SlideShare ist ein Scribd-Unternehmen logo
1 von 38
Downloaden Sie, um offline zu lesen
Karnataka State Police
Sanjay Sahay,
IGP, Eastern Range
Karnataka State Police
Deployment of ERP Software
Change Management Issues
20th Dec 2011
The only permanent issue in human existence is
Change
Change
Change
Stone Age to Digital Age
Slash and Burn to Commercial Cultivation
Naturalism to understanding nature
Travel by walk to Space Shuttles and A380s
Barter to MNCs
CHANGE IS THE DNA OF HUMAN EXISTENCE , INDIVIDUAL,CHANGE IS THE DNA OF HUMAN EXISTENCE , INDIVIDUAL,CHANGE IS THE DNA OF HUMAN EXISTENCE , INDIVIDUAL,CHANGE IS THE DNA OF HUMAN EXISTENCE , INDIVIDUAL,
SOCIETAL AND COMMERCIALSOCIETAL AND COMMERCIALSOCIETAL AND COMMERCIALSOCIETAL AND COMMERCIAL
The Challenge-Complex Issues and even more complex
Challenge & The Core
The Challenge-Complex Issues and even more complex
setting.
The Core- Passion, Stimulating an Innovative Culture
and Creating a Learning Organisation
Practitioner’s Speak- An experiential Story
Transformational Change
Change
Management
Transformational Change
Complete Computerisation Process
Software is treated as the flagship of change
Creation of State Police Data Center
Connectivity across the State
Capacity Building
Change management is a structured approach to
shifting/transitioning individuals, teams,
Change Management
shifting/transitioning individuals, teams,
and organizations from a current state to a desired future
state.
It is an organizational process aimed at helping
employees to accept and embrace changes in their
current business environment.
Change Management
In project management, change management
refers to a project management process where
changes to a project are formally introduced and
approved
Creator/Developer
The Same Leader - Change Better Controlled and
Simpler
Practitioner Deployer Stabliser
Ingredients
Understanding Change
Change Management
Understanding Change
Addressing Change
Implementing Change
Leading Change
Idea of an ERP system
Hardware
SoftwareConnectivity
Need for change
Internally, the need for change was non-existing.
Understanding Change
Internally, the need for change was non-existing.
The employee & staff were working without digital aids.
They also believed computers/computerization did not
bring any transformational change and would have merely
the same impact as in the case of physical logistics and
infrastructure i.e vehicles, wireless sets, weaponry,
buildings and the like.
Need for change
This was the true reflection of the splendid
Understanding Change
This was the true reflection of the splendid
isolation of the dept, willingly.
Needless to say any dept desperately need
completely digital in the true sense of the term, it is
the police department because we don’t decide our
requirement.
Need for change
Understanding Change
the enemies of society decide our requirements and
today those are the people who are the best
practitioners of digital technology, which have been
demonstrated over and over again by innumerable
instances of money laundering, mafia operations,
narcotics and varieties of terror impacting the country.
Role of change in the organization
Understanding Change…
The software itself was the change.
Just deploying the software brings a complete
metamorphosis in the dept.
Simple issues like anti-virus in the whole of
servers/clients were needed for initiating change.
Nature of Change
Understanding Change…
Magnitude of the likely change
Scope of the chang
Periodicity of change- The roll out
Plan
Response to change
Understanding Change…
The police dept is resistant to any form of change.
As an organisation we are averse to technology
When the change was started, it was told to be
undoable and I was advised to follow my predecessors.
Addressing Change
Burning Platform
With ICT taking over as a Tsunami, there was
absolutely no other option than computerizing each
and every operation.
In the year of 2000-2001 Crime, Criminal
Information System was introducedwhich was
skeletal in nature, covered on investigation.
Addressing Change…
Facilitators of change
Overall knowledge of the subject and
the way in which the change mgmtthe way in which the change mgmt
would be effective in the dept.
Team comprising of officers who had
exposure in engineering/management
education or had some inclination
towards either technology or change
Addressing Change…
Restraining forces
The problem was that the software was far tooThe problem was that the software was far too
advanced for all people involved to understand.
Besides that, was the complexity of the nature of
human resources, timelines, funding and expected
delivery systems.
The need to have a set of precursors before the change
management thought is launched.
Addressing Change…
Types of resistance
Individual level
Organizational level
Addressing Change…
Handling the restraining forces
Training mechanism in place—to
provide the bridge to the humanprovide the bridge to the human
resources a lot of precursors has to
be solved .
Training- every person part of this
training.
Metrics- should be unique for each
person.
Addressing Change…
the precursors
Precursors
Functional State Police State Center
Creation of Primary Network
Anti Virus, Facilities and Asset Management
Creation of training infrastructure
Other training resources- trainers, methodology,
training material etc
Addressing Change…
The Wipro Story
Addressing Change…
The Advance State BattleThe Advance State Battle
the beginning of success
THE FUNCTIONAL CYCLE
• Mission
Mode Project
• Wipro, the
developer
Police IT CCTNS
• GoI accepts
Karnataka as
a lead state
• Both the
projects get
integrated
Lead
State
CCTNS
Police IT
KSP Wide Area Network
39 locations
2 Mbps leased line
1400 locations
512 Kbps VPNoBB
SPDC
10 Mbps
aggregation bandwidth
4 Mbps
Internet leased line
SPDC
KSPWAN Network Architecture
VPNoBB
VPNoBB
Addressing Change…
Handling the restraining forces
Training mechanism in place—to
provide the bridge to the humanprovide the bridge to the human
resources a lot of precursors has to
be solved .
Training- every person part of this
training.
Metrics- should be unique for each
person.
Implementing Change…
Work Culture of the Organization
Implementing Change…
The Data Bases
End User Matrix, Training
accomplished & needs, Systemaccomplished & needs, System
Administrators, Change requests,
Traceability Matrix, Assets et al
Implementing Change…
leadership story
the strategic way
Talent Acquisition with the Police Force- relying on Legacy
Robust Training Model for the Operating StaffRobust Training Model for the Operating Staff
Adequate compensation and benefit schemes
High level of motivation and leadership
Balanced Stakeholder Management
Choosing Appropriate implementation partner
Interacting with intellectuals
Role of leadership- leading from the front and people management
Commitment of the top management
ref: ICT Enable Change in Indian Police Service, A case of leadership and
drive in Karnataka by Dr. Jaba Mukherjee and Prof Vinit Thakur of TAPMI
Implementing Change…
Communicating the change
The role of communicator in bringing about
the change?
As the change progresses, the change should
start to percolate i.e. must be communicated
across the layers in the org from top down.
Communication was in a multi-faceted
manner.
Communicated the progress being made to
execute the precursors- broadband
networking, system administrator training,
Nodal Officers
Implementing Change…
The CEO Story
CorporateCorporate
History is
replete with
instances of the
top leader
effecting
monumental
change
Implementing Change…
Role of Leadership
Under a dynamic leadership, the
level of uncertainty that you canlevel of uncertainty that you can
handle is the level of change you can
deliver.
How much does
reputation/personality play a role in
bringing about change- ability to
deliver successfully, continuously in a
robust manner in the times to come?
Implementing Change…
Attributes of a change leader
Critical location in the change
management physical process.management physical process.
Expertise in performing his tasks
Being a role model for his
subordinates
Ability to train
Comfort level in initiating the change
Feeling capable of handling change
with ease.
Implementing Change…
Type of Leadership adopted
Can benevolent aggression and
coercion be a tool for bringingcoercion be a tool for bringing
change?
Is it easier to bring the
precursors of change management
if right amount or type of coercion
is used?
Sustaining Change
Any org can sustain change only if they have
a core team which is shrewd enough toa core team which is shrewd enough to
adapt to the change environment and get
into the production mode. In a nebulous
organisation, or just a workable
organisation, no change of any worthwhile
nature can be brought in.
CHANGE HAS TO BE IRREVERSIBLECHANGE HAS TO BE IRREVERSIBLECHANGE HAS TO BE IRREVERSIBLECHANGE HAS TO BE IRREVERSIBLE
Thank YouThank You

Weitere ähnliche Inhalte

Was ist angesagt?

Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Harsh Bhanushali
 
Cyber Security
Cyber SecurityCyber Security
Cyber SecurityIllumeo
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsAlex G. Lee, Ph.D. Esq. CLP
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber securitySandip Juthani
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDMApperian
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsDinesh O Bareja
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?IndSightsResearchSG
 
IoT advatage and disadvantage
IoT advatage and disadvantageIoT advatage and disadvantage
IoT advatage and disadvantageRubel Biswas
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityPriyanshu Ratnakar
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceNowSecure
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceFaction XYZ
 
Cyber Security & Cyber Security Threats
Cyber Security & Cyber Security ThreatsCyber Security & Cyber Security Threats
Cyber Security & Cyber Security ThreatsSiemplify
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityOlivier Busolini
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationE.S.G. JR. Consulting, Inc.
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-statusRama Reddy
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation♟Sergej Epp
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security IssuesPhearin Sok
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16James Rutt
 

Was ist angesagt? (20)

Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)Cyber Security in AI (Artificial Intelligence)
Cyber Security in AI (Artificial Intelligence)
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
Deep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from PatentsDeep Learning for Cybersecurity Innovation Insights from Patents
Deep Learning for Cybersecurity Innovation Insights from Patents
 
The future of cyber security
The future of cyber securityThe future of cyber security
The future of cyber security
 
Shrinking Role of MDM
Shrinking Role of MDMShrinking Role of MDM
Shrinking Role of MDM
 
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in CorporationsManaging Frequently Overlooked Risks & Threats (FORTS) in Corporations
Managing Frequently Overlooked Risks & Threats (FORTS) in Corporations
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
 
IoT advatage and disadvantage
IoT advatage and disadvantageIoT advatage and disadvantage
IoT advatage and disadvantage
 
Artificial Intelligence for Cyber Security
Artificial Intelligence for Cyber SecurityArtificial Intelligence for Cyber Security
Artificial Intelligence for Cyber Security
 
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligenceDelivering secure mobile financial services (MFS) - "Frictionless" vs diligence
Delivering secure mobile financial services (MFS) - "Frictionless" vs diligence
 
Security in the age of Artificial Intelligence
Security in the age of Artificial IntelligenceSecurity in the age of Artificial Intelligence
Security in the age of Artificial Intelligence
 
Cyber Security & Cyber Security Threats
Cyber Security & Cyber Security ThreatsCyber Security & Cyber Security Threats
Cyber Security & Cyber Security Threats
 
Cloud & Cybersecurity
Cloud & CybersecurityCloud & Cybersecurity
Cloud & Cybersecurity
 
Cyber security basics
Cyber security basics Cyber security basics
Cyber security basics
 
Artificial Intelligence and Cybersecurity
Artificial Intelligence and CybersecurityArtificial Intelligence and Cybersecurity
Artificial Intelligence and Cybersecurity
 
Toward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network AutomationToward Continuous Cybersecurity with Network Automation
Toward Continuous Cybersecurity with Network Automation
 
Cyber security-in-india-present-status
Cyber security-in-india-present-statusCyber security-in-india-present-status
Cyber security-in-india-present-status
 
Cyber Defense Automation
Cyber Defense AutomationCyber Defense Automation
Cyber Defense Automation
 
Pervasive computing and its Security Issues
Pervasive computing and its Security IssuesPervasive computing and its Security Issues
Pervasive computing and its Security Issues
 
Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16Cybersecurity-Real World Approach FINAL 2-24-16
Cybersecurity-Real World Approach FINAL 2-24-16
 

Ähnlich wie Karnataka State Police Deployment of ERP Software KIAMS

IT Ops Modernization Helps Energy Powerhouse Exelon Master the Art of Mergers...
IT Ops Modernization Helps Energy Powerhouse Exelon Master the Art of Mergers...IT Ops Modernization Helps Energy Powerhouse Exelon Master the Art of Mergers...
IT Ops Modernization Helps Energy Powerhouse Exelon Master the Art of Mergers...Dana Gardner
 
Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...subramanian K
 
5 Keys to Mastering Today's Communication Domain
5 Keys to Mastering Today's Communication Domain5 Keys to Mastering Today's Communication Domain
5 Keys to Mastering Today's Communication DomainAvaya Inc.
 
The Emerging Role Of The Cio
The Emerging Role Of The CioThe Emerging Role Of The Cio
The Emerging Role Of The CioNirvesh Sooful
 
100531 it management dpa upload
100531 it management dpa upload100531 it management dpa upload
100531 it management dpa uploadplpictimatec
 
Shane-Kerry-Sanja---The-Art-and-Science-of-Change-in-SAP-Implementations-libre
Shane-Kerry-Sanja---The-Art-and-Science-of-Change-in-SAP-Implementations-libreShane-Kerry-Sanja---The-Art-and-Science-of-Change-in-SAP-Implementations-libre
Shane-Kerry-Sanja---The-Art-and-Science-of-Change-in-SAP-Implementations-libreShane Hodgson
 
Group 5 change management presentation
Group 5   change management presentationGroup 5   change management presentation
Group 5 change management presentationMatlosa
 
Building your skills for a Cloud World
Building your skills for a Cloud WorldBuilding your skills for a Cloud World
Building your skills for a Cloud WorldChristian Verstraete
 
Intellectual Capital Study for Etisalat Egypt
Intellectual Capital Study for Etisalat EgyptIntellectual Capital Study for Etisalat Egypt
Intellectual Capital Study for Etisalat EgyptDalia Hamed
 
Changing how agencies change - Embedding digital transformation in organisati...
Changing how agencies change - Embedding digital transformation in organisati...Changing how agencies change - Embedding digital transformation in organisati...
Changing how agencies change - Embedding digital transformation in organisati...Craig Thomler
 
Intranet & Digital strategy survey - Synthesis 2017
Intranet & Digital strategy survey - Synthesis 2017Intranet & Digital strategy survey - Synthesis 2017
Intranet & Digital strategy survey - Synthesis 2017ARCTUS
 
From travel management to global mobility
From travel management to global mobilityFrom travel management to global mobility
From travel management to global mobilityKey Corporate Solutions
 
Intranet & Digital strategy survey - Synthesis 2016
Intranet & Digital strategy survey -  Synthesis 2016 Intranet & Digital strategy survey -  Synthesis 2016
Intranet & Digital strategy survey - Synthesis 2016 ARCTUS
 
Iipa lecture km & good governance jan 12 2011
Iipa lecture  km & good governance  jan 12 2011Iipa lecture  km & good governance  jan 12 2011
Iipa lecture km & good governance jan 12 2011subramanian K
 
Microfinance seminar, Presentasi InfoConnect
Microfinance seminar, Presentasi InfoConnectMicrofinance seminar, Presentasi InfoConnect
Microfinance seminar, Presentasi InfoConnectPT Datacomm Diangraha
 

Ähnlich wie Karnataka State Police Deployment of ERP Software KIAMS (20)

BPR - Unit 4
BPR - Unit 4BPR - Unit 4
BPR - Unit 4
 
Digital transformation
Digital transformationDigital transformation
Digital transformation
 
IT Ops Modernization Helps Energy Powerhouse Exelon Master the Art of Mergers...
IT Ops Modernization Helps Energy Powerhouse Exelon Master the Art of Mergers...IT Ops Modernization Helps Energy Powerhouse Exelon Master the Art of Mergers...
IT Ops Modernization Helps Energy Powerhouse Exelon Master the Art of Mergers...
 
Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...Skim lecture @national conference on technoly, innovation & chnge management ...
Skim lecture @national conference on technoly, innovation & chnge management ...
 
5 Keys to Mastering Today's Communication Domain
5 Keys to Mastering Today's Communication Domain5 Keys to Mastering Today's Communication Domain
5 Keys to Mastering Today's Communication Domain
 
The Emerging Role Of The Cio
The Emerging Role Of The CioThe Emerging Role Of The Cio
The Emerging Role Of The Cio
 
100531 it management dpa upload
100531 it management dpa upload100531 it management dpa upload
100531 it management dpa upload
 
Knowledge Management
Knowledge ManagementKnowledge Management
Knowledge Management
 
Shane-Kerry-Sanja---The-Art-and-Science-of-Change-in-SAP-Implementations-libre
Shane-Kerry-Sanja---The-Art-and-Science-of-Change-in-SAP-Implementations-libreShane-Kerry-Sanja---The-Art-and-Science-of-Change-in-SAP-Implementations-libre
Shane-Kerry-Sanja---The-Art-and-Science-of-Change-in-SAP-Implementations-libre
 
Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
 
Group 5 change management presentation
Group 5   change management presentationGroup 5   change management presentation
Group 5 change management presentation
 
Building your skills for a Cloud World
Building your skills for a Cloud WorldBuilding your skills for a Cloud World
Building your skills for a Cloud World
 
Intellectual Capital Study for Etisalat Egypt
Intellectual Capital Study for Etisalat EgyptIntellectual Capital Study for Etisalat Egypt
Intellectual Capital Study for Etisalat Egypt
 
Changing how agencies change - Embedding digital transformation in organisati...
Changing how agencies change - Embedding digital transformation in organisati...Changing how agencies change - Embedding digital transformation in organisati...
Changing how agencies change - Embedding digital transformation in organisati...
 
Intranet & Digital strategy survey - Synthesis 2017
Intranet & Digital strategy survey - Synthesis 2017Intranet & Digital strategy survey - Synthesis 2017
Intranet & Digital strategy survey - Synthesis 2017
 
ICT CAPABILITY BUILDING
ICT CAPABILITY BUILDINGICT CAPABILITY BUILDING
ICT CAPABILITY BUILDING
 
From travel management to global mobility
From travel management to global mobilityFrom travel management to global mobility
From travel management to global mobility
 
Intranet & Digital strategy survey - Synthesis 2016
Intranet & Digital strategy survey -  Synthesis 2016 Intranet & Digital strategy survey -  Synthesis 2016
Intranet & Digital strategy survey - Synthesis 2016
 
Iipa lecture km & good governance jan 12 2011
Iipa lecture  km & good governance  jan 12 2011Iipa lecture  km & good governance  jan 12 2011
Iipa lecture km & good governance jan 12 2011
 
Microfinance seminar, Presentasi InfoConnect
Microfinance seminar, Presentasi InfoConnectMicrofinance seminar, Presentasi InfoConnect
Microfinance seminar, Presentasi InfoConnect
 

Mehr von ADGP, Public Grivences, Bangalore

Mehr von ADGP, Public Grivences, Bangalore (20)

Towards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for IndiaTowards Making Smart Policing a Reality for India
Towards Making Smart Policing a Reality for India
 
Cyber Security
Cyber SecurityCyber Security
Cyber Security
 
CCTNS & Homeland Security
CCTNS & Homeland SecurityCCTNS & Homeland Security
CCTNS & Homeland Security
 
Secure it0001
Secure it0001Secure it0001
Secure it0001
 
e-gov: Secure IT 2014
e-gov: Secure IT 2014e-gov: Secure IT 2014
e-gov: Secure IT 2014
 
Asymmetric warfare for geoworld
Asymmetric warfare for geoworldAsymmetric warfare for geoworld
Asymmetric warfare for geoworld
 
Secure Cities 2013
Secure Cities 2013Secure Cities 2013
Secure Cities 2013
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Secure IT 2014
Secure IT 2014Secure IT 2014
Secure IT 2014
 
Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop Wipro and KSP - Police IT Change Management Workshop
Wipro and KSP - Police IT Change Management Workshop
 
KSP Composite Computerization Model
KSP Composite Computerization ModelKSP Composite Computerization Model
KSP Composite Computerization Model
 
CCTNS Karnataka Overview
CCTNS Karnataka OverviewCCTNS Karnataka Overview
CCTNS Karnataka Overview
 
Xime erp creation & change management 18082013
Xime erp creation & change management 18082013Xime erp creation & change management 18082013
Xime erp creation & change management 18082013
 
Technological framework
Technological frameworkTechnological framework
Technological framework
 
Cii iq's national business excellence conclave 2013
Cii   iq's national business excellence conclave 2013Cii   iq's national business excellence conclave 2013
Cii iq's national business excellence conclave 2013
 
E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013E gov championship workshop bangalore 21082013
E gov championship workshop bangalore 21082013
 
Homeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism MechanismHomeland security – A Robust Counter Terrorism Mechanism
Homeland security – A Robust Counter Terrorism Mechanism
 
Leadership casestudy
Leadership casestudyLeadership casestudy
Leadership casestudy
 
Reaching out to the unreached
Reaching out to the unreachedReaching out to the unreached
Reaching out to the unreached
 
LTC Word
LTC WordLTC Word
LTC Word
 

Kürzlich hochgeladen

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Kürzlich hochgeladen (20)

Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Karnataka State Police Deployment of ERP Software KIAMS

  • 1. Karnataka State Police Sanjay Sahay, IGP, Eastern Range Karnataka State Police Deployment of ERP Software Change Management Issues 20th Dec 2011
  • 2. The only permanent issue in human existence is Change Change Change Stone Age to Digital Age Slash and Burn to Commercial Cultivation Naturalism to understanding nature Travel by walk to Space Shuttles and A380s Barter to MNCs CHANGE IS THE DNA OF HUMAN EXISTENCE , INDIVIDUAL,CHANGE IS THE DNA OF HUMAN EXISTENCE , INDIVIDUAL,CHANGE IS THE DNA OF HUMAN EXISTENCE , INDIVIDUAL,CHANGE IS THE DNA OF HUMAN EXISTENCE , INDIVIDUAL, SOCIETAL AND COMMERCIALSOCIETAL AND COMMERCIALSOCIETAL AND COMMERCIALSOCIETAL AND COMMERCIAL
  • 3. The Challenge-Complex Issues and even more complex Challenge & The Core The Challenge-Complex Issues and even more complex setting. The Core- Passion, Stimulating an Innovative Culture and Creating a Learning Organisation
  • 4. Practitioner’s Speak- An experiential Story Transformational Change Change Management Transformational Change Complete Computerisation Process Software is treated as the flagship of change Creation of State Police Data Center Connectivity across the State Capacity Building
  • 5. Change management is a structured approach to shifting/transitioning individuals, teams, Change Management shifting/transitioning individuals, teams, and organizations from a current state to a desired future state. It is an organizational process aimed at helping employees to accept and embrace changes in their current business environment.
  • 6. Change Management In project management, change management refers to a project management process where changes to a project are formally introduced and approved
  • 7. Creator/Developer The Same Leader - Change Better Controlled and Simpler Practitioner Deployer Stabliser
  • 8. Ingredients Understanding Change Change Management Understanding Change Addressing Change Implementing Change Leading Change
  • 9. Idea of an ERP system Hardware SoftwareConnectivity
  • 10. Need for change Internally, the need for change was non-existing. Understanding Change Internally, the need for change was non-existing. The employee & staff were working without digital aids. They also believed computers/computerization did not bring any transformational change and would have merely the same impact as in the case of physical logistics and infrastructure i.e vehicles, wireless sets, weaponry, buildings and the like.
  • 11. Need for change This was the true reflection of the splendid Understanding Change This was the true reflection of the splendid isolation of the dept, willingly. Needless to say any dept desperately need completely digital in the true sense of the term, it is the police department because we don’t decide our requirement.
  • 12. Need for change Understanding Change the enemies of society decide our requirements and today those are the people who are the best practitioners of digital technology, which have been demonstrated over and over again by innumerable instances of money laundering, mafia operations, narcotics and varieties of terror impacting the country.
  • 13. Role of change in the organization Understanding Change… The software itself was the change. Just deploying the software brings a complete metamorphosis in the dept. Simple issues like anti-virus in the whole of servers/clients were needed for initiating change.
  • 14. Nature of Change Understanding Change… Magnitude of the likely change Scope of the chang Periodicity of change- The roll out Plan
  • 15. Response to change Understanding Change… The police dept is resistant to any form of change. As an organisation we are averse to technology When the change was started, it was told to be undoable and I was advised to follow my predecessors.
  • 16. Addressing Change Burning Platform With ICT taking over as a Tsunami, there was absolutely no other option than computerizing each and every operation. In the year of 2000-2001 Crime, Criminal Information System was introducedwhich was skeletal in nature, covered on investigation.
  • 17. Addressing Change… Facilitators of change Overall knowledge of the subject and the way in which the change mgmtthe way in which the change mgmt would be effective in the dept. Team comprising of officers who had exposure in engineering/management education or had some inclination towards either technology or change
  • 18. Addressing Change… Restraining forces The problem was that the software was far tooThe problem was that the software was far too advanced for all people involved to understand. Besides that, was the complexity of the nature of human resources, timelines, funding and expected delivery systems. The need to have a set of precursors before the change management thought is launched.
  • 19. Addressing Change… Types of resistance Individual level Organizational level
  • 20. Addressing Change… Handling the restraining forces Training mechanism in place—to provide the bridge to the humanprovide the bridge to the human resources a lot of precursors has to be solved . Training- every person part of this training. Metrics- should be unique for each person.
  • 22. Precursors Functional State Police State Center Creation of Primary Network Anti Virus, Facilities and Asset Management Creation of training infrastructure Other training resources- trainers, methodology, training material etc
  • 24. Addressing Change… The Advance State BattleThe Advance State Battle the beginning of success
  • 25. THE FUNCTIONAL CYCLE • Mission Mode Project • Wipro, the developer Police IT CCTNS • GoI accepts Karnataka as a lead state • Both the projects get integrated Lead State CCTNS Police IT
  • 26. KSP Wide Area Network 39 locations 2 Mbps leased line 1400 locations 512 Kbps VPNoBB SPDC 10 Mbps aggregation bandwidth 4 Mbps Internet leased line SPDC
  • 28. Addressing Change… Handling the restraining forces Training mechanism in place—to provide the bridge to the humanprovide the bridge to the human resources a lot of precursors has to be solved . Training- every person part of this training. Metrics- should be unique for each person.
  • 29. Implementing Change… Work Culture of the Organization
  • 30. Implementing Change… The Data Bases End User Matrix, Training accomplished & needs, Systemaccomplished & needs, System Administrators, Change requests, Traceability Matrix, Assets et al
  • 31. Implementing Change… leadership story the strategic way Talent Acquisition with the Police Force- relying on Legacy Robust Training Model for the Operating StaffRobust Training Model for the Operating Staff Adequate compensation and benefit schemes High level of motivation and leadership Balanced Stakeholder Management Choosing Appropriate implementation partner Interacting with intellectuals Role of leadership- leading from the front and people management Commitment of the top management ref: ICT Enable Change in Indian Police Service, A case of leadership and drive in Karnataka by Dr. Jaba Mukherjee and Prof Vinit Thakur of TAPMI
  • 32. Implementing Change… Communicating the change The role of communicator in bringing about the change? As the change progresses, the change should start to percolate i.e. must be communicated across the layers in the org from top down. Communication was in a multi-faceted manner. Communicated the progress being made to execute the precursors- broadband networking, system administrator training, Nodal Officers
  • 33. Implementing Change… The CEO Story CorporateCorporate History is replete with instances of the top leader effecting monumental change
  • 34. Implementing Change… Role of Leadership Under a dynamic leadership, the level of uncertainty that you canlevel of uncertainty that you can handle is the level of change you can deliver. How much does reputation/personality play a role in bringing about change- ability to deliver successfully, continuously in a robust manner in the times to come?
  • 35. Implementing Change… Attributes of a change leader Critical location in the change management physical process.management physical process. Expertise in performing his tasks Being a role model for his subordinates Ability to train Comfort level in initiating the change Feeling capable of handling change with ease.
  • 36. Implementing Change… Type of Leadership adopted Can benevolent aggression and coercion be a tool for bringingcoercion be a tool for bringing change? Is it easier to bring the precursors of change management if right amount or type of coercion is used?
  • 37. Sustaining Change Any org can sustain change only if they have a core team which is shrewd enough toa core team which is shrewd enough to adapt to the change environment and get into the production mode. In a nebulous organisation, or just a workable organisation, no change of any worthwhile nature can be brought in. CHANGE HAS TO BE IRREVERSIBLECHANGE HAS TO BE IRREVERSIBLECHANGE HAS TO BE IRREVERSIBLECHANGE HAS TO BE IRREVERSIBLE