KM past and present: Five megatrends
Many issues affect knowledge management but five key ones are big data, cybersecurity, mobility, social analytics and customer engagement. The availability of big data has opened many options for understanding everything from customer preferences to medical outcomes. Amidst all that data, concerns about security have grown, so cybersecurity is taking on new importance. Mobility has become pervasive and affects nearly every element in KM, while social analytics is providing insights at a personal level that were never possible before. Finally, although those four factors feed into many KM objectives, enhancing customer engagement has taken a place at the top of the priority list for virtually every company and is likely to remain there for some time.
The most dramatic trend impacting knowledge management is harvesting and analyzing big data. An esoteric phenomenon just a few years ago with a new set of technologies and terminology, big data is now wrapped into the strategic plans of many firms, and not just the big ones.
When Slingshot Power, a startup based in Northern California, launched its ambitious plan to create a new business model for solar installations, the challenge of Hadoop and the well-known shortage of data scientists might have discouraged it from using big data as a resource. However, the incentive was compelling—being able to integrate a complex set of weather data, demographics, fuel prices and other information to make decisions that would optimize its marketing efforts.
“We had elaborate Excel spreadsheets that we were using for lead generation and targeting,” says Ravi Chiruvolu, CEO of Slingshot Power, “but there was a plethora of data out there that we were not using. If we could use big data, we could target a much broader range of customers more precisely.” After looking at various approaches, the company selected the Actian Analytics Platform, a big data analytics solution that is described as accessible and affordable for small businesses, but also scalable to large ones.
Slingshot is using Actian to help expand its solar franchise business from Northern California to other regions of the country in which solar power can be successful. “Picking the right customers will be a key ingredient for our growth,” Chiruvolu says. “In addition to using Actian to target them, we also use it to generate an economic case for potential buyers. We can show them the energy that solar will generate, compare it to local electric usage and fine-tune it into a business case, all from a holistic model based on big data.”
Yahoo uses Actian to segment millions of users across 10,000 variables, looking for clues that will help predict customer behavior. Amazon Redshift also tapped Actian to provide the core technology components for its cloud-based data warehouse.
“The digital tap has been turned on and is never going to be turned off,” says Ashish Gupta, CMO and senior VP at Actian. “Our technology pulls together diverse data including clickstream, ERP, CRM or network data in near real time as it flows through the data pipeline, marketing, customer engagement, risk assessment and many other applications.” At both ends of the spectrum, from startups to large-scale users, big data will be a central force in converting large amounts of data to decision-supporting information.
With so much information at large, unauthorized access has the potential to be destructive. “Knowledge management is focused on information,” says Karl Volkman, CTO of SRV Network. “What makes KM so important now is that people can get information and analyze it better. In the past, it was hard to find out who was buying products and how they felt about them. Now an enormous amount of information is available, which has benefits. The other side of the coin, however, is that the information can be stolen and used in one way or another for financial gain.”
The cybersecurity market is expected to increase from $95.6 billion in 2014 to $155.7 billion by 2019, resulting in a 10.3 percent per year increase during that time period. That figure includes network, endpoint, application, content and wireless security as well as many other types. Venture capitalists are pouring money into the market, and innovative products are emerging in response to increased threats. The volume of data (including an entire new collection from the Internet of Things), the challenges of mobile devices, greater use of the cloud for data storage and the broad impact of consumer concern are all sparking the growth.
Cybercrime comes in many forms, from stealing credit card numbers out of a merchant’s database to identity theft of consumers. A common strategy is for a cyberthief to obtain some publicly available information about an individual and use it to open an account or figure out a password that provides them access to an account. “Users need to be vigilant about changing their passwords and making them strong,” advises Volkman. “Technological safeguards can be put into place, but security depends a great deal on the human element too.”
Mobile devices add another element of risk. They are much easier to lose or to steal, and often contain sensitive information such as bank passwords. Technological advances such as the ability to remotely disable a phone will continue to emerge to protect users from the impact of cybertheft. However, the result of workers being careless with physical security, such as leaving a laptop in an unlocked car, remains a threat.
Companies can mitigate the impact on their customers by limiting the responsibility of users in the event of fraud or identity theft. Industries are growing up around providing insurance for such scenarios, either to the merchant or the customer. As to whether people will back away from using online methods of purchase and payment, Volkman sees a generational issue. “Those of us who are older may use it more cautiously. The ‘digital natives’ who have grown up with the technology are less likely to be shocked by adverse events such as data leakage. They just move on,” he says.
Although mobility brings hazards, it has brought even more advantages, and it will continue to drive the pervasiveness of knowledge management. Increasingly, knowledge management solutions, including content management, process management and analytics, have mobile versions of the solution. No longer a miniaturized version of the desktop browser, mobile apps are delivering usable KM applications.
Mobility is also forging new paths. “Consumers have grown acclimated to the use of their mobile devices to access data,” says Penny Gillespie, research director at Gartner, “and are now moving beyond that to see the devices as sources of value. For example, Apple Pay allows use of the smartphone as a wallet.”
However, the payment model has not kept up with the technology. “Today, merchants have to pay a ‘card not present’ fee when the purchaser is using Apple Pay for an online payment,” Gillespie says. “This is the same fee that applies to purchases made by phone or over the Internet when the card data is typed into the application and cannot be validated. However, this charge does not make sense for an Apple Pay transaction because the card is present (i.e., embedded in the iPhone) with additional authentication of the cardholder through a fingerprint.”
One mistake merchants make in designing mobile apps is to try to duplicate a physical purchase experience on a mobile device. “Merchants should not necessarily automate an existing process, but instead should look at the experience holistically,” adds Gillespie. “Mobile experiences have to be simpler and as good as, if not better than, the non-mobile experience in order to gain loyalty from the customer.”
Barriers remain in the use of mobile devices for enterprise applications, but the barriers also represent opportunities. In a study of U.S. and U.K. information technology decision makers conducted by Vanson Bourne, respondents reported that although more than 400 enterprise applications were typically deployed in each organization, only 22 percent of them could be easily accessed on mobile devices.