Government Technology

Getting the Strategic Value Out of IT


Technology can solve problems and contribute to solutions. The key is getting IT people into the process at the start.

September 3, 2013 By John Martin

For 24 years, I ran a Harvard program in which government information-technology leaders worked together for several days at a time on emerging problems. At the end of those sessions, which assembled people from all over the world, a common comment was, "Well, at least I don't work for the U.S. federal government!" They were referring to the difficulty of getting a critical mass of leaders to commit to handling the risks required for major IT-driven problem-solving.

The big benefits of IT occur when digital information enables government workers to change how they work -- by reaching the public through 311 customer-service systems, for example, or by tackling challenges through "stat" or other problem-solving and accountability systems. That kind of innovation is difficult -- even impossible -- when senior program managers and elected leaders are positioned too far away from the IT staff, as they typically are in larger governments at every level.

When IT staff and ideas can't get into the problem-solving game, they can't make much of a contribution. As a result, many government-technology managers still are stuck in old "support center" roles. They are not expected to solve big problems, only to help operate new programs after they have been approved. IT is told, in effect, to stick to its knitting.

But there are ways to bring IT in on the big issues earlier in the process. Here are five routes:

Economic development: Governments that take job creation and economic development seriously must, in today's world, start with information infrastructure and digital services. With manufacturing long globalized, service jobs now are being moved to places that can supply digitally capable workers supported by trustworthy, Internet-based collaboration. For an example of the kind of dramatic growth that is possible, look at Singapore. Based largely on government-developed digital infrastructure and services, Singapore has attracted global corporations and progressed from a per-capita income of $511 a year in 1965 to more than $56,000 in 2010.


View Full Story

| More

Comments

Add Your Comment

You are solely responsible for the content of your comments. We reserve the right to remove comments that are considered profane, vulgar, obscene, factually inaccurate, off-topic, or considered a personal attack.

In Our Library

White Papers | Exclusives Reports | Webinar Archives | Best Practices and Case Studies
Maintain Your IT Budget with Consistent Compliance Practices
Between the demands of meeting federal IT compliance mandates, increasing cybersecurity threats, and ever-shrinking budgets, it’s not uncommon for routine maintenance tasks to slip among state and local government IT departments. If it’s been months, or even only days, since you have maintained your systems, your agency may not be prepared for a compliance audit—and that could have severe financial consequences. Regardless of your mission, consistent systems keep your data secure, your age
Best Practice Guide for Cloud and As-A-Service Procurements
While technology service options for government continue to evolve, procurement processes and policies have remained firmly rooted in practices that are no longer effective. This guide, built upon the collaborative work of state and local government and industry executives, outlines and explains the changes needed for more flexible and agile procurement processes.
Fresh Ideas In Online Security for Public Safety Organizations
Lesley Carhart, Senior Information Security Specialist at Motorola Solutions, knows that online and computer security are more challenging than ever. Personal smartphones, removable devices like USB storage drives, and social media have a significant impact on security. In “Fresh Ideas in Online Security for Public Safely Organizations,” Lesley provides recommendations to improve your online security against threats from social networks, removable devices, weak passwords and digital photos.
View All

Featured Papers