Transcript Web 2.0

Montana Digital Government Summit
Web 2.0’s Impact on
Government
Mark Van Alstyne, IT Manager, Montana Office of the
Secretary of State
Rennan Rieke, Program Lead, Information Technology
Services Division, Department of Administration
Original Source: Markus Angermeier. Source: http://kosmar.de/archives/2005/11/11/the-huge-cloudlens-bubble-map-web20/ URL: http://kosmar.de/wp-content/web20map.png
Web 2.0
"Web 2.0" refers to web development and web design
that facilitates interactive information sharing,
interoperability, user-centered design[1] and
collaboration on the World Wide Web. Examples of
Web 2.0 include web-based communities, hosted
services, web applications, social-networking sites,
video-sharing sites, wikis, blogs, mashups and
folksonomies. A Web 2.0 site allows its users to
interact with other users or to change website
content, in contrast to non-interactive websites
where users are limited to the passive viewing of
information that is provided to them. (www.wikipedia.org)
Norex Social Media Poll
Gov 2.0
1. Government as a process
2. Government as a provider
3. Government as a partner
4. Government as a product
5. Government as a protector and
peacekeeper
Source: Mark Drapeau, Federal Computer Week, 9/2/2009
What is the business driver?
•
•
•
•
•
•
Dynamic information sharing or
collaboration (internal or external)
Support communities of interest
Public outreach
Interaction with younger customers
Recruitment (Human Resources)
May already be happening via informal
channels
Top 5 Pros
1. Web 2.0 technology improves
collaboration
2. It streamlines internal and external
communications
3. It costs little or nothing to use
4. It has the potential to attract to young
recruits
5. It’s highly portable
Source: http://fcw.com/Articles/2009/09/07/DOD-andWeb2.aspx?s=fcwdaily_090909&Page=1
Top 5 Cons
1. Sensitive information is on the public
Internet
2. The tools can make it difficult to
comply with existing policy
3. The technology lacks standards
4. Sharing personal information can put
employees at risk
5. The tools demand a lot of bandwidth
Source: http://fcw.com/Articles/2009/09/07/DOD-andWeb2.aspx?s=fcwdaily_090909&Page=1
Define Risk
•
Security
• Where is your information going?
• DDoS attacks on social network sites
• Known vulnerability (Twitter XSS, etc.)
• Network/infrastructure
• Poor implementation or no follow-up
• Police shut down Facebook page after
angry drivers post hate comments
(www.dailymail.co.uk)
•
Employee productivity/appropriate use
• Haven’t we been here before? (Web 1.0)
Off The Shelf Tools
•
•
•
•
•
•
•
•
•
•
Wikis
Blogs
YouTube
Twitter
RSS Feeds
Podcasts
Chat
Facebook
Video Conferencing
GovLoop
Custom Tools
• Sharepoint
• MS Online Services
– Sharepoint
– Office Communicator
– Live Meeting
• BaseCamp
• Streaming Service
Characteristics
• Tend to be externally hosted
– Minimal desktop installations
– Transparent upgrades
– Little administrative overhead
•
•
•
•
“Cloud Computing”
Self-policing
Push, not pull
Highly usable
Pros and Cons
•
•
•
•
•
•
•
•
Telephone
Pro: Can reach party directly.
Con: Can reach party directly.
Brick through window
Pro: Can make a direct, dramatic statement to a specific party.
Con: Might get caught.
Twitter
Pro: Can send a brief message to a group of contacts / followers.
Con: Numbers of contacts/followers might diminish after receiving "just got out of shower can't decide what to
wear" tweet.
Comments section
Pro: Allows immediate response to specific article.
Con: Immediacy can come at expense of rational thoughts.
YouTube
Pro: Can develop a full media package, with sound and visuals, to tell your message.
Con: Need to create a production company in order to produce 5 minute story that gets 136 hits.
Postal Service
Pro: The joy of producing a physical message that will be unique to the sender and recipient.
Con: The 17 people who still do this may be too busy to immediately write back.
Facebook
Pro: Can send mass message to group of contacts or friends.
Con: Might forget to hide the photos of last week's party that are still on your wall.
Blog
Pro: Can write thoughts and philosophies on a variety of subjects.
Con: This is monologue, not communication.
Source: John Klossner
Policies
• Barriers
– Resistance to new technology
– Tighter responsibilities for government
– State statute
– Advertising
• Enforcement is HR, not IT
Policies - Security
• Appropriate Use is the key concept
– Can be formal policy, informal communication
– EULA-style contract works well
– Golden Rule
• Know your business
– One size DOES NOT fit all
• Security policy update?
Policies, cont.
•
Appropriate/acceptable use is not:
•
•
•
Suit cites officer’s Facebook page in Bozeman
case (www.dailychronicle.com)
The Facebook Coppers: The bizarre pictures of
police officers…(www.dailymail.co.uk)
Roles/responsibilities
•
•
•
Site maintenance/monitoring
Content creation/maintenance
Moderator vs. censor
Policies – Network Usage
• “Our main goal when bringing new tools
online is simply to ‘encourage judicious
use’” – Steve Noland, Network Technology
Services Bureau Chief
• Modern networks go hand in hand with
Web 2.0
Web 2.0 Policy Links
http://www.ibm.com/blogs/zz/en/guidelines.html
http://www.t2pa.com/t2pwikis/doku.php?id=it_policies:socia
l_computing_social_networking_policy
http://www.doncio.navy.mil/PolicyView.aspx?ID=789
http://rossdawsonblog.com/weblog/archives/2009/04/telstra
_release.html
http://blog.thenetimpact.com/index.php/2009/06/08/doesyour-firm-need-a-social-media-policy-yes/
Questions?
Thanks everyone!