NGO workflows and how to choose your tools

From DevSummit
Revision as of 03:49, 20 November 2016 by Beatrice (talk | contribs)
Jump to navigation Jump to search

1. Introduction

1.1 Review of the work done in the "Mapping out NGO Workflows" session on Day 2.

See notes from the "Mapping out NGO Workflows" session.

1.2 Overview of key workflows emerged from discussions about technology infrastructure for NGOs

  • Share a file internally with trusted colleagues
  • Share a file externally with known organizations and allies
  • Share a file publicly
  • Set up a conference call
  • Set up a 1:1 call
  • Set up a webinar
  • Set up an in person meeting
  • Send an end-of-the-year donation-drive newsletter
  • Author a grant proposal
  • Compile the end of the year budget

2. Session Notes

2.1 Workflows taken as reference

  • Share a file internally with trusted colleagues
  • Share a file externally with known organizations and allies
  • Share a file publicly

Steps included in these workflows:

  • Coordinate document sharing
  • Annotate/ comment on document

2.2. What are folks current using?

  • Email
  • Dropbox, Box.net
  • Asana
  • Trello
  • Skype
  • Slack messages
  • Basecamp
  • Google Drive
  • GitHub

2.3 Values identified

  • Privacy
  • Security
  • Anonymity
  • Resiliency
  • Sustainability
  • Usability
  • Accessibility
  • Openness

2.4 Brainstorming: What questions should we ask?

  • What is the tech literacy of participants?
  • Who are the actual adversaries?
  • Where are the files?
  • What path do the files take?
  • How do we manage usability and security?
  • Who is watching?
  • Is there a "fear factor" in adopting new technology? e.g. fear of learning new? e.g. fear of the tech itself?
  • How do we determine/ maintain data integrity?
  • What is the server configuration?
  • What is the level of security culture (of the org)?
  • What is the path to adoption (within an organization)?
  • What factions are we dealing with?
  • What belief structures are embedded in existing ways of working?
  • What is the budget/ resources of the org?
  • What is the level of security culture of the provider?
  • What is the timeline/ time restraints?
  • What is the bandwidth?
  • Who needs what permissions?
  • How many people need access?