SlideShare a Scribd company logo
Susan Agerskov © 2011
Susan Agerskov
How to turn the black hole of geographically
dispersed and virtual team communication into
positive energy
Susan Agerskov © 2011
Defining the black hole
 Psychologically -> feel isolated and
unnoticed
motivation and loyalty diminish rapidly if
members feel they have been short-changed
▪ higher turnover of staff / loss of knowledge
▪ decreased levels of knowledge transfer
▪ data theft
Not to be sold or published. Sole risk with user. Author accepts no liability.
Susan Agerskov © 2011
Defining the black hole
Data Leakage Worldwide Survey of IT professionals worldwideData Leakage Worldwide Survey of IT professionals worldwide
Unauthorized physical and
network access
39 % -> more concerned about threat from
their own employees than outside hackers.
Unauthorized use: 70 % said unauthorized use resulted in ≥ 50
% of data loss incidents.
Remote worker security: 46 % of employees admitted to transferring
files between work and personal computers.
Misuse of passwords: 18 % of employees share passwords with
co-workers.
Rate is 25 % in China, India, and Italy.
Cisco, 2008, Data Leakage Worldwide Survey (2000 respondents in
10 countries selected due to differences in social and business cultures).
Susan Agerskov © 2011
Defining the black hole
 Communication -> black hole is remote
relational communication
▪ creating goodwill, fellow-feeling, rapport and loyalty
among people with whom you have little or no face-to-
face interaction
▪ non-verbal clues and feedback missing -> meaning of
silence
▪ sheer amount of information available
Not to be sold or published. Sole risk with user. Author accepts no liability.
Susan Agerskov © 2011
Remote Communication
Difficult to manage virtually through any form of command and control.
Haywood (1998), p. 18.
Defining the black hole –
team leader has to influence rather than control communication
Not to be sold or published. Sole risk with user. Author accepts no liability.
Susan Agerskov © 2011
Defining the black hole
 Trust -> employees from different locations,
cultures, and technical backgrounds are likely to
mistrust:
▪ how their information will be used,
▪ whether they will get credit for their contributions outside
team,
▪ degree to which other team members will make an equal
contribution1.
 Lack of Trust -> affects quality of information that
is exchanged:
▪ senders to withhold unfavorable but relevant information but
▪ pass on favorable but irrelevant information2
1 George, (1996), p. 40-45 / 2 Hayes, (2002), p. 117
Not to be sold or published. Sole risk with user. Author accepts no liability.
Susan Agerskov © 2011
 Symbols matter: ensure same decorations in all locations
 Face-to-face communication is important
 visit employees instead of everything in Copenhagen
 joint meetings at least once a year
 Over-communicate
 weekly individual sessions / weekly joint session
 ensure all team members receive critical information
simultaneously
 Personalization and small talk
 brief narratives, personal discourses in weekly updates
Creating positive energy
Not to be sold or published. Sole risk with user. Author accepts no liability.
Susan Agerskov © 2011
MEETING
MANAGEMENT
No side conversations
during meetings
SET EXPECTATIONS
SOLICIT FEEDBACK
TIE KEY PERFORMANCE
INDICATORS (KPI) TO:
how well communicate and
collaborate, not on
competition
time / hours
performance
pay
benefits
qualifications
expectations
recognition
loyalty
mobility
sacrifice
tolerance
life-balance
status
respect
security
Creating positive energy
Not to be sold or published. Sole risk with user. Author accepts no liability.
Susan Agerskov © 2011
Creating positive energy
Create positive energy today with:
mobile: (+45) 30 95 88 87
susan@2communicate.dk
www.2communicate.dk
Happy Thanksgiving
and thank you!
Not to be sold or published. Sole risk with user. Author accepts no liability.

More Related Content

Similar to Susan Agerskov - Virtual Teams

Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
ZakiAhmed70
 
Understanding and Managing Workplace Bullying
Understanding and Managing Workplace BullyingUnderstanding and Managing Workplace Bullying
Understanding and Managing Workplace Bullying
Occupational Health and Safety Industry Group
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
 
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts  Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Naba Ahmed
 
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docxWorkplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
ericbrooks84875
 
The Human Factor: Debunking The Myth That Technology Drives Collaboration
The Human Factor: Debunking The Myth That Technology Drives CollaborationThe Human Factor: Debunking The Myth That Technology Drives Collaboration
The Human Factor: Debunking The Myth That Technology Drives Collaboration
C5 Insight
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
Evan Francen
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Beth Sallay
 
Measuring employee engagement [compatibility mode]
Measuring employee engagement [compatibility mode]Measuring employee engagement [compatibility mode]
Measuring employee engagement [compatibility mode]
Apeiron Agency
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
Murray Security Services
 
Social Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike BaileySocial Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike Bailey
Security B-Sides
 
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
GRBN  Trust and Personal Data Survey - Presentation -  IIeX Amsterdam - Febru...GRBN  Trust and Personal Data Survey - Presentation -  IIeX Amsterdam - Febru...
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
Andrew Cannon
 
Bullying in the workplace
Bullying in the workplaceBullying in the workplace
Bullying in the workplace
Noonamsom
 
Does internal comms hold the key to international business success?
Does internal comms hold the key to international business success?Does internal comms hold the key to international business success?
Does internal comms hold the key to international business success?
Interact
 
Workforce 2020
Workforce 2020Workforce 2020
Workforce 2020
Human Capital Media
 
Social engineering
Social engineering Social engineering
Social engineering
Vîñàý Pãtêl
 
Role of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in CybersecurityRole of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in Cybersecurity
Rachit Shah
 
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized AccessSocial Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized AccessKory Edwards
 
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized AccessSocial Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized AccessKory Edwards
 

Similar to Susan Agerskov - Virtual Teams (20)

Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptxCounterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
 
Understanding and Managing Workplace Bullying
Understanding and Managing Workplace BullyingUnderstanding and Managing Workplace Bullying
Understanding and Managing Workplace Bullying
 
What is Social Engineering? An illustrated presentation.
What is Social Engineering?    An illustrated presentation.What is Social Engineering?    An illustrated presentation.
What is Social Engineering? An illustrated presentation.
 
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts  Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
 
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docxWorkplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
 
The Human Factor: Debunking The Myth That Technology Drives Collaboration
The Human Factor: Debunking The Myth That Technology Drives CollaborationThe Human Factor: Debunking The Myth That Technology Drives Collaboration
The Human Factor: Debunking The Myth That Technology Drives Collaboration
 
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to ComplianceManaging Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
 
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
 
Measuring employee engagement [compatibility mode]
Measuring employee engagement [compatibility mode]Measuring employee engagement [compatibility mode]
Measuring employee engagement [compatibility mode]
 
The Accidental Insider Threat
The Accidental Insider ThreatThe Accidental Insider Threat
The Accidental Insider Threat
 
HR Manager - NEW YORK
HR Manager - NEW YORKHR Manager - NEW YORK
HR Manager - NEW YORK
 
Social Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike BaileySocial Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike Bailey
 
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
GRBN  Trust and Personal Data Survey - Presentation -  IIeX Amsterdam - Febru...GRBN  Trust and Personal Data Survey - Presentation -  IIeX Amsterdam - Febru...
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
 
Bullying in the workplace
Bullying in the workplaceBullying in the workplace
Bullying in the workplace
 
Does internal comms hold the key to international business success?
Does internal comms hold the key to international business success?Does internal comms hold the key to international business success?
Does internal comms hold the key to international business success?
 
Workforce 2020
Workforce 2020Workforce 2020
Workforce 2020
 
Social engineering
Social engineering Social engineering
Social engineering
 
Role of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in CybersecurityRole of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in Cybersecurity
 
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized AccessSocial Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
 
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized AccessSocial Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
 

More from Bysted

Sociale medier, communities & relevant indhold
Sociale medier, communities & relevant indholdSociale medier, communities & relevant indhold
Sociale medier, communities & relevant indhold
Bysted
 
A Ux love affair
A Ux love affairA Ux love affair
A Ux love affair
Bysted
 
Designer wanted Job advert
Designer wanted Job advertDesigner wanted Job advert
Designer wanted Job advert
Bysted
 
Er kursen sat? Analyse af strategi-kommunikation i årsrapporter
Er kursen sat? Analyse af strategi-kommunikation i årsrapporterEr kursen sat? Analyse af strategi-kommunikation i årsrapporter
Er kursen sat? Analyse af strategi-kommunikation i årsrapporter
Bysted
 
Twittercensus_DK_2014_præsentation
Twittercensus_DK_2014_præsentationTwittercensus_DK_2014_præsentation
Twittercensus_DK_2014_præsentation
Bysted
 
Intranet plus 200314
Intranet plus 200314Intranet plus 200314
Intranet plus 200314
Bysted
 
Eksperimenter ik ek-martinhartmann_20marts
Eksperimenter ik ek-martinhartmann_20martsEksperimenter ik ek-martinhartmann_20marts
Eksperimenter ik ek-martinhartmann_20marts
Bysted
 
Ic intracom c_140320_til-slideshare
Ic intracom c_140320_til-slideshareIc intracom c_140320_til-slideshare
Ic intracom c_140320_til-slideshare
Bysted
 
Scope cowi bystedpresentation_2014
Scope cowi bystedpresentation_2014Scope cowi bystedpresentation_2014
Scope cowi bystedpresentation_2014
Bysted
 
Cathrine lippert opengovernment_bysted_06-02-2014
Cathrine lippert opengovernment_bysted_06-02-2014Cathrine lippert opengovernment_bysted_06-02-2014
Cathrine lippert opengovernment_bysted_06-02-2014Bysted
 
Involvering offentlig-lsa-v1-2014
Involvering offentlig-lsa-v1-2014Involvering offentlig-lsa-v1-2014
Involvering offentlig-lsa-v1-2014Bysted
 
Åben branding i Ringsted
Åben branding i RingstedÅben branding i Ringsted
Åben branding i RingstedBysted
 
Gåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da Effekt
Gåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da EffektGåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da Effekt
Gåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da Effekt
Bysted
 
Wilke indlæg på bystedseminar november 2013
Wilke   indlæg på bystedseminar november 2013Wilke   indlæg på bystedseminar november 2013
Wilke indlæg på bystedseminar november 2013Bysted
 
Rasmus ghm effekter
Rasmus ghm effekterRasmus ghm effekter
Rasmus ghm effekterBysted
 
Hvordan laver vi en god prætest 6
Hvordan laver vi en god prætest 6Hvordan laver vi en god prætest 6
Hvordan laver vi en god prætest 6Bysted
 
The newcorporate
The newcorporate The newcorporate
The newcorporate
Bysted
 
Naturen det billige skidt, oplæg af Maria Barslund fra VisitDenmark
Naturen det billige skidt, oplæg af Maria Barslund fra VisitDenmarkNaturen det billige skidt, oplæg af Maria Barslund fra VisitDenmark
Naturen det billige skidt, oplæg af Maria Barslund fra VisitDenmarkBysted
 
Naturen det billige skidt, oplæg af Sebastian Christensen fra BYSTED
Naturen det billige skidt, oplæg af Sebastian Christensen fra BYSTEDNaturen det billige skidt, oplæg af Sebastian Christensen fra BYSTED
Naturen det billige skidt, oplæg af Sebastian Christensen fra BYSTEDBysted
 
Naturen det billige skidt, oplæg af Christa Brønd fra MANTO
Naturen det billige skidt, oplæg af Christa Brønd fra MANTONaturen det billige skidt, oplæg af Christa Brønd fra MANTO
Naturen det billige skidt, oplæg af Christa Brønd fra MANTOBysted
 

More from Bysted (20)

Sociale medier, communities & relevant indhold
Sociale medier, communities & relevant indholdSociale medier, communities & relevant indhold
Sociale medier, communities & relevant indhold
 
A Ux love affair
A Ux love affairA Ux love affair
A Ux love affair
 
Designer wanted Job advert
Designer wanted Job advertDesigner wanted Job advert
Designer wanted Job advert
 
Er kursen sat? Analyse af strategi-kommunikation i årsrapporter
Er kursen sat? Analyse af strategi-kommunikation i årsrapporterEr kursen sat? Analyse af strategi-kommunikation i årsrapporter
Er kursen sat? Analyse af strategi-kommunikation i årsrapporter
 
Twittercensus_DK_2014_præsentation
Twittercensus_DK_2014_præsentationTwittercensus_DK_2014_præsentation
Twittercensus_DK_2014_præsentation
 
Intranet plus 200314
Intranet plus 200314Intranet plus 200314
Intranet plus 200314
 
Eksperimenter ik ek-martinhartmann_20marts
Eksperimenter ik ek-martinhartmann_20martsEksperimenter ik ek-martinhartmann_20marts
Eksperimenter ik ek-martinhartmann_20marts
 
Ic intracom c_140320_til-slideshare
Ic intracom c_140320_til-slideshareIc intracom c_140320_til-slideshare
Ic intracom c_140320_til-slideshare
 
Scope cowi bystedpresentation_2014
Scope cowi bystedpresentation_2014Scope cowi bystedpresentation_2014
Scope cowi bystedpresentation_2014
 
Cathrine lippert opengovernment_bysted_06-02-2014
Cathrine lippert opengovernment_bysted_06-02-2014Cathrine lippert opengovernment_bysted_06-02-2014
Cathrine lippert opengovernment_bysted_06-02-2014
 
Involvering offentlig-lsa-v1-2014
Involvering offentlig-lsa-v1-2014Involvering offentlig-lsa-v1-2014
Involvering offentlig-lsa-v1-2014
 
Åben branding i Ringsted
Åben branding i RingstedÅben branding i Ringsted
Åben branding i Ringsted
 
Gåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da Effekt
Gåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da EffektGåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da Effekt
Gåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da Effekt
 
Wilke indlæg på bystedseminar november 2013
Wilke   indlæg på bystedseminar november 2013Wilke   indlæg på bystedseminar november 2013
Wilke indlæg på bystedseminar november 2013
 
Rasmus ghm effekter
Rasmus ghm effekterRasmus ghm effekter
Rasmus ghm effekter
 
Hvordan laver vi en god prætest 6
Hvordan laver vi en god prætest 6Hvordan laver vi en god prætest 6
Hvordan laver vi en god prætest 6
 
The newcorporate
The newcorporate The newcorporate
The newcorporate
 
Naturen det billige skidt, oplæg af Maria Barslund fra VisitDenmark
Naturen det billige skidt, oplæg af Maria Barslund fra VisitDenmarkNaturen det billige skidt, oplæg af Maria Barslund fra VisitDenmark
Naturen det billige skidt, oplæg af Maria Barslund fra VisitDenmark
 
Naturen det billige skidt, oplæg af Sebastian Christensen fra BYSTED
Naturen det billige skidt, oplæg af Sebastian Christensen fra BYSTEDNaturen det billige skidt, oplæg af Sebastian Christensen fra BYSTED
Naturen det billige skidt, oplæg af Sebastian Christensen fra BYSTED
 
Naturen det billige skidt, oplæg af Christa Brønd fra MANTO
Naturen det billige skidt, oplæg af Christa Brønd fra MANTONaturen det billige skidt, oplæg af Christa Brønd fra MANTO
Naturen det billige skidt, oplæg af Christa Brønd fra MANTO
 

Recently uploaded

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
Frank van Harmelen
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
g2nightmarescribd
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
Product School
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
Alan Dix
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
Safe Software
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
91mobiles
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
ControlCase
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
OnBoard
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
DianaGray10
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Tobias Schneck
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
Paul Groth
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Product School
 

Recently uploaded (20)

Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*Neuro-symbolic is not enough, we need neuro-*semantic*
Neuro-symbolic is not enough, we need neuro-*semantic*
 
Generating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using SmithyGenerating a custom Ruby SDK for your web service or Rails API using Smithy
Generating a custom Ruby SDK for your web service or Rails API using Smithy
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
Epistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI supportEpistemic Interaction - tuning interfaces to provide information for AI support
Epistemic Interaction - tuning interfaces to provide information for AI support
 
Essentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with ParametersEssentials of Automations: Optimizing FME Workflows with Parameters
Essentials of Automations: Optimizing FME Workflows with Parameters
 
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdfFIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
FIDO Alliance Osaka Seminar: The WebAuthn API and Discoverable Credentials.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
PCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase TeamPCI PIN Basics Webinar from the Controlcase Team
PCI PIN Basics Webinar from the Controlcase Team
 
FIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdfFIDO Alliance Osaka Seminar: Overview.pdf
FIDO Alliance Osaka Seminar: Overview.pdf
 
Leading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdfLeading Change strategies and insights for effective change management pdf 1.pdf
Leading Change strategies and insights for effective change management pdf 1.pdf
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3UiPath Test Automation using UiPath Test Suite series, part 3
UiPath Test Automation using UiPath Test Suite series, part 3
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMsTo Graph or Not to Graph Knowledge Graph Architectures and LLMs
To Graph or Not to Graph Knowledge Graph Architectures and LLMs
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 

Susan Agerskov - Virtual Teams

  • 1. Susan Agerskov © 2011 Susan Agerskov How to turn the black hole of geographically dispersed and virtual team communication into positive energy
  • 2. Susan Agerskov © 2011 Defining the black hole  Psychologically -> feel isolated and unnoticed motivation and loyalty diminish rapidly if members feel they have been short-changed ▪ higher turnover of staff / loss of knowledge ▪ decreased levels of knowledge transfer ▪ data theft Not to be sold or published. Sole risk with user. Author accepts no liability.
  • 3. Susan Agerskov © 2011 Defining the black hole Data Leakage Worldwide Survey of IT professionals worldwideData Leakage Worldwide Survey of IT professionals worldwide Unauthorized physical and network access 39 % -> more concerned about threat from their own employees than outside hackers. Unauthorized use: 70 % said unauthorized use resulted in ≥ 50 % of data loss incidents. Remote worker security: 46 % of employees admitted to transferring files between work and personal computers. Misuse of passwords: 18 % of employees share passwords with co-workers. Rate is 25 % in China, India, and Italy. Cisco, 2008, Data Leakage Worldwide Survey (2000 respondents in 10 countries selected due to differences in social and business cultures).
  • 4. Susan Agerskov © 2011 Defining the black hole  Communication -> black hole is remote relational communication ▪ creating goodwill, fellow-feeling, rapport and loyalty among people with whom you have little or no face-to- face interaction ▪ non-verbal clues and feedback missing -> meaning of silence ▪ sheer amount of information available Not to be sold or published. Sole risk with user. Author accepts no liability.
  • 5. Susan Agerskov © 2011 Remote Communication Difficult to manage virtually through any form of command and control. Haywood (1998), p. 18. Defining the black hole – team leader has to influence rather than control communication Not to be sold or published. Sole risk with user. Author accepts no liability.
  • 6. Susan Agerskov © 2011 Defining the black hole  Trust -> employees from different locations, cultures, and technical backgrounds are likely to mistrust: ▪ how their information will be used, ▪ whether they will get credit for their contributions outside team, ▪ degree to which other team members will make an equal contribution1.  Lack of Trust -> affects quality of information that is exchanged: ▪ senders to withhold unfavorable but relevant information but ▪ pass on favorable but irrelevant information2 1 George, (1996), p. 40-45 / 2 Hayes, (2002), p. 117 Not to be sold or published. Sole risk with user. Author accepts no liability.
  • 7. Susan Agerskov © 2011  Symbols matter: ensure same decorations in all locations  Face-to-face communication is important  visit employees instead of everything in Copenhagen  joint meetings at least once a year  Over-communicate  weekly individual sessions / weekly joint session  ensure all team members receive critical information simultaneously  Personalization and small talk  brief narratives, personal discourses in weekly updates Creating positive energy Not to be sold or published. Sole risk with user. Author accepts no liability.
  • 8. Susan Agerskov © 2011 MEETING MANAGEMENT No side conversations during meetings SET EXPECTATIONS SOLICIT FEEDBACK TIE KEY PERFORMANCE INDICATORS (KPI) TO: how well communicate and collaborate, not on competition time / hours performance pay benefits qualifications expectations recognition loyalty mobility sacrifice tolerance life-balance status respect security Creating positive energy Not to be sold or published. Sole risk with user. Author accepts no liability.
  • 9. Susan Agerskov © 2011 Creating positive energy Create positive energy today with: mobile: (+45) 30 95 88 87 susan@2communicate.dk www.2communicate.dk Happy Thanksgiving and thank you! Not to be sold or published. Sole risk with user. Author accepts no liability.