Transparency - The Double-Edged Sword
-
date post
17-Oct-2014 -
Category
Business
-
view
8.405 -
download
1
description
Transcript of Transparency - The Double-Edged Sword
Transparency
TransparencyThe double-edged sword
Oscar Berg
Acando
Twitter: @oscarberg
●Management Consultant at Acando, Sweden
●Enterprise 2.0, Collaboration and Content
Management
●Strategy, concept development,
requiremens, architecture and change
management
●Blogging at:
thecontenteconomy.com (Personal)
aiimcommunities.org/e20/ (AIIM)
Oscar Berg
Problem: The black boxes
Increasing transparency
decreases risk and
enables value-creation
Oops, too late!Everything’s under control
Transparency enables better
decision-making
Transparency workspace
awareness
Transparency enables
workspace awareness
Case: workspace awareness
My Team
?
?
?
?
What’s up?
From information silos…
Blog
BlogBlog
BlogBlog
…to need to share
Case: information sharing
Who’s
expert at
Excel?
From expert search…
I can drop by and
show you some tricks
Check out the blog
excelcharts.com
Look at the
Microsoft web site
How do I
make great
diagrams in
Excel?
…to asking questions
There legal issues
are the same now as
when email was
introduced
Emails easily get wings
The biggest risk is not in
the technology itself;
it is in how we use it.
Failing usability makes
us go for workarounds.
Common workarounds
Share with sticks
Email everything Label everything as
Copy to ensure access
Lesson: A real
challenge is finding
a balance between
security and privacy.
Do not
disturb
Lesson: Transparency
must go both ways
Lesson: Governance failure
Empower employees!
Trust
Tools
Training
Control
Restrictions
Policies
Control Empowerment
A culture of
trust is more
secure than a
culture of
control.
Photo credits
●http://www.sxc.hu/browse.phtml?f=download&id=290562
●http://www.clker.com/clipart-wings.html
●http://www.sxc.hu/browse.phtml?f=download&id=1114685
●http://www.sxc.hu/browse.phtml?f=download&id=760730
●http://www.sxc.hu/browse.phtml?f=download&id=1171398
Information(spoken, printed,
electronic)
Confidentiality Integrity
Availability
Information security is
always a balancing act