McKinsey studies the value of social technology for business
The research arm of McKinsey & Company, a major consulting firm, has released an interesting report, The social economy: Unlocking value and productivity through social technologies. It explains how social can be tapped for demonstrable value.
We all know that ‘social’ has exploded among consumers and that organizations, both public and private, are working to obtain value from it. The McKinsey report studies the value that can be created and guides us with advice on how to optimize it.
This should grab our attention:
- While 72 percent of companies use social technologies in some way, very few are anywhere near to achieving the full potential benefit. In fact, the most powerful applications of social technologies in the global economy are largely untapped.
- … by fully implementing social technologies, companies have an opportunity to raise the productivity of interaction workers—high-skill knowledge workers, including managers and professionals—by 20 to 25 percent.
- These technologies, which create value by improving productivity across the value chain, could potentially contribute $900 billion to $1.3 trillion in annual value.
The McKinsey study emphasizes the opportunity to improve communication and collaboration. Opportunities exist to communicate:
- With and among employees
- With customers
- With the extended enterprise (supply chain, channel partners, etc.)
- With investors and the community at large
Organizations should recognize and have a strategy to take advantage of the opportunities.
Risk, security, and assurance professionals can also use social technologies in a variety of ways, including:
- Socializing new policies, such as for information security, to obtain insights on proposed standards and improve adoption once they are issued
- Virtual risk assessment workshops and forums
- Surveying employees and partners to take the pulse of the organization
- Sharing information and best practices across the organization
The report touches on the potential to mine the Big Data created by social. But, in my opinion it doesn’t do justice to the enormous potential.
Recent Posts on this Blog
- New guidance on operational risk December 3, 2016
- Why do so many practitioners misunderstand risk? November 26, 2016
- A new front opens in the SOX battle November 20, 2016
- Internal audit reports do the function a great disservice November 12, 2016
- My new book on Auditing that Matters is available November 9, 2016
- Time for a leap change in risk management guidance November 5, 2016
- Cyber security and the board October 29, 2016
- The biggest obstacle to effective risk management October 28, 2016
- A revolution in risk management October 22, 2016
- Why do people commit fraud? October 14, 2016
- What could go wrong with strategy and its execution? October 6, 2016
- Is a new maturity model for GRC the right model? September 25, 2016
- The Wells Fargo “Staff Scam”: More questions and fewer answers September 16, 2016
- The astonishing Wells Fargo fraud September 10, 2016
- Leading an effective information security capability September 4, 2016
- Do we know how to audit technology-related risks December 3, 2016
- The State of Information or Cybersecurity November 28, 2016
- Back to the Future for Internal Audit November 21, 2016
- How Do You Change the Culture of the Organization? November 15, 2016
- Why Does ERM Fail So Often? November 7, 2016
- Incentives and Ethics: Transparency International Speaks Out October 31, 2016
- A COSO Gem Helps Assess Risks and Related Control Deficiencies October 25, 2016
- Focusing on the Wrong Line of Defense October 17, 2016
- Internal Audit and the Internet of Things October 10, 2016
- Fraud, Abuse, and Corruption September 26, 2016