DZone
Thanks for visiting DZone today,
Edit Profile
  • Manage Email Subscriptions
  • How to Post to DZone
  • Article Submission Guidelines
Sign Out View Profile
  • Post an Article
  • Manage My Drafts
Over 2 million developers have joined DZone.
Log In / Join
Refcards Trend Reports Events Over 2 million developers have joined DZone. Join Today! Thanks for visiting DZone today,
Edit Profile Manage Email Subscriptions Moderation Admin Console How to Post to DZone Article Submission Guidelines
View Profile
Sign Out
Refcards
Trend Reports
Events
Zones
Culture and Methodologies Agile Career Development Methodologies Team Management
Data Engineering AI/ML Big Data Data Databases IoT
Software Design and Architecture Cloud Architecture Containers Integration Microservices Performance Security
Coding Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
Culture and Methodologies
Agile Career Development Methodologies Team Management
Data Engineering
AI/ML Big Data Data Databases IoT
Software Design and Architecture
Cloud Architecture Containers Integration Microservices Performance Security
Coding
Frameworks Java JavaScript Languages Tools
Testing, Deployment, and Maintenance
Deployment DevOps and CI/CD Maintenance Monitoring and Observability Testing, Tools, and Frameworks
  1. DZone
  2. Culture and Methodologies
  3. Career Development
  4. IBM reveals the secrets of social business success

IBM reveals the secrets of social business success

Adi Gaskell user avatar by
Adi Gaskell
·
Jan. 18, 13 · Interview
Like (0)
Save
Tweet
Share
3.46K Views

Join the DZone community and get the full member experience.

Join For Free

Social business, and indeed social media as a whole, often struggles to achieve the results it should do.  Research earlier this year found that just 13% of IT professionals thought their internal social networks were a success.  The general failure of social business to deliver results led one group to issue a $10,000 bounty for anyone that could prove positive ROI from their social business endeavours.

So a new report released this month by IBM should be required reading for anyone with a desire to create a social business.  The report, called The Business of Social Business: What works and how it’s done, looked at social business projects across 1,000 companies from a wide array of industries.  They wanted to find out how companies are using social business and what was working for them.

Three main areas jumped out as being particularly successful:

  • Creating valued customer experiences
  • Driving workforce productivity and effectiveness
  • Accelerating innovation

Suffice to say that each of these are relatively obvious areas to utilise social business and are thus good places to begin the process of becoming social.  Of greater interest however is the importance IBM placed on the cultural aspect of social business.  Success rests on your ability to weave social into the fabric of how you do business.

In order for this to happen they recommend that the following three issues are addressed:

  1. You need to figure out how to incorporate social metrics into traditional processes
  2. You need to be clear on the risks involved and how to manage them
  3. This is a change management thing, and whilst it will require a unique application of change management, it will nonetheless require tried and tested techniques to influence corporate culture and performance.

I wrote almost a year ago to the day about how successful social adoption is a cultural thing more than it is a technical thing, and this report underlines that completely.  The twin issues of ROI and risk however have received more recent coverage.

Social business ROI

Last month Deloitte released a report on the importance of connecting social business with the over-arching aims of the organisation.  They suggested that whilst most organisations have ‘best practice’ guidelines in place, most of the time we end up working around those guidelines in order to cope with exceptional circumstances.  By making these so called hidden practices visible, social business can then drive real business value.

Managing the risks of social media

The issue of risk was one that was covered nicely by Charlene Li and her Altimeter Group earlier this summer.  They broke down risk management into four main areas:

  1. Identify the risk- First things first you have to identify the risks you face.  These could be a risk to your brand, a leaking of confidential information, legal violations or identity theft.  Altimeter found that the most common threat was to a companies brand, but if you investigate potential sources of risk you may come up with something more specific to your own situation.
  2. Assess the risk - Next you have to assess how likely that risk is to do you damage.  It’s basically a bit of probability analysis.  Couple up the likelihood of a risk happening with the damage it would do if it did occur to give you a decent understanding of the risks you face and the damage they can do.
  3. Manage and mitigate the risk – The next step is to deal with the risk.  You might be able to eliminate it completely (unlikely) or you might be able to reduce the odds of it occuring, or indeed mitigating the damage should the worst materialise.  Common strategies here include providing outstanding training on how staff should behave on social media and what you expect from them when they use it.
  4. Monitor and evaluate the risk – As with most things like this, you should never be completely satisfied, so the final step is to regularly review and regulate their existing risk strategies to take account of both the success of the current strategy and the changing landscape within which they operate.

Having greater insight into these key areas is always useful though.  You can download the IBM report below.

The Business of Social Business: What works and how it’s done

Reprinted with permission 
IT Media (communication) guidelines application Productivity career Clear (Unix) LEd Monitor (synchronization)

Opinions expressed by DZone contributors are their own.

Popular on DZone

  • The 31 Flavors of Data Lineage and Why Vanilla Doesn’t Cut It
  • Data Mesh vs. Data Fabric: A Tale of Two New Data Paradigms
  • How To Avoid “Schema Drift”
  • Silver Bullet or False Panacea? 3 Questions for Data Contracts

Comments

Partner Resources

X

ABOUT US

  • About DZone
  • Send feedback
  • Careers
  • Sitemap

ADVERTISE

  • Advertise with DZone

CONTRIBUTE ON DZONE

  • Article Submission Guidelines
  • Become a Contributor
  • Visit the Writers' Zone

LEGAL

  • Terms of Service
  • Privacy Policy

CONTACT US

  • 600 Park Offices Drive
  • Suite 300
  • Durham, NC 27709
  • support@dzone.com
  • +1 (919) 678-0300

Let's be friends: