Suche senden
Hochladen
Susan Agerskov - Virtual Teams
•
0 gefällt mir
•
1,266 views
Bysted
Folgen
Technologie
Business
Melden
Teilen
Melden
Teilen
1 von 9
Empfohlen
Grapevine Communication
Grapevine Communication
Olaniyan Oyindamola,ACIM
Social Impact of Technology: Cellphones & Relationships
Social Impact of Technology: Cellphones & Relationships
matharkness
Making Lync VDI work best in your virtualization environment
Making Lync VDI work best in your virtualization environment
Digicomp Academy AG
Anwar csse presentation
Anwar csse presentation
Arif Anwar
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
Murray Security Services
People communicate effectively throughout the organisation
People communicate effectively throughout the organisation
pludoni GmbH
Managerial Communication
Managerial Communication
DAVIS THOMAS
Achieving Accelerated Organisation Change through Internal Networks
Achieving Accelerated Organisation Change through Internal Networks
Optimice
Empfohlen
Grapevine Communication
Grapevine Communication
Olaniyan Oyindamola,ACIM
Social Impact of Technology: Cellphones & Relationships
Social Impact of Technology: Cellphones & Relationships
matharkness
Making Lync VDI work best in your virtualization environment
Making Lync VDI work best in your virtualization environment
Digicomp Academy AG
Anwar csse presentation
Anwar csse presentation
Arif Anwar
Accidental Insider Threat - 2018 Version
Accidental Insider Threat - 2018 Version
Murray Security Services
People communicate effectively throughout the organisation
People communicate effectively throughout the organisation
pludoni GmbH
Managerial Communication
Managerial Communication
DAVIS THOMAS
Achieving Accelerated Organisation Change through Internal Networks
Achieving Accelerated Organisation Change through Internal Networks
Optimice
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
ZakiAhmed70
Understanding and Managing Workplace Bullying
Understanding and Managing Workplace Bullying
Occupational Health and Safety Industry Group
What is Social Engineering? An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Naba Ahmed
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
ericbrooks84875
The Human Factor: Debunking The Myth That Technology Drives Collaboration
The Human Factor: Debunking The Myth That Technology Drives Collaboration
C5 Insight
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
Evan Francen
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Beth Sallay
Measuring employee engagement [compatibility mode]
Measuring employee engagement [compatibility mode]
Apeiron Agency
The Accidental Insider Threat
The Accidental Insider Threat
Murray Security Services
HR Manager - NEW YORK
HR Manager - NEW YORK
Gavin_Interactive_Heads
Social Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike Bailey
Security B-Sides
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
Andrew Cannon
Bullying in the workplace
Bullying in the workplace
Noonamsom
Does internal comms hold the key to international business success?
Does internal comms hold the key to international business success?
Interact
Workforce 2020
Workforce 2020
Human Capital Media
Social engineering
Social engineering
Vîñàý Pãtêl
Role of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in Cybersecurity
Rachit Shah
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Kory Edwards
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Kory Edwards
Sociale medier, communities & relevant indhold
Sociale medier, communities & relevant indhold
Bysted
A Ux love affair
A Ux love affair
Bysted
Weitere ähnliche Inhalte
Ähnlich wie Susan Agerskov - Virtual Teams
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
ZakiAhmed70
Understanding and Managing Workplace Bullying
Understanding and Managing Workplace Bullying
Occupational Health and Safety Industry Group
What is Social Engineering? An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Pratum
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Naba Ahmed
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
ericbrooks84875
The Human Factor: Debunking The Myth That Technology Drives Collaboration
The Human Factor: Debunking The Myth That Technology Drives Collaboration
C5 Insight
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
Evan Francen
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Beth Sallay
Measuring employee engagement [compatibility mode]
Measuring employee engagement [compatibility mode]
Apeiron Agency
The Accidental Insider Threat
The Accidental Insider Threat
Murray Security Services
HR Manager - NEW YORK
HR Manager - NEW YORK
Gavin_Interactive_Heads
Social Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike Bailey
Security B-Sides
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
Andrew Cannon
Bullying in the workplace
Bullying in the workplace
Noonamsom
Does internal comms hold the key to international business success?
Does internal comms hold the key to international business success?
Interact
Workforce 2020
Workforce 2020
Human Capital Media
Social engineering
Social engineering
Vîñàý Pãtêl
Role of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in Cybersecurity
Rachit Shah
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Kory Edwards
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Kory Edwards
Ähnlich wie Susan Agerskov - Virtual Teams
(20)
Counterintelligence & The Insider Threat January 2019 (1).pptx
Counterintelligence & The Insider Threat January 2019 (1).pptx
Understanding and Managing Workplace Bullying
Understanding and Managing Workplace Bullying
What is Social Engineering? An illustrated presentation.
What is Social Engineering? An illustrated presentation.
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Workplace Wellness: The Missing Piece of your Employee Engagement Efforts
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
Workplace Bullying Costly and PreventablefalseWiedmer, Terry L..docx
The Human Factor: Debunking The Myth That Technology Drives Collaboration
The Human Factor: Debunking The Myth That Technology Drives Collaboration
Managing Risk or Reacting to Compliance
Managing Risk or Reacting to Compliance
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Why Do Some People Fall for Phishing Scams and What Do I Do About it?
Measuring employee engagement [compatibility mode]
Measuring employee engagement [compatibility mode]
The Accidental Insider Threat
The Accidental Insider Threat
HR Manager - NEW YORK
HR Manager - NEW YORK
Social Penetration - Mike Murray and Mike Bailey
Social Penetration - Mike Murray and Mike Bailey
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
GRBN Trust and Personal Data Survey - Presentation - IIeX Amsterdam - Febru...
Bullying in the workplace
Bullying in the workplace
Does internal comms hold the key to international business success?
Does internal comms hold the key to international business success?
Workforce 2020
Workforce 2020
Social engineering
Social engineering
Role of Sentiment Analysis in Cybersecurity
Role of Sentiment Analysis in Cybersecurity
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Social Engineering-The Underpinning of Unauthorized Access
Mehr von Bysted
Sociale medier, communities & relevant indhold
Sociale medier, communities & relevant indhold
Bysted
A Ux love affair
A Ux love affair
Bysted
Designer wanted Job advert
Designer wanted Job advert
Bysted
Er kursen sat? Analyse af strategi-kommunikation i årsrapporter
Er kursen sat? Analyse af strategi-kommunikation i årsrapporter
Bysted
Twittercensus_DK_2014_præsentation
Twittercensus_DK_2014_præsentation
Bysted
Intranet plus 200314
Intranet plus 200314
Bysted
Eksperimenter ik ek-martinhartmann_20marts
Eksperimenter ik ek-martinhartmann_20marts
Bysted
Ic intracom c_140320_til-slideshare
Ic intracom c_140320_til-slideshare
Bysted
Scope cowi bystedpresentation_2014
Scope cowi bystedpresentation_2014
Bysted
Cathrine lippert opengovernment_bysted_06-02-2014
Cathrine lippert opengovernment_bysted_06-02-2014
Bysted
Involvering offentlig-lsa-v1-2014
Involvering offentlig-lsa-v1-2014
Bysted
Åben branding i Ringsted
Åben branding i Ringsted
Bysted
Gåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da Effekt
Gåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da Effekt
Bysted
Wilke indlæg på bystedseminar november 2013
Wilke indlæg på bystedseminar november 2013
Bysted
Rasmus ghm effekter
Rasmus ghm effekter
Bysted
Hvordan laver vi en god prætest 6
Hvordan laver vi en god prætest 6
Bysted
The newcorporate
The newcorporate
Bysted
Naturen det billige skidt, oplæg af Maria Barslund fra VisitDenmark
Naturen det billige skidt, oplæg af Maria Barslund fra VisitDenmark
Bysted
Naturen det billige skidt, oplæg af Sebastian Christensen fra BYSTED
Naturen det billige skidt, oplæg af Sebastian Christensen fra BYSTED
Bysted
Naturen det billige skidt, oplæg af Christa Brønd fra MANTO
Naturen det billige skidt, oplæg af Christa Brønd fra MANTO
Bysted
Mehr von Bysted
(20)
Sociale medier, communities & relevant indhold
Sociale medier, communities & relevant indhold
A Ux love affair
A Ux love affair
Designer wanted Job advert
Designer wanted Job advert
Er kursen sat? Analyse af strategi-kommunikation i årsrapporter
Er kursen sat? Analyse af strategi-kommunikation i årsrapporter
Twittercensus_DK_2014_præsentation
Twittercensus_DK_2014_præsentation
Intranet plus 200314
Intranet plus 200314
Eksperimenter ik ek-martinhartmann_20marts
Eksperimenter ik ek-martinhartmann_20marts
Ic intracom c_140320_til-slideshare
Ic intracom c_140320_til-slideshare
Scope cowi bystedpresentation_2014
Scope cowi bystedpresentation_2014
Cathrine lippert opengovernment_bysted_06-02-2014
Cathrine lippert opengovernment_bysted_06-02-2014
Involvering offentlig-lsa-v1-2014
Involvering offentlig-lsa-v1-2014
Åben branding i Ringsted
Åben branding i Ringsted
Gåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da Effekt
Gåhjemmøde 07.11.2013 - Kampagner: Så Giv Os Da Effekt
Wilke indlæg på bystedseminar november 2013
Wilke indlæg på bystedseminar november 2013
Rasmus ghm effekter
Rasmus ghm effekter
Hvordan laver vi en god prætest 6
Hvordan laver vi en god prætest 6
The newcorporate
The newcorporate
Naturen det billige skidt, oplæg af Maria Barslund fra VisitDenmark
Naturen det billige skidt, oplæg af Maria Barslund fra VisitDenmark
Naturen det billige skidt, oplæg af Sebastian Christensen fra BYSTED
Naturen det billige skidt, oplæg af Sebastian Christensen fra BYSTED
Naturen det billige skidt, oplæg af Christa Brønd fra MANTO
Naturen det billige skidt, oplæg af Christa Brønd fra MANTO
Kürzlich hochgeladen
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
Enterprise Knowledge
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
ThousandEyes
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
The Digital Insurer
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
gurkirankumar98700
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
HampshireHUG
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Miguel Araújo
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
debabhi2
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Neo4j
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
Paola De la Torre
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
Gabriella Davis
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
Malak Abu Hammad
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Martijn de Jong
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Igalia
Slack Application Development 101 Slides
Slack Application Development 101 Slides
praypatel2
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
Sinan KOZAK
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Delhi Call girls
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
naman860154
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Allon Mureinik
Kürzlich hochgeladen
(20)
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Slack Application Development 101 Slides
Slack Application Development 101 Slides
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
Susan Agerskov - Virtual Teams
1.
Susan Agerskov ©
2011 Susan Agerskov How to turn the black hole of geographically dispersed and virtual team communication into positive energy
2.
Susan Agerskov ©
2011 Defining the black hole Psychologically -> feel isolated and unnoticed motivation and loyalty diminish rapidly if members feel they have been short-changed ▪ higher turnover of staff / loss of knowledge ▪ decreased levels of knowledge transfer ▪ data theft Not to be sold or published. Sole risk with user. Author accepts no liability.
3.
Susan Agerskov ©
2011 Defining the black hole Data Leakage Worldwide Survey of IT professionals worldwideData Leakage Worldwide Survey of IT professionals worldwide Unauthorized physical and network access 39 % -> more concerned about threat from their own employees than outside hackers. Unauthorized use: 70 % said unauthorized use resulted in ≥ 50 % of data loss incidents. Remote worker security: 46 % of employees admitted to transferring files between work and personal computers. Misuse of passwords: 18 % of employees share passwords with co-workers. Rate is 25 % in China, India, and Italy. Cisco, 2008, Data Leakage Worldwide Survey (2000 respondents in 10 countries selected due to differences in social and business cultures).
4.
Susan Agerskov ©
2011 Defining the black hole Communication -> black hole is remote relational communication ▪ creating goodwill, fellow-feeling, rapport and loyalty among people with whom you have little or no face-to- face interaction ▪ non-verbal clues and feedback missing -> meaning of silence ▪ sheer amount of information available Not to be sold or published. Sole risk with user. Author accepts no liability.
5.
Susan Agerskov ©
2011 Remote Communication Difficult to manage virtually through any form of command and control. Haywood (1998), p. 18. Defining the black hole – team leader has to influence rather than control communication Not to be sold or published. Sole risk with user. Author accepts no liability.
6.
Susan Agerskov ©
2011 Defining the black hole Trust -> employees from different locations, cultures, and technical backgrounds are likely to mistrust: ▪ how their information will be used, ▪ whether they will get credit for their contributions outside team, ▪ degree to which other team members will make an equal contribution1. Lack of Trust -> affects quality of information that is exchanged: ▪ senders to withhold unfavorable but relevant information but ▪ pass on favorable but irrelevant information2 1 George, (1996), p. 40-45 / 2 Hayes, (2002), p. 117 Not to be sold or published. Sole risk with user. Author accepts no liability.
7.
Susan Agerskov ©
2011 Symbols matter: ensure same decorations in all locations Face-to-face communication is important visit employees instead of everything in Copenhagen joint meetings at least once a year Over-communicate weekly individual sessions / weekly joint session ensure all team members receive critical information simultaneously Personalization and small talk brief narratives, personal discourses in weekly updates Creating positive energy Not to be sold or published. Sole risk with user. Author accepts no liability.
8.
Susan Agerskov ©
2011 MEETING MANAGEMENT No side conversations during meetings SET EXPECTATIONS SOLICIT FEEDBACK TIE KEY PERFORMANCE INDICATORS (KPI) TO: how well communicate and collaborate, not on competition time / hours performance pay benefits qualifications expectations recognition loyalty mobility sacrifice tolerance life-balance status respect security Creating positive energy Not to be sold or published. Sole risk with user. Author accepts no liability.
9.
Susan Agerskov ©
2011 Creating positive energy Create positive energy today with: mobile: (+45) 30 95 88 87 susan@2communicate.dk www.2communicate.dk Happy Thanksgiving and thank you! Not to be sold or published. Sole risk with user. Author accepts no liability.