses Unintended consequences Spur of the moment tweets Employees may become stalker targets Submit intellectual property Inadvertently transfer intellectual property to a client
Practical hints and tips
How to keep an online world sane Simple things Common sense! Don’t post in your real name – set up three email addresses: Personal, anonymous email address that forwards to your main email (for blogging comments & mail lists) – but expect that this is not fail-safe – very useful if you want to stalk Justin Bieber Personal (for all your personal email) Work (for work email – no personal email!) Only post online what you’d be happy for Mum (or a potential recruiter/client) to see
How to keep an online world sane Simple things Wall posts are wall posts on someone else’s wall, and a tweet is forever (particularly now they’re archived by Library of Congress!) Get permission before you post a photo of someone online Only ‘friend’ friends! Be coy about your age Never post photos of official identification documents... Just so you know
How to keep an online world sane For the more paranoid If you have a social networking website (e.g. MySpace, Facebook), use the privacy options – so many people still don’t Limit the sites you participate in – perhaps FaceBook for friends, LinkedIn for work colleagues?  Too many are too difficult to manage Plain old do not accept a flung zombie, which Hero are you?, Blackjack or other application on Facebook Don’t get me started on Farmville... Set up Google Alerts to monitor your name and email address
Google Alerts www.google.com/alerts
Dealing with it Strawpoll:  who knows whether their business searches for these discussions? Good talk is good, right? The only good way to respond is to give good service and hope that people blog about it At least show an interest and respond to address a grievance, and be transparent about it Professional monitoring services Reputation Hawk Reputation Defender Cymfony There are many others of course
Dealing with it Simple (and cheap) Google Alerts/Yahoo Alerts/MonitorThis Customer representatives join online, private, forums and lurk there while watching for issues Set clear expectations as to what staff can do with your brand name on the internet Responding to online comments Don’t post a hot and angry response Don’t exercise legal muscle unless you really have to Respond with transparency and honesty, but take up discussions off-line at a senior level, after research! Engage with the author of the post is most effective
Dealing with it Words of wisdom Sometimes, leaving it lie is the best option! Don’t lie and pretend to be a customer – you will be found out, and the price will be high! Avoid a search engine optimisation solution – the ethics are questionable and doesn’t remove the offending post Invite genuine customers to respond in a forum – but this can be risky! Sometimes these comments come from a direct competitor! Social networking and the use of the internet is increasing – ignore the trend at your peril It’s not all problems – marketing opportunities to engage your clients, and also to recruit reliable staff
rights & responsibilities
What is OSN being used for by business? Increased professional contacts, exposure to new ideas Use the network to recruit new employees Allow new-hires to mix with current employees  It is good when customers say positive things about the business Online reputation monitoring & proactive customer support
What can we do to ‘minimise harm’? We need to minimise the potential for harm from social networking for both ourselves and our livelihoods.   It is important that businesses recognise that there are potentially great benefits that can arise from online social networking, and so a ‘blanket ban’ within the workplace frequently is counterproductive (and really won’t help with activities at home and by customers).
Whose activities need to be governed? Five stakeholders: Customers Employees Suppliers of the business Business owners  Independent third parties such as journalists or industry regulators
Current Employees A business can control what is done with its equipment and resources, and additionally can dictate behaviour on work time. However, courts are generally reluctant to allow employers to intrude into employees’ activities in their private time.   A fiduciary relationship exists between the employer and the employee Note limitations on use of OSN by prospective employers – can look, can use the info (but not in a disciminatory way) – but if they store it, privacy issues apply.  See especially Privacy Commissioner:  http://www.privacy.gov.au/faq/individuals/sn-q5
An employer and employee’s fiduciary relationship Practically, there are three duties: to work with care and diligence to obey all lawful and reasonable orders  to act with good faith and fidelity There are two types of employee - standard and professional employees if an employee ‘tarnishes his employee’s image’ the employment relationship would allow disciplinary procedures, and/or termination Essentially, if the employee’s actions on the OSN make it difficult to carry out their work duties due to special considerations, then the employer could dictate what can and cannot be done
Control over current employees An employer can exercise control in the context of the duties they are owed. Different standards will apply depending upon the employee’s role.   Clear and explicit expectations (and inclusion in the contract of employment) would be necessary to exercise control over current employees
Former employees Since they’re no longer employed by the business, duties owed are much less Control is very limited Generally, a post-employment restraint only allows the protection of a ‘trade secret’ – information of a ‘high degree of confidentiality’ must not be misused Legal action will likely be expensive & uncommercial without an express covenant
Other stakeholders Other stakeholders (customers, business owners, suppliers, independent third parties) will be governed by, for example, defamation actions. Commercially – probably not a lot a business can do about such activities without involving legal actions, which may or may not suit
Developing OSN policies and procedures
AS/NZS 4360:2004 Risk Management
Tailoring your response
Elements of policy & procedure Standard Title Purpose Revision History Effective Date Persons affected Definitions Responsibilities Change to suit risk appetite Policy Procedures
Understand the risks
The focus of attention In accordance with your risk appetite: Define what are acceptable online social networking activities Develop an employee training and awareness program Monitor your online reputation Respond to online social networking activities
Draft Policy – Very Low Risk Appetite For a very low risk appetite In recognition of the very high impact that online social networking activities have upon the business activities of XYZ Pty Ltd, XYZ Pty Ltd implements very strict restrictions on the use of online social networking activities by employees using XYZ Pty Ltd equipment, and/or making reference to the business of XYZ Pty Ltd.   XYZ Pty Ltd emphasises procedural controls, regular and intense monitoring to online social networking activities referring to the business of XYZ Pty Ltd, and provides explicit guidelines to follow in responding to such activities.
Draft Policy – Very High Risk Appetite For a very high risk appetite As online social networking activities have minimal impact upon the business activities of XYZ Pty Ltd, XYZ Pty Ltd provides some guidance in the use of online social networking activities by employees.   Responses to online social networking activities that refer to the business of XYZ Pty Ltd are made on a case by case basis as XYZ Pty Ltd becomes aware of them.
Acceptable online social networking activities Possibilities Could ban all mentions by employees Could ask for pre-approval of a comment Could allow employees to publish, but have marketing manager subscribe to RSS feeds and have employees agree to make changes if requested Only have authorised representatives respond online Could block online social networking websites in work hours (but please be realistic)
Staff training and awareness program Possibilities Content Awareness of acceptable online social networking activities Core principles in ensuring the privacy of personal information in an online environment Specific training on the use of major identified online social networking websites to ensure privacy.   Practical advice in the use and etiquette of online social networking tools, including the use of email Make your requirements part of induction program, perhaps with an exam Require existing staff to attend annually, and perhaps pass an exam
Online reputation monitoring Possibilities Engage online reputation monitoring service provider At least set up Google Alerts!   Document risky mentions in monthly, quarterly, or annual online social networking references report Subscribe to likely private online forums Ensure that applicants for positions are aware that the candidate’s online profile may be examined in the course of assessing the candidate’s suitability for the position.
Responding Possibilities May need to have lawyers involved For an employee, the HR manager would deal with it Core principles: Demonstrate an interest and respond online to address a grievance, and be transparent about it Never post an immediate, negative, response to an online reference.  Have a conversation in person at a senior level Legal action considered  Making no response may be the least harmful All responses conducted professionally and honestly  Monitor and document responses in social networking references report
Conclusion
Conclusion Review the expectations wall How did we go? Obtaining a copy of the presentation See www.michealaxelsen.com for a copy of this presentation Main Message Set up Google Alerts!  (www.google.com/alerts) Set privacy options in Facebook/MySpace! Use three email addresses, and no private email at work! Know what your customers say about you at the virtual water-cooler! Applied Insight Pty Ltd Services Guide to the Development of Online Social Networking Policies & Procedures Social networking training for staff Social networking review for your business Social networking policies & procedures
About the speaker Services Micheal Axelsen provides business systems consulting services – that is, how can IT be made to work for your business? Position and qualifications Director of Applied Insight Pty Ltd Member of ISACA Qualifications Bachelor of Commerce (Hons) Masters of Information Systems FCPA  Currently undertaking PhD in the impact of technology use upon professional skills.
Contact details Micheal AxelsenDirector, Applied Insight Pty Ltd m:  	0412 526 375t:  	+61 7 3139 0325e:	micheal.axelsen@appliedinsight.com.au blog:  www.michealaxelsen.com Applied Insight Pty LtdPO Box 603Toowong  DC  4066AUSTRALIA
References AS/NZS 4360:2004 Risk Management Boyd, D., and Ellison, N. "Social Network Sites: Definition, History, and Scholarship," Journal of Computer-Mediated Communication (13:1), March 2007, pp 210-230. Brandenburg, C.  ‘The Newest Way to Screen Job Applicants: A Social Networker's Nightmare’.  Federal Communications Law Journal. Los Angeles: Jun 2008. Vol. 60, Iss. 3; p. 597 (30 pages).   Emerald Insights.  ‘MySpace or yours? Advertising and social networks’.  Strategic Direction. Bradford.  2008. Vol. 24, Iss. 8; p. 15 Engdahl, S (Editor).  “Online social networking”.  Greenhaven Press.  Farmington Hills, MI, USA.  c2007.
References Espejo, R (Editor).  ‘Should social networking web sites be banned?’.  Greenhaven Press.  Detroit, MI, USA.  2008. Johnson, R A, and Middleton, J M.  ‘Accounting for Second Life’.  Journal of Accountancy. New York: Jun 2008. Vol. 205, Iss. 6; p. 54 (5 pages) Lavenda, D.  ‘Does 'blogging' have a place in the workplace?’.  The British Journal of Administrative Management. Orpington: Jul 2008. p. 27 (3 pages) Mac Sithigh, D.  ‘The mass age of internet law’.  Information & Communications Technology Law. Abingdon: Jun 2008. Vol. 17, Iss. 2; pg. 79 McCallum, R.  “Employer Controls over Private Life”.  New South Wales University Press Ltd.  Sydney, NSW, Australia.  1999.
References Stewart, A.  ‘Drafting and enforcing post-employment restraints’.  Australian Journal of Labour Law.   Vol 10 pp181-221.  1997.   Willard, N E.  ‘Cyber-safe kids, cyber-savvy teens : helping young people learn to use the Internet safely and responsibly.  Jossey-Bass.  San Francisco , CA, USA.  2007.
Appendix:OSN Risk Examples
Scenarios Productivity Losses Employees use social networking websites during work time to the detriment of business performance.   Legal risks As no policy explicitly states that email use is monitored by the employer, the employee brings an action for wrongful dismissal when dismissed for posting inappropriate content to an email forum.   As no policy explicitly states that web use is actively monitored, it is difficult for a business to further investigate an employee who is suspected of posting details of an upcoming marketing program and product price list onto Wikipedia.
Scenarios A junior financial planner with an accounting firm provides taxation advice in a public forum using the firm’s email address and with a signature including the firm’s name.  The advice is posted publicly, is relied upon by some readers who suffer a loss and subsequently bring an action against the accounting firm.   Reputation Risk A customer writes a blog post or video that is negative towards your product, service or staff. An employee writes a blog post or posts a video that is negative towards the company’s product, service or staff.
Scenarios An employee writes a blog post or status update that places company secrets in the public domain using the business’s equipment.    An employee posts lewd photographs online in a public forum.  A friend of an employee posts lewd material on the employee’s public website or social networking page.   Photographs of office functions depicting inappropriate behaviour are posted online by staff.   Photographs of office functions depicting inappropriate behaviour are posted online by staff employed by the venue.
Scenarios An employee writes a blog post or posts a video that is derogatory to his or her colleagues or the firm’s customers. An ex-employee writes a blog post or posts a video that is derogatory to his or her colleagues or the firm’s customers. A supplier writes a blog post that is derogatory about the company’s ability to pay its suppliers. Viruses & spyware A staff member’s computer infects all networked computers with a virus that was launched from a website that advertised on MySpace.
Scenarios The accountant’s username and password for the business’s online banking is stolen by a Trojan key-logging program that was downloaded to the accountant’s laptop from an advertisement on a niche social networking website while her teenaged son was using the computer at home.   Privacy breaches/identity theft Using an edited copy of a signed letter and a business-card posted on Flickr, a fraudster creates a fake letter of employment as supporting documentation for a bank loan in an employee’s name that is subsequently defaulted upon and causes personal bankruptcy for the employee.
Scenarios The employee subsequently brings an action against the business for not taking reasonable precautions to prevent this from happening.  Although the resulting court case is unsuccessful, it is a serious distraction and expense for the business.   An employee posts a photograph of a colleague and her children on her blog at the annual Christmas function.  The colleague’s estranged husband is able to identify the children’s school from the uniform they are wearing, and subsequently collects the children from the school.  The children are never seen again.
Scenarios Social engineering Using names, email address, and positions gleaned from Facebook, position titles and references from LinkedIn, and faked letterhead or invoices from a site such as Flickr or Photobucket, a conman is able to extract payment for non-existent products or services. Using photos from Flickr of a business card and letterhead, and information gleaned from Facebook, a fraudster poses as a contract cleaner who then uses an unattended and logged-in computer to steal clients’ taxation information on a 4gb USB memory stick.
Scenarios Inadvertent release of information The company’s proprietary approach to the bidding process for government work is submitted to Wikipedia by the business development assistant and is not able to be withdrawn in time.

More Related Content

What's hot

Connecticut 2017 best practices in social media
Connecticut 2017 best practices in social mediaConnecticut 2017 best practices in social media
Connecticut 2017 best practices in social mediaMarina London
 
Sports and Social Media, Practical Advice
Sports and Social Media, Practical AdviceSports and Social Media, Practical Advice
Sports and Social Media, Practical AdviceJohn Duffy
 
Linked In
Linked InLinked In
Linked Inkewanyk
 
Twitbook spaced in! and you!
Twitbook spaced in! and you!Twitbook spaced in! and you!
Twitbook spaced in! and you!Mike May
 
Protecting Your Professional Reputation Online
Protecting Your Professional Reputation OnlineProtecting Your Professional Reputation Online
Protecting Your Professional Reputation OnlineLegal Media Matters
 
Social Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and BrokersSocial Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and BrokersSmarsh
 
E Networking Linked In
E Networking Linked InE Networking Linked In
E Networking Linked Inkimberlene
 
Social Media Job Search
Social Media Job SearchSocial Media Job Search
Social Media Job Searchnovermyer
 
Social media: Is it for me?
Social media: Is it for me?Social media: Is it for me?
Social media: Is it for me?Mary Kelly
 
Using social media responsibly
Using social media responsibly Using social media responsibly
Using social media responsibly Donal O' Mahony
 
LinkedIn Leaderhsip Presentation
LinkedIn Leaderhsip PresentationLinkedIn Leaderhsip Presentation
LinkedIn Leaderhsip PresentationSteve Gasser
 
Using Social Media responsibly - a talk for parents
Using Social Media responsibly - a talk for parentsUsing Social Media responsibly - a talk for parents
Using Social Media responsibly - a talk for parentsDonal O' Mahony
 
Can you be Fired for a Like?
Can you be Fired for a Like?Can you be Fired for a Like?
Can you be Fired for a Like?Charlotte Gerrish
 
Lecture 4 document preparation 1
Lecture 4  document preparation 1Lecture 4  document preparation 1
Lecture 4 document preparation 1MarketingAcademy2
 
Beyond the water cooler
Beyond the water coolerBeyond the water cooler
Beyond the water coolerwychepa
 
Comvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperComvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperJames Tanner
 
Link, Poke & Tweet [Omaha ed., 10.20.2009]
Link, Poke & Tweet [Omaha ed., 10.20.2009]Link, Poke & Tweet [Omaha ed., 10.20.2009]
Link, Poke & Tweet [Omaha ed., 10.20.2009]John Kreicbergs
 
How To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobHow To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobAVG Technologies AU
 

What's hot (20)

Connecticut 2017 best practices in social media
Connecticut 2017 best practices in social mediaConnecticut 2017 best practices in social media
Connecticut 2017 best practices in social media
 
Sports and Social Media, Practical Advice
Sports and Social Media, Practical AdviceSports and Social Media, Practical Advice
Sports and Social Media, Practical Advice
 
Linked In
Linked InLinked In
Linked In
 
Twitbook spaced in! and you!
Twitbook spaced in! and you!Twitbook spaced in! and you!
Twitbook spaced in! and you!
 
Protecting Your Professional Reputation Online
Protecting Your Professional Reputation OnlineProtecting Your Professional Reputation Online
Protecting Your Professional Reputation Online
 
Social Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and BrokersSocial Media Policy Essentials for Lenders and Brokers
Social Media Policy Essentials for Lenders and Brokers
 
risks associated with using social Media
 risks associated with using social Media  risks associated with using social Media
risks associated with using social Media
 
E Networking Linked In
E Networking Linked InE Networking Linked In
E Networking Linked In
 
Social Media Job Search
Social Media Job SearchSocial Media Job Search
Social Media Job Search
 
Social media: Is it for me?
Social media: Is it for me?Social media: Is it for me?
Social media: Is it for me?
 
Using social media responsibly
Using social media responsibly Using social media responsibly
Using social media responsibly
 
LinkedIn Leaderhsip Presentation
LinkedIn Leaderhsip PresentationLinkedIn Leaderhsip Presentation
LinkedIn Leaderhsip Presentation
 
Using Social Media responsibly - a talk for parents
Using Social Media responsibly - a talk for parentsUsing Social Media responsibly - a talk for parents
Using Social Media responsibly - a talk for parents
 
Can you be Fired for a Like?
Can you be Fired for a Like?Can you be Fired for a Like?
Can you be Fired for a Like?
 
Lecture 4 document preparation 1
Lecture 4  document preparation 1Lecture 4  document preparation 1
Lecture 4 document preparation 1
 
Beyond the water cooler
Beyond the water coolerBeyond the water cooler
Beyond the water cooler
 
Social Networking and E-discovery
Social Networking and E-discoverySocial Networking and E-discovery
Social Networking and E-discovery
 
Comvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaperComvigo IM Lock WhitePaper
Comvigo IM Lock WhitePaper
 
Link, Poke & Tweet [Omaha ed., 10.20.2009]
Link, Poke & Tweet [Omaha ed., 10.20.2009]Link, Poke & Tweet [Omaha ed., 10.20.2009]
Link, Poke & Tweet [Omaha ed., 10.20.2009]
 
How To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your JobHow To Be Facebook Friends With The Boss & Keep Your Job
How To Be Facebook Friends With The Boss & Keep Your Job
 

Viewers also liked

Research in an e-enabled world
Research in an e-enabled worldResearch in an e-enabled world
Research in an e-enabled worldMicheal Axelsen
 
CCIM/SIOR Socialmedia Ecra 09102009
CCIM/SIOR Socialmedia Ecra 09102009CCIM/SIOR Socialmedia Ecra 09102009
CCIM/SIOR Socialmedia Ecra 09102009ecracreative
 
Itinerario Florida Foro
Itinerario Florida ForoItinerario Florida Foro
Itinerario Florida Foroguestceb8a1
 
Reputatation Management Systems Analysis Presentation
Reputatation Management Systems Analysis PresentationReputatation Management Systems Analysis Presentation
Reputatation Management Systems Analysis Presentationecracreative
 
Consumer behaviour slides group 1 MRKT 1299 kpu
Consumer behaviour   slides group 1 MRKT 1299 kpuConsumer behaviour   slides group 1 MRKT 1299 kpu
Consumer behaviour slides group 1 MRKT 1299 kpuPatricia Oliveira
 
Ecra Club Entrep 030509
Ecra Club Entrep 030509Ecra Club Entrep 030509
Ecra Club Entrep 030509ecracreative
 
Review tversky & kahnemann (1974) judgment under uncertainty
Review   tversky & kahnemann (1974) judgment under uncertaintyReview   tversky & kahnemann (1974) judgment under uncertainty
Review tversky & kahnemann (1974) judgment under uncertaintyMicheal Axelsen
 
Religious Discrimination and Harassment
Religious Discrimination and HarassmentReligious Discrimination and Harassment
Religious Discrimination and HarassmentJeremy_L
 
Affirmative Action Presentation
Affirmative Action PresentationAffirmative Action Presentation
Affirmative Action PresentationKristindee
 
Affirmative action.ppt
Affirmative action.pptAffirmative action.ppt
Affirmative action.pptcberrett
 
Anger management ppt
Anger management pptAnger management ppt
Anger management pptDonelking
 
Anger management
Anger managementAnger management
Anger managementbrucecowan
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsLinkedIn
 

Viewers also liked (16)

Research in an e-enabled world
Research in an e-enabled worldResearch in an e-enabled world
Research in an e-enabled world
 
CCIM/SIOR Socialmedia Ecra 09102009
CCIM/SIOR Socialmedia Ecra 09102009CCIM/SIOR Socialmedia Ecra 09102009
CCIM/SIOR Socialmedia Ecra 09102009
 
Itinerario Florida Foro
Itinerario Florida ForoItinerario Florida Foro
Itinerario Florida Foro
 
Reputatation Management Systems Analysis Presentation
Reputatation Management Systems Analysis PresentationReputatation Management Systems Analysis Presentation
Reputatation Management Systems Analysis Presentation
 
Consumer behaviour slides group 1 MRKT 1299 kpu
Consumer behaviour   slides group 1 MRKT 1299 kpuConsumer behaviour   slides group 1 MRKT 1299 kpu
Consumer behaviour slides group 1 MRKT 1299 kpu
 
Ecra Club Entrep 030509
Ecra Club Entrep 030509Ecra Club Entrep 030509
Ecra Club Entrep 030509
 
Freedomeducation Am
Freedomeducation AmFreedomeducation Am
Freedomeducation Am
 
Review tversky & kahnemann (1974) judgment under uncertainty
Review   tversky & kahnemann (1974) judgment under uncertaintyReview   tversky & kahnemann (1974) judgment under uncertainty
Review tversky & kahnemann (1974) judgment under uncertainty
 
Religious Discrimination
Religious DiscriminationReligious Discrimination
Religious Discrimination
 
Religious Discrimination and Harassment
Religious Discrimination and HarassmentReligious Discrimination and Harassment
Religious Discrimination and Harassment
 
Affirmative Action Presentation
Affirmative Action PresentationAffirmative Action Presentation
Affirmative Action Presentation
 
Affirmative action.ppt
Affirmative action.pptAffirmative action.ppt
Affirmative action.ppt
 
Anger management ppt
Anger management pptAnger management ppt
Anger management ppt
 
Anger management
Anger managementAnger management
Anger management
 
Anger management
Anger managementAnger management
Anger management
 
Study: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving CarsStudy: The Future of VR, AR and Self-Driving Cars
Study: The Future of VR, AR and Self-Driving Cars
 

Similar to Online Social Networking and the Workplace draft #3 final

Introduction To Business Networking And Social Media V2 0
Introduction To Business Networking And Social Media V2 0Introduction To Business Networking And Social Media V2 0
Introduction To Business Networking And Social Media V2 0Marcus Vannini
 
Social Media Workshop
Social Media WorkshopSocial Media Workshop
Social Media WorkshopSitesPlus
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital FootprintMike Fisher
 
NCPITClub-Sumedh_SocialMediaAndNetworkingInCanada
NCPITClub-Sumedh_SocialMediaAndNetworkingInCanadaNCPITClub-Sumedh_SocialMediaAndNetworkingInCanada
NCPITClub-Sumedh_SocialMediaAndNetworkingInCanadaSumedh Nene
 
social media for lawyers - a how to guide
social media for lawyers - a how to guidesocial media for lawyers - a how to guide
social media for lawyers - a how to guideJustinRFrench
 
Titanium Marketing Guide
Titanium Marketing GuideTitanium Marketing Guide
Titanium Marketing GuideJason Townsend
 
Transacting PPT.pptx
Transacting PPT.pptxTransacting PPT.pptx
Transacting PPT.pptxLyndaWillett
 
Social Media for HR Execs
Social Media for HR ExecsSocial Media for HR Execs
Social Media for HR ExecsCarmen Hudson
 
Social media compliance
Social media complianceSocial media compliance
Social media complianceMatchPointSG
 
Social Networking Final 19.11.2009 Cipd
Social Networking Final 19.11.2009 CipdSocial Networking Final 19.11.2009 Cipd
Social Networking Final 19.11.2009 Cipdhotspurboy
 
Ts510 now that youre linked in baum
Ts510 now that youre linked in baumTs510 now that youre linked in baum
Ts510 now that youre linked in baumRay Baum
 
Social Media Marketing
Social Media MarketingSocial Media Marketing
Social Media Marketingpeacheydays
 
Inspiring Edinburgh - using digital for social engagement
Inspiring Edinburgh - using digital for social engagement Inspiring Edinburgh - using digital for social engagement
Inspiring Edinburgh - using digital for social engagement Weber Shandwick Scotland
 
JRF Facebook Staffing And Policies
JRF Facebook Staffing And PoliciesJRF Facebook Staffing And Policies
JRF Facebook Staffing And PoliciesLisa Colton
 
Inspiring edinburgh - Tips on social media engagement and online ROI
Inspiring edinburgh - Tips on social media engagement and online ROIInspiring edinburgh - Tips on social media engagement and online ROI
Inspiring edinburgh - Tips on social media engagement and online ROIWeber Shandwick Scotland
 
Private vs professional in Social Media?
Private vs professional in Social Media?Private vs professional in Social Media?
Private vs professional in Social Media?Raimo Matvere
 
see attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docxsee attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docxbagotjesusa
 

Similar to Online Social Networking and the Workplace draft #3 final (20)

Introduction To Business Networking And Social Media V2 0
Introduction To Business Networking And Social Media V2 0Introduction To Business Networking And Social Media V2 0
Introduction To Business Networking And Social Media V2 0
 
Social Media Workshop
Social Media WorkshopSocial Media Workshop
Social Media Workshop
 
Your Digital Footprint
Your Digital FootprintYour Digital Footprint
Your Digital Footprint
 
LinkedIn Primer
LinkedIn PrimerLinkedIn Primer
LinkedIn Primer
 
Life & P R
Life &  P RLife &  P R
Life & P R
 
NCPITClub-Sumedh_SocialMediaAndNetworkingInCanada
NCPITClub-Sumedh_SocialMediaAndNetworkingInCanadaNCPITClub-Sumedh_SocialMediaAndNetworkingInCanada
NCPITClub-Sumedh_SocialMediaAndNetworkingInCanada
 
social media for lawyers - a how to guide
social media for lawyers - a how to guidesocial media for lawyers - a how to guide
social media for lawyers - a how to guide
 
Titanium Marketing Guide
Titanium Marketing GuideTitanium Marketing Guide
Titanium Marketing Guide
 
Transacting PPT.pptx
Transacting PPT.pptxTransacting PPT.pptx
Transacting PPT.pptx
 
Page 1 Kaplan Business.docx
Page 1                                       Kaplan Business.docxPage 1                                       Kaplan Business.docx
Page 1 Kaplan Business.docx
 
Social Media for HR Execs
Social Media for HR ExecsSocial Media for HR Execs
Social Media for HR Execs
 
Social media compliance
Social media complianceSocial media compliance
Social media compliance
 
Social Networking Final 19.11.2009 Cipd
Social Networking Final 19.11.2009 CipdSocial Networking Final 19.11.2009 Cipd
Social Networking Final 19.11.2009 Cipd
 
Ts510 now that youre linked in baum
Ts510 now that youre linked in baumTs510 now that youre linked in baum
Ts510 now that youre linked in baum
 
Social Media Marketing
Social Media MarketingSocial Media Marketing
Social Media Marketing
 
Inspiring Edinburgh - using digital for social engagement
Inspiring Edinburgh - using digital for social engagement Inspiring Edinburgh - using digital for social engagement
Inspiring Edinburgh - using digital for social engagement
 
JRF Facebook Staffing And Policies
JRF Facebook Staffing And PoliciesJRF Facebook Staffing And Policies
JRF Facebook Staffing And Policies
 
Inspiring edinburgh - Tips on social media engagement and online ROI
Inspiring edinburgh - Tips on social media engagement and online ROIInspiring edinburgh - Tips on social media engagement and online ROI
Inspiring edinburgh - Tips on social media engagement and online ROI
 
Private vs professional in Social Media?
Private vs professional in Social Media?Private vs professional in Social Media?
Private vs professional in Social Media?
 
see attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docxsee attachedTitle social Media in the work placeWhat is the .docx
see attachedTitle social Media in the work placeWhat is the .docx
 

More from Micheal Axelsen

20220114 Typecasting on the lettera 22
20220114 Typecasting on the lettera 2220220114 Typecasting on the lettera 22
20220114 Typecasting on the lettera 22Micheal Axelsen
 
20210214 Adventures in Typewriting - In Australia
20210214 Adventures in Typewriting - In Australia20210214 Adventures in Typewriting - In Australia
20210214 Adventures in Typewriting - In AustraliaMicheal Axelsen
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEOMicheal Axelsen
 
Speakers at MNCs in Emerging Markets: International Human Resource Management...
Speakers at MNCs in Emerging Markets: International Human Resource Management...Speakers at MNCs in Emerging Markets: International Human Resource Management...
Speakers at MNCs in Emerging Markets: International Human Resource Management...Micheal Axelsen
 
Seminar Invitation to UQ BS Event: MNCs in Emerging Markets: International H...
Seminar Invitation to UQ BS Event:  MNCs in Emerging Markets: International H...Seminar Invitation to UQ BS Event:  MNCs in Emerging Markets: International H...
Seminar Invitation to UQ BS Event: MNCs in Emerging Markets: International H...Micheal Axelsen
 
What if I told you you doing insane hours is not the same as doing your phd?
What if I told you you doing insane hours is not the same as doing your phd?What if I told you you doing insane hours is not the same as doing your phd?
What if I told you you doing insane hours is not the same as doing your phd?Micheal Axelsen
 
Workshop: Processes and practices for effective information governance
Workshop:  Processes and practices for effective information governanceWorkshop:  Processes and practices for effective information governance
Workshop: Processes and practices for effective information governanceMicheal Axelsen
 
Sergeant Major Eats Sugar Cookies
Sergeant Major Eats Sugar CookiesSergeant Major Eats Sugar Cookies
Sergeant Major Eats Sugar CookiesMicheal Axelsen
 
IDAS and the Accounting Professional
IDAS and the Accounting ProfessionalIDAS and the Accounting Professional
IDAS and the Accounting ProfessionalMicheal Axelsen
 
Example business continuity plan
Example business continuity planExample business continuity plan
Example business continuity planMicheal Axelsen
 
Judgment Under Uncertainty: Anchoring and Adjustment Bias
Judgment Under Uncertainty:  Anchoring and Adjustment BiasJudgment Under Uncertainty:  Anchoring and Adjustment Bias
Judgment Under Uncertainty: Anchoring and Adjustment BiasMicheal Axelsen
 
NGERS and Data Capture Systems: Reporting Requirements
NGERS and Data Capture Systems:  Reporting RequirementsNGERS and Data Capture Systems:  Reporting Requirements
NGERS and Data Capture Systems: Reporting RequirementsMicheal Axelsen
 
Overview of Key Performance Indicators
Overview of Key Performance IndicatorsOverview of Key Performance Indicators
Overview of Key Performance IndicatorsMicheal Axelsen
 
Data Management Strategies - Speakers Notes
Data Management Strategies - Speakers NotesData Management Strategies - Speakers Notes
Data Management Strategies - Speakers NotesMicheal Axelsen
 
Data Management Strategies
Data Management StrategiesData Management Strategies
Data Management StrategiesMicheal Axelsen
 
Continued Use Of IDAs And Knowledge Acquisition
Continued Use Of IDAs And Knowledge AcquisitionContinued Use Of IDAs And Knowledge Acquisition
Continued Use Of IDAs And Knowledge AcquisitionMicheal Axelsen
 
Decision Support Systems And The Professional
Decision Support Systems And The ProfessionalDecision Support Systems And The Professional
Decision Support Systems And The ProfessionalMicheal Axelsen
 
20070221 Getting It Right Draft #3 Applied Insight
20070221 Getting It Right Draft #3 Applied Insight20070221 Getting It Right Draft #3 Applied Insight
20070221 Getting It Right Draft #3 Applied InsightMicheal Axelsen
 

More from Micheal Axelsen (20)

20220114 Typecasting on the lettera 22
20220114 Typecasting on the lettera 2220220114 Typecasting on the lettera 22
20220114 Typecasting on the lettera 22
 
20210214 Adventures in Typewriting - In Australia
20210214 Adventures in Typewriting - In Australia20210214 Adventures in Typewriting - In Australia
20210214 Adventures in Typewriting - In Australia
 
Cyber Security and the CEO
Cyber Security and the CEOCyber Security and the CEO
Cyber Security and the CEO
 
Speakers at MNCs in Emerging Markets: International Human Resource Management...
Speakers at MNCs in Emerging Markets: International Human Resource Management...Speakers at MNCs in Emerging Markets: International Human Resource Management...
Speakers at MNCs in Emerging Markets: International Human Resource Management...
 
Seminar Invitation to UQ BS Event: MNCs in Emerging Markets: International H...
Seminar Invitation to UQ BS Event:  MNCs in Emerging Markets: International H...Seminar Invitation to UQ BS Event:  MNCs in Emerging Markets: International H...
Seminar Invitation to UQ BS Event: MNCs in Emerging Markets: International H...
 
What if I told you you doing insane hours is not the same as doing your phd?
What if I told you you doing insane hours is not the same as doing your phd?What if I told you you doing insane hours is not the same as doing your phd?
What if I told you you doing insane hours is not the same as doing your phd?
 
Workshop: Processes and practices for effective information governance
Workshop:  Processes and practices for effective information governanceWorkshop:  Processes and practices for effective information governance
Workshop: Processes and practices for effective information governance
 
Sergeant Major Eats Sugar Cookies
Sergeant Major Eats Sugar CookiesSergeant Major Eats Sugar Cookies
Sergeant Major Eats Sugar Cookies
 
IDAS and the Accounting Professional
IDAS and the Accounting ProfessionalIDAS and the Accounting Professional
IDAS and the Accounting Professional
 
Academic paper template
Academic paper templateAcademic paper template
Academic paper template
 
Example business continuity plan
Example business continuity planExample business continuity plan
Example business continuity plan
 
Judgment Under Uncertainty: Anchoring and Adjustment Bias
Judgment Under Uncertainty:  Anchoring and Adjustment BiasJudgment Under Uncertainty:  Anchoring and Adjustment Bias
Judgment Under Uncertainty: Anchoring and Adjustment Bias
 
The Data Dynamic
The Data DynamicThe Data Dynamic
The Data Dynamic
 
NGERS and Data Capture Systems: Reporting Requirements
NGERS and Data Capture Systems:  Reporting RequirementsNGERS and Data Capture Systems:  Reporting Requirements
NGERS and Data Capture Systems: Reporting Requirements
 
Overview of Key Performance Indicators
Overview of Key Performance IndicatorsOverview of Key Performance Indicators
Overview of Key Performance Indicators
 
Data Management Strategies - Speakers Notes
Data Management Strategies - Speakers NotesData Management Strategies - Speakers Notes
Data Management Strategies - Speakers Notes
 
Data Management Strategies
Data Management StrategiesData Management Strategies
Data Management Strategies
 
Continued Use Of IDAs And Knowledge Acquisition
Continued Use Of IDAs And Knowledge AcquisitionContinued Use Of IDAs And Knowledge Acquisition
Continued Use Of IDAs And Knowledge Acquisition
 
Decision Support Systems And The Professional
Decision Support Systems And The ProfessionalDecision Support Systems And The Professional
Decision Support Systems And The Professional
 
20070221 Getting It Right Draft #3 Applied Insight
20070221 Getting It Right Draft #3 Applied Insight20070221 Getting It Right Draft #3 Applied Insight
20070221 Getting It Right Draft #3 Applied Insight
 

Recently uploaded

Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMRavindra Nath Shukla
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear RegressionRavindra Nath Shukla
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityEric T. Tung
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Roland Driesen
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableDipal Arora
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfAmzadHosen3
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLSeo
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756dollysharma2066
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...amitlee9823
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...Aggregage
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageMatteo Carbone
 

Recently uploaded (20)

Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 
Monte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSMMonte Carlo simulation : Simulation using MCSM
Monte Carlo simulation : Simulation using MCSM
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Regression analysis: Simple Linear Regression Multiple Linear Regression
Regression analysis:  Simple Linear Regression Multiple Linear RegressionRegression analysis:  Simple Linear Regression Multiple Linear Regression
Regression analysis: Simple Linear Regression Multiple Linear Regression
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
How to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League CityHow to Get Started in Social Media for Art League City
How to Get Started in Social Media for Art League City
 
Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...Boost the utilization of your HCL environment by reevaluating use cases and f...
Boost the utilization of your HCL environment by reevaluating use cases and f...
 
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service AvailableCall Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
Call Girls Pune Just Call 9907093804 Top Class Call Girl Service Available
 
John Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdfJohn Halpern sued for sexual assault.pdf
John Halpern sued for sexual assault.pdf
 
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRLMONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
MONA 98765-12871 CALL GIRLS IN LUDHIANA LUDHIANA CALL GIRL
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Majnu Ka Tilla, Delhi Contact Us 8377877756
 
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
Call Girls Electronic City Just Call 👗 7737669865 👗 Top Class Call Girl Servi...
 
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
The Path to Product Excellence: Avoiding Common Pitfalls and Enhancing Commun...
 
Insurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usageInsurers' journeys to build a mastery in the IoT usage
Insurers' journeys to build a mastery in the IoT usage
 

Online Social Networking and the Workplace draft #3 final

  • 1. Online social networking and the workplace Presented by: Micheal Axelsen Director Applied Insight Pty Ltd
  • 2. Cheer up, it could be worse Maybe you can go dive in a swimming pool full of my money to make you feel better. @Rynobi: You're a bank. You made a $1.6 billion first-quarter profit. Cheer up. RT @westpac: Oh so very over it today. Finally! A bank that feels existential pain."
  • 4. About this presentation Key Issues How to stop your online life from affecting: your career your employer perhaps your reputation! Objectives Identify and discuss how online social networking can affect the workplace Discuss employer and employee rights and responsibilities Provide practical hints and tips for maintaining appropriate privacy when using social networking websites. Provide a framework for businesses to use in developing their policies and procedures for online social networking.
  • 5. About this presentation Agenda Social networking overview and who’s using it So... that hollow empty feeling was my career? Social networking and the workplace Practical hints and tips Rights and responsibilities Developing OSN policies and procedures Conclusion
  • 6. Expectations What are your expectations from this session? Strawpoll: Who uses social networking websites? MySpace, FaceBook, Friendster, MyYahoo, Twitter, Flickr, Photobucket, SchoolFriends, Blogger, LiveJournal, Tumblr, Microsoft Live... Blogs/Vlogs? Others? Strawpoll: Who didn’t know about these websites? Strawpoll: Anybody here ever ‘Vlog Naked’? (sorry, just wondering)
  • 7. Social Networking overview: who’s using it
  • 8. The growth of online social networking September 2006 – Facebook in Australia March 2010 – Facebook now claims 7.8 million Australian users Appears to be here for some time, in some form Employees expect to have access, customers expect to use it to discuss and evaluate businesses A general distrust of advertising, but a trust of an online user
  • 9. What is online social networking? Online social networking includes: Text (blog posts, comments on blogs, mailing lists or forums, microblogging – Twitter, pwnce) Video (video-blog posts on for example YouTube, Google Video) Photographs or artwork (for example, Flickr or Photobucket, Audio (for example, podcasts) Dedicated online social networking websites such as MySpace or Facebook – also Google Buzz (?)
  • 10. Why is online social networking growing? Our lives are increasingly digital We often meet friends and family online, and make friends online. Allows us to achieve work/life balance With growth of Web 2.0, higher access to easy to use technology – no specialist expertise required
  • 11. Is it different? Not really, people always talked to each other and said ‘stuff’ – blowing off steam Trouble is those conversations at barbecues were never indexed by Google. Frequently we forget the context of the forum – and its accessibility – and say ‘regrettable’ things.
  • 12. So that hollow empty feeling was my career?
  • 13. Last year’s video is tomorrow’s viral
  • 14. Things that make you go ‘hmm’ Censored Ex-boyfriend site
  • 17. Social networking & the workplace
  • 18. Public and digital lives Alritey. The names Ryan workin at #### #### At the moment to get the money to go out and enjoy my much appreciated young life. As far as i know i enjoy life to the max, i love to get wrecked, mwi and be around mates and loud music. No better way to spend a weekend than gettin out my #### in one way or another and be surrounded by loud music and knowing that i have a stunning girlfriend when i go home.
  • 19. The risks to business: seven risks Productivity Losses Legal Reputation Viruses and spyware Privacy breaches and identity theft Social engineering Inadvertent release of information
  • 20. Some business examples of issues Staff issues: Employees sacked for blogging Using firm email addresses to argue with clients Embarrassing photos of office Christmas parties Employees with ‘lewd’ Facebook sites Customer/online reputation issues: Suing Whirlpool Twitter & Best-Buy Comcast technician falling asleep while on hold – Youtube FTW!
  • 21. Internal and external privacy issues, and other related issues Productivity cost (cyber-slacking) Phishing attacks, risk of spyware, viruses Unintended consequences Spur of the moment tweets Employees may become stalker targets Submit intellectual property Inadvertently transfer intellectual property to a client
  • 23. How to keep an online world sane Simple things Common sense! Don’t post in your real name – set up three email addresses: Personal, anonymous email address that forwards to your main email (for blogging comments & mail lists) – but expect that this is not fail-safe – very useful if you want to stalk Justin Bieber Personal (for all your personal email) Work (for work email – no personal email!) Only post online what you’d be happy for Mum (or a potential recruiter/client) to see
  • 24. How to keep an online world sane Simple things Wall posts are wall posts on someone else’s wall, and a tweet is forever (particularly now they’re archived by Library of Congress!) Get permission before you post a photo of someone online Only ‘friend’ friends! Be coy about your age Never post photos of official identification documents... Just so you know
  • 25. How to keep an online world sane For the more paranoid If you have a social networking website (e.g. MySpace, Facebook), use the privacy options – so many people still don’t Limit the sites you participate in – perhaps FaceBook for friends, LinkedIn for work colleagues? Too many are too difficult to manage Plain old do not accept a flung zombie, which Hero are you?, Blackjack or other application on Facebook Don’t get me started on Farmville... Set up Google Alerts to monitor your name and email address
  • 27. Dealing with it Strawpoll: who knows whether their business searches for these discussions? Good talk is good, right? The only good way to respond is to give good service and hope that people blog about it At least show an interest and respond to address a grievance, and be transparent about it Professional monitoring services Reputation Hawk Reputation Defender Cymfony There are many others of course
  • 28. Dealing with it Simple (and cheap) Google Alerts/Yahoo Alerts/MonitorThis Customer representatives join online, private, forums and lurk there while watching for issues Set clear expectations as to what staff can do with your brand name on the internet Responding to online comments Don’t post a hot and angry response Don’t exercise legal muscle unless you really have to Respond with transparency and honesty, but take up discussions off-line at a senior level, after research! Engage with the author of the post is most effective
  • 29. Dealing with it Words of wisdom Sometimes, leaving it lie is the best option! Don’t lie and pretend to be a customer – you will be found out, and the price will be high! Avoid a search engine optimisation solution – the ethics are questionable and doesn’t remove the offending post Invite genuine customers to respond in a forum – but this can be risky! Sometimes these comments come from a direct competitor! Social networking and the use of the internet is increasing – ignore the trend at your peril It’s not all problems – marketing opportunities to engage your clients, and also to recruit reliable staff
  • 31. What is OSN being used for by business? Increased professional contacts, exposure to new ideas Use the network to recruit new employees Allow new-hires to mix with current employees It is good when customers say positive things about the business Online reputation monitoring & proactive customer support
  • 32. What can we do to ‘minimise harm’? We need to minimise the potential for harm from social networking for both ourselves and our livelihoods. It is important that businesses recognise that there are potentially great benefits that can arise from online social networking, and so a ‘blanket ban’ within the workplace frequently is counterproductive (and really won’t help with activities at home and by customers).
  • 33. Whose activities need to be governed? Five stakeholders: Customers Employees Suppliers of the business Business owners Independent third parties such as journalists or industry regulators
  • 34. Current Employees A business can control what is done with its equipment and resources, and additionally can dictate behaviour on work time. However, courts are generally reluctant to allow employers to intrude into employees’ activities in their private time. A fiduciary relationship exists between the employer and the employee Note limitations on use of OSN by prospective employers – can look, can use the info (but not in a disciminatory way) – but if they store it, privacy issues apply. See especially Privacy Commissioner: http://www.privacy.gov.au/faq/individuals/sn-q5
  • 35. An employer and employee’s fiduciary relationship Practically, there are three duties: to work with care and diligence to obey all lawful and reasonable orders to act with good faith and fidelity There are two types of employee - standard and professional employees if an employee ‘tarnishes his employee’s image’ the employment relationship would allow disciplinary procedures, and/or termination Essentially, if the employee’s actions on the OSN make it difficult to carry out their work duties due to special considerations, then the employer could dictate what can and cannot be done
  • 36. Control over current employees An employer can exercise control in the context of the duties they are owed. Different standards will apply depending upon the employee’s role. Clear and explicit expectations (and inclusion in the contract of employment) would be necessary to exercise control over current employees
  • 37. Former employees Since they’re no longer employed by the business, duties owed are much less Control is very limited Generally, a post-employment restraint only allows the protection of a ‘trade secret’ – information of a ‘high degree of confidentiality’ must not be misused Legal action will likely be expensive & uncommercial without an express covenant
  • 38. Other stakeholders Other stakeholders (customers, business owners, suppliers, independent third parties) will be governed by, for example, defamation actions. Commercially – probably not a lot a business can do about such activities without involving legal actions, which may or may not suit
  • 39. Developing OSN policies and procedures
  • 40. AS/NZS 4360:2004 Risk Management
  • 42. Elements of policy & procedure Standard Title Purpose Revision History Effective Date Persons affected Definitions Responsibilities Change to suit risk appetite Policy Procedures
  • 44. The focus of attention In accordance with your risk appetite: Define what are acceptable online social networking activities Develop an employee training and awareness program Monitor your online reputation Respond to online social networking activities
  • 45. Draft Policy – Very Low Risk Appetite For a very low risk appetite In recognition of the very high impact that online social networking activities have upon the business activities of XYZ Pty Ltd, XYZ Pty Ltd implements very strict restrictions on the use of online social networking activities by employees using XYZ Pty Ltd equipment, and/or making reference to the business of XYZ Pty Ltd. XYZ Pty Ltd emphasises procedural controls, regular and intense monitoring to online social networking activities referring to the business of XYZ Pty Ltd, and provides explicit guidelines to follow in responding to such activities.
  • 46. Draft Policy – Very High Risk Appetite For a very high risk appetite As online social networking activities have minimal impact upon the business activities of XYZ Pty Ltd, XYZ Pty Ltd provides some guidance in the use of online social networking activities by employees. Responses to online social networking activities that refer to the business of XYZ Pty Ltd are made on a case by case basis as XYZ Pty Ltd becomes aware of them.
  • 47. Acceptable online social networking activities Possibilities Could ban all mentions by employees Could ask for pre-approval of a comment Could allow employees to publish, but have marketing manager subscribe to RSS feeds and have employees agree to make changes if requested Only have authorised representatives respond online Could block online social networking websites in work hours (but please be realistic)
  • 48. Staff training and awareness program Possibilities Content Awareness of acceptable online social networking activities Core principles in ensuring the privacy of personal information in an online environment Specific training on the use of major identified online social networking websites to ensure privacy. Practical advice in the use and etiquette of online social networking tools, including the use of email Make your requirements part of induction program, perhaps with an exam Require existing staff to attend annually, and perhaps pass an exam
  • 49. Online reputation monitoring Possibilities Engage online reputation monitoring service provider At least set up Google Alerts! Document risky mentions in monthly, quarterly, or annual online social networking references report Subscribe to likely private online forums Ensure that applicants for positions are aware that the candidate’s online profile may be examined in the course of assessing the candidate’s suitability for the position.
  • 50. Responding Possibilities May need to have lawyers involved For an employee, the HR manager would deal with it Core principles: Demonstrate an interest and respond online to address a grievance, and be transparent about it Never post an immediate, negative, response to an online reference. Have a conversation in person at a senior level Legal action considered Making no response may be the least harmful All responses conducted professionally and honestly Monitor and document responses in social networking references report
  • 52. Conclusion Review the expectations wall How did we go? Obtaining a copy of the presentation See www.michealaxelsen.com for a copy of this presentation Main Message Set up Google Alerts! (www.google.com/alerts) Set privacy options in Facebook/MySpace! Use three email addresses, and no private email at work! Know what your customers say about you at the virtual water-cooler! Applied Insight Pty Ltd Services Guide to the Development of Online Social Networking Policies & Procedures Social networking training for staff Social networking review for your business Social networking policies & procedures
  • 53. About the speaker Services Micheal Axelsen provides business systems consulting services – that is, how can IT be made to work for your business? Position and qualifications Director of Applied Insight Pty Ltd Member of ISACA Qualifications Bachelor of Commerce (Hons) Masters of Information Systems FCPA Currently undertaking PhD in the impact of technology use upon professional skills.
  • 54. Contact details Micheal AxelsenDirector, Applied Insight Pty Ltd m: 0412 526 375t: +61 7 3139 0325e: micheal.axelsen@appliedinsight.com.au blog: www.michealaxelsen.com Applied Insight Pty LtdPO Box 603Toowong DC 4066AUSTRALIA
  • 55. References AS/NZS 4360:2004 Risk Management Boyd, D., and Ellison, N. "Social Network Sites: Definition, History, and Scholarship," Journal of Computer-Mediated Communication (13:1), March 2007, pp 210-230. Brandenburg, C. ‘The Newest Way to Screen Job Applicants: A Social Networker's Nightmare’. Federal Communications Law Journal. Los Angeles: Jun 2008. Vol. 60, Iss. 3; p. 597 (30 pages). Emerald Insights. ‘MySpace or yours? Advertising and social networks’. Strategic Direction. Bradford. 2008. Vol. 24, Iss. 8; p. 15 Engdahl, S (Editor). “Online social networking”. Greenhaven Press. Farmington Hills, MI, USA. c2007.
  • 56. References Espejo, R (Editor). ‘Should social networking web sites be banned?’. Greenhaven Press. Detroit, MI, USA. 2008. Johnson, R A, and Middleton, J M. ‘Accounting for Second Life’. Journal of Accountancy. New York: Jun 2008. Vol. 205, Iss. 6; p. 54 (5 pages) Lavenda, D. ‘Does 'blogging' have a place in the workplace?’. The British Journal of Administrative Management. Orpington: Jul 2008. p. 27 (3 pages) Mac Sithigh, D. ‘The mass age of internet law’. Information & Communications Technology Law. Abingdon: Jun 2008. Vol. 17, Iss. 2; pg. 79 McCallum, R. “Employer Controls over Private Life”. New South Wales University Press Ltd. Sydney, NSW, Australia. 1999.
  • 57. References Stewart, A. ‘Drafting and enforcing post-employment restraints’. Australian Journal of Labour Law. Vol 10 pp181-221. 1997. Willard, N E. ‘Cyber-safe kids, cyber-savvy teens : helping young people learn to use the Internet safely and responsibly. Jossey-Bass. San Francisco , CA, USA. 2007.
  • 59. Scenarios Productivity Losses Employees use social networking websites during work time to the detriment of business performance. Legal risks As no policy explicitly states that email use is monitored by the employer, the employee brings an action for wrongful dismissal when dismissed for posting inappropriate content to an email forum. As no policy explicitly states that web use is actively monitored, it is difficult for a business to further investigate an employee who is suspected of posting details of an upcoming marketing program and product price list onto Wikipedia.
  • 60. Scenarios A junior financial planner with an accounting firm provides taxation advice in a public forum using the firm’s email address and with a signature including the firm’s name. The advice is posted publicly, is relied upon by some readers who suffer a loss and subsequently bring an action against the accounting firm. Reputation Risk A customer writes a blog post or video that is negative towards your product, service or staff. An employee writes a blog post or posts a video that is negative towards the company’s product, service or staff.
  • 61. Scenarios An employee writes a blog post or status update that places company secrets in the public domain using the business’s equipment. An employee posts lewd photographs online in a public forum. A friend of an employee posts lewd material on the employee’s public website or social networking page. Photographs of office functions depicting inappropriate behaviour are posted online by staff. Photographs of office functions depicting inappropriate behaviour are posted online by staff employed by the venue.
  • 62. Scenarios An employee writes a blog post or posts a video that is derogatory to his or her colleagues or the firm’s customers. An ex-employee writes a blog post or posts a video that is derogatory to his or her colleagues or the firm’s customers. A supplier writes a blog post that is derogatory about the company’s ability to pay its suppliers. Viruses & spyware A staff member’s computer infects all networked computers with a virus that was launched from a website that advertised on MySpace.
  • 63. Scenarios The accountant’s username and password for the business’s online banking is stolen by a Trojan key-logging program that was downloaded to the accountant’s laptop from an advertisement on a niche social networking website while her teenaged son was using the computer at home. Privacy breaches/identity theft Using an edited copy of a signed letter and a business-card posted on Flickr, a fraudster creates a fake letter of employment as supporting documentation for a bank loan in an employee’s name that is subsequently defaulted upon and causes personal bankruptcy for the employee.
  • 64. Scenarios The employee subsequently brings an action against the business for not taking reasonable precautions to prevent this from happening. Although the resulting court case is unsuccessful, it is a serious distraction and expense for the business. An employee posts a photograph of a colleague and her children on her blog at the annual Christmas function. The colleague’s estranged husband is able to identify the children’s school from the uniform they are wearing, and subsequently collects the children from the school. The children are never seen again.
  • 65. Scenarios Social engineering Using names, email address, and positions gleaned from Facebook, position titles and references from LinkedIn, and faked letterhead or invoices from a site such as Flickr or Photobucket, a conman is able to extract payment for non-existent products or services. Using photos from Flickr of a business card and letterhead, and information gleaned from Facebook, a fraudster poses as a contract cleaner who then uses an unattended and logged-in computer to steal clients’ taxation information on a 4gb USB memory stick.
  • 66. Scenarios Inadvertent release of information The company’s proprietary approach to the bidding process for government work is submitted to Wikipedia by the business development assistant and is not able to be withdrawn in time.

Editor's Notes

  1. This is the AS/NZS 4360:2004 we talked about previously.