The Business-Technology Weave

Aug 31 2012   2:29PM GMT

Crucial Considerations when Going Mobile, Pt. II – Training

David Scott David Scott Profile: David Scott

Most organizations already have a schedule of regularized training – both for core, mission-critial, applications as they undergo revision and update – and in accommodating new apps and business methods.

Whether incorporating mobile as a formal addition to your business enablements, or in merely granting access to personally-owned devices, be certain to set expectations up front.  These should include adherence to proper security protocols.  Be aware that many users feel that mobile devices, whether company or personally owned, represent a certain informality in terms of use and communications.

It’s the nature of the beast:  These devices lend themselves to a certain “rounding” – abbreviations and the compacting of words that would never be tolerated through other means:  the support of texting; IM’ing; “friending;” Twittering, etc.

Too, there is the ready “firing off” of communications without the appropriate distance (time) for review.  Ensure that business communications remain… business-like.  You should train for caution, and for adherence to that standard.

Also remember to train staff in troubleshooting measures.  When important business is being conducted through mobile, device-unavailability can put a real crimp in operations.  Oftentimes routine problems can be overcome with simple guidance.  Users should be able to examine connectivity issues to include setups, the verification of account info such as user ID and password, and they should have ready-access to a support desk.

 Comment on this Post

There was an error processing your information. Please try again later.
Thanks. We'll let you know when a new response is added.
Send me notifications when other members comment.

Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to:

Share this item with your network: