McKinsey studies the value of social technology for business
The research arm of McKinsey & Company, a major consulting firm, has released an interesting report, The social economy: Unlocking value and productivity through social technologies. It explains how social can be tapped for demonstrable value.
We all know that ‘social’ has exploded among consumers and that organizations, both public and private, are working to obtain value from it. The McKinsey report studies the value that can be created and guides us with advice on how to optimize it.
This should grab our attention:
- While 72 percent of companies use social technologies in some way, very few are anywhere near to achieving the full potential benefit. In fact, the most powerful applications of social technologies in the global economy are largely untapped.
- … by fully implementing social technologies, companies have an opportunity to raise the productivity of interaction workers—high-skill knowledge workers, including managers and professionals—by 20 to 25 percent.
- These technologies, which create value by improving productivity across the value chain, could potentially contribute $900 billion to $1.3 trillion in annual value.
The McKinsey study emphasizes the opportunity to improve communication and collaboration. Opportunities exist to communicate:
- With and among employees
- With customers
- With the extended enterprise (supply chain, channel partners, etc.)
- With investors and the community at large
Organizations should recognize and have a strategy to take advantage of the opportunities.
Risk, security, and assurance professionals can also use social technologies in a variety of ways, including:
- Socializing new policies, such as for information security, to obtain insights on proposed standards and improve adoption once they are issued
- Virtual risk assessment workshops and forums
- Surveying employees and partners to take the pulse of the organization
- Sharing information and best practices across the organization
The report touches on the potential to mine the Big Data created by social. But, in my opinion it doesn’t do justice to the enormous potential.
Recent Posts on this Blog
- Is a new maturity model for GRC the right model? September 25, 2016
- The Wells Fargo “Staff Scam”: More questions and fewer answers September 16, 2016
- The astonishing Wells Fargo fraud September 10, 2016
- Leading an effective information security capability September 4, 2016
- Have your provided comments on the COSO ERM draft? August 31, 2016
- How to do your internal audit risk assessment August 27, 2016
- Do techies really understand cyber risk? August 20, 2016
- Continuing to learn about culture from Toyota August 13, 2016
- The danger of an arrogant board August 7, 2016
- The Board and Technology: Questions to ask the management team July 31, 2016
- IIA Insights on Internal Audit Effectiveness July 22, 2016
- Deloitte predicts change for Internal Audit July 20, 2016
- Risk and Opportunity Management July 2, 2016
- Risk reporting to the Board June 26, 2016
- We need to review and provide feedback on the COSO ERM Exposure Draft June 19, 2016
- Fraud, Abuse, and Corruption September 26, 2016
- Reconsidering the Board: Its Composition and Oversight of Management September 19, 2016
- Time for the Board to Take a Deep Dive Into Risk Management and Risks September 12, 2016
- Oversight of the External Auditor September 6, 2016
- Signs of a Failing Board August 29, 2016
- Contrasting Comments on Internal Audit From a CAE and a Consultant August 23, 2016
- Asking the Tough Questions About Internal Audit August 15, 2016
- When Risk Management Fails August 8, 2016
- An Internal Audit Ambition Model August 1, 2016
- Understanding and Assessing Governance Risk July 25, 2016