Are you wondering how social media will change your business then check out this whitepaper by IBM about how your business will be effected by social media.
The document discusses four key organizational communication interventions: networking and collaboration, information systems, suggestion and grievance systems, and conflict resolution. It describes each intervention in 1-2 paragraphs, noting that effective communication is important for organizational success and these interventions can improve information sharing, coordination, and conflict management within an organization.
This document discusses how organizations can effectively implement social media. It notes that social media impacts internal communications, employer branding, recruitment, teamwork, training and learning. It also summarizes surveys that found most organizations do not have dedicated social media employees or strategies. The document advocates for organizations to view social media as an evolution and to focus on changing employee behaviors through effective communication and governance policies. It provides tips for starting a social media program, including sharing vision, engaging stakeholders, experimenting, and measuring return on investment. Overall, the document promotes a blended social media solution that focuses on human relationships and changing behaviors over time.
The New Enterprise Collaboration Imperative: How Leading Brands Achieve Tangi...Frank Jurden
Social media has transformed the consumer world and is now crossing the firewall into the enterprise. New forms of knowledge sharing, collaboration and community building may be the biggest thing to hit enterprise IT since the introduction of the PC.
Whitepaper IBM on social business patternse-office bv
In dit whitepaper worden 6 use cases beschreven voor succesvol inzetten van social voor bedrijfsprocessen. Use cases zijn: toegang tot kennis, inzicht in klantvragen, kennisdelen, werving en inwerken, fusies en overnames, veiligheid op de werkplek.
This document describes seven social business patterns that organizations can use to improve business processes and gain measurable returns. The innovation pattern is discussed. It aims to increase innovation through a wider reach of ideas and faster time to market. Key actions include using collaboration tools to openly communicate strategy and generate ideas, engaging internal and external crowds to vet ideas, and using gamification to improve engagement. Companies that have applied this pattern have seen benefits like $40 million in manufacturing savings and launching new global products in 1/3 the time.
IBM social business patterns paper / April 2013 - Venite a vederli il 23/5 al...Max Ardigó 🇦🇷
This document discusses patterns in achieving social business success through leading organizations. It describes how social business practices can help organizations adapt to changing economic conditions and create competitive advantages. Six social business patterns are identified: finding expertise, gaining external customer insights, increasing knowledge sharing, improving recruiting and onboarding, managing mergers and acquisitions, and enabling workplace safety. Each pattern is described in detail with examples of how organizations have successfully implemented social capabilities to address common business challenges and achieve benefits like faster problem solving, reduced costs, improved customer and employee engagement, and increased innovation.
Social Media in the Workplace - Are We Nearly There?Infor HCM
Since Facebook was invented a decade ago, it has attracted a billion users worldwide. Twitter now reports 200 million users who send 400 million tweets every day. Compounded by record IPO valuations well into the billions, there is little doubt that the social media way of life is here to stay.
From the AMA - a summary of the 2nd Annual New Symbiosis of Professional Networks research study that explores impact of social media on enterprise decision-
making.
.
Why today’s businesses need enterprise socialMicrosoft
People today are more connected than ever before. The growth
of mobile devices such as smartphones and tablets, combined
with the rise of social technologies such as Facebook, Twitter,
and LinkedIn, has turned the world into a global community
that gives users instant access to information, makes it easy
for them to communicate about everything from products to
politics, and facilitates collective action. Technology makes it
easier than ever to tap into the human network.
1) Traditional BPM is less effective for modern, knowledge-based companies that value flexibility over strict processes and boundaries.
2) Social BPM integrates social media and networks into business processes to encourage collaboration beyond organizational boundaries.
3) ProcessCodi is a new social BPM platform that will allow knowledge workers to start and engage with business processes using social tools and input from networks, with the goal of designing smarter working cultures.
This document discusses organizational network analysis (ONA). ONA maps both the formal and informal networks within an organization. It can identify central and peripheral members, potential integration points, and strategic groups. The document provides an example of ONA conducted with a IT services company. The analysis mapped communication, problem-solving, and innovation networks across different locations and levels. It identified prominent members, interactions between groups, and social isolates. ONA can be used for organizational change, communities of practice, effectiveness, and business reasons like leadership development and innovation.
The document discusses how enterprises need to embrace social collaboration to remain competitive. It argues that future workplaces should be "social by birth" and integrate social capabilities into business processes from the start. This will help break down silos, engage stakeholders, and allow for more agile work. However, enterprises still face challenges around silos, inclusion, and reliance on email. The next generation of employees will expect participatory environments, real-time feedback, and focus on personal reputation over job titles.
This document provides an overview of social business and how organizations are applying social approaches. Some key points:
- Social business involves embedding social tools and practices into organizational activities both internally and externally. This allows for improved knowledge sharing, collaboration, and customer experiences.
- Leading organizations are applying social business to create valued customer experiences, drive workforce productivity and effectiveness, and accelerate innovation.
- To create customer value, companies are using social media to engage and listen to customers, build online communities, and shift marketing and sales online.
- Applying social approaches internally increases transparency, allows experts to more easily share knowledge, and improves collaboration both within and outside the organization.
- While investment in social business is
Social Media kunnen uitstekend intern worden toegepast. Het is een manier van werken die gebruikers kennen en het leidt tot het delen van informatie. Goed voor werknemers en organisatie.
Infographic why every company should implement Internal Social Media attini s...Wilco Turnhout
According to research of Rapid Circle, managers are choosing for Internal Social Media mainly because it enables employees to find colleagues and to connect to them, sharing ideas, experiences and knowledge and to keep young potentials inside the company. Microblogging is the most important feature of a Social Suite, followed by finding colleagues, news and mobile access.
The document discusses how collaboration on the internet is changing everything. It notes that mass collaboration has become second nature due to the internet, enabling unprecedented cooperation and innovation through sharing ideas and working together (paragraph 1-2). It then provides examples of how peer production and open collaboration have led to the success of companies like Wikipedia, Amazon, YouTube and Facebook by leveraging collective intelligence and user contributions (paragraph 3-6). The document argues that organizations need to adopt collaborative models and engage with customers, partners and peer producers to survive in this new landscape where closed, proprietary approaches are less effective (paragraph 7-8).
Collaborative Enterprise & Social Media : definition, reasons & goals, implem...Frédéric Williquet
Enterprise 2.0 involves using social software and technology to facilitate collaboration between employees and with customers. The key goals are to improve collaboration, innovation, and awareness to gain a competitive advantage. Implementing an enterprise collaboration platform can shrink distances between people and information. Reasons to adopt social media internally include dismantling silos, leveraging relationships for ROI, and improving the employee and customer experience. Visualizing networks can help diagnose collaboration challenges and design efficient solutions. Intensive use of social technologies is correlated with market gains and stronger financial performance. Avoiding social networks comes at a cost to relationships and knowledge. The future of social media in organizations involves conversational channels, social search driving value, and work transcending boundaries.
A social business is an organization whose culture and systems encourage networks of people to create business value. Social businesses connect individuals, so they can rapidly share information, knowledge and ideas by having conversations and publishing informal content. They analyze social content from multiple channels and sources, in addition to structured data, to gain insights from both external and internal stakeholders. When those things happen, innovation and business execution rates increase, better decisions are made, and customers and employees are more engaged and satisfied. Social businesses enjoy lower operating costs, faster speed-to-market, improved customer and employee engagement, and increased profitability.
RIM Communication PlanMGT-550 Andrea Taylor Southern New H.docxhealdkathaleen
RIM Communication Plan
MGT-550
Andrea Taylor
Southern New Hampshire University
This presentation is about RIM, a wireless solutions and mobile device company falling under scrutiny for a toxic organizational culture. After an open letter was published on the tech website BGR, RIM’s negative workplace culture was exposed including oppressed communications at all levels. The CEOs found themselves at the center of the scrutiny and this presentation is meant to demonstrate effective strategies for RIM to apply to this severe situation that could dismantle RIM within their industry and public relations.
Goals
Rebuild internal trust and civility at RIM.
Create a new open communication plan that reinstates the mission and vision of the organizational culture at RIM.
Dismantle the previous toxic attributes to the organizational culture.
Rebuild the external trust at RIM within the tech industry and with customers.
Create platforms for open communication to allow for more innovation and bring RIM back into the competition in the tech industry.
As RIM was already facing internal issues “from a dwindling market share, failed product attempts, and a sinking stock price”(Bigus, 2012, p. 6). An RIM senior executive made the decision to make the letter public due to the “culture at RIM does not allow us to speak openly without having to worry about the career-limiting effects”(Bigus, 2012, p. 5). At RIM it is more critical than ever to focus on employee engagement as the organization should be “speaking to the employee as the consumer”(Breman, 2017). Best efforts to ensure that stakeholder contributions, efforts, and overall happiness are meeting business goals and while completing their mission is a major focal point for Balsillie and Lazaridis to achieve through effective communication at all levels with all employees. To better the relationship management at RIM, more frequent face to face interaction must occur as well as more open communication throughout the workplace and through various channels such as email, surveys, anonymous feedback, and meetings to foster the relationship management on a professional and personal matter. To eliminate the limitations in relation to product development, more openness toward idea exchanges to foster the innovation and creation that RIM desperately needs to rebuild their brand. To dissolve the unenjoyable workplace issue, maintaining civility as professionals must occur and all employees must be held accountable for their performances, contributing to a positive workplace culture, and professionalism meanwhile utilizing filtering to aid responses that exhibit empathy, understanding, and informational exchanges.
Target Audience
Employees at all levels will be the main focus of internal communication.
Industry critics, publication sights/media, as well as customers will be the main focus of external communications.
The entire organization at RIM will be the focal, target audience, considering the ...
RIM Communication PlanMGT-550 Andrea Taylor Southern New H.docxmalbert5
RIM Communication Plan
MGT-550
Andrea Taylor
Southern New Hampshire University
This presentation is about RIM, a wireless solutions and mobile device company falling under scrutiny for a toxic organizational culture. After an open letter was published on the tech website BGR, RIM’s negative workplace culture was exposed including oppressed communications at all levels. The CEOs found themselves at the center of the scrutiny and this presentation is meant to demonstrate effective strategies for RIM to apply to this severe situation that could dismantle RIM within their industry and public relations.
Goals
Rebuild internal trust and civility at RIM.
Create a new open communication plan that reinstates the mission and vision of the organizational culture at RIM.
Dismantle the previous toxic attributes to the organizational culture.
Rebuild the external trust at RIM within the tech industry and with customers.
Create platforms for open communication to allow for more innovation and bring RIM back into the competition in the tech industry.
As RIM was already facing internal issues “from a dwindling market share, failed product attempts, and a sinking stock price”(Bigus, 2012, p. 6). An RIM senior executive made the decision to make the letter public due to the “culture at RIM does not allow us to speak openly without having to worry about the career-limiting effects”(Bigus, 2012, p. 5). At RIM it is more critical than ever to focus on employee engagement as the organization should be “speaking to the employee as the consumer”(Breman, 2017). Best efforts to ensure that stakeholder contributions, efforts, and overall happiness are meeting business goals and while completing their mission is a major focal point for Balsillie and Lazaridis to achieve through effective communication at all levels with all employees. To better the relationship management at RIM, more frequent face to face interaction must occur as well as more open communication throughout the workplace and through various channels such as email, surveys, anonymous feedback, and meetings to foster the relationship management on a professional and personal matter. To eliminate the limitations in relation to product development, more openness toward idea exchanges to foster the innovation and creation that RIM desperately needs to rebuild their brand. To dissolve the unenjoyable workplace issue, maintaining civility as professionals must occur and all employees must be held accountable for their performances, contributing to a positive workplace culture, and professionalism meanwhile utilizing filtering to aid responses that exhibit empathy, understanding, and informational exchanges.
Target Audience
Employees at all levels will be the main focus of internal communication.
Industry critics, publication sights/media, as well as customers will be the main focus of external communications.
The entire organization at RIM will be the focal, target audience, considering the .
The document discusses how human capital metrics need to evolve to reflect changes in the modern workforce. It provides examples of how two existing metrics - quality of hire and ready now candidates - could incorporate collaboration skills. It also examines how employee engagement index and employee net promoter score could evolve to include social engagement and employees' ongoing digital dialogue. Taking these new skills into account may impact how organizations view and manage their talent pools.
The Organization in the Digital Age 2017 - Key FindingsJane McConnell
Digital transformation is a continuum of change for organizations as people, workplaces and technology evolve. While many organizations have defined digital strategies, most have not implemented them effectively across the entire organization. Goals for transformation primarily focus on improving existing processes and business models rather than creating new ones. True digital maturity requires open and trusting work cultures with engaged employees, customers and leadership.
Patterns in achieving Social Business success by leading and pioneering organ...IBM Software India
This document discusses patterns in achieving social business success through leading organizations. It describes how social business practices can help organizations adapt to changing economic conditions and create competitive advantages. Six social business patterns are identified: finding expertise, gaining external customer insights, increasing knowledge sharing, improving recruiting and onboarding, managing mergers and acquisitions, and enabling workplace safety. Each pattern is described in detail with examples of how organizations have successfully implemented social capabilities to address common business challenges and achieve benefits like faster problem solving, reduced costs, improved customer and employee engagement, and increased innovation and profits.
The New Symbiosis Of Professional Networks Research StudyLeader Networks
The article focuses on the impact of social media and social networks to Social Media Peer Groups (SMPG) and professional decision-makers. It mentions that customers and prospects have an instant platform of discussions for their ideas, experiences and knowledge through the use of social media, wherein their important role is utilizing the tools and mediums before engaging to decision-making processes. It states that social media increase the impressive strength of decision-making and change the dynamics of customer relationship management, marketing, and communications. It also recommends being part in a peer network or online community for sharing ideas that were often formed in office settings.
Independent contractors, who make up 34% of the US workforce, often feel invisible working for companies as they are not fully integrated into the corporate culture and communication channels. To address this, companies could create an external portal for contractors to communicate with employees and each other to share project updates, ideas, and build relationships outside of the traditional corporate network. This would help contractors feel more valued and better connected while still maintaining the legal separation from employees. It would also benefit companies by providing better access to contractors' skills, innovations, and contributions to help drive business success.
An honest look at how digital and social media can be used to create tangible value for companies, customers and consumers.
Authors:
Magan Arthur & Rob Mallens
With inputs from:
Sumathi Venkitaraman,
Head, Marketing at CustomerXPs Software
www.customerxps.com
Social businesses are arguably the next generation of business; a new model of operating, and interacting. They are businesses where success is based on the participation of all, rather than the outputs of a few. Strategists Maggie...
This document discusses how social enterprise and internal collaboration can drive innovation. It argues that companies should embrace social media internally to improve communication, boost productivity and align departments. Implementing an internal social platform can enhance culture, leverage resources and allow ideas to flow more freely across an organization. While choosing the right technology can be difficult, the most important thing is understanding employee needs and focusing on people, not just tools.
Introducing Social Employee Engagement: Shifting From Technology To PeopleMSL
Social employee engagement puts people at the centre by focusing on what inspires and
engages them to do their best work. This report offers a complete introduction to social business and sets out a roadmap for success.
Microsoft Enterprise Social technologies provide benefits for IT professionals by enabling companies to work like a network. It allows employees to (1) listen to what matters inside and outside the business through improved collaboration across locations and departments, (2) quickly adapt to changing priorities and opportunities by enabling faster knowledge sharing and decision making, and (3) grow their impact on the business through increased innovation, faster times to market, and improved customer experiences.
How Human Resources can help craft social businessGautam Ghosh
This document discusses how social media and technology can be leveraged internally by HR departments and organizations to improve employee engagement, collaboration, learning and knowledge sharing. Some of the key points made include:
1) Social tools on their own will not increase employee engagement, which is impacted more by factors like job fit, manager relationship, and organizational culture.
2) For social tools to be adopted, organizations need executive buy-in, leaders who model sharing behaviors, rewards for participation, clear goals around how tools link to work, and addressing existing disengagement issues.
3) HR can use social approaches to co-create policies, enhance recruitment, learning, communication, recognition, and knowledge sharing across the organization.
This document discusses how social enterprise and internal collaboration can drive innovation in companies. It argues that social media is increasingly important both externally for customer engagement and internally to improve communication, productivity and the free flow of ideas across departments. Implementing social platforms internally can break down silos and align different parts of a company. While there are many technology options, the most important thing is understanding employee needs and focusing first on people, then processes, before choosing technology. Starting social collaboration can provide benefits like increased business agility.
CEOs now expect more from their communications functions in the digital age:
1) CCOs must provide granular, data-driven measurements of corporate reputation across many stakeholder groups and brand attributes.
2) Communications strategies must be prepared for rapid response since issues can emerge quickly via social media.
3) The function has an offensive role in proactively building relationships, not just defense against crises.
4) Active listening to social media and stakeholder opinions informs corporate decision-making.
Chapter 2 is all about defining social business strategy. Essentially, I condense the entire content of my first book, Smart Business, Social Business, into one chapter and introduce new thinking, implementation strategies and new models.
This chapter discusses how social entrepreneurs can work across organizational boundaries to enhance their ventures. Partnering with other organizations allows social ventures to provide more social value. Partnerships and networks allow organizations to collaborate in addressing complex social problems. New legal forms like benefit corporations and low-profit limited liability companies (L3Cs) have emerged to facilitate hybrid organizations that blend social missions and business activities. Working across sectors and through various models of collaboration can help social enterprises solve problems more effectively.
Mobile phones have come a long way since their introduction over 30 years ago. Phones are smaller, weigh less, and do more, carrying data as well as voice. Phones not only make telephone calls, they send e-mail and text messages, take and send photographs, play games, and access and browse the Internet. And mobile phones are everywhere. By the end of 2009, mobile cellular subscriptions worldwide numbered approximately 4.6 billion.1 Neither age, nationality, nor economic status represents a barrier to owning and using a mobile phone. The first phones may have been novelties, but mobile phones now are a necessity, especially for the under-35 demographic.
This document from Whospoppin Enterprises discusses relationships between doctors, patients, and pharmacies. It likely outlines how these groups interact and exchange medical information to provide healthcare services and prescribe/fill medications. The date, 1/2/2014, indicates when this policy or procedures document was created or last updated.
Smart machines IBM’s watson and the era of cognitive computingWirehead Technology
We are at the dawn of a major shift in the evolution of technology. The next two decades will transform the way people live and work just as the computing revolution has transformed the human landscape over the past half century. The host of opportunities and challenges that come with this new era will require a new generation of technologies and a rewriting of the rules of computing.
Healthcare is in crisis. While this is not news for many
countries, we believe what is now different is that the
current paths of many healthcare systems around the
world will become unsustainable by 2015.
This may seem a contrarian conclusion, given the efforts
of competent and dedicated healthcare professionals
and the promise of genomics, regenerative medicine, and
information-based medicine. Yet, it is also true that costs
are rising rapidly; quality is poor or inconsistent; and
access or choice in many countries is inadequate.
Introduction
The increasing use of smartphones and tablet computers as business tools has brought organizations and their employees new levels of productivity, flexibility and mobility. But their use is a double-edged sword, bringing with it new levels of complexity to IT management and security.
The shift to mobile is dramatically changing the way people work and companies do business. IT departments are being challenged to effectively manage resources and infrastructure to support the mobile enterprise. The stakes are high, and enterprise mobility solutions are complex. To succeed, you need more than a piecemeal solution. You need a partner who can deliver a true end-to-end mobility service.
This white paper discusses how HP solutions can help healthcare providers implement bring your own device (BYOD) initiatives securely. BYOD allows doctors, nurses and patients to access healthcare resources using their personal mobile devices like tablets and smartphones. However, it also presents security and network management challenges. HP solutions like Intelligent Management Center (IMC) provide simple network access control to authenticate devices and users. IMC uses device fingerprinting to identify devices and enforce security policies, allowing BYOD while maintaining compliance with regulations and protecting sensitive patient information. The paper explains how HP solutions address BYOD challenges around security, network usage and management of both organization-owned and personal devices on the healthcare network.
The Illinois Health Information Exchange (ILHIE) has just released its Consumer Education Health IT Toolkit. It was developed to provide healthcare professionals with simple and informative educational material to share with their patients. Consumer education and engagement are cornerstones for the implementation of a successful state health IT program.
The Illinois Health Information Exchange (ILHIE) has just released its Consumer Education Health IT Toolkit. It was developed to provide healthcare professionals with simple and informative educational material to share with their patients. Consumer education and engagement are cornerstones for the implementation of a successful state health IT program.
The document summarizes how new Illinois healthcare laws will affect small businesses. It discusses small business tax credits available for employers who provide health insurance. Nearly 60% of small businesses that don't offer coverage cite cost as the main barrier. The laws also require insurers to spend at least 80% of premiums on medical claims and quality improvement. The document encourages small business owners to educate themselves and employees on the new laws and support legislation for healthcare cost transparency.
This guide to designed to help private doctors and small clinics understand the HIPPA regulation and get them ready for an audit. The guide contains several checklists that will guide them step by step to make sure everything is done to create and secure and EMR network
This document discusses how organizations can capitalize on collective intelligence by tapping into the knowledge and expertise of individuals both inside and outside the organization. It provides 3 approaches that organizations can use to apply collective intelligence: 1) Discovering and sharing new ideas through contests/challenges, collaborative design markets, virtual ideation, and communities of practice. 2) Augmenting skills and distributing workload through parallel task processing and distributed question/answer forums. 3) Improving forecasting effectiveness by collecting diverse opinions through prediction markets. The document also provides examples of companies that have successfully used these approaches.
This document provides updates and tips for social media marketing. It discusses setting up a content marketing program with regular blog posts. It promotes embedding videos in blogs and using Twitter to share interesting facts from reports. Mobile apps and curating factoids are also presented as ways to engage customers. An alumni company, Wirehead Technology, is featured for its curated mobility blog.
The Hayt School implemented a wireless network across their campus to enhance learning opportunities. Wirehead Technology installed 49 wireless access points throughout the school, allowing students to access the internet and classroom files from laptops anywhere on campus. This has enabled hands-on project-based learning in new locations like the cafeteria and auditorium. Teachers and students are already benefiting from increased mobility and flexibility in their lessons. The school plans to expand their keyboarding program and explore other technologies that can enhance the curriculum using the wireless network.
Wirehead Technology provides comprehensive healthcare IT managed services including:
1) Helping healthcare practices create HIPAA/HITECH compliant IT networks through managed services to manage patient and practice information while improving care.
2) Offering a range of IT solutions like EMR/PM software, security systems, telecommunications, computer hardware, and mobile health applications.
3) Having experience implementing solutions for practices ranging from sole providers to hundreds of providers through customizable, model-driven systems.
The document profiles four health information exchange (HIE) efforts that are succeeding in getting doctors to share patient data. It discusses how HIEs enable doctors to access test results, diagnoses, and other patient information across organizations. It then summarizes four specific HIE initiatives: the Louisiana Rural Health Information Exchange which serves a rural, underserved region; state-level exchanges being developed in several states using federal funding; HealthBridge serving the Cincinnati area; and the Chesapeake Regional Information System for Our Patients on Maryland's Eastern Shore. The document concludes by noting the growth in HIEs and expectations that new federal incentives and requirements will further drive their adoption.
This document summarizes an EMR system called MDsuite.EMR. It provides incentives for eligible professionals to adopt certified EHR technology through government stimulus programs. MDsuite.EMR offers a fully integrated EMR and practice management system. It has customizable templates, order management, e-prescribing, and connects to external data sources. Pricing is based on the number of providers and users, with options for licensed or hosted models.
1. IBM Software
IBM executive brief:
social business behavior
The changing nature of culture, etiquette and
personal interaction in the workplace
2. 2 IBM executive brief: social business behavior
The changing business landscape
Much has been made of the need for new rules of behavior
in the age of social business. The discussion has focused greatly
on how corporate spokespersons and the general employee
population behave when communicating and interacting with
clients, prospects, colleagues and other audiences through online
social environments.
There has been much less discussion about business
communication and professional interactions inside the firewall.
Social collaboration affects the way workers interact with not
only external stakeholders, but also one another. Just consider
the environmental changes seen in the past four years alone:
●● The increasingly porous nature of the corporate firewall
●● Geographically distributed teams
●● Increased insourcing, outsourcing and cosourcing and more
contractual team members
●● The growing impact of informal networks in team decision
making
●● Employees’ behavior in circumventing standard policies and
tools to “get the job done”—especially as the consumerization
of IT creates new expectations for corporate IT services
Extensive communications over online social networks often
means that entire business conversations—and even deals—may
be carried out online. But human behavior is a rich interplay
of visual cues, body language, facial expressions, voice tone
and other “meta-senses” that are not yet fully realized in online
conversations. The risk is that, without understanding the new
rules of etiquette for social business, we may now misunder-
stand, stall or break down vital business communications.
With these conditions in mind, we need to ask ourselves a
fundamental question: What are the norms for employee com-
munication in a social business? In this IBM executive brief, we
frame our response to this question as social business etiquette.
The role of social business etiquette in social business
transformation
Internal social transformation is often the first step toward a
broader transformation. The IBM 2011 Tech Trends Report,
which surveyed more than 4,000 IT professionals in 93 coun-
tries, shows the importance of social collaboration to overall
strategies: As summarized by InformationWeek:
“Many of the survey respondents noted that their companies are
implementing social from the inside out—that is, they are testing the
waters by deploying intranet-based social systems. The top three drivers
for such deployments are employee collaboration, efficiency in locating
people and resources, and idea generation, according to the
report.”—InformationWeek1
Without a firm grasp of the technology itself or the human
behavior related to the use of the technology, any project or
strategy looking to harness the power of social collaboration
will not be nearly as successful. By testing the waters internally,
companies can understand how technology affects existing
employees’ behavioral patterns. They can then use that cultural
knowledge to encourage and enable successful adoption.
This IBM executive brief is for enterprise leaders who seek to
understand the critical role that social business etiquette plays
in workforce transformation and in adoption of social business
programs. It explores professional interactions among colleagues
over online social networks inside the firewall, with particular
emphasis on colleagues who do not have an established profes-
sional relationship.
3. IBM Software 3
This executive brief avoids discussions that cover other
enterprise collaboration modalities:
●● Employee communication and collaboration with external
stakeholders. As already mentioned, this is covered by a
large and growing body of work. IBM has contributed to
that discussion with reports such as the 2011 IBM Institute for
Business Value’s Global Chief Marketing Officer Study.2
●● The basics of being a “good businessperson.” These basics are
already extensively covered by management tomes, the
Harvard Business Review, human resource communities such as
the Institute for Corporate Productivity and many more.
●● Organizations with rigidly hierarchical structures. In addition
to the challenges described in this executive brief, these
organizations may face additional change management,
regulatory and other organizational behavior requirements
before fully incorporating social business strategies in their
business model. This executive brief can, however, certainly
benefit organizations that allow, or are experimenting with,
informal and formal online networks of collaboration.
Why etiquette plays a role in internal social business
adoption
Most organizations have professional norms: the written
and unwritten rules and behaviors that govern working with
colleagues across formal organizational structures. The nature
of social collaboration, however, elevates the importance of the
informal networks within the organization, whereas the newness
of interacting in this manner creates a fog of uncertainty on how
to behave. It is important to understand the organization’s cul-
ture, the rules of etiquette that fit and how these factors enable
employee engagement in such social networks.
As always, a good set of definitions will help frame the problem:
Culture: the beliefs, behaviors, objects and other characteristics common
to the members of a particular group or society4
“Culture eats strategy for lunch.”
—Coffman Organization, 20093
4. 4 IBM executive brief: social business behavior
Etiquette: conventional requirements as to social behavior; customary
conduct as established in any class or community or for any occasion5
In other words, etiquette can be thought of as best practices
(good or acceptable) or best behaviors to avoid (improper or
unacceptable) for specific interactions. Organizational cultures
can then encourage specific rules of etiquette to facilitate
harmony and productivity across the environment.
This customization is important. There is no one single “right
way” to behave, because appropriate behavior is culturally and
organizationally determined, depending on several factors:
●● “Up-down” etiquette: interacting with a direct report or an
up-line manager
●● “Sideways” etiquette: interacting with a peer coworker in your
immediate group, a coworker on your extended team or a
coworker in a different division
●● Asymmetric social knowledge: interacting with a coworker
who is more familiar with your work than you are with his or
hers (or vice versa)
●● Media being used: email, instant messaging (IM), telephone
call, social networks or a combination thereof
●● Number of participants: one to one (face to face, telephone
and instant message), one to many (weekly team meetings,
videoconferences and microblog posts) or many to many
(town halls, community discussions and ideation blogs)
●● Influence of geographic cultural norms: participants are
culturally homogeneous or participants are from multiple
cultures
●● Level of experience of participants: younger workers interact-
ing with older workers—or newer workers interacting with
more-experienced workers
Because of the subjective nature of etiquette, many business
leaders are understandably uncomfortable with the subject. It is
easier to focus on more quantifiable business outcomes and key
performance indicators. But etiquette is important, increasingly
so, as social business strategies become a key source of competi-
tive differentiation:
●● Etiquette is a normalizing practice that helps align your
people to the principles that your organization values, which
in turn shape your business strategies.
●● Etiquette informs employees how to operate in common
situations, and culture guides them in uncommon ones.
●● Etiquette and cultural values can be a strong competitive
differentiator, especially when well communicated to custom-
ers, colleagues and communities. Consider the employees
and fans of Harley-Davidson motorcycles: They have their
own unique rules of etiquette. The well-defined culture of
Harley-Davidson appeals to its constituents and has enabled
the company to succeed over the long term.
●● Trust is critical for successful business relationships, and it’s a
key differentiator for social businesses, because, ultimately, we
are likely to do more business with those we trust. The small
interactions we have every day are as important as the
outcomes of major transactions when developing trusted
relationships. Etiquette helps new employees understand what
is and is not considered trustworthy behavior, and therefore it
helps them map out the boundaries. It also helps experienced
employees share wisdom about successful as opposed to
unsuccessful interpersonal behavior.
5. 5
IBM Software
There is a growing body of discussion on the nature of trust in
online social networks. This includes business versus personal
and the effect of anonymity (or personas) versus true identifica-
tion. Just one recent example: Bertrand Duperrin, a prominent
French blogger on Enterprise 2.0, recently wrote a blog post on the
unforeseen consequences of how these basic structures affect
behavior (“sincerity is impacted by transparency”) and business
outcomes.6 Although this is beyond the scope of our executive
brief, it helps to illuminate the complexity of the issue.
The changing rules of etiquette in an
online social world
Social business etiquette is not built in a vacuum. As with other
cultural artifacts, social business etiquette builds on the rules
that have already been established in other contexts: telephone
interactions, email exchanges, elevator chats, formal face-to-face
meetings and so on. For example, the emoticon (“smiley face”)
was developed to impart facial emotional content, such as
amusement or boredom, within an email conversation.
Emoticons later carried forward into instant messaging and are
now a fixture in newer online social communications like blogs,
microblogs and more.
“Culture isn’t just one aspect of the game ...
it IS the game.”
—Lou Gerstner7
Social business etiquette therefore builds on norms honed
over years of experience in the shared tools of interaction, and
it evolves as the tools evolve. Another example: It is generally
considered improper to use all capital letters in a text-based
message, including email, microblogs and blog comments,
because it suggests that one is yelling at another person. When
the Internet first started, however, “all caps” was not as unusual
because there were still devices that did not have lower-case
letters on keyboards. This is similar to telegraph messages of a
century ago, where that limitation implied no negative sentiment
toward “all caps.” However, because it is almost unheard of now
to have devices without lowercase letters, “all caps” is now
considered improper.
The specific application of etiquette to the particular media in
use is also important. As Marshall McLuhan said, “The medium
is the message.”8 What is considered acceptable in one medium
may not be in another. For example, some social network tools
such as Twitter do not require the permission of people to build
connections, while others such as LinkedIn do. The etiquette on
Twitter therefore forgoes the need to give a reason for people to
connect, while LinkedIn connections are most successful when
users provide a good reason why they wish to connect with
someone.
What follows are some of the more common scenarios that
should be considered in any social business transformation.
6. 6 IBM executive brief: social business behavior
Etiquette in building relationships
Assuming your organization is open to employees viewing
organization charts using internal social network profiles and
other resources (see sidebar), anyone can quickly understand an
individual’s place within the formal relationship: job titles,
reporting chain, etc. In addition, most enterprise profile systems
also provide data about employees’ social graphs: their informal
relationships, including shared communities, current projects,
publications and informal networks. Understanding the formal
and informal relationships between individuals can be used to
find expertise and get information from others; for example,
to find a product development expert or to request data for a
specific project.
The availability of formal reporting structures
Like most organizations, IBM has a clearly defined hierarchy
of reporting relationships. However, IBM also provides
universal and easy access to this information in an online
company directory. Employees are actively encouraged to
search through the profile database. Many organizations
today have not yet made this change: some because of
inertia, others because it is culturally inappropriate to publicly
share organizational structures outside of one’s immediate
reporting chain, still others because there is a business need
such as secrecy or legal compartmentalization among
organizational units.
Building networks is therefore not necessarily as straightforward
as it may seem. For example, when inviting someone you don’t
already know to join your network, it is often appropriate to
include a short message explaining your reason for the invitation
and why you think the connection will be mutually beneficial.
In other instances, it may be more appropriate to “follow” a
person rather than invite them to join your network. This is
often the case when individuals want to keep up with managers
or executives outside of the normal reporting structure. Network
connections imply a level of connectedness and an established,
or prior, working relationship.
The effect on etiquette is significant. In such open information
systems, it is perfectly acceptable to research and bring up in
open discussion our colleagues’ documented relationships. It is
not considered inappropriate (i.e., “stalking”). On the contrary, it
is considered to be less than thoughtful when entering a new
conversation without first having done some prior research into
your colleagues’ formal and informal networks. In the case of
organizations that need to maintain more control over such
information, the opposite norms of behavior may apply. For
example, in highly regulated financial services, collaboration
between stock trading and investment banking divisions are
often sharply proscribed. Etiquette reinforces that necessity by
ascribing concern or confusion to individuals approached outside
the tightly controlled norm.
7. 7
IBM Software
Etiquette in interactions: tooling and communication types
In addition to the tools and data that identify relationships,
IBM has a culture of interaction that enables social business.
Email, conference calls, instant messaging, discussion forums,
web meetings, blogging, microblogging and more are acceptable
ways to meet, explain, invent, argue and listen. The ease with
which people interact and the meaningful ways people can
participate enable the work we need to do together.
In fact, low or even no interaction, when not explicitly
requesting a response or direct engagement, is also acceptable.
According to Forrester Research’s Social Technographics profile,
a significant portion of the population are not, nor will be, vocal
contributors.9 When called “lurking,” the term unnecessarily
denigrates an important and valid type of interaction where
responses are not required: researching a new topic or expert in
the field of interest, broadcast cascades from senior executives
(announcements, policy), informal peer-to-peer information
sharing (tips, Q&As) and more.
Etiquette in responding to others
In social spaces, responsiveness is visible. The IBM culture of
professionalism means that IBM employees expect responses
in a reasonable time, and social pressure can prompt action.
IBM has capabilities in our internal social network tools that aid
in understanding how to respond to others. The “Do Not
Disturb” status on instant messaging, for example, may make
clear a current inability to respond. The tool can also provide
exception building. For example: One can set a preference that
immediate managers can override a Do Not Disturb status. In
the case of IBM, because of the highly geographically dispersed
workforce and the use of customizable status messages, “Out of
Office” notifications on email, or “away” status on instant mes-
saging, are not just acceptable, but are socially recommended
when employees are away for a significant amount of time
(e.g., for email, more than a day; for IM, more than an hour).
Setting “Preferred Contact” information in the employee online
profile, which can then be surfaced in a digital business card,
tells colleagues the best way to connect with one another, and
sets an expectation that if one tries to connect in that manner, a
response will be provided. The functions in the tools give clues
to the rules for starting interactions with one another, and for
knowing when to stop. The response etiquette applies to nega-
tive situations as well, such as providing the ability to indicate
inappropriate content.
Lurking behavior can be perceived as inappropriate when it
seems to be a means to ignore a direct request. For example,
someone posting a question to an IBM employee’s Profile Board
(similar to the Facebook wall) has a reasonable expectation that
his or her question will eventually be answered as if it had been
posed in an email or a voicemail, if not with the same sense of
urgency.
8. 8 IBM executive brief: social business behavior
Etiquette in including and acknowledging others
One of the more important aspects of social business etiquette is
the ability to include and acknowledge others, especially when
face-to-face inclusion and acknowledgement are impossible. As
is often taught in school, never underestimate the value of a
thank you. Social tools can provide undeniable benefit by mak-
ing it easy to make those thank you notes public by including
others in your work: share links to your successes and lessons
learned, reshare the interesting work of others, acknowledge a
colleague’s contributions and trace contributions in the network.
The tools themselves can assist in setting up the right etiquette
for the response. If it is unclear whether a file can be shared
with others, the poster can easily set limits on who can see the
file (“only share with John, Jeanne and Jacques”) and what level
of participation each is provided: “read only” versus “editor.”
If a recipient thinks that additional access or privileges are
required, a request back to the document owner is acceptable
(as is a “no” reply).
Another example: In a microblog exchange, acknowledging
comments shows attention is being paid. It is good practice to
address comments to a specific individual using his or her name,
or the “@username” style that is popular on networks such as
Twitter. While this approach is sometimes used, referring to
individual comments by comment number is often considered
less personal and does not engender the same level of trust.
Human resources professionals are always wrestling with recog-
nition and reward strategies in their organization. A year-end
bonus or a private year-end review result is not worth as much
when the norm is no longer “employee for life”. Professional
value is increasingly measured by the public acknowledgment
of one’s accomplishments to extended networks, inside as well as
outside the organization. IBM, for example, is experimenting
with BlueThx, a virtual “thank you” and reward system where
peers can publicly acknowledge colleagues’ positive contribu-
tions. Those acknowledgments are in turn communicated to
managers, posted to the recipient’s online profile board and
tagged to enhance expertise searches.
At IBM, etiquette dictates that negative criticisms and outcome-
based criticisms are generally kept inside private email strings.
Sharing these thoughts via public forums, status updates, profile
boards or public comments to a blog, is considered
inappropriate.
Defining etiquette helps us to understand our responsibilities for
adhering to the code of behavior. In particular, it is the responsi-
bility of every employee to understand differences in perspective
and context when crafting responses and sharing others’ work.
Etiquette of mass communications over social networks
versus spamming
As more people move to social networks within an organization,
new audiences emerge. Often, online communities may have
membership lists that others can see. However, this does not
necessarily impart permission to broadcast messages to all
members of a particular group. Social business tools allow
better ways to drive attention to a topic, event or other subject
such as through a blog or wiki. One recent example within
IBM: when Virginia (Ginni) Rometty assumed the role as CEO of
IBM on January 1, 2012, her first major communiqué was via a short
video outlining her priorities as leader, which she posted to the
IBM internal social network.10
9. 9
IBM Software
Social business etiquette also takes advantage of rapid iteration
to accommodate changing definitions of success (what works and
what doesn’t). For example: Where previously it may have been
considered bragging to overcommunicate one’s successes, online
social networks actually respond better when subject matter
experts (humbly) communicate their successes to the broader
community. Over time, as subject matter experts develop suffi-
cient social trust, senior leaders may actually send organizational
messages through such thought leaders instead of themselves or
other more formal communiqués; they know that a thought
leader’s message will likely draw more attention than one sent
through more formal—and unsolicited—channels. Most recipi-
ents may equate unsolicited messages, even those coming from
the senior leadership team, as spam and ignore them, whereas
they may be much more interested in hearing what a trusted
subject matter expert has to say about the same topic.
Understanding differences in perspective
People violate codes of behaviors all the time, of course, and
need help understanding expectations. Melissa Sader, one
of the contributors to this executive brief, writes a monthly
column about corporate etiquette to encourage employees to
be mindful of how they communicate and interact with others.
Her column is “about IBMers practicing our values with special
regard to effective business communication and building strong
professional relationships in a global enterprise.” Her focus
is similar to that of The Emily Post Institute Etipedia, the online
etiquette encyclopedia where the great grandchildren of Emily
Post are using the framework of Wikipedia to update her classic
rulebook with social networking etiquette.11
The IBM Social Computing Guidelines advise all IBM employees
to be respectful and factual.12 The expectations are described
clearly. Problems occur because social interaction crosses
borders, flattens hierarchies, involves multiple generations and
practically moves at the speed of light. Many breaches of eti-
quette are not deliberate, but often are failures to understand
perspectives, cultural norms and expectations: “I didn’t know—
I haven’t had a chance to read the guidelines yet.”
Other transgressions occur because the interactions are happen-
ing so fast that people do not have access to all the facts. In some
cases, the original interaction is acceptable, but the feedback is
subsequently handled inappropriately. With a corporate culture
that has publicly valued diversity, IBM employees have the clear
responsibility to understand the differences in perspective that
other contributors bring, and the blind spots that we may have
ourselves.13
Recognizing context
Understanding differing perspectives is only part of the
responsibility. Professional social collaboration also engenders a
responsibility to understand context: of the content, the people
and the exposure. Content always has a context: draft versus
final version, vacation photo versus team dinner photo, informal
remarks versus official press release. Just consider the pitfalls in
the use—and misunderstanding of—humor used in a business
context. People also have a context relative to you, depending
on such factors as their history, their relationship to you, their
position in the organization and more. And finally, there is
the context of exposure: a “for your eyes only” versus wider-but-
still-controlled-distribution communications versus public
communications.
10. 10 IBM executive brief: social business behavior
For example, those who have been exposed to more traditional
brainstorming workshops know that spirited discussions are
encouraged to drive innovative idea generation. But because the
discussions remained behind closed doors, the etiquette of the
caucus applied: Any disagreements are kept behind closed doors;
when in public, everyone is on the same page. But newer tools
allow for much more distributed brainstorming, such as ideation
blogs or IBM InnovationJam® sessions. This more public
context requires a different etiquette, such as discussion forum
comments that are kept more factual and less emotional than a
closed-door discussion.
Context is a very strong governor of etiquette. The transforma-
tion to social business creates an added responsibility in workers
and leaders to understand that online social environments bring
a transparency to context that doesn’t exist in other realms of
interaction.
Risk and governance
Open communication in social spaces makes managers worry
that they have less control over employee behavior. IBM and
other companies have addressed risk by relying on existing codes
of behavior (such as the IBM Business Conduct Guidelines)
and forming new policies where needed (see the index of social
media governance guidelines from 176 companies compiled by
Chris Boudreaux).14 Many companies form new governance
models in their organizations, with representation from business
units, legal and HR, to assess risk, educate employees and report
progress on the impact of social business.
IBM BlueIQ
The IBM BlueIQ program educates employees on social tasks
and behaviors, and it taps into thousands of volunteer BlueIQ
ambassadors across the company to help teach and model
usage scenarios. At the management level, IBM established
its Social Business Management Council to help ensure
alignment with corporate strategy and handle policy issues.
But etiquette breaches can still occur, even with new policies and
programs in place—just like they did before the transformation
to a social business takes place. The most effective means of
etiquette control rely less on rules and sanctions, and more on
norms, values and the influence of peers. In a social business, the
desired end state is one where employees help each other govern
and enforce social business etiquette according to the policies
and values of the company.
The game changers that make governing etiquette in a social
business different are issues of access and identity, expectations
for participation, and the impact that a breach can have across
the organization. For example, social spaces enable access to
information as well as many channels for distributing informa-
tion, which can mean faster communication—or inappropriate
dissemination. Employees can manage identity in social spaces
so they create digital eminence and avoid a digital disaster. The
vast spectrum of participation in a social network (from content
creators to commenters and observers) means that employees
can influence others by their presence—or their absence.
11. 11
IBM Software
Clear policies, training and feedback mechanisms help employ-
ees understand how best to interact, and how best to help each
other. Social businesses must establish clear policy tied to roles:
who is authorized to speak for the company and how employees
can convey when they are not. Policy must also be tied to
ownership: who has decision-making ability and which organiza-
tions take responsibility for what issues. Training programs
should stress the behaviors and tasks, and not just the tools.
And feedback mechanisms are essential for formal and informal
community dialogue about questions, concerns, ideas and
compliments.
The viral, social aspects of a social business are an advantage in
communicating desired etiquette. Practices are observed by all,
both good and bad. And both can be addressed quickly in an
appropriate way. The informal networks that form so quickly
and easily in social spaces can be used for reinforcement, train-
ing and feedback. Skilled people who have respect in their own
networks can spread desired practices faster, achieving the influ-
ence of good etiquette that a social business needs to reach its
maximum potential.
Next steps
Social business etiquette is not about a “feel good” approach to
business. It is rooted in the deepest levels of how businesses cre-
ate and engender trust, which is increasingly the most critical
capital an organization has. It is ultimately about driving profes-
sional and organizational success through reduced friction and
increased transparency.
As organizations embark upon a social business transformation,
they should consider these next three steps critical in helping
ensure that the transformation is not about tools but about what
will drive strategic success for the business.
1. Consider your own organization’s culture and behavioral norms
when rolling out social business tools. A social business strategy
that does not take into account the current culture will likely
stall or even fail in the face of rejection by the social body.
Specific, existing, written and, just as important, unwritten
rules of conduct must be considered when deploying social
collaboration technologies in the enterprise.
2. Walk before you run. Because social business etiquette is tied so
closely to the complexities of your organizational culture, it is
important for both individuals and groups to experiment and
rapidly iterate. Individuals should be encouraged and empow-
ered to try public social media to collaborate on non-confi-
dential projects and tasks. Although not behind the firewall,
public social collaboration can give employees and groups an
excellent feel for how these tools will work internally.
Designate moderators and coaches to keep an eye on progress
and capture lessons learned before rolling out similar tools
internally.