Browse Definitions :
Definition

Enterprise 2.0

Enterprise 2.0 is the strategic integration of Web 2.0 technologies into an enterprise's Intranet, extranet and business processes. Enterprise 2.0 implementations generally use a combination of social software and collaborative technologies like blogs, RSS, Social bookmarking, social networking and wikis. Most enterprise 2.0 technologies, whether homegrown, free or purchased, emphasize employee, partner and consumer collaboration. Such technologies may be in-house or Web-based. Companies using YouTube for vlogging or a private Facebook group as a modified intranet, for instance, are implementing a form of Enterprise 2.0.

The term "Enterprise 2.0" was first coined in March of 2006 by Harvard Business School Associate Professor Andrew McAfee in an MIT Sloan Management Review article entitled "Enterprise 2.0: The Dawn of Emergent Collaboration." McAfee offered his first definition on May 20 of that year, only to revise it seven days later after comments and suggestions from the blogosphere extended its meaning. McAfee specifically excluded Wikipedia, YouTube, Flickr, MySpace and similar programs, arguing that those services were intended for individuals, not companies.

Adoption of enterprise 2.0 technologies can spur efficiency, productivity and innovation by encouraging employees and other stakeholders to share information and discuss business problems in an open, collaborative setting.
~ Contributor: Zach Church


Learn More About IT:


SearchCIO.com offers relevant news and expert advice in its Enterprise 2.0 topic pages.

Professor Andrew McAfee first wrote about Enterprise 2.0 in this MIT Sloan Management Review article, "Enterprise 2.0: The Dawn of Emergent Collaboration."

Professor McAfee's revised definition for Enterprise 2.0 is posted on his blog.

Phil Simon gives his definition of Enterprise 2.0.

This was last updated in October 2009
SearchNetworking
SearchSecurity
  • man in the browser (MitB)

    Man in the browser (MitB) is a security attack where the perpetrator installs a Trojan horse on the victim's computer that is ...

  • Patch Tuesday

    Patch Tuesday is the unofficial name of Microsoft's monthly scheduled release of security fixes for the Windows operating system ...

  • parameter tampering

    Parameter tampering is a type of web-based cyber attack in which certain parameters in a URL are changed without a user's ...

SearchCIO
  • chief procurement officer (CPO)

    The chief procurement officer, or CPO, leads an organization's procurement department and oversees the acquisitions of goods and ...

  • Lean Six Sigma

    Lean Six Sigma is a data-driven approach to improving efficiency, customer satisfaction and profits.

  • change management

    Change management is a systematic approach to dealing with the transition or transformation of an organization's goals, processes...

SearchHRSoftware
SearchCustomerExperience
  • clickstream data (clickstream analytics)

    Clickstream data and clickstream analytics are the processes involved in collecting, analyzing and reporting aggregate data about...

  • neuromarketing

    Neuromarketing is the study of how people's brains respond to advertising and other brand-related messages by scientifically ...

  • contextual marketing

    Contextual marketing is an online marketing strategy model in which people are served with targeted advertising based on their ...

Close