Professional Documents
Culture Documents
Collaboration and Social Media at Work-Architecture
Collaboration and Social Media at Work-Architecture
Social
Understanding Architecture
Computing and Identifying Mitigating Ensuring
the Economic Planning Amid
the Disruption Collaboration Social Media Information
Potential of Technology
to Conventional Opportunities Risk Usability
Collaboration Change
IT Management
101
102
103
104
Challenge: Challenge:
Velocity of technology developments prevents Variation between enterprise- and user-level needs
clear distinction between hype, innovation, and increases potential complexity of solutions.
mainstream.
Solution:
Solution: Identify extent to which technology is actively used
Identify which technologies are becoming and whether use has met business case targets.
mainstream across industries through information
on enterprise deployments.
Challenge: Challenge:
Pressures for experimental, consumerized, or rogue Value potential is linked to changing adoption and
implementations increase deployment risks. use patterns.
Solution: Solution:
Assess consensus on risks to deployments among Assess consensus on value realization from
enterprise adopters. deployments among enterprise adopters.
105
106
Industry1
4%
Transportation
10%
8% Retail/Consumer
Energy/Utilities Products Manufacturing
8%
Government
10%
12% Pharmaceuticals
Computer Hardware and Health Care
and Services/
Electronics 14%
Nonprofit/
Media/Leisure/
14% Business Services
Aerospace and
Defense/Industrial
Manufacturing/Chemicals
18%
Insurance/Banking
and Financial Services
INFORMATION TECHNOLOGY PRACTICE
www.executiveboard.com/IT
107
108
Presence Awareness
Accelerated Adoption
Mobile Applications
Support—E-Mail/
Communications
Unified Communications
End-User Adoption Within Companies
Location Awareness
Enterprise Search
Moderate (15–30%)
User Adoption
Virtual Worlds/Immersive
Workplaces Widgets Typical Adoption Path
Podcasting
Desktop Video
User Adoption
Low (0–15%)
Prediction Markets
Approaching Extensive
Experimental
Mainstream Deployment
Deployment Across Companies
n = 51.
109
110
n = 34.
High-User
Adoption
■■ In the absence of consumer
trends shaping employee
Presence
behavior, IT organizations Awareness
will need to develop
substantial change
Unified
management campaigns Location Communications
End-User Adoption Within Companies
Awareness
to support adoption of any
technology considered
Few technologies see high-user
“ahead of the curve.”
adoption before cross-industry
diffusion, in the absence of
■■ Please see page 108 to significant change management. Enterprise Search
review the legend.
Synchronous Room-Based
Document Telepresence
Creation
and Editing
Blogging
111
112
Significant
100% Value
■■ The average time any Deployments That Meet or
technology has to be in Exceed Predicted Adoption
place to reach 50% of (Left Axis)
technology has to be in
place to realize moderate
business benefits is about Average Value
Average Value
eight quarters. (Right Axis)
Moderate
■■ Please see pages 143–144 50% Value
in the Appendix for data on
individual technologies.
25%
0% No Value
0 2 4 6 8 10 12
Average Time Technology Has Been in Place (Quarters)
n = 34.
INFORMATION TECHNOLOGY PRACTICE
www.executiveboard.com/IT
113
114
Organizations are
challenged to realize
FINDING #5: INDIVIDUAL EFFICIENCIES DO NOT MEAN
enterprise cost savings
from individual or team
ENTERPRISE SAVINGS
efficiencies created
by social computing Realized Value by Category
Average Across All 24 Technologies
and communications
technologies.
Significant
Value
■■ Secondary literature
indicates that time saved on Average level of cost-reduction
any project/process is likely benefits is about 30–40% lower
channeled into a greater than benefits realized in other areas.
number of projects per
individual.
No
Value
User or Team Innovation Increased Quality of User Enterprise Cost
Efficiency/Time in Operating Frequency of or Team Output Reduction
Savings Model Knowledge
Transfer
n = 34.
INFORMATION TECHNOLOGY PRACTICE
www.executiveboard.com/IT
Idea Banks
115
116
Persistent Risks
■■ Technologies with high levels
of non-persistent risk on
Information Security Implementation and Support Cost
average provide minimal or
low business value. 1. Mobile Applications Support—App Development 1. Synchronous Project Planning
Non-Persistent Risks
Insights Actions
2. The dominant pattern of “Enterprise 2.0” technology adoption suggests Do not pursue early adoption of social computing technologies without
that successful value capture rarely happens for technologies that have yet major investments in change management to demonstrate benefits to
to see mainstream deployment across industries. end users and ensure uptake.
117
118