Welcome!

Agile Computing Authors: William Schmarzo, Elizabeth White, Pat Romanski, Zakia Bouachraoui, Liz McMillan

Related Topics: Agile Computing

Agile Computing: Blog Feed Post

Automated Social Media Governance and Government 2.0

Should social media governance be automated, and to what extent?

With the proliferation of Internet-based tools and forums to share information, deliver announcements or warnings and create collaborative networks, it’s become apparent that “self-policing” strategies for controlling and managing the risks involved in delivering content through the corporate firewall can’t mitigate most risks.

Most corporations and government agencies do indeed require, as terms of employment and various legislation, that care be taken and policies or procedures followed when engaging in online public discourse or otherwise moving content from the corporate-controlled environment to the public Internet.

Over the past years, many good tools and governance frameworks have been developed as a routine matter of enabling Internet content posting, distribution and syndication – but these have mostly focused on automation, protection and monitoring procedures associated with corporate-managed content. “Corporate-managed content” is defined as information products or artifacts that are specifically governed and managed by a combination of corporate policy, processes and information management systems.

The availability and use of Internet-based “Web 2.0” tools (when used with collaborative intent termed “Social Media”) from inside corporate and agency firewalls are exposing additional types of information and styles of communication that don’t fall neatly into the corporate-managed information bucket. These social media information types and communication styles are proving quite difficult to manage from many perspectives, including legal compliance, risk management, security, personal or corporate reputation management and overall productivity and return-on-investment (ROI).

Newer communication styles – such as those that result in creation of unmediated copies or renditions of original content - include things like “microblogging” (i.e. “Twitter”) and self-syndication, i.e. publishing content to sites like EzineArticles, Digg or public blogs, and enabling subscription to RSS feeds. These communication styles are used expressly for the purpose of enabling public propagation and information-sharing, for reasons ranging from actual corporate or agency public service mission, to marketing or simple relationship and reputation-building.

Newer information types (to be considered from a corporate information management perspective) include RSS-formatted messages, micromedia (i.e. small, highly-portable, low-bandwidth and standardized image or video files), tags and attributions, social media press releases, backlinks, comments and pingbacks – these are the currency of social media, and that which provides permanent, public evidence of collaboration.

Within the so-called “Enterprise 2.0” or especially "Government 2.0" context, these communication styles and information types aren’t so problematic – employee to employee socialization using corporate-managed Web 2.0 style tools is a low-risk, high-return activity, so long as it’s managed and monitored effectively. Many organizations have grown to understand and leverage information management tools to help control risk, productivity and costs associated with creating, publishing and sharing information internally. Systems that provide web content management, records management, business process and services registry/repository management, document management and various flavors of logging/auditing capabilities are well known and broadly-implemented. However, when these social media activities and content surface for public consumption on the Internet, unmanaged by corporate information management systems and associated with explicit or implicit attributes reflecting ownership, participation, intent, decisions, or opinion – the corporation or agency’s risk profile can rise dramatically, and asymmetrically.

Consider this use case. A government agency wishes to post a photograph and description of a road closure on the Internet, making sure that the information not only appears on local “traditional” media Internet channels and the agency’s own website and subscription channels, but also in local “user-generated” community websites, blogs, and discussion forums, as well as larger 3rd-party user-generated media sites that allow localization through keywords or other metadata. Basically, the news needs to get out to both the “pull” environments (i.e. online traditional media), and the “push” environments (i.e. online social dialogue environments). What’s the process?

Read the original blog entry...

More Stories By Ted McLaughlan

Summary: Currently a Federal Enterprise Architect with Oracle, Ted has over 25 years in Commercial and Government Information Technology with University of Virginia, EDS, Accenture, KME Internet Marketing, Blackstone Technology Group, NavigationArts and CSC; additional focus recently on Interactive Design, Web 2.0 Internet Marketing, SEO, Social Media and Advertising. Specialties: Enterprise Architecture and Information Management, SOA/ESB, Enterprise Integration, Business Intelligence, Internet Safety and Security, Family Content Networks, Knowledge Management and Collaboration, User-Defined Operational Pictures/Common Operating Pictures (UDOP/COP), Situational Awareness, Portals, Internet Marketing and Search Engine Optimization (SEO), Website Design/Development and Optimization - Certified Systems Engineer - Certified Enterprise Solution Architect

IoT & Smart Cities Stories
At CloudEXPO Silicon Valley, June 24-26, 2019, Digital Transformation (DX) is a major focus with expanded DevOpsSUMMIT and FinTechEXPO programs within the DXWorldEXPO agenda. Successful transformation requires a laser focus on being data-driven and on using all the tools available that enable transformation if they plan to survive over the long term. A total of 88% of Fortune 500 companies from a generation ago are now out of business. Only 12% still survive. Similar percentages are found throug...
CloudEXPO has been the M&A capital for Cloud companies for more than a decade with memorable acquisition news stories which came out of CloudEXPO expo floor. DevOpsSUMMIT New York faculty member Greg Bledsoe shared his views on IBM's Red Hat acquisition live from NASDAQ floor. Acquisition news was announced during CloudEXPO New York which took place November 12-13, 2019 in New York City.
OpsRamp is an enterprise IT operation platform provided by US-based OpsRamp, Inc. It provides SaaS services through support for increasingly complex cloud and hybrid computing environments from system operation to service management. The OpsRamp platform is a SaaS-based, multi-tenant solution that enables enterprise IT organizations and cloud service providers like JBS the flexibility and control they need to manage and monitor today's hybrid, multi-cloud infrastructure, applications, and wor...
The Master of Science in Artificial Intelligence (MSAI) provides a comprehensive framework of theory and practice in the emerging field of AI. The program delivers the foundational knowledge needed to explore both key contextual areas and complex technical applications of AI systems. Curriculum incorporates elements of data science, robotics, and machine learning-enabling you to pursue a holistic and interdisciplinary course of study while preparing for a position in AI research, operations, ...
Codete accelerates their clients growth through technological expertise and experience. Codite team works with organizations to meet the challenges that digitalization presents. Their clients include digital start-ups as well as established enterprises in the IT industry. To stay competitive in a highly innovative IT industry, strong R&D departments and bold spin-off initiatives is a must. Codete Data Science and Software Architects teams help corporate clients to stay up to date with the mod...
Tapping into blockchain revolution early enough translates into a substantial business competitiveness advantage. Codete comprehensively develops custom, blockchain-based business solutions, founded on the most advanced cryptographic innovations, and striking a balance point between complexity of the technologies used in quickly-changing stack building, business impact, and cost-effectiveness. Codete researches and provides business consultancy in the field of single most thrilling innovative te...
Atmosera delivers modern cloud services that maximize the advantages of cloud-based infrastructures. Offering private, hybrid, and public cloud solutions, Atmosera works closely with customers to engineer, deploy, and operate cloud architectures with advanced services that deliver strategic business outcomes. Atmosera's expertise simplifies the process of cloud transformation and our 20+ years of experience managing complex IT environments provides our customers with the confidence and trust tha...
With the introduction of IoT and Smart Living in every aspect of our lives, one question has become relevant: What are the security implications? To answer this, first we have to look and explore the security models of the technologies that IoT is founded upon. In his session at @ThingsExpo, Nevi Kaja, a Research Engineer at Ford Motor Company, discussed some of the security challenges of the IoT infrastructure and related how these aspects impact Smart Living. The material was delivered interac...
Intel is an American multinational corporation and technology company headquartered in Santa Clara, California, in the Silicon Valley. It is the world's second largest and second highest valued semiconductor chip maker based on revenue after being overtaken by Samsung, and is the inventor of the x86 series of microprocessors, the processors found in most personal computers (PCs). Intel supplies processors for computer system manufacturers such as Apple, Lenovo, HP, and Dell. Intel also manufactu...
Darktrace is the world's leading AI company for cyber security. Created by mathematicians from the University of Cambridge, Darktrace's Enterprise Immune System is the first non-consumer application of machine learning to work at scale, across all network types, from physical, virtualized, and cloud, through to IoT and industrial control systems. Installed as a self-configuring cyber defense platform, Darktrace continuously learns what is ‘normal' for all devices and users, updating its understa...