Making content management work for you
Many organizations struggle with what is commonly referred to as “content” management. Content management is about ensuring that people get the exact information they need, when they want it and in the easiest way. There a two core challenges with trying to establish a content management system.
- -There is a vast wealth of information generated in most organizations, some relevant, some not so much.
- – There are many potential consumers of information, all of whom have different needs concerning what they need, how they access it and when they want to use it.
- – Consumers of content
- – Generators of content (both approved and informal)
- – A permissions process to separate approved from informal content
- – A permissions system to separate approved from unapproved users of the content
- – An access system to find the content
- – An searchable database that stores the content
- Most content management initiatives only focus on the searchable database, ignoring the larger ecosystem, which is one of the reasons they fail. However, by focusing on how the stars consume content, it becomes possible to drive the creation of the complete environment. Here’s how it works:
- – Go to 10-12 star performers in a critical role.
- – Ask each one to identify 1-2 critical instances where they successfully used content or were missing a critical
- piece of content. This will produce about 20 possible instances of content use.
- – Have each of them describe their top priority instance. Where was it? Who were they using it with? What was
- used?
- – Focus in on the specific content they used. What was it? Where did they get it? Were there any issues? This
- needs to be very specific.
- – Select 1-2 of the instances as the most important
- – Now use these high priority instances as drivers for defining and building the overall ecosystem – one section
- at a time including defining who are the generators (approved and informal) of the content, who approves the
- content, who can access it, how is it accessed, how is it stored and how is it used.