SlideShare una empresa de Scribd logo
1 de 25
How To
Communicate
With Your
Pointy-Haired
Boss
Rich Bader
President & CEO
How To Communicate with Your Pointy-Haired Boss
Geek Values
Knowledge IS Power
Geeks Value Knowledge
Suits and Geeks
 Live in different worlds
 Use different language
 Often seek different rewards
 Have different cultural norms
 View risk differently
 Are mutually dependent on each other
The Problem Statement
 According to Claudio Ciborra[9] among others, Information
Systems failures are mostly caused by the inability of our
current methods to identify and analyse the complex Social-
Technical issues that have to be addressed in order to be
successful. [VPEC-T Wikipedia]
Complex Social-Technical Issues
Start With Assumptions…
Geeks Make Stuff Up Too
Sometimes, It’s Just Basic Trust
The Core Issue is Lack of Trust
 Relationship and task trust
 3 scenarios for proposal approval
 Gaming the system
 Who do you trust?
 People that are “like you”; common social identity
 Low trust trading; an environment of fear
 The Moors and gold miners of Africa
 Common Ground
 What are the geeks’ weapons?
The Cold War lives on
Wally Teaches Trust
Lack of Trust Creates “Friction”
The higher the perceived risks, the longer the review
VPEC-T
 The terms Values, Policy, Events, Content and Trust are the
principle means through which communication concerning a
topic is viewed. Ensuring that these dimensions are all
considered, while avoiding technological issues at an early
stage helps to create a balanced and complete view of the
system
 Of necessity the language of business users of an
information system embraces ambiguity, tacit knowledge
and willingness to change: Business must operate in the
environment of a constantly changing market. Of necessity
the language of the IT function embraces high specification,
certainty and avoidance of change: The IT function must
minimize change to systems that require cost, time and risk
to implement.[5]
VPEC-T Off to a Great Start
Even Good Systems Don’t Work With Low Trust
Finding Common Ground Builds Trust
 Find common interests other than work to build stronger
relationships
 Based on honesty, benevolence, fairness
 Do you really have their best interests in mind, taken to heart?
 Confidence vs. competence
 Easier to forgive incompetence than a lack of benevolence or honesty
 Geeks focus on competence and may not be benevolent to the suits
 Other constructs, frequently discussed together with trust,
are: control, confidence, risk, meaning and power.
Lack of empathy cause mistrust
First, you have to want it to work
Wilson Social Styles
Analytical Driver
Amiable Expressive
Assertiveness
E
m
o
t
i
v
e
n
e
s
s
Personalysis
“Doing” “Collaborating”
“Structuring" “Creating”
EasyStreet: Where Geeks and Suits Get Along!
 Call 503-671-1885
 Email richb@easystreet.com
31

Más contenido relacionado

Similar a How to Communicate with Your Pointy Haired Boss

Play It By Trust: Ethical marketing - can we do it?
Play It By Trust: Ethical marketing - can we do it?Play It By Trust: Ethical marketing - can we do it?
Play It By Trust: Ethical marketing - can we do it?Thom. Poole
 
The other world of it
The other world of itThe other world of it
The other world of itFing
 
Digital Governance in Complex Organisations philly13
Digital Governance in Complex Organisations   philly13Digital Governance in Complex Organisations   philly13
Digital Governance in Complex Organisations philly13onlineredin
 
5 barriers to creativity
5 barriers to creativity5 barriers to creativity
5 barriers to creativityNiraj Singh
 
Building Trust in Artificial Intelligence
Building Trust in Artificial IntelligenceBuilding Trust in Artificial Intelligence
Building Trust in Artificial Intelligencemahaveermalhi1
 
Building trust across the digital landscape
Building trust across the digital landscapeBuilding trust across the digital landscape
Building trust across the digital landscapeJonathon Hensley
 
Finance: A Relational Perspective
Finance: A Relational PerspectiveFinance: A Relational Perspective
Finance: A Relational PerspectiveMoral Markets
 
Communications, Social Media & Business
Communications, Social Media & BusinessCommunications, Social Media & Business
Communications, Social Media & BusinessLars Voedisch
 
The Shifting Role of the CIO as a Strategic Innovator
The Shifting Role of the CIO as a Strategic InnovatorThe Shifting Role of the CIO as a Strategic Innovator
The Shifting Role of the CIO as a Strategic InnovatorIT Network marcus evans
 
Trust by Design: Rethinking Technology Risk
Trust by Design: Rethinking Technology RiskTrust by Design: Rethinking Technology Risk
Trust by Design: Rethinking Technology RiskSwatantra Kumar
 
Social Media at CME Group: Creating Marketplace 4.0
Social Media at CME Group: Creating Marketplace 4.0Social Media at CME Group: Creating Marketplace 4.0
Social Media at CME Group: Creating Marketplace 4.0Allan Schoenberg
 
Advocacy 301: next Steps
Advocacy 301: next StepsAdvocacy 301: next Steps
Advocacy 301: next StepsNorman DeLisle
 
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Group
 
Strategic Mortgage Planning
Strategic Mortgage PlanningStrategic Mortgage Planning
Strategic Mortgage PlanningMichael Bischof
 
How To Get Your Team Participating and Collaborating More Effectively
How To Get Your Team Participating and Collaborating More EffectivelyHow To Get Your Team Participating and Collaborating More Effectively
How To Get Your Team Participating and Collaborating More EffectivelyAndy Harjanto
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...i_scienceEU
 
Communication barriers
Communication barriersCommunication barriers
Communication barriersGia Tri Tien
 
Meetup. Getting Ready for Due Diligence
Meetup. Getting Ready for Due DiligenceMeetup. Getting Ready for Due Diligence
Meetup. Getting Ready for Due DiligenceIT Arena
 

Similar a How to Communicate with Your Pointy Haired Boss (20)

Speed of Trust
Speed of TrustSpeed of Trust
Speed of Trust
 
Play It By Trust: Ethical marketing - can we do it?
Play It By Trust: Ethical marketing - can we do it?Play It By Trust: Ethical marketing - can we do it?
Play It By Trust: Ethical marketing - can we do it?
 
The other world of it
The other world of itThe other world of it
The other world of it
 
Digital Governance in Complex Organisations philly13
Digital Governance in Complex Organisations   philly13Digital Governance in Complex Organisations   philly13
Digital Governance in Complex Organisations philly13
 
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSIONBUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
BUILDING TRUST IN A CONNECTED WORLD – HAYNNE’S ROYAL COMMISSION
 
5 barriers to creativity
5 barriers to creativity5 barriers to creativity
5 barriers to creativity
 
Building Trust in Artificial Intelligence
Building Trust in Artificial IntelligenceBuilding Trust in Artificial Intelligence
Building Trust in Artificial Intelligence
 
Building trust across the digital landscape
Building trust across the digital landscapeBuilding trust across the digital landscape
Building trust across the digital landscape
 
Finance: A Relational Perspective
Finance: A Relational PerspectiveFinance: A Relational Perspective
Finance: A Relational Perspective
 
Communications, Social Media & Business
Communications, Social Media & BusinessCommunications, Social Media & Business
Communications, Social Media & Business
 
The Shifting Role of the CIO as a Strategic Innovator
The Shifting Role of the CIO as a Strategic InnovatorThe Shifting Role of the CIO as a Strategic Innovator
The Shifting Role of the CIO as a Strategic Innovator
 
Trust by Design: Rethinking Technology Risk
Trust by Design: Rethinking Technology RiskTrust by Design: Rethinking Technology Risk
Trust by Design: Rethinking Technology Risk
 
Social Media at CME Group: Creating Marketplace 4.0
Social Media at CME Group: Creating Marketplace 4.0Social Media at CME Group: Creating Marketplace 4.0
Social Media at CME Group: Creating Marketplace 4.0
 
Advocacy 301: next Steps
Advocacy 301: next StepsAdvocacy 301: next Steps
Advocacy 301: next Steps
 
Brunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attackBrunswick Intelligence - Building reputational resilience to cyber attack
Brunswick Intelligence - Building reputational resilience to cyber attack
 
Strategic Mortgage Planning
Strategic Mortgage PlanningStrategic Mortgage Planning
Strategic Mortgage Planning
 
How To Get Your Team Participating and Collaborating More Effectively
How To Get Your Team Participating and Collaborating More EffectivelyHow To Get Your Team Participating and Collaborating More Effectively
How To Get Your Team Participating and Collaborating More Effectively
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
 
Communication barriers
Communication barriersCommunication barriers
Communication barriers
 
Meetup. Getting Ready for Due Diligence
Meetup. Getting Ready for Due DiligenceMeetup. Getting Ready for Due Diligence
Meetup. Getting Ready for Due Diligence
 

Más de InnoTech

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"InnoTech
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is MaturingInnoTech
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?InnoTech
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostInnoTech
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering StormInnoTech
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the fieldInnoTech
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implicationsInnoTech
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged InfrastructureInnoTech
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365InnoTech
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studiesInnoTech
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential InnoTech
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?InnoTech
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...InnoTech
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeInnoTech
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacyInnoTech
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio InnoTech
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumInnoTech
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2InnoTech
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionInnoTech
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentationInnoTech
 

Más de InnoTech (20)

"So you want to raise funding and build a team?"
"So you want to raise funding and build a team?""So you want to raise funding and build a team?"
"So you want to raise funding and build a team?"
 
Artificial Intelligence is Maturing
Artificial Intelligence is MaturingArtificial Intelligence is Maturing
Artificial Intelligence is Maturing
 
What is AI without Data?
What is AI without Data?What is AI without Data?
What is AI without Data?
 
Courageous Leadership - When it Matters Most
Courageous Leadership - When it Matters MostCourageous Leadership - When it Matters Most
Courageous Leadership - When it Matters Most
 
The Gathering Storm
The Gathering StormThe Gathering Storm
The Gathering Storm
 
Sql Server tips from the field
Sql Server tips from the fieldSql Server tips from the field
Sql Server tips from the field
 
Quantum Computing and its security implications
Quantum Computing and its security implicationsQuantum Computing and its security implications
Quantum Computing and its security implications
 
Converged Infrastructure
Converged InfrastructureConverged Infrastructure
Converged Infrastructure
 
Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365Making the most out of collaboration with Office 365
Making the most out of collaboration with Office 365
 
Blockchain use cases and case studies
Blockchain use cases and case studiesBlockchain use cases and case studies
Blockchain use cases and case studies
 
Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential Blockchain: Exploring the Fundamentals and Promising Potential
Blockchain: Exploring the Fundamentals and Promising Potential
 
Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?Business leaders are engaging labor differently - Is your IT ready?
Business leaders are engaging labor differently - Is your IT ready?
 
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
AI 3.0: Is it Finally Time for Artificial Intelligence and Sensor Networks to...
 
Using Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to LifeUsing Business Intelligence to Bring Your Data to Life
Using Business Intelligence to Bring Your Data to Life
 
User requirements is a fallacy
User requirements is a fallacyUser requirements is a fallacy
User requirements is a fallacy
 
What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio What I Wish I Knew Before I Signed that Contract - San Antonio
What I Wish I Knew Before I Signed that Contract - San Antonio
 
Disaster Recovery Plan - Quorum
Disaster Recovery Plan - QuorumDisaster Recovery Plan - Quorum
Disaster Recovery Plan - Quorum
 
Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2Share point saturday access services 2015 final 2
Share point saturday access services 2015 final 2
 
Sp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner sessionSp tech festdallas - office 365 groups - planner session
Sp tech festdallas - office 365 groups - planner session
 
Power apps presentation
Power apps presentationPower apps presentation
Power apps presentation
 

Último

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 

Último (20)

How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 

How to Communicate with Your Pointy Haired Boss

  • 2. How To Communicate with Your Pointy-Haired Boss
  • 6. Suits and Geeks  Live in different worlds  Use different language  Often seek different rewards  Have different cultural norms  View risk differently  Are mutually dependent on each other
  • 7. The Problem Statement  According to Claudio Ciborra[9] among others, Information Systems failures are mostly caused by the inability of our current methods to identify and analyse the complex Social- Technical issues that have to be addressed in order to be successful. [VPEC-T Wikipedia]
  • 11. Sometimes, It’s Just Basic Trust
  • 12. The Core Issue is Lack of Trust  Relationship and task trust  3 scenarios for proposal approval  Gaming the system  Who do you trust?  People that are “like you”; common social identity  Low trust trading; an environment of fear  The Moors and gold miners of Africa  Common Ground  What are the geeks’ weapons?
  • 13. The Cold War lives on
  • 15. Lack of Trust Creates “Friction”
  • 16. The higher the perceived risks, the longer the review
  • 17. VPEC-T  The terms Values, Policy, Events, Content and Trust are the principle means through which communication concerning a topic is viewed. Ensuring that these dimensions are all considered, while avoiding technological issues at an early stage helps to create a balanced and complete view of the system  Of necessity the language of business users of an information system embraces ambiguity, tacit knowledge and willingness to change: Business must operate in the environment of a constantly changing market. Of necessity the language of the IT function embraces high specification, certainty and avoidance of change: The IT function must minimize change to systems that require cost, time and risk to implement.[5]
  • 18. VPEC-T Off to a Great Start
  • 19. Even Good Systems Don’t Work With Low Trust
  • 20. Finding Common Ground Builds Trust  Find common interests other than work to build stronger relationships  Based on honesty, benevolence, fairness  Do you really have their best interests in mind, taken to heart?  Confidence vs. competence  Easier to forgive incompetence than a lack of benevolence or honesty  Geeks focus on competence and may not be benevolent to the suits  Other constructs, frequently discussed together with trust, are: control, confidence, risk, meaning and power.
  • 21. Lack of empathy cause mistrust
  • 22. First, you have to want it to work
  • 23. Wilson Social Styles Analytical Driver Amiable Expressive Assertiveness E m o t i v e n e s s
  • 25. EasyStreet: Where Geeks and Suits Get Along!  Call 503-671-1885  Email richb@easystreet.com 31