Top management articles 2011

Emerald’s Management Review is 50 years old this year.  This database contains over 280,000 abstracts of articles published in the world’s top 300 management publications.  For the last 15 years, Emerald has run its Citation of Excellence Awards, announcing the most cited and influential articles of this enormous mass of content.

This year’s list has been compiled using Professor Anne-Wil Harzing’s ‘Publish or perish’ software program which maps citation data from the last three years.   The 2011 top 50 articles feature articles originally published in 2007.  This longlist of articles was sifted by an Editorial judging panel – their final choices are listed in full here.

The list includes an article written by KM guru Dave Snowden and originally published in HBR.  Also featuring are this article about a KM success model and this about knowledge governance models.  Also of interest is this article about ‘social sources of information’ for entrepreneurs.

By far the most intriguing title is this one ‘It’s all about me: narcissistic chief executive officers and their effects on company strategy and performance’. Emerald comments that this article adds to the ‘limited research’ in this area.

‘The promise – and peril – of personalisation’

One day, Eli Pariser (an online organiser) logged onto Facebook to find out what people with less liberal opinions than his own were talking about.  He couldn’t find them.  Based on his past search and click behaviour, Facebook had simply edited them out.

Since then, Pariser has gone on to write The Filter Bubble: what the internet is hiding from you.  Speaking recently at the RSA in London, he spoke about his concerns about the filters and algorithms that shape the way the internet is presented to us.  The internet, it seems, is not as ‘connective’ as he once thought it could be.

Companies recognised that there was money to be made in helping people sort through enormous data torrents.  This led to a focus on ‘relevance’ as manifested in, for example, Amazon’s ‘if you liked this, you might like that’ concept.  And these filter algorithms do more than that.  They can make inferences from seemingly unrelated data and are responsible for creating a ‘web of one’ in which results are no longer ‘universal’ but rather based on our own search history.  This ‘filter bubble’ feeds our human confirmation bias by presenting to us the world as we already see it.

The problem is that in our personal bubble views, we don’t know what we are missing. It is relatively easy to know the editorial or political slant of a newspaper but not the unseen filters of social media.  And this matters when social media is driving approximately 50% of the traffic to online news sites.  It’s easy for challenging stories to be lost from view amongst the stream of ‘likes’.

We need to move on from narrow relevance and be challenged in our world view.  It’s not easy to achieve this but the first stage is to be aware – and to make others aware – that this filter bubble exists.

Social media and rioters

The “free flow of information can be used for good, but it can also be used for ill”.  This is what British Prime Minister David Cameron said in the aftermath of the riots that spread across England last week.  He went on to state that “we are working with the police, the intelligence services and industry to look at whether it would be right to stop people communicating via these websites and services when we know they are plotting violence, disorder and criminality.”

In the aftermath of the riots and the debate about causes and solutions, it is the use of BlackBerry Messenger (BBM) that has featured highly in the debate about the use of social media by rioters to communicate.  BBM offers free texting, via the internet, for its users and is growing in popularity especially among young people while SMS usage is declining. The network is not ‘public’ and is therefore more difficult to monitor in real time.  The messages are also encrypted, and unintelligible to casual observers.

As can be imagined, the statement by the Prime Minister has been received with some consternation by observers from across the political spectrum.  Who would decide what consititues ‘criminal’ usage of social media?

Knee-jerk politicians would do well to read Phil Bradley’s post in which he likens the banning of social media to the banning of roads.  And let’s not forget that communities have used social media to regroup after the riots.  The ‘broom armies’, for example, were mobilised to action by a simple Twitter campaign @riotcleanup.

Travelling on the technology curve

The theory of how new ideas, innovations and technology are spread is something we should be well aware of.  In our own organisations, we know it pays to identify those who are ‘early adopters’ or members of the ‘early majority’ – and who are influential.   And we also know that sometimes it’s as unhelpful to be too far ahead of the curve as it is to be behind it.

This week, ReadWriteWeb reports on the latest changes to Gartner’s HypeCycle.  HypeCycle seeks to map technological innovations along a timeline from ‘technology trigger’ and through key stages including the ‘peak of inflated expectations’(!) to the ‘plateau of productivity’, when innovation can be seen to be truly impactful and has been adopted by 20-30% of the potential audience.  The latest additions to the service include ‘big data’ and ‘gamification’.

Technologies may follow the curve, but each travels at a different speed.  HypeCycle places eBook readers beyond any disillusionment and at the beginning of the ‘slope of enlightenment’ and big data climbing up towards the ‘peak’ (and likely to do so quite rapidly).

You can view images and read the reseach summary here.


Information professionals – unsung ‘good fairies’?

This week’s Sue Hill breakfast meeting provided a compelling snapshot of what is exercising information professionals across a wide range of sectors (health, law, property and more were represented).

Several delegates reported that their organisations are working to develop new strategies and models to reflect the changing business landscape.  Collaboration, both internally, but increasingly externally, is seen as a strategy for success – or at least survival.  Organisational websites are no longer static ‘repositories’ but are being opened up to collaborative content creation – with all the challenges that this might generate.  Colleagues must learn to work more openly and in new matrix structures.  There are opportunities for knowledge and information people to act as role models when it comes to collaborative working.  It may not come as easily to others as it does to our profession.

But it’s not just our customers with whom we need to collaborate.  There is also work to be done educating, informing, and exerting influence on those who seek to regulate and measure our business.  We can assist in raising the profile, not just of our profession, but of our organisations and the sectors in which we work.  We can help share success stories, internally and externally and have a role to play in helping our colleagues interpret, and maximise, internally generated knowledge.  We can help our organisations mitigate information risk and maximise information value.

Even against the backdrop of a challenging business landscape, the conversation was positive and energised.  In hard times, we are the ‘good fairies’ of our organisations – our good deeds bring business benefits!

Suzanne from Sue Hill Recruitment has also blogged about this event.  Click here for her review.

The cultured traveller in Europe

Thanks to Library Stuff for highlighting this article in the New York Times written with the ‘cultured traveller’ in mind.  Readers are recommended to visit European city libraries because they offer ‘respite’ from the crowds.  Hopefully this is not a euphemistic way of saying they are underused.

Libraries recommended include the Austrian National Library in Vienna and the Strahov Monastery and Library in Prague.  If you feel your European library could benefit from cultured visitors from overseas, why not add in your own recommendations in the comments field on the New York Times website?  And share your suggestions here too!

How to maximise the impact of a conference

Have you have ever attended – or even organised – an event and felt concerned that the energy and learnings are quickly lost as delegates are dispersed and return to their ‘day jobs’?

The Library and Information Science Research Coalition has just published a post on the DREaM project launch event that was held at the British Library in July.  The post pulls together all the blog posts written (fourteen so far!); photographs of the event; video interviews with delegates; and links to the archived social media coverage including a summary of the Twitter activity.  Presentations from the event are also available.

The post shows the highly participative and interactive nature of the event and captures the energy of the day.  It’s a great example of how to extend the impact of conference, beyond its time frame and its attending delegates.

Clear, concise, accurate – what all information managers should aim for

Information is an organisational resource that needs to be managed, just like any other.  It needs to be allowed to flow appropriately and effectively if its value is to be maximised – and its potential to harm is to be minimised.

Our second speaker at the NetIKX Information Risk Management workshop was Patricia (Pat) Bryant – a risk manager with experience of advocating the benefits of managing risks at a senior level in the public, private and third sectors.

Pat used the recent events at News Corp and Westminster to highlight some key lessons about managing information risk.   Poor information management combined with alleged criminality has created financial problems for that organisation and raised political implications in three continents.

Key lessons from Pat’s presentation and the discussion that followed it:

  • ‘Secrecy’ is the enemy of information security.  If information is locked down, then it becomes siloed.  Information lock-down creates a barrier which can lead the disaffected to believe that you have something to hide.
  • It is possible to manage information boundaries, but organisations are not very good at it!  Organisations should aim for information transparency within clear boundaries.
  • Organisations should consider who is best placed to control and manage information flows
  • Similarly communications are vital and serious consideration should be given to who is the best person to do it!
  • Your information should be concise, factual and the person who communicates it should be trustworthy
  • Leaks tarnish people and organisation
  • Get your information right in the first place
  • Organisations should seek to move from ‘risk averse’ to ‘risk managed’
  • Has your organisation defined its ‘appetite for risk’? – you should work within that framework
  • The watchwords should be ‘Clear, Concise, Accurate

How to align IM with organisational risk management

As recent events have only too clearly shown, poor information management and control (particularly when combined with a ‘flexible’ appreciation of information ethics and legislation) can lead to financial and reputational loss.

It was an extraordinary coincidence of timing that while a UK Government Select Committee was in progress in Westminster, members of NetIKX were discussing the concept of organisational information risk management.

Liz Scott-Wilson, currently an information architect at a large law firm, has years of experience in information management and consulting roles in both the public and private sectors.  In her presentation she shared what she considers to be the most valuable lesson of her career.  When it comes to exerting influence within your organisation the key to success is to focus on what keeps senior people in your organisation awake at night.

Senior managers are unlikely to care much about the intricacies of information governance but they will be concerned about organisational risk.  Liz outlined how in a previous role, she had analysed a (very detailed) organisational risk register and identified information pressure points.  She then used these to demonstrate how effective information management could help mitigate organisational risk at key pressure points.

Key lessons from Liz’s presentation:

  • Focus on real pain points for senior managers
  • Ensure you understand the power systems in your organisation
  • Find friends in your organisation’s governance/risk teams
  • Reflect organisational language in your strategy
  • Demonstrate how IM can bring plausible and affordable processes to mitigate risk

The key call for action was to encourage anyone interested in demonstrating the importance of IM to organisations to meet with organisational risk managers.


(There were two speakers at the event.  Watch out for a second blog entry!)

The gamification of content – what marketers are saying

Gamification means that content need no longer remain ‘passive’.  Gamification techniques can help ensure your content will work harder for you, for longer.

Two recent articles in the professional magazine Marketing Week summarise the ways in which gamification is being used to enhance brand awareness and to support customer loyalty programmes.  It is an approach that has already been adopted by such brands as Kellog, Disney and (as featured here) Marriott International.  Future developments mentioned look set to help customers manage their household energy  and petrol consumption.

And of course gamification techniques have already been used successfully by libraries.  Finland’s National Library, for example, has used gamification techniques to enhance the crowdsourced, collaborative nature of its archive digitisation project.  We can look forward to hearing of more gamification-based library projects in the months to come.