Michael R Nelson, Senior Researcher Creating Your Transparency Strategy the Age of Wikileaks.

Slides:



Advertisements
Similar presentations
What is Business Architecture?. Overview Agility matters today more than yesterday Previous methods for managing change were designed for the needs of.
Advertisements

STRENGTHENING FINANCING FOR DEVELOPMENT: PROPOSALS FROM THE PRIVATE SECTOR Compiled by the UN-Sanctioned Business Interlocutors to the International Conference.
University of York Planning for Process Review. Using our Vision, Strategy and Medium Term Planning to inform our business and process change agenda..
The Internet of Riedwaan Bassadien Platform Strategy Manager Microsoft Everything Your things.
Back to Table of Contents
CHAPTER 16 1 Use with BUSINESS TO BUSINESS MARKETING MANAGEMENT: A GLOBAL PERSPECTIVE ISBN Published by Routledge 2013.
Strategy 2022: A Holistic View Tony Hayes International President ISACA © 2012, ISACA. All rights reserved.
Introduction to Enterprise Risk Management (ERM)
Social Media Listening Campaigns Intrapromote Introduction.
Marketing Management 27th of June 2011.
THE RIGHT TECHNOLOGY IN INVESTOR RELATIONS: WHAT TO DO ONLINE? THOMSON REUTERS Alex Ménage Head of Business Development Corporate Services Rapidly Developing.
Corporate Responsibility Index 14 April Athens A tool for improving management of and performance in corporate responsibility.
Hosted by Achieving Best Business Performance Mark R. Willford, Partner Accenture.
How to Grow Revenues Through Supply Chain Relationship Management Bill Burke President, CEO ePlains, Inc.
© 2012 McGladrey LLP. All Rights Reserved.© 2014 McGladrey LLP. All Rights Reserved. © 2012 McGladrey LLP. All Rights Reserved. © 2013 McGladrey LLP. All.
Electronic Business (MGT-485)
Chapter 2 Strategic Training
ADDING VALUE - BRINGING VALUE A Presentation from RD and D Sales Engineering.
Business Acquisition Process Implementation & transition Closing Negotiation of the transaction Due Diligence Engagement TargetIdentification.
The future shape of business is being redefined through outsourcing.
Meeting the Needs of the Customer: to ISO 9001 Standards Michael Donohoe, Operations and Systems Manager (CYQ)
1 Jon Whitfield Agency CEO Head of Government Internal Audit.
Deloitte Consulting SCOOPS Session September 2003.
Consumer Relations Lecture # 13.
Bill Newhouse Program Lead National Initiative for Cybersecurity Education Cybersecurity R&D Coordination National Institute of Standards and Technology.
Steve Bennett President & Chief Executive Officer NASDAQ OMX International Investor Program December 4, 2013.
© Dr. John T. Whiting All Rights Reserved Slide 1 The Rationale for Integrating IT Assets into the Strategic Business.
Institutional Research Compliance Juliann Tenney, JD Research Compliance and Privacy Officer Director, Institutional Research Compliance Program.
1102 Contract Specialist as a Business Manager Debbie Bartlett Defense Acquisition University.
© 2013 Cengage Learning. All Rights Reserved. 1 Part Four: Implementing Business Ethics in a Global Economy Chapter 9: Managing and Controlling Ethics.
TEST With Johan Beeckmans
Agency Risk Management & Internal Control Standards (ARMICS)
Scandals (in the public and private sector)  Enron  Worldcom  Livent  Nortel  HRDC  Sponsorship Scandal.
Chapter © 2009 Pearson Education, Inc. Publishing as Prentice Hall.
European Broadband Portal Phase II Application of the Blueprint for “bottom-up” broadband initiatives.
0 COMPETITIVE INTELLIGENCE A PROCESS THAT CREATES COMPETITIVE ADVANTAGE NOT A REPORT THAT SITS ON A SHELF Plan Integrate Collect Analyze Communicate 4200.
E-P RAGUE AND THE P ROSPECTS OF E-G OVERNMENT : D ISCUSSION P ANELS James Melitski, PhD and Tony Carrizales, PhD E-governance Institute National Center.
Chapter 15 Advertising and Public Relations. Topics to Cover Public Relations – Role and impact – Tools.
April 2008 Global Developments in Corporate Reporting Charles Tilley Chartered Institute of Management Accountants Chief Executive Global Developments.
Location, Location, Location: The Emerging Crisis in Wireless Data Privacy Ari Schwartz & Alan Davidson Center for Democracy and Technology
The Impact of Privacy on HP’s Customer Relationship Management Solution Mike Overly Vice President, Marketing © 2003 Hewlett-Packard Development Company,
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
THE PRIORITIES OF PUBLIC ADMINISTRATION REFORM IN THE MIDDLE EAST THE PRIORITIES OF PUBLIC ADMINISTRATION REFORM IN THE MIDDLE EAST 1. Decentralization.
The information supply chain FDIC XBRL International Conference Mr. Inscoe.
Cloud Market Readiness Report Finance, Media, and Legal Sectors March 2014 Trend Consulting 2013.
TCF and FCF-Online How can help you generate MI you need to satisfy FSA requirementswww.fcf-online.com.
Catholic Charities Performance and Quality Improvement (PQI)
Connie Allison. Changing Your Focus Sourcing Looking for lowest price Placing orders Vendor Management Maximize company’s technology investments Looking.
Government and Industry IT: one vision, one community Vice Chairs April Meeting Agenda Welcome and Introductions GAPs welcome meeting with ACT Board (John.
John Weigelt, MEng, PEng, CISSP, CISM National Technology Officer Microsoft Canada November 2005 Fighting Fraud Through Data Governance.
Michael Saucier - OSIsoft Cliff Reeves - Microsoft Your Portal to Performance An Introduction to the RtPM Platform Copyright c 2004 OSIsoft Inc. All rights.
1 An Overview of Process and Procedures for Health IT Collaboration GSA Office of Citizen Services and Communications Intergovernmental Solutions Division.
Putting Social Media to Good Use Jeff Moriarty, Sitewire Director Social Media Strategy.
Unifying Talent Management. Harnessing the Power of Workforce Intelligence in Talent Planning to Drive Business Performance.
JANI AARTI En No:  By the end of this lecture, students should be able to: 1.Explain the functions of management 2.Define and explain strategy.
ONLINE BRANDING © Cseng Lim All Rights Reserved | | Social Media Outsourcing and Coaching.
Research Fairness Initiative (RFI)
MGMT 452 Corporate Social Responsibility
Data Minimization Framework
Forensics Week 11.
MDIC- Case for Quality Forum
Chapter 12 Implementing strategy through organization
The Most Important Element to Assure That Your Sales and Marketing Compliance Program is Working Effectively: Monitoring and Auditing Kelly B. Freeman,
Chapter 12 Implementing strategy through organization
Neil Kirton and Zoë Newman
Michael R Nelson Senior Researcher
The Modern Organization Functioning in a Global Environment
Presentation transcript:

Michael R Nelson, Senior Researcher Creating Your Transparency Strategy the Age of Wikileaks

Leading Edge Forum 6/28/2015 1:21 AM 2 More data; less control Employees expect information access on demand Social media greatly expands information sharing possibilities “Open Science,” “Open Data,” create major new innovation platforms More public skepticism; less societal trust Increasingly punitive business environment Multi-gigabyte storage devices for less than $20 Increasing regulatory oversight and reporting demands More “eyes” watching; everyone’s a potential blogger, whistleblower More powerful analytical and semantic tools to link and decipher data Introduction – today’s digital environment

Leading Edge Forum 6/28/2015 1:21 AM 3 In the last 20 years: 100s of times more data ( , CRM, social media, video, etc) Greater need to share that data (internally and externally) Easier to copy, leak Company walls becoming porous (ecosystems, Cloud) Data becoming an ever-more important source of value Greater transparency increasingly expected (by customers and investors) Information management – what’s changed? Data Sharing Control

Leading Edge Forum 6/28/2015 1:21 AM 4 Web site launched in late 2006 using advanced technology to enable documents to be leaked anonymously April 2010: WikiLeaks publishes video of a helicopter attack in Baghdad in July 2007, which shows Iraqi civilians and journalists being shot July 2010: WikiLeaks releases more than 75,000 documents from the war in Afghanistan, mostly field reports from troop actions October 2010: WikiLeaks works with major global news organizations to release the Iraq War Logs, containing almost 400,000 documents November 2010: WikiLeaks begins releasing some of 250,000 US State department diplomatic cables, many of which are classified CONFIDENTIAL ALL of this material is thought to have been compiled and leaked by a single disgruntled intelligence analyst in Iraq, Private Bradley Manning WikiLeaks puts transparency on the agenda

Leading Edge Forum 6/28/2015 1:21 AM 5 From governments: –Panic – then a renewed focus on cyber-security –Efforts to impede or close down WikiLeaks, – Charges against Julian Assange From businesses: –Disassociation from WikiLeaks (e.g. Amazon, PayPal) –Response planning -- What if it happened to us? (e.g. Bank of America) From hacker community: –Wikileaks sympathy –Counterattacks (Anonymous, et al.) First impulse: Lock down everything

Leading Edge Forum 6/28/2015 1:21 AM 6 If thousands of people had access to the data Private Manning allegedly leaked, can everything really be kept confidential? Modern organizations are going to become more transparent, whether they like it or not A lot of the leaked data actually made the US State Department look more capable and more human What data and information that we always considered confidential should we make available online – and how could we leverage the disclosure of that information? Can we benefit from ‘strategic leaking’ in order to foster more publicity and interest in our work? How can we best avoid unwanted hacktivist attention? Upon further consideration

Leading Edge Forum 6/28/2015 1:21 AM 7 Good News, Bad News, No News Routine Reports Good News Bad News

Leading Edge Forum 6/28/2015 1:21 AM 8 Classic Public Relations Routine Reports Good News Bad News COVER UP

Leading Edge Forum 6/28/2015 1:21 AM 9 Really Good Public Relations Routine Reports Good News Bad News COVER UP & SPIN

Leading Edge Forum 6/28/2015 1:21 AM 10 Really Good Public Relations Routine Reports Good News + Phony Good News Bad News COVER UP & SPIN

Leading Edge Forum 6/28/2015 1:21 AM 11 What Wikileaks and Bloggers Do Routine Reports Good News Bad News BAD NEWS LEAKS FIRST

Leading Edge Forum 6/28/2015 1:21 AM 12 The Economist on transparency

Leading Edge Forum 6/28/2015 1:21 AM 13 SecrecyTransparency Externa l Legalistic Licensing Non-disclosure Compliance Open Innovation Speed and agility Publicity/reputation Collaborative Driving Cultural Change from the Outside In

Leading Edge Forum 6/28/2015 1:21 AM 14 SecrecyTransparency Internal Externa l Hierarchies Silos Need-to-know culture Locked-down Legalistic Licensing Non-disclosure Compliance Flat organizations Information sharing Participatory culture Learning Open Innovation Speed and agility Publicity/reputation Collaborative Driving Cultural Change from the Outside In

Leading Edge Forum 6/28/2015 1:21 AM 15 Two main transparency goals – more value and/or more accountability Low High Value Creation Accountability Transparent – Publicity/trust – Sharing/IP – New data platforms Open – Transparency as default – Internal = external – 360 degree sharing Traceable – Compliance – Visibility – Responsibility Opaque – Need to know – Mgmt whims – Black box

Leading Edge Forum 6/28/2015 1:21 AM 16 ① Thoughts and opinions of the CEO and key employees ② Research and product plans (even source code and other IP; open science) ③ Personnel data (bios, contact information, job focus, even salaries) ④ Sales goals and figures ⑤ Customer data (anonymized) ⑥ Customer complaints and resolutions ⑦ Pricing and purchasing data ⑧ Everyday operations -- schedules, events, webcasts ⑨ Crisis response Major areas of potential transparency Value Accountability Lo High

Leading Edge Forum 6/28/2015 1:21 AM 17 Radical transparency WIRED, March 2006

Leading Edge Forum 6/28/2015 1:21 AM 18 Why do it? Inform and inspire team Drive strategy and values Communicate with customers/partners Build trust Increase personal visibility 1. Sharing CEO’s and employees’ thoughts Why not? Ammunition for lawsuits Violate financial disclosure regulations Half-baked ideas Lexus/Nexus effect (you can’t erase the Web)

Leading Edge Forum 6/28/2015 1:21 AM Sharing product plans (even source code!) Innovation in the open: –Linux and other open source projects –Eli Lilly and GlaxoSmithKline drug trial data

Leading Edge Forum 6/28/2015 1:21 AM 20 Why do it? Demonstrate leadership Attract attention, generate buzz Attract employees, partners, advisors, potential customers to build ecosystem Instill ‘need for speed’ among employees and partners Increase quality of work (because ‘the world is watching’) Influence standards (formal and de facto) Solve hard problems, shared challenges Test, benchmark competitiveness 2. Sharing R&D and product plans Why not? Lose first mover advantage Help competitors Forfeit IP

Leading Edge Forum 6/28/2015 1:21 AM 21 Examples: United States Congress Bell, California, scandal: –California State Controller John Chiang publishes city officials’ salaries online Ricardo Semler and Semco 3. Sharing personnel information

Leading Edge Forum 6/28/2015 1:21 AM 22 Why not? Poaching Reveal corporate strategy and product plans National employee privacy rules Demoralize the lowest performers Potential frictions 3. Sharing personnel information Why do it? Raise employees’ profiles (and morale) Help employees win external recognition Build trust Foster internal (and external) communication Improve recruiting Let employees see they are paid fairly Establish culture of merit

Leading Edge Forum 6/28/2015 1:21 AM 23 Examples: Amazon book rankings Movie box office receipts New York Times book and e-book sales 4. Sharing sales figures

Leading Edge Forum 6/28/2015 1:21 AM 24 Why do it? Generate buzz Help managers and employees retarget resources Attract partners Find opportunities for bundling Peer pressure, greater accountability Establish new norms 4. Sharing sales figures and goals Why not? Alert potential competitors Scare customers, investors Reveal bad strategy choices

Leading Edge Forum 6/28/2015 1:21 AM 25 Examples: CT TyMetrix data on legal bills at Wolters Kluwer Data.mint.com at Intuit Netflix Improve the accuracy of predictions about how much someone is going to enjoy a movie based on their movie preferences. $1 million awarded on 21 September Sharing customer data (anonymized)

Leading Edge Forum 6/28/2015 1:21 AM 26 Why do it? Inform and build the ecosystem Help partners collaborate more effectively Enable new services (e.g. Amazon book rankings) Build customer loyalty, trust Get more value from data Establish new platforms for value creation 5. Sharing customer data (anonymized) Why not? Customers’ privacy concerns Reconciling various national privacy regulations De-anonymization (e.g. AOL user data fiasco) Truth in advertising rules Hacking and abuse Other companies profit from your data

Leading Edge Forum 6/28/2015 1:21 AM 27 Examples: 6. Sharing customer complaints Leading Edge Forum 6/28/2015 1:21 AM 27

Leading Edge Forum 6/28/2015 1:21 AM 28 Why do it? Early awareness Assure effective resolution Pre-empt third party sites Learn customer workarounds Build customer trust Track progress over time 6. Sharing customer complaints, resolutions Why not? Expose problems Old embarrassments persist Fodder for competitors who will target unhappy customers

Leading Edge Forum 6/28/2015 1:21 AM 29 Why not? Rules against price fixing Harder to get lower (secret) prices from vendors Harder to price discriminate (by geography or customer) Non-disclosure agreements with vendors 7. Sharing pricing and purchasing data Why do it? Convince customers they are getting a fair deal Simplify negotiations with customers and suppliers Build customer loyalty (e.g. Jet Blue, Southwest Airlines) Invite better offers from new vendors Competitive differentiation Build trust

Leading Edge Forum 6/28/2015 1:21 AM 30 Examples: Webcams from ski resorts, hotel lobbies, cruise ships 8. Day-to-day operations (schedules, webcasts, webcams)

Leading Edge Forum 6/28/2015 1:21 AM 31 Leading Edge Forum 6/28/2015 1:21 AM 31

Leading Edge Forum 6/28/2015 1:21 AM 32 Examples: Webcams from ski resorts, hotel lobbies, cruise ships Sunlight Foundation and Congressional schedules White House visitor logs Data.gov, data.gov.uk Crime statistics, e.g. 8. Day-to-day operations (schedules, webcasts, webcams)

Leading Edge Forum 6/28/2015 1:21 AM 33 New Report from the Transparency & Accountability Initiative of the Open Society Foundation Examples: Citizen access to policy debates Ushahidi for election monitoring Tracking legislation Citizen complaints Lessons: Visualization, mapping, social media key Best to partners with outside groups, online service providers, etc. 8. Day-to-day operations (Examples from government watchdogs)

Leading Edge Forum 6/28/2015 1:21 AM 34 Why do it? Generate publicity Show a human side Foster ecosystem Enable unplanned encounters 8.Sharing day-to-day operations (schedules, events, webcasts Why not? Unscripted moments Violation of financial disclosure regulations Bad PR (Microsoft’s Ballmer ‘monkey video’) Reuse and remix Accuracy of data?

Leading Edge Forum 6/28/2015 1:21 AM 35 Why do it? Provide context Develop trust (esp. among press, investors, and analysts) Get more information out faster (to public and employees) >> faster response Correct inaccuracies 9.Sharing before and during a crisis Why not? Incorrect/preliminary data No time for spin, analysis Give critics ammunition

Leading Edge Forum 6/28/2015 1:21 AM 36 Trust tension Trust and transparency Privacy Identity 0% Amount of Disclosure of PII 100% (Customers) (Vendors)

Leading Edge Forum 6/28/2015 1:21 AM 37 Trust tension (cont) Trust and transparency Privacy Less Fraud 0% Amount of Disclosure of PII 100% More Profits Personalization Identity

Leading Edge Forum 6/28/2015 1:21 AM 38 Redefining the debate Trust and transparency Privacy Personalization 0% Amount of Disclosure of PII 100% Disclosure about systems and processes Transparency (Customers + Vendors)

Leading Edge Forum 6/28/2015 1:21 AM 39 Clear agreement among relevant divisions on what level of transparency is desired (IT, Communications, PR, Legal, HR, Marketing, Board, CEO) Clearly stated, consistent policies on confidentiality and transparency; Avoid worst-case thinking Effective employee training on data policies Coordination with partners and vendors (especially content management) IT infrastructure that can monitor which data goes where (to whom) Mechanisms and metrics for measuring impact of openness (in terms of profits, partners, web hits, morale, customer satisfaction) Emerging practices

Leading Edge Forum 6/28/2015 1:21 AM 40 Who decides? Legal Human Resources Public Relations and marketing CEO and Board (when?) IT Centralized or decentralized approach? Defining and promulgating policies Regulatory issues Governance

Leading Edge Forum 6/28/2015 1:21 AM 41 Effective, easy-to-use (or automatic) means for flagging sensitive information Single sign-on and federated identity Fine-grained access control and monitoring mechanisms Wider use of end-to-end encryption (especially in the Cloud) Implications for IT architecture

Leading Edge Forum 6/28/2015 1:21 AM 42 Potential Damage Value of Asset LowHigh Low High Your firm’s risk gradient probably looks like this

Leading Edge Forum 6/28/2015 1:21 AM 43 Current Cost of Controls Value of Asset LowHigh Low High … but your current Cost of Controls probably looks like this

Leading Edge Forum 6/28/2015 1:21 AM 44 Potential Impact Value of Asset LowHigh Low High Which results in … Underprotection Crown Jewels at Risk > Overcontrol (Waste of Money)

Leading Edge Forum 6/28/2015 1:21 AM 45 Cost of Controls Required Potential Impact Value of Asset LowHigh Low High Classification provides a better approach …

Leading Edge Forum 6/28/2015 1:21 AM 46 Start a discussion regarding company-wide transparency strategy Study companies or government offices that have gained competitive advantage by becoming more transparent Talk to IT vendors about need to release data (and manage its release) rather than just focusing on cyber-security Survey employees on how well they understand current policy and where more clarity on confidentiality policy is needed Consider transparency metrics (e.g. WorldBlu) Get the IT team, marketing, and communications to brainstorm on possible pilot projects What to do today?

Leading Edge Forum 6/28/2015 1:21 AM 47 Determine goals and develop guidelines regarding disclosure of: Thoughts and opinions of the CEO and employees R&D and product plans Personnel information Sales figures and goals Customer data (anonymized) Customer complaints, resolutions Prices and purchasing Day-to-day operations Crisis response Create/identify point person and high-level council to coordinate, implement, assess Developing a transparency strategy

Leading Edge Forum 6/28/2015 1:21 AM 48 Where do you want to be? 1 External 10 Lock Down Wide Open Internal 1 10 G IA DC Start-up Lock Down Wide Open Linux G = Google IA = Intelligence Agency DC = Defense Contractor

Leading Edge Forum 6/28/2015 1:21 AM 49 Where do you want to be? Effort 1 External 10 Wide Open Total Lock-down Benefit Damage

Leading Edge Forum 6/28/2015 1:21 AM 50 You have a security strategy You have a privacy and compliance policy You need a TRANSPARENCY POLICY The simpler the better. (But it will vary with sector, with type of information) Examples: Clinton White House: “Put it on Web unless there’s a good reason not to.” Obama’s very first executive order went one step further and required data in open formats, but overall White House transparency still a mixed bag, subject to many conflicting pressures Like security and privacy, transparency policies will continually evolve; there are real leadership and competitive differentiation possibilities. Bottom Line

Michael R. Nelson