I met the CIO and the IT strategist from a large government organization to discuss about social media and gov 2.0. The organization had been using Facebook and Twitter for some time to reach out to constituents, and the whole discussion was about what to do next.
I made my usual point that the right perspective to explore strategic options is an employee-centric one, looking at social media as increasingly important components of the workplace, rather than simple communication tools. We ended up discussing how employees could be using social media for engagement purposes.
While the CIO seemed to be more willing to listen to how managing the boundary between personal and professional use is key to create value from social media engagement, his colleague looked and sounded quite dismissive. He said that he has and uses multiple identities on Facebook and other media, in order to create an airtight separation between his different roles and be sure to comply with the code of conduct. I hope he realized that having multiple identities breaches the terms and conditions of many social media platform, and could not be endorsed as a strategy by his organization.
The other thing that I found interesting was that he proudly showed a diagram describing their future information architecture, but when I asked how he was factoring in external information available in consumer social media platforms, he admitted that he hadn’t thought about that.
I was surprised. The IT strategist was clearly a competent person, but he had missed aspects that cannot be missed for any future-proof IT strategy. Sometimes even the most competent people are not ready to comprehend or accept change, when this implies disruption or discontinuity.
Read Complimentary Relevant Research
Predicts 2017: Artificial Intelligence
Artificial intelligence is changing the way in which organizations innovate and communicate their processes, products and services. Practical...
View Relevant Webinars
How to Live Without Mobile Device Management
This webinar addresses the growing trend of users refusing to have enterprise management of their mobile devices due to privacy concerns....
Comments or opinions expressed on this blog are those of the individual contributors only, and do not necessarily represent the views of Gartner, Inc. or its management. Readers may copy and redistribute blog postings on other blogs, or otherwise for private, non-commercial or journalistic purposes, with attribution to Gartner. This content may not be used for any other purposes in any other formats or media. The content on this blog is provided on an "as-is" basis. Gartner shall not be liable for any damages whatsoever arising out of the content or use of this blog.