Feeds

Loutish users scupper collaborative technology

Socially inept choose the wrong comms tools - report

Eight steps to building an HP BladeSystem

Collaborative technologies are failing because too many users are socially inept and have poor manners, according to a report from the Leading Edge Forum, a consortium of CIOs and academics.

The problem comes because users don't know which tools to use for which purposes, and don't consider the other people involved, so if employers want to get value from the technologies they buy, they need to provide guidance and social training, said Doug Neal, the report's author and an LEF research fellow.

Many email and IM users will know from painful experience how easy it is to offend others by mistake, when all you have to work with is text, but Neal said similar problems can arise with other collaborative tools too – for example, when someone assumes that, because your diary shows uncommitted time you have nothing better to do than attend their meeting.

"This issue will get worse as new versions of MS Office and Sharepoint are rolled out with dramatically greater capabilities," he said. He added that part of the problem is that users choose collaborative tools instinctively, rather than consciously.

The forum, which is sponsored by IT services company CSC, has put together an interactive slide-show summarising its recommendations. It suggests questions people should ask themselves when deciding which tool to use, and offers advice for different types of collaboration, for example:

  • Calendaring – Don't use a broadcast meeting invitation to gauge interest in a topic.
  • Email – If you expect discussion on an issue, don't send it by email.
  • Messaging – Always assume that whatever you say by IM will be seen by others.
  • Shared filing space – Establish the owner of any reference document and a process for keeping it up to date.
  • Discussions – Aim to close as many discussions as you open.
  • Audio/web conferencing – Direct your questions to nominated participants.
  • Video conferencing – To appear natural, you must practice unnatural acts.

No, the latter is not a reference to the goat and the Shih-Tzu that the MD keeps in the videoconferencing room, it's things such as looking at the camera, not the screen, and exaggerating your expressions to give greater feedback. Gurning lessons all round, then. ®

Maximizing your infrastructure through virtualization

More from The Register

next story
You! Pirate! Stop pirating, or we shall admonish you politely. Repeatedly, if necessary
And we shall go about telling people you smell. No, not really
There's NOTHING on TV in Europe – American video DOMINATES
Even France's mega subsidies don't stop US content onslaught
Airbus promises Wi-Fi – yay – and 3D movies (meh) in new A330
If the person in front reclines their seat, this could get interesting
BBC goes offline in MASSIVE COCKUP: Stephen Fry partly muzzled
Auntie tight-lipped as major outage rolls on
UK Parliament rubber-stamps EMERGENCY data grab 'n' keep bill
Just 49 MPs oppose Drip's rushed timetable
Want to beat Verizon's slow Netflix? Get a VPN
Exec finds stream speed climbs when smuggled out
Samsung threatens to cut ties with supplier over child labour allegations
Vows to uphold 'zero tolerance' policy on underage workers
Dude, you're getting a Dell – with BITCOIN: IT giant slurps cryptocash
1. Buy PC with Bitcoin. 2. Mine more coins. 3. Goto step 1
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.