Cover Image
市場調查報告書

媒體市場的發展趨勢

Social Media Market Trends

出版商 Osterman Research, Inc. 商品編碼 305552
出版日期 內容資訊 英文 36 Pages
商品交期: 最快1-2個工作天內
價格
Back to Top
媒體市場的發展趨勢 Social Media Market Trends
出版日期: 2014年06月12日 內容資訊: 英文 36 Pages
簡介

所謂的社群媒體、Facebook及Twitter等社會性溝通為重點的工具及企業等級的工具等總稱、近年很多的企業急速的普及中。關於社群媒體使用在職場部分、與開始使用電子信箱一樣、覺得浪費時間的人依然居多、對於特定種類的意思疏通及內容共有、組織內專門知識的發現、客戶服務的改善等有效的手段的人也有、客戶的理解和對應效率化的資料集、或是客戶及有希望客戶等的行銷之手段、也有很大的可能性。

本報告書、以使用者為對像進行調查、企業的IT部門工作人員為對象的調查、及組織內社群媒體多樣層面為焦點的調查結果之彙整、企業使用社群媒體的各種發展情勢之解明。

第1章 實施摘要

第2章 調查方法和背景事情

第3章 對使用者調查的結果

第4章 對IT部門的調查結果

圖表一覽

  • 圖1:業務目的所使用的帳路之社群媒體工具
  • 圖2:業務相關為目的的各種工具的使用時間
  • 圖3:職場及自家的業務相關目的的各種工具使用時間
  • 圖4:業務相關的社群媒體使用到目前為止的變化和今後預測的變化
  • 圖5:僱用者的業務時間中社群媒體使用監視的有無
  • 圖6:僱用者的社群媒體隱私公開的有無
  • 圖7:社群媒體帳號的駭客和電腦病毒的受害與否
  • 圖8:就業時使用社群媒體的僱用者態度
  • 圖9:今後12個月間社群媒體到電腦病毒所感染的危險性之認識
  • 圖10:企業內網路的社群媒體使用狀況
  • 圖11:正式的社群媒體隱私的有無
  • 圖12:社會的社群媒體隱私與員工的認知度
  • 圖13:社群媒體的投資收益相關分析作業實施的有無
  • 圖14:就地部署或是雲端基礎的企業等級社群媒體平台引進的有無
  • 圖15:員工對於社群媒體網路不論以何種方式公開發表作為原因皆可能捲入組織的訴訟等狀況
  • 圖16:以社群媒體不論是怎樣的職位為理由解僱員工的事例的有無
  • 圖17:IT部門的員工就業時社群媒體使用狀況的監視狀況
  • 圖18:企業的隱私、法律的義務、規範要件為基準長期保存的社群媒體檔案種類
  • 圖19:各種社群媒體平台的管理所追求的品質
  • 圖20:2013∼14年的社群媒體相關活動的投資優先順位
  • 圖21:各種社群媒體工具所預想的電腦病毒侵入的危險性
  • 圖22:經由社群媒體的電腦病毒等所預想的保護對策
  • 圖23:各種社群媒體工具所期待的管理品質
  • 圖24:各種社群媒體相關問題的掛念
  • 圖25:透過各種社群媒體工具讓企業內網路被電腦病毒侵入的事例
  • 圖26:透過各種社群媒體工具洩漏企業內的機密資訊之事例
  • 圖27:社群媒體工具管理的方法
  • 圖28:使用者透過社群媒體的操作進行監視的方法
  • 圖29:維持社群媒體內容的方法
  • 圖30:檢討引進可能性的企業等級之社群媒體解決方案
目錄

Social media - the collection of "public"-focused tools like Facebook and Twitter and enterprise-grade tools, are growing rapidly in popularity as evidenced by their increasing use in the workplace. Our research finds a growing proportion of users' time spent using social media for a variety of purposes, both personal and corporate.

While many view social media as nothing more than a time-waster for employees, it is important to note that many viewed email in the same light when it was in the early stages of its use in the workplace. However, social media offers enormous opportunities for organizations of all sizes, including its use as a more efficient tool for certain types of internal communications and content sharing, a way to discover expertise throughout an organization, a means of dramatically improving customer service, a data set to understand and respond to customers more effectively, and a means of marketing to customers and prospects, among other uses.

The purpose of this research report is to present and analyze the results of two separate surveys that were conducted by Osterman Research, as well as additional research from another survey. One survey was conducted with end users, another with IT staff members and the third

Table of Contents

  • Chapter 1 Executive Summary
  • Chapter 2 Methodology and Background
  • Chapter 3 End User Survey Results
  • Chapter 4 IT Survey Results

List of Figures

  • Figure 1: Social Media Tools on Which Users Have Accounts That Are Used at Least Partially for Business Purposes
  • Figure 2: Minutes Spent on Various Tools for Work-Related Purposes
  • Figure 3: Minutes Spent on Various Tools for Work-Related Purposes at Work and at Home
  • Figure 4: Past and Anticipated Changes in Work-Related Social Media Usage
  • Figure 5: "Does your employer monitor your usage of social media at work?"
  • Figure 6: "Has your employer published a social media policy?"
  • Figure 7: "Have any of your social media accounts been hacked or have you been the victim of malware that you received through social media?"
  • Figure 8: Employer Attitudes Toward the Use of Social Media at Work
  • Figure 9: Concern About Receiving a Malware Infection From Social Media During the Next 12 Months
  • Figure 10: Use of Social Media on Corporate Networks
  • Figure 11: Existence of a Formal Social Media Policy
  • Figure 12: Employee Awareness of Corporate Social Media Policies
  • Figure 13: "Has your organization conducted any sort of return-on-investment analysis for social media?"
  • Figure 14: "Has your organization deployed an enterprise-grade social media platform, either on-premises or in the cloud?"
  • Figure 15: Perceived Likelihood That Organizations Will be Involved in a Legal Action Because of Something That an Employee Has Published on a Social Network
  • Figure 16: "Has your organization ever terminated an employee because of something he or she posted on social media?"
  • Figure 17: IT's Visibility Into How Employees are Using Social Media at Work
  • Figure 18: Social Media Data Types That Are Retained for the Lengths of Time Required by Corporate Policy, Legal Obligations or Regulatory Requirements
  • Figure 19: Perceived Quality of Governance and Management for Various Social Media Platforms
  • Figure 20: Investment Priorities for Social Media-Related Activities, 2013 and 2014
  • Figure 21: Perceived Malware-Infiltration Risk Posed by Various Social Media Tools
  • Figure 22: Perceived Protection Against Social Media-Borne Malware and Other Exploits
  • Figure 23: Perceived Quality of Management for Various Social Media Tools
  • Figure 24: Concern About Various Social Media-Related Issues
  • Figure 25: "Has malware ever infiltrated your corporate network through the following social media tools?"
  • Figure 26: "Has confidential or sensitive information in your company been leaked through the following social media tools?"
  • Figure 27: Methods by Which Social Media Tools are Managed
  • Figure 28: Methods for Monitoring What is Sent or Received by Users Via Social Media
  • Figure 29: Methods for Retaining Social Media Content
  • Figure 30: Enterprise-Grade Social Media Solutions That Would be Considered
Back to Top