Learn how to defeat Government 2.0 ‘villains’

Booz Allen Hamilton\'s Steve Radick discusses a recent blog post.

The transition to government 2.0 creates challenges for everyone as agencies look for ways to improve performance and transparency.

Earlier, DorobekInsider interviewed Luke Fretwell about his idea to designate June 15 as Government 2.0 Hero Day to “recognize citizens doing great work both inside and outside of government.”

But every superhero has an arch enemy, and government heroes are no exception.

Steve Radick is lead associate at Booz Allen Hamilton and recently blogged about government 2.0 villains, how to spot them, and how to thwart them.

Radick says he was looking for a fun post idea and was inspired by

        Read more: Technology

The third villain on Radick’s list is the Money Monger, the federal equivalent of the “sleazy, marketing, infomercial, get-rich-quick guy”.

“He focuses on generating buzz and twitter followers rather than improving agency performance. Radick says defeating the Money Monger requires asking for a measure of success that is rooted in hard data, not hype.

The fourth villain, Cap’t Conservative, “wants to do the right thing but gets bogged down in seeking justification and approval.” Captain Conservative would never act first then ask for forgiveness; he always asks for permission.

Radick says “by securing the approval of people located above Captain Conservative on the organizational chart, you can mitigate his fear of doing something wrong and getting in trouble for it.”

Silos are the fifth type of villain, and Raddick ranks them among the most powerful.

Because they consider their team unique, Silos refuse to cooperate out of an almost paranoid fear that everyone else has the worst intentions in mind. Radick says operating on open platforms, which limits opportunities to restrict information, is the best way to handle Silos.

Radick’s sixth villain is the Information Sucker, the individual who steals ideas from Gov 2.0 heroes only to introduce the concepts elsewhere as his own creations. Radick says fear of Information Suckers can often give rise to Silos.

The key to discrediting Suckers is probing questions, “Because their “expertise” has been gained from a few white papers and PowerPoint presentations, their outer shell can be penetrated with follow-up questions,” says Radick.

Though they didn’t make his list of six, Radick also says agencies must be on the lookout for sideline sitters. While he’s not concerned about people who don’t actively push innovation, Radick says “the real danger comes when they sign up for new technologies but never come back and use it . . . there is so much content you can use if you just spend some time researching.”

Meg Beasley is an intern with Federal News Radio.

Copyright © 2024 Federal News Network. All rights reserved. This website is not intended for users located within the European Economic Area.

    DCSA

    New DCSA director sees a data-driven future for security clearances and more

    Read more
    HHS, cybersecurity, Administration of Children and families,The Department of Health and Human Services building

    A look into whether one HHS component is properly securing its cloud information systems

    Read more
    cybersecurity maturity model certification

    The next security update: What you need to know about the newest version of NIST 800-171

    Read more