Many organizations are turning to big data analytics to shed greater light on workplace behaviour
What makes employees happier in the workplace? How come some individuals are more creative, others better leaders, while some more predisposed to adopt change?
Traditionally managers mainly relied on their powers of observation or surveys and interviews to determine the answers to these questions.
The data used in people analytics come not only from emails, SMS and Web browsing habits but can also emanate from the a preponderance of sensors embedded in technology we wear or keep close at hand (such as mobile phones, handheld scanners and identification badges and access fobs) and those in our environment such us access sensors, and surveillance cameras or even the company photocopier.
Data from the virtual world combined with information collected through face-to—face contact with individuals, are used as transformative tools by some organizations.
Don’t do big data analytics alone, says expert
For instance, Bank of America analyzed its call centre operations to alter employee break time patters in order to improve performance and cut the centre’s turnover rate.
Another firm, Cubist Pharmaceutics improved employee interaction and sales numbers by simply centralized coffee areas after it found out that the office had far too many coffee machines.
Of course there is the danger that people analytics could be mishandled and the data gathering could end up being a threat to personal privacy.
One of the ways to avoid this is to make the data gathering process an opt-in program and ensure that the data culled preserves the anonymity of participants and that their personal information is not disseminated.
Optimized Security and Simplicity for Complex Distributed Enterprise Networks
This IDC Analyst Connection looks at the the benefits of using a UTM platform integrated with network connectivity and how it will save the enterprise money, reduce the number of vendors' products needed to be purchased, improve the communications between devices, offer the opportunity for organizations to deploy more sophisticated capabilities, and vastly improve security.