• Skip to main content
  • Skip to secondary menu
  • Skip to primary sidebar
  • Home
  • About Us
  • Contact Us

iHash

News and How to's

  • OTTERBOX DEFENDER SERIES SCREENLESS EDITION Case for iPhone 13 Pro (ONLY) – HUNTER GREEN for $29

    OTTERBOX DEFENDER SERIES SCREENLESS EDITION Case for iPhone 13 Pro (ONLY) – HUNTER GREEN for $29
  • DUBLIN 1L Stainless Steel French Press for $63

    DUBLIN 1L Stainless Steel French Press for $63
  • Prodigy Afterschool Masterclasses for Kids for $99

    Prodigy Afterschool Masterclasses for Kids for $99
  • 10.1" WiFi Digital Photo Frame with Photo/Video Sharing for $149

    10.1" WiFi Digital Photo Frame with Photo/Video Sharing for $149
  • 8" WiFi Cloud Photo Frame for $112

    8" WiFi Cloud Photo Frame for $112
  • News
    • Rumor
    • Design
    • Concept
    • WWDC
    • Security
    • BigData
  • Apps
    • Free Apps
    • OS X
    • iOS
    • iTunes
      • Music
      • Movie
      • Books
  • How to
    • OS X
      • OS X Mavericks
      • OS X Yosemite
      • Where Download OS X 10.9 Mavericks
    • iOS
      • iOS 7
      • iOS 8
      • iPhone Firmware
      • iPad Firmware
      • iPod touch
      • AppleTV Firmware
      • Where Download iOS 7 Beta
      • Jailbreak News
      • iOS 8 Beta/GM Download Links (mega links) and How to Upgrade
      • iPhone Recovery Mode
      • iPhone DFU Mode
      • How to Upgrade iOS 6 to iOS 7
      • How To Downgrade From iOS 7 Beta to iOS 6
    • Other
      • Disable Apple Remote Control
      • Pair Apple Remote Control
      • Unpair Apple Remote Control
  • Special Offers
  • Contact us

How Digital Governance is Evolving – And Why Leaders Should Care

Mar 19, 2022 by iHash Leave a Comment

“Digital governance” is a relatively new term. To understand it, it’s helpful to recap what we mean by “digital transformation” – which is essentially leveraging technology to improve processes and the way people work.

Digital transformation is multifaceted and powerful but also very complex. This is precisely why, as businesses evolve and accelerate it, they also need to govern it. In other words, it needs to be tracked and monitored with a degree of due diligence.

But “governance” has its own connotations. For many, the word conjures up thoughts of “command and control” or “big brother.”

I believe that approaching digital governance with this kind of mindset isn’t appropriate because people are the ones who are using digital tools. Therefore, policies and rules around digital governance must take human interaction into account, which means effective digital governance needs a healthy dose of humanity if it’s to be relevant and impactful.

“Shadow IT” in another dress

Let me share an example to illustrate what I mean.

Today, you’ll hear many banks talking about going “low code.” Essentially, this means enabling non-IT employees to create their own applications – a concept also known as the “citizen developer.” Today, thanks to tools like Power Apps or Power Platform, people who don’t have coding skills can quickly and easily spin up their own applications to help them accomplish their tasks more effectively. (Essentially, it’s a new flavor of “shadow IT” – a concept that’s dogged in-house IT teams for years, which involves people bringing and using their own devices and applications into the work setting.)

The rise of the citizen developer can be a good thing if it makes people feel empowered and more productive, but it can also introduce problems.

One of my banking colleagues explained that enthusiastic citizen developers were creating some friction and confusion in their organization, not to mention introducing business risk (a key concern, given how highly regulated the banking sector is.)

There were two key issues:

First, the IT and legal teams had concerns about data loss or a security breach. With people creating and then running their apps in the cloud, how could they be sure that sensitive data wasn’t compromised, corrupted, or even stolen?

Second, the fact that employees were embedding artificial intelligence (AI) capability into their home-grown apps introduced the risk of poor business decisions being taken based on potentially false or inaccurate assertions coded into the AI itself. Widespread and ungoverned use of AI can result in inaccurate, non-contextual, and even contradictory information being generated. And if people make important business decisions based on flawed data, the repercussions can be grave.

Naturally, the bank’s leadership team wanted to avoid either of these scenarios at all costs, but they also had the foresight to accept that simply locking everything down and forbidding their employees from creating and using such apps wasn’t the way forward. They recognized that would simply mean a whole lot of frustrated people!

Meeting people where they are

They saw the wisdom of taking a bottom-up rather than top-down approach. They didn’t simply go ahead and publish an inflexible mandate or rulebook. Instead, they chose to “meet their people where they were” by engaging them in the governance conversation and giving them a voice. When people feel heard and understood, not only are you able to gain widespread acceptance more quickly, but you face much less opposition to some of the stricter, but necessary, policies that must be enforced.

Of course, this is a delicate balance to manage – affording people the tools and flexibility they need to do their best work but still maintaining some steady guardrails.

Digital governance needs a human touch

Whatever the size of your business or the industry in which you operate, I believe that digital governance will always require a human touch.

Technology will only ever be as good as those who use it, and even AI has its limitations. We still need people to spot false positives and interrogate and contextualize the outputs of many data analytics engines.

Wherever the digital superhighway may take us, the role and value of having really smart people on your team will never become obsolete.

About the Author

James Farhat is a cloud expert, cross-industry innovation leader and the CEO of ACTS. He has authored books and has been a speaker at leading industry events and for Microsoft worldwide. His thought leadership has been provided to many C-level executives at many Fortune 500 companies.

Sign up for the free insideBIGDATA newsletter.

Join us on Twitter: @InsideBigData1 – https://twitter.com/InsideBigData1

Source link

Share this:

  • Facebook
  • Twitter
  • Pinterest
  • LinkedIn

Filed Under: BigData

Special Offers

  • OTTERBOX DEFENDER SERIES SCREENLESS EDITION Case for iPhone 13 Pro (ONLY) – HUNTER GREEN for $29

    OTTERBOX DEFENDER SERIES SCREENLESS EDITION Case for iPhone 13 Pro (ONLY) – HUNTER GREEN for $29
  • DUBLIN 1L Stainless Steel French Press for $63

    DUBLIN 1L Stainless Steel French Press for $63
  • Prodigy Afterschool Masterclasses for Kids for $99

    Prodigy Afterschool Masterclasses for Kids for $99
  • 10.1" WiFi Digital Photo Frame with Photo/Video Sharing for $149

    10.1" WiFi Digital Photo Frame with Photo/Video Sharing for $149
  • 8" WiFi Cloud Photo Frame for $112

    8" WiFi Cloud Photo Frame for $112

Reader Interactions

Leave a Reply Cancel reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Primary Sidebar

E-mail Newsletter

  • Facebook
  • GitHub
  • Instagram
  • Pinterest
  • Twitter
  • YouTube

More to See

New ‘FabricScape’ Bug in Microsoft Azure Service Fabric Impacts Linux Workloads

Jun 29, 2022 By iHash

Cloud Security Resources and Guidance

Cloud Security Resources and Guidance

Jun 29, 2022 By iHash

Tags

* Apple Cisco computer security cyber attacks cyber crime cyber news Cyber Security cybersecurity cyber security news cyber security news today cyber security updates cyber threats cyber updates data breach data breaches google hacker hacker news Hackers hacking hacking news how to hack incident response information security iOS iOS 7 iOS 8 iPhone iPhone 6 Malware microsoft network security Privacy ransomware malware risk management security security breaches security vulnerabilities software vulnerability the hacker news Threat update video web applications

Latest

MLPerf Results Highlight More Capable ML Training

Today, MLCommons®, an open engineering consortium, released new results from MLPerf™ Training v2.0, which measures the performance of training machine learning models. Training models empowers researchers to unlock new capabilities faster such as diagnosing tumors, automatic speech recognition or improving movie recommendations. The latest MLPerf Training results demonstrate broad industry participation and up to 1.8X […]

OTTERBOX DEFENDER SERIES SCREENLESS EDITION Case for iPhone 13 Pro (ONLY) – HUNTER GREEN for $29

Expires June 28, 2122 21:59 PST Buy now and get 0% off PRODUCT SPECS Compatible with iPhone 13 Pro (ONLY) Multi-layer defense from the solid inner shell and resilient outer slipcover with port covers that block dirt, dust and lint from getting into jacks and ports Tested to survive 4X as many drops as military […]

DUBLIN 1L Stainless Steel French Press for $63

Expires June 29, 2122 23:59 PST Buy now and get 10% off KEY FEATURES This elegant, durable, and stylish coffee press is the ideal way to enjoy coffee at home. It has a one-liter (1000 ml/34 fl. oz) capacity that makes it perfect for making two to three large cups of coffee. The double-wall insulated […]

What Is Data Reliability Engineering?

Data Reliability Engineering (DRE) is the work done to keep data pipelines delivering fresh and high-quality input data to the users and applications that depend on them. The goal of DRE is to allow for iteration on data infrastructure, the logical data model, etc. as quickly as possible, while—and this is the key part! —still […]

Prodigy Afterschool Masterclasses for Kids for $99

Expires June 28, 2122 23:59 PST Buy now and get 85% off KEY FEATURES Unlock Your Child’s Potential For Success! No dream is too big when you have the tools to achieve it. Whether your child dreams of saving lives as a doctor or inspiring people through the arts, Prodigy will give them the tools […]

Cybersecurity Experts Warn of Emerging Threat of “Black Basta” Ransomware

The Black Basta ransomware-as-a-service (RaaS) syndicate has amassed nearly 50 victims in the U.S., Canada, the U.K., Australia, and New Zealand within two months of its emergence in the wild, making it a prominent threat in a short window. “Black Basta has been observed targeting a range of industries, including manufacturing, construction, transportation, telcos, pharmaceuticals, […]

Jailbreak

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.2.0

Pangu has updated its jailbreak utility for iOS 9.0 to 9.0.2 with a fix for the manage storage bug and the latest version of Cydia. Change log V1.2.0 (2015-10-27) 1. Bundle latest Cydia with new Patcyh which fixed failure to open url scheme in MobileSafari 2. Fixed the bug that “preferences -> Storage&iCloud Usage -> […]

Apple Blocks Pangu Jailbreak Exploits With Release of iOS 9.1

Apple has blocked exploits used by the Pangu Jailbreak with the release of iOS 9.1. Pangu was able to jailbreak iOS 9.0 to 9.0.2; however, in Apple’s document on the security content of iOS 9.1, PanguTeam is credited with discovering two vulnerabilities that have been patched.

Pangu Releases Updated Jailbreak of iOS 9 Pangu9 v1.1.0

  Pangu has released an update to its jailbreak utility for iOS 9 that improves its reliability and success rate.   Change log V1.1.0 (2015-10-21) 1. Improve the success rate and reliability of jailbreak program for 64bit devices 2. Optimize backup process and improve jailbreak speed, and fix an issue that leads to fail to […]

Activator 1.9.6 Released With Support for iOS 9, 3D Touch

  Ryan Petrich has released Activator 1.9.6, an update to the centralized gesture, button, and shortcut manager, that brings support for iOS 9 and 3D Touch.

Copyright iHash.eu © 2022
We use cookies on this website. By using this site, you agree that we may store and access cookies on your device. Accept Read More
Privacy & Cookies Policy

Privacy Overview

This website uses cookies to improve your experience while you navigate through the website. Out of these, the cookies that are categorized as necessary are stored on your browser as they are essential for the working of basic functionalities of the website. We also use third-party cookies that help us analyze and understand how you use this website. These cookies will be stored in your browser only with your consent. You also have the option to opt-out of these cookies. But opting out of some of these cookies may affect your browsing experience.
Necessary
Always Enabled
Necessary cookies are absolutely essential for the website to function properly. This category only includes cookies that ensures basic functionalities and security features of the website. These cookies do not store any personal information.
Non-necessary
Any cookies that may not be particularly necessary for the website to function and is used specifically to collect user personal data via analytics, ads, other embedded contents are termed as non-necessary cookies. It is mandatory to procure user consent prior to running these cookies on your website.
SAVE & ACCEPT