Enviar búsqueda
Cargar
Susan Agerskov - Virtual Teams
•
0 recomendaciones
•
1,266 vistas
Bysted
Seguir
Tecnología
Empresariales
Denunciar
Compartir
Denunciar
Compartir
1 de 9
Recomendados
Grapevine Communication
Grapevine Communication
Olaniyan Oyindamola,ACIM
Social Impact of Technology: Cellphones & Relationships
Social Impact of Technology: Cellphones & Relationships
matharkness
Making Lync VDI work best in your virtualization environment
Making Lync VDI work best in your virtualization environment
Digicomp Academy AG
Anwar csse presentation
Anwar csse presentation
Arif Anwar
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
Murray Security Services
People communicate effectively throughout the organisation
People communicate effectively throughout the organisation
pludoni GmbH
Managerial Communication
Managerial Communication
DAVIS THOMAS
Achieving Accelerated Organisation Change through Internal Networks
Achieving Accelerated Organisation Change through Internal Networks
Optimice
Recomendados
Grapevine Communication
Grapevine Communication
Olaniyan Oyindamola,ACIM
Social Impact of Technology: Cellphones & Relationships
Social Impact of Technology: Cellphones & Relationships
matharkness
Making Lync VDI work best in your virtualization environment
Making Lync VDI work best in your virtualization environment
Digicomp Academy AG
Anwar csse presentation
Anwar csse presentation
Arif Anwar
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
Murray Security Services
People communicate effectively throughout the organisation
People communicate effectively throughout the organisation
pludoni GmbH
Managerial Communication
Managerial Communication
DAVIS THOMAS
Achieving Accelerated Organisation Change through Internal Networks
Achieving Accelerated Organisation Change through Internal Networks
Optimice
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
ZakiAhmed70
Understanding and Managing Workplace Bullying
Understanding and Managing Workplace Bullying
Occupational Health and Safety Industry Group
What is Social Engineering? An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Naba Ahmed
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
ericbrooks84875
The Human Factor: Debunking The Myth That Technology Drives Collaboration
The Human Factor: Debunking The Myth That Technology Drives Collaboration
C5 Insight
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
Evan Francen
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Beth Sallay
Measuring employee engagement [compatibility mode]
Measuring employee engagement [compatibility mode]
Apeiron Agency
The Accidental Insider Threat
The Accidental Insider Threat
Murray Security Services
Social Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike Bailey
Security B-Sides
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
Andrew Cannon
Bullying in the workplace
Bullying in the workplace
Noonamsom
Does internal comms hold the key to international business success?
Does internal comms hold the key to international business success?
Interact
Workforce 2020
Workforce 2020
Human Capital Media
Social engineering
Social engineering
Vîñàý Pãtêl
Role of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in Cybersecurity
Rachit Shah
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Kory Edwards
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Kory Edwards
Making long-distance relation.docx
Making long-distance relation.docx
tarifarmarie
Sociale medier, communities & relevant indhold
Sociale medier, communities & relevant indhold
Bysted
A Ux love affair
A Ux love affair
Bysted
Más contenido relacionado
Similar a Susan Agerskov - Virtual Teams
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
ZakiAhmed70
Understanding and Managing Workplace Bullying
Understanding and Managing Workplace Bullying
Occupational Health and Safety Industry Group
What is Social Engineering? An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Naba Ahmed
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
ericbrooks84875
The Human Factor: Debunking The Myth That Technology Drives Collaboration
The Human Factor: Debunking The Myth That Technology Drives Collaboration
C5 Insight
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
Evan Francen
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Beth Sallay
Measuring employee engagement [compatibility mode]
Measuring employee engagement [compatibility mode]
Apeiron Agency
The Accidental Insider Threat
The Accidental Insider Threat
Murray Security Services
Social Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike Bailey
Security B-Sides
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
Andrew Cannon
Bullying in the workplace
Bullying in the workplace
Noonamsom
Does internal comms hold the key to international business success?
Does internal comms hold the key to international business success?
Interact
Workforce 2020
Workforce 2020
Human Capital Media
Social engineering
Social engineering
Vîñàý Pãtêl
Role of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in Cybersecurity
Rachit Shah
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Kory Edwards
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Kory Edwards
Making long-distance relation.docx
Making long-distance relation.docx
tarifarmarie
Similar a Susan Agerskov - Virtual Teams
(20)
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
Understanding and Managing Workplace Bullying
Understanding and Managing Workplace Bullying
What is Social Engineering? An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
The Human Factor: Debunking The Myth That Technology Drives Collaboration
The Human Factor: Debunking The Myth That Technology Drives Collaboration
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Measuring employee engagement [compatibility mode]
Measuring employee engagement [compatibility mode]
The Accidental Insider Threat
The Accidental Insider Threat
Social Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike Bailey
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
Bullying in the workplace
Bullying in the workplace
Does internal comms hold the key to international business success?
Does internal comms hold the key to international business success?
Workforce 2020
Workforce 2020
Social engineering
Social engineering
Role of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in Cybersecurity
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Making long-distance relation.docx
Making long-distance relation.docx
Más de Bysted
Sociale medier, communities & relevant indhold
Sociale medier, communities & relevant indhold
Bysted
A Ux love affair
A Ux love affair
Bysted
Designer wanted Job advert
Designer wanted Job advert
Bysted
Er kursen sat? Analyse af strategi-kommunikation i årsrapporter
Er kursen sat? Analyse af strategi-kommunikation i årsrapporter
Bysted
Twittercensus_DK_2014_præsentation
Twittercensus_DK_2014_præsentation
Bysted
Intranet plus 200314
Intranet plus 200314
Bysted
Eksperimenter ik ek-martinhartmann_20marts
Eksperimenter ik ek-martinhartmann_20marts
Bysted
Ic intracom c_140320_til-slideshare
Ic intracom c_140320_til-slideshare
Bysted
Scope cowi bystedpresentation_2014
Scope cowi bystedpresentation_2014
Bysted
Cathrine lippert opengovernment_bysted_06-02-2014
Cathrine lippert opengovernment_bysted_06-02-2014
Bysted
Involvering offentlig-lsa-v1-2014
Involvering offentlig-lsa-v1-2014
Bysted
Åben branding i Ringsted
Åben branding i Ringsted
Bysted
Gåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da Effekt
Gåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da Effekt
Bysted
Wilke indlæg på bystedseminar november 2013
Wilke indlæg på bystedseminar november 2013
Bysted
Rasmus ghm effekter
Rasmus ghm effekter
Bysted
Hvordan laver vi en god prætest 6
Hvordan laver vi en god prætest 6
Bysted
The newcorporate
The newcorporate
Bysted
Naturen det billige skidt, oplæg af Maria Barslund fra VisitDenmark
Naturen det billige skidt, oplæg af Maria Barslund fra VisitDenmark
Bysted
Naturen det billige skidt, oplæg af Sebastian Christensen fra BYSTED
Naturen det billige skidt, oplæg af Sebastian Christensen fra BYSTED
Bysted
Naturen det billige skidt, oplæg af Christa Brønd fra MANTO
Naturen det billige skidt, oplæg af Christa Brønd fra MANTO
Bysted
Más de Bysted
(20)
Sociale medier, communities & relevant indhold
Sociale medier, communities & relevant indhold
A Ux love affair
A Ux love affair
Designer wanted Job advert
Designer wanted Job advert
Er kursen sat? Analyse af strategi-kommunikation i årsrapporter
Er kursen sat? Analyse af strategi-kommunikation i årsrapporter
Twittercensus_DK_2014_præsentation
Twittercensus_DK_2014_præsentation
Intranet plus 200314
Intranet plus 200314
Eksperimenter ik ek-martinhartmann_20marts
Eksperimenter ik ek-martinhartmann_20marts
Ic intracom c_140320_til-slideshare
Ic intracom c_140320_til-slideshare
Scope cowi bystedpresentation_2014
Scope cowi bystedpresentation_2014
Cathrine lippert opengovernment_bysted_06-02-2014
Cathrine lippert opengovernment_bysted_06-02-2014
Involvering offentlig-lsa-v1-2014
Involvering offentlig-lsa-v1-2014
Åben branding i Ringsted
Åben branding i Ringsted
Gåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da Effekt
Gåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da Effekt
Wilke indlæg på bystedseminar november 2013
Wilke indlæg på bystedseminar november 2013
Rasmus ghm effekter
Rasmus ghm effekter
Hvordan laver vi en god prætest 6
Hvordan laver vi en god prætest 6
The newcorporate
The newcorporate
Naturen det billige skidt, oplæg af Maria Barslund fra VisitDenmark
Naturen det billige skidt, oplæg af Maria Barslund fra VisitDenmark
Naturen det billige skidt, oplæg af Sebastian Christensen fra BYSTED
Naturen det billige skidt, oplæg af Sebastian Christensen fra BYSTED
Naturen det billige skidt, oplæg af Christa Brønd fra MANTO
Naturen det billige skidt, oplæg af Christa Brønd fra MANTO
Último
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
wesley chun
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
Delhi Call girls
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
hans926745
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
The Digital Insurer
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
apidays
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
Principled Technologies
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Delhi Call girls
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Remote DBA Services
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
RTylerCroy
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
jfdjdjcjdnsjd
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
naman860154
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
hans926745
Último
(20)
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
🐬 The future of MySQL is Postgres 🐘
🐬 The future of MySQL is Postgres 🐘
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
presentation ICT roal in 21st century education
presentation ICT roal in 21st century education
How to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
Susan Agerskov - Virtual Teams
1.
Susan Agerskov ©
2011 Susan Agerskov How to turn the black hole of geographically dispersed and virtual team communication into positive energy
2.
Susan Agerskov ©
2011 Defining the black hole Psychologically -> feel isolated and unnoticed motivation and loyalty diminish rapidly if members feel they have been short-changed ▪ higher turnover of staff / loss of knowledge ▪ decreased levels of knowledge transfer ▪ data theft Not to be sold or published. Sole risk with user. Author accepts no liability.
3.
Susan Agerskov ©
2011 Defining the black hole Data Leakage Worldwide Survey of IT professionals worldwideData Leakage Worldwide Survey of IT professionals worldwide Unauthorized physical and network access 39 % -> more concerned about threat from their own employees than outside hackers. Unauthorized use: 70 % said unauthorized use resulted in ≥ 50 % of data loss incidents. Remote worker security: 46 % of employees admitted to transferring files between work and personal computers. Misuse of passwords: 18 % of employees share passwords with co-workers. Rate is 25 % in China, India, and Italy. Cisco, 2008, Data Leakage Worldwide Survey (2000 respondents in 10 countries selected due to differences in social and business cultures).
4.
Susan Agerskov ©
2011 Defining the black hole Communication -> black hole is remote relational communication ▪ creating goodwill, fellow-feeling, rapport and loyalty among people with whom you have little or no face-to- face interaction ▪ non-verbal clues and feedback missing -> meaning of silence ▪ sheer amount of information available Not to be sold or published. Sole risk with user. Author accepts no liability.
5.
Susan Agerskov ©
2011 Remote Communication Difficult to manage virtually through any form of command and control. Haywood (1998), p. 18. Defining the black hole – team leader has to influence rather than control communication Not to be sold or published. Sole risk with user. Author accepts no liability.
6.
Susan Agerskov ©
2011 Defining the black hole Trust -> employees from different locations, cultures, and technical backgrounds are likely to mistrust: ▪ how their information will be used, ▪ whether they will get credit for their contributions outside team, ▪ degree to which other team members will make an equal contribution1. Lack of Trust -> affects quality of information that is exchanged: ▪ senders to withhold unfavorable but relevant information but ▪ pass on favorable but irrelevant information2 1 George, (1996), p. 40-45 / 2 Hayes, (2002), p. 117 Not to be sold or published. Sole risk with user. Author accepts no liability.
7.
Susan Agerskov ©
2011 Symbols matter: ensure same decorations in all locations Face-to-face communication is important visit employees instead of everything in Copenhagen joint meetings at least once a year Over-communicate weekly individual sessions / weekly joint session ensure all team members receive critical information simultaneously Personalization and small talk brief narratives, personal discourses in weekly updates Creating positive energy Not to be sold or published. Sole risk with user. Author accepts no liability.
8.
Susan Agerskov ©
2011 MEETING MANAGEMENT No side conversations during meetings SET EXPECTATIONS SOLICIT FEEDBACK TIE KEY PERFORMANCE INDICATORS (KPI) TO: how well communicate and collaborate, not on competition time / hours performance pay benefits qualifications expectations recognition loyalty mobility sacrifice tolerance life-balance status respect security Creating positive energy Not to be sold or published. Sole risk with user. Author accepts no liability.
9.
Susan Agerskov ©
2011 Creating positive energy Create positive energy today with: mobile: (+45) 30 95 88 87 susan@2communicate.dk www.2communicate.dk Happy Thanksgiving and thank you! Not to be sold or published. Sole risk with user. Author accepts no liability.