Matching YOUR internal talent to power YOUR business
Hiring from within your organization provides numerous benefits. Higher Inside is a proposed innovative product that can provide unmatched opportunities to staff. Higher Inside reduces recruitment costs, increases retention, and decreases employee production delays using data you already have and employees you have already trained. Higher Inside provides a platform to match talent to jobs, providing entry level positions for external talent to fill and supplement your workforce.
Have a look at the video for a product composed of an internal recruitment engine powered by your data and customized AI algorithms to match managers to prospective employees to power your business.
0 Comments
Innovations I dream up can be better prepared for success if I am careful not to repeat the mistakes of business past. Innovations can be affected by forces beyond our control, such as society and culture moving differently or launching a product at the wrong time. However, for those who may have worked in large organizations, sometimes the forces beyond our control are the very leaders and their business rivalries. Thus begins our tale of Windows Phone. Many people who shop for smartphones have never heard of Windows Phone. Windows Phone was an operating system that ran on smartphone hardware developed and released by Microsoft in 2010 (Savov, 2017). Windows Phone OS (Operating System) was revolutionary with features such as icons that changed and updated, advanced camera hardware, and other elements that are now present in operating systems running on iOS and Android OS that we may take for granted. Yet the concept failed in the marketplace. Why did Windows Phone fail to impact the smartphone marketspace significantly? Examining common forces against innovations such as technical, legal, ethical, and social issues does not yield many significant barriers against the new operating system. Windows OS hardware manufacturers were separate from Microsoft, and it supported operating Windows Phone OS without many technical challenges. There were no patent battles with giants in the smartphone space such as Google and Apple; thus, legal problems did not necessarily prevent it from succeeding. What ultimately killed Windows phone were two things the developers and designers had no control over; company branding and senior leadership's socio-political rivalry with competitors. Microsoft and Google have long had a corporate rivalry. That rivalry continues with the two corporate behemoths feuding in court and media (Satter, 2021). However, some believe the factors that doomed Windows Phone may have been senior leadership's corporate culture, which made it difficult for applications like Instagram and FaceBook to be included on the device. In addition, there was pressure for the OS to be tied to the Microsoft desktop operating system, which on the heels of a botched Windows 8 desktop OS, soured consumers to Windows's brand (Edwards, 2021). In addition, Microsoft's corporate nemesis Google had refused to allow them to use Youtube, Google Maps, and other popular and well-established applications (The Times of India, 2019). An ex-Nokia engineer shared with The Times of India that Microsoft leadership underestimated Google's value to users and had little interest in adding their suite of applications to their operating system (2019). These two lessons are essential to my sociotechnical plan for product innovation. First, I must recognize socio-political pressures and develop a plan to neutralize them to ensure success. The socio-political aspect is true when creating technical solutions that may rely on other applications or products produced by other companies (or competitors). This can be achieved by researching what other parts of the organization are doing or performing scenario planning to minimize the risk a product launch may face.
Second, I need to be careful that my innovation is not launched when other product launches or social issues may impact its success. For example, a car manufacturer launching a new vehicle line with low fuel efficiency that generates the maximum allowed amount of carbon output would be difficult to sell today when consumers make decisions based on environmental issues (Laker, 2022). Being successful with an innovation being introduced to the marketplace often requires more than a great idea. Hopefully, business behemoths such as Microsoft have learned from expensive flops like the Windows 8 release and the Windows Phone rivalry. Launching an innovation requires a little more finesse than dumping incredible amounts of resources into a product and throwing it in front of consumers. Given the proper launch at the right time, an innovative product can overcome unforeseeable forces, hopefully. Alexander Pope’s An Essay on Criticism from 1711 brought the phrase “To err is human” to light (Merriam-Webster, n.d.). The irony about errors is that I have despised errors for most of my life. However, my calm and rational mind understands that learning by making mistakes has brought incredible innovations to the world. Here I reflect on a few innovations discovered by serendipity, error, and exaptation.
Serendipity is a clever-sounding word that I have always understood to mean a glorious discovery by happenstance. For example, it is serendipitous to discover a gold nugget while out on a nature hike along a riverbed without ever aiming to find said gold nugget. An innovation that was also serendipitous was the microwave oven that was discovered by Percy Spencer while working on a magnetron that happened to melt his peanut cluster bar (Blitz, 2016). Spencer investigated the accident and found microwaves could heat things. An error is another method of innovation. In fact, without mistakes, we would cease to exist as errors in our DNA lead to the mutations that allowed our species to evolve (Schoemaker, 2012). The minor mistakes that occur throughout the unending chain of cell division, replication, and copying allow me to be what I am today. However, an error by nature is different than an error caused by a human being who accidentally makes a very human mistake and discovers something new and innovative in the process. Enter Alfred Nobel, who experimented with a new substance called nitroglycerin and discovered that the material had the propensity to explode. However, he lost his brother and caused significant damage in the process (Lemmel, 1998). Nobel was determined to discover a way to tame the volatile material that cost him his brother and eventually created Dynamite in 1876, making the material stable. Dynamite has been used to build tunnels, dams, and clear debris, ultimately turning Nobel’s disastrous error into a valuable tool for humankind. Finally, we examine exaptation as an innovative mechanism. Exaptation follows closely with the formerly mentioned errors and serendipity. Still, it differs in that an innovator recognizes how something used for a different purpose can be remade to be helpful in another way. Sir Tim Berners-Lee recognized the computer and networks to quickly and easily navigate through information on a computer system. He created the URI, HTML, and HTTP specifications and protocols to share information (Internet Society, 2009). Sir Berners-Lee is the father of the Internet, and his exaptation of computers and networks into tools for the masses is one of the most influential innovations of the current age. Though errors may be frustrating and not everything can be serendipitous in nature, organizations and innovators who recognize the value in being human and hunting down the cause and effects of our world can turn these frustrations and happy accidents into true modern miracles. Through mistakes and the identification of new ways to use existing technology, I have the honor, privilege, and capability to share my thoughts on innovation by happenstance. References
One of the fascinating predictions of all time that eventually came true is that the everyday person would communicate to another person with a personal device without wires. This was the dream of Nikola Tesla, who shared this prediction with the New York Times in 1909! (Sterbenz, 2013). Nikola wasn't a very practical businessman, so his patents responsible for the proliferation of radio broadcasting and alternative current were never attributed to him. In addition, he had lofty ideals, including a preference not to publish in academic journals and a desire to provide energy for free to people all over the world that clashed with modern capitalism.
Today Tesla would be pleased to see that most persons in the modern world have access to a device (our smartphones) that allows us to send messages, share pictures, movies, and access information without wires. It took approximately eighteen years for the first pictures to be broadcast wireless through a television (Vlku, n.d.). Part of the dream of Tesla is now commonplace in the developed world. But what had to happen for the proliferation of mobile messaging and personal communication devices? Technological innovation is a significant force required before the capabilities for smartphones were possible. The continuous improvements in microprocessors, the development of plastic, advanced software, and the mass adoption of cellular towers required ongoing enhancements in technological innovation. In addition, the practicality and accessibility of the Internet allowed smartphones to provide a utility that many people sought. Yet as Nikola Tesla learned, technology alone does not let something be successful. In addition to the technological advancements required for smartphones and wireless communications, there also needed to be economical and social forces present. Social demand for the capabilities to communicate with other people using a small device was a prominent business driver for all the supply chain companies that feed into mobile phones components, phone producers, and the telecommunication industry. The demand for on-demand messaging, faster communications, data transfers, and multimedia streaming continues to drive telecommunication providers and smartphone manufacturers to innovate by developing more advanced chips and ways to accommodate expectations. Tesla understood the human desire to communicate easily with a simple "apparatus." He was a genius of his time, creating patents for radio broadcasting and electricity delivery under Thomas Edison's Edison company. His knowledge of physics allowed him to envision the ability to transmit electromagnetic radiation from one device and receive it on another device. He may not have had the foresight to see that the microchip, software, and telecommunication companies would be the required components to achieve this feat, but he knew it was possible. I believe that those of us who work in various industries and have the knowledge, skills, and imagination about where our future innovations will lead society are often capable of making informed predictions. These predictions can come to reality more quickly when businesses couple experts in their fields (the visionaries) with business prowess and the ability to sell goods people may not even know they need (salespersons). It is a rare gift when an innovator with imagination can also identify and leverage business drivers to deliver goods into customers' hands and make dreams into reality! References Esferize. (n.d.). StackPath. Www.esferize.com. Retrieved January 16, 2022, from https://www.esferize.com/en/nikola-tesla-the-forerunner-of-wireless-communications/ Sterbenz, C. (2013, September 3). 16 Of The Most Impressive Predictions Of All Time. Business Insider. https://www.businessinsider.com/predictions-from-the-past-that-came-true-2013-9#from-1909-nikola-tesla-predicted-personal-wireless-devices-7 Vlku, N. (n.d.). The History of Television (or, How Did This Get So Big?). Www.cs.cornell.edu. http://www.cs.cornell.edu/~pjs54/Teaching/AutomaticLifestyle-S02/Projects/Vlku/history.html#:~:text=The%20first%20%22television%22%20system%20broadcast When I wake up in the morning, at some moment I am presented with a choice in how to approach the day. The choices I make determine, to some extent, how any given day will unfold. Some mornings I pause and think about the day ahead. I recall past occurrences, review my calendars for activities, and map out a course of action to accomplish tasks. I envision a story about how the day will unfold, and I examine the day as it unravels. During the day, I observe how activities are progressing. Are meetings running longer than anticipated? Did an unexpected school incident affect our children? Did an unexpected automobile accident prevent a timely route to a scheduled activity with the family? These types of signs require me to adjust future appointments or change my course of action throughout the day. In a small way, I am doing my scenario planning. Scenario planning requires an abstraction of the future, positing what may occur throughout time. It works best in scenarios described as "high uncertainty-high complexity" (Koehler & Harvey, 2004). In reality, my daily activities could hardly be described as uncertain or highly complex. Scenario planning works best for complex activities with multiple variables. It uses qualitative and quantitative data and determines a response to various scenarios (Saulsgiver, 2021).
Scenario planning is not what I typically do when I wake up in the morning. What I usually do is more akin to forecasting. When I wake, I use past experiences to determine the day's events. Koehler and Harvey describe forecasting as an activity that "…involves making predictions about an unknown question or issue" (Koehler & Harvey, 2004, pp. 274). Some days, I react to events using life experience without anticipating and planning for various outcomes. Forecasting is similar to this activity because it takes past quantitative data and predicts future performance. For my day-to-day life, forecasting seems to get the job done. However, there are some times when scenario planning will ensure I have a more successful day. For example, if my day requires me to take an airplane across the country for a critical business meeting. The advantages to each type of planning activity are that forecasting is it uses real data and requires less time. Forecasting analyzes concrete facts from the past to anticipate the future. Forecasting is often performed to predict short periods in the future. The disadvantage of forecasting is that it is less responsive to unexpected changes. For example, if I expected revenues to be significantly higher based on a forecast, and I performed no planning around the scenario if income is low, then I may be in severe financial trouble. Scenario planning anticipates multiple outcomes and maps them to stories. These stories have signs and markers that adjust the narrative as it flows. The scenarios use quantitative and qualitative data to develop a narrative that could happen or the opposite. The process anticipates a variety of outcomes well into the future. One disadvantage of scenario planning is that it requires a significant investment in resources and time. Also, scenario planning may be far from accurate given that it is used to predict outcomes many years into the future. In most cases, scenario planning is best performed by many experts (e.g., my wife, children, coworkers) to anticipate the outcomes of the day. This is not always possible and may drive said experts nuts. Forecasting my day is something that is easier to do, and it keeps the experts happy. However, when a complex vacation travel agenda needs to be made, then scenario planning may be the best activity to perform. After all, you never know when Coronavirus pandemics may come along to rain on your Disney Cruise line parade! References Koehler, D. J., & Harvey, N. (2004). Blackwell handbook of judgment and decision making. Blackwell Pub. Saulsgiver, W. (2021, August 20). Scenario Planning versus Forecasting. Schultz Financial Group Inc. https://sfginc.com/scenario-planning-versus-forecasting/ Carbon Nanotubes and our Future“Accidents happen!” Although the phrase may have a negative connotation, it is because of accidents and errors that humans discovered world-changing technologies. For example, vulcanized rubber and penicillin were discovered by accident (The Editors of Encyclopedia Britannica, 2018a) (The Editors of Encyclopedia Britannica, 2018b). These two technologies have provided the capability to create impact-resistant materials, automobile and bicycle tires, durable shoes, and a new class of medicine that has saved lives. Carbon nanotubes (CNT) include a list of materials accidentally discovered and showed the potential to create new materials and save lives! In 1991 a researcher, Sumio Iijima, fascinated with carbon materials and atomic structure, analyzed materials using an electron microscope. During his analysis, he recognized cylindric-shaped carbon structures that appeared to be “…extremely thin needle-like material…” (International Balzan Prize Foundation, 2007). Upon further inspection, Iijima realized that the structure was shaped like a tube and named the materials “carbon nanotubes.” Iijima’s finding was not the first time CNT was created; however, it was the first time a researcher reported their structure and potential applications (Iijima, 1991).
The discovery and further research regarding CNT applications have promised a boon of new materials, medical applications, and computer circuitry. CNT innovation and research are driven by numerous creation forces, including economic pressure to improve computer circuitry (Graham et al., 2005), medicine (Prato et al., 2008), create new materials, and drive innovation in green technology. CNT has the potential to drastically increase electric vehicle battery efficiency and capabilities and provide new materials to use in microchips. However, there remain challenges preventing whole scale application of CNT. CNT are incredibly strong and flexible, which drives a desire to use them in new materials for buildings, vehicles, and structures. However, Lu et al. share technological challenges to produce this microscopic miracle at a scale that is economically useful (Lu et al., 2012). Currently, industrial-scale manufacturing of CNT in quantities to support a new material revolution is one of the primary challenges of using CNT. In addition, using CNT for transistors is hindered by subtle defects in the tube structures themselves. A methodology to create a more uniform CNT will need to be developed before the next computer generation using CNT as transistors. CNT, nonetheless, have found their way into drinking water filters, sports equipment, batteries, and for use in the delivery of medicine (Cambridge, 2014). In addition, CNT is being produced in larger and larger quantities each year with a “..tenfold..” increase between 2006 and 2014. CNT, discovered by accident, could be the future material to follow a string of materials that were accidentally found and driven to the markets by economic and technological forces. It seems humans have a knack for discovering new materials, whether it be Charles Goodyear's vulcanized rubber or Leo Baekeland’s synthetic plastic. References Cambridge, U. of. (2014, March 31). Carbon nanotubes find real world applications. Phys.org. https://phys.org/news/2014-03-carbon-nanotubes-real-world-applications.html Graham, A. P., Duesberg, G. S., Seidel, R. V., Liebau, M., Unger, E., Pamler, W., Kreupl, F., & Hoenlein, W. (2005). Carbon Nanotubes for Microelectronics? Small, 1(4), 382–390. https://doi.org/10.1002/smll.200500009 Iijima, S. (1991). Helical microtubules of graphitic carbon. Nature, 354(6348), 56–58. https://doi.org/10.1038/354056a0 International Balzan Prize Foundation. (2007, November 22). The Discovery of Carbon Nanotubes - Basle, 22.11.2007. Www.balzan.org. https://www.balzan.org/en/prizewinners/sumio-iijima/the-discovery-of-carbon-nanotubes-iijima Lu, W., Zu, M., Byun, J.-H., Kim, B.-S., & Chou, T.-W. (2012). State of the Art of Carbon Nanotube Fibers: Opportunities and Challenges. Advanced Materials, 24(14), 1805–1833. https://doi.org/10.1002/adma.201104672 Prato, M., Kostarelos, K., & Bianco, A. (2008). Functionalized Carbon Nanotubes in Drug Design and Discovery. Accounts of Chemical Research, 41(1), 60–68. https://doi.org/10.1021/ar700089b The Editors of Encyclopedia Britannica. (2018a). Vulcanization | rubber manufacturing. In Encyclopædia Britannica. https://www.britannica.com/technology/vulcanization The Editors of Encyclopedia Britannica. (2018b). penicillin | Discovery, Mechanism of Action, & Uses. In Encyclopædia Britannica. https://www.britannica.com/science/penicillin If you have ever gone out to lunch with a large group of people, you may have experienced how challenging it is for a group of people to make a group decision. Maybe your colleagues and friends are different, but for me, it can be a real pain in the neck to find a lunch destination that everyone is happy to visit. Consensus-building methods for formal settings loosely applicable to a group lunch destination decision exist that are more appropriate for complex issues. Two group decision-making models are the Delphi method and the Structured Design (Dialogic) (SDD) method. Both group decision-making methods ensure that group decisions are objective. In addition, both ways strive to include introverts, balance contributions from extroverts, and have all perspectives. The ideal results of each method include group decisions with holistic viewpoints rather than decisions based on who was the loudest or more senior person in a group. The strategy should reflect the issue's complexity, so I would prefer to use SDD over Delphi for complex problems. The Delphi Method begins with a series of open-ended questions about the decisions to be made. Participants then discuss the answers until a consensus is reached (Sekayi & Kennedy, 2017). For example, in our lunch destination scenario, participants may begin by asking if anyone has any food allergies or specific types of food that are strictly off-limits. The group can then eliminate some destinations to narrow down the lunch destination. Each person provides information about their preferences and slowly whittle down potential destinations. Unfortunately, this technique may still "out-vote" one or more person's preferences and rely on a majority vote, leaving someone less vocal stuck eating Thai food when they hate Thai food. Alternatively, Structured Design (Dialogic) (or Structured Dialogical Design) (SDD) may be more appropriate for complicated strategies and plans. In SDD, the persons most concerned or affected by the issue(s) are the primary participants. Triggering questions (TQ) focus the decision, followed by statements responding to the TQs. Next, further clarification narrows outcomes, and the group then comes up with comparison and contrasting options (e.g., clustering). Following the grouping of choices, the participants select their preferences and explore their relations. Finally, interpretation of those relationships occurs, and the group plans to move forward (Laouris & Romm, 2021). I would not want to use SDD to develop a lunch destination; however, a verbal version may be used to ensure that all stakeholders' interests are taken into consideration. The similarities between the Delphi method and SDD are that both ways use framing or, as Laouris and Romm describe it, focus on the problem or issue of interest. They also involve a discussion of participants and aim to eliminate less desired options. The two methods differ most drastically in the analysis and proper selection of group preferences and a deeper exploration of potential solutions that occurs in SDD. SDD aims to explore as many relationships between the group decision choice and build consensus through metrics analysis and choice relationship analysis.
In the case of SDD, it would not make a very effective method for determining a trivial group decision-making method because it requires extensive analysis. The Delphi method or a modified version works best for a more rapid decision-making process. The SDD method value is more inherent with groups such as Think Tanks, business strategy planning, or scenario planning for organizations. For now, I think I'll stick with conceding to eat at a Thai restaurant when lunching with a group instead of turning the decision-making process into an academic exercise. Unless you're into that sort of thing? Happy trails! References Sekayi, D., & Kennedy, A. (2017). Qualitative delphi method: A four round process with a worked example. The Qualitative Report, 22(10), 2755-2763. Yiannis, Laouris, Norma RA Romm. (2021). Structured dialogical design as a problem structuring method illustrated in a Re-invent democracy project. European Journal of Operational Research, 2021, ISSN 0377-2217, https://doi.org/10.1016/j.ejor.2021.11.046. Information security is a challenging field for organizations made more difficult because it is prone to the constant change in information technology. Higher education institutions thrive with open access to information and collaboration. Yet, higher education institutions also store and process sensitive data such as student records, student health records, credit card data, and State and Federal government data. An essential aspect of information security professionals' roles is to know what types of data they have and where data is located. However, a technological trend identified by the 2021 EDUCAUSE Horizon Report: Information Security Edition identified expanding and borderless network boundaries (EDUCAUSE, 2021). Networks without well-defined borders are complicated for information security teams to protect. As organizations migrate data to cloud-hosted solutions and data is accessed by organizational users, devices not managed by the organization could access that data. For example, personal and mobile devices may access cloud-hosted and controlled data stored or processed across devices subject to different laws, regulations, and endpoint security access controls. Information security teams will need to identify and monitor a device accessing their data and ensure that it is free from malicious software and can safely access sensitive data. The societal and cultural trends amplified by the remote work lifestyles to accommodate COVID-19 safety protocols have compounded information security challenges. Information security teams can detect and respond to security incidents on endpoint devices such as computers, tablets, and other mobile devices as long as end-users comply with security requirements on personal devices. For example, end-users will need to install endpoint protection software and maintain their devices with security updates. However, users today want the convenience of access to data and, though aware, may not be as vigilant about information security practices. The Horizon Report identified the deployment of cloud-based endpoint protection platforms (EPPs) as an important technological trend to manage the security of organizational data. EPP will be required to provide information security as users continue to access data from personal and public networks due to COVID safety protocols and the convenience of remote work. COVID and cultural trends pushed network boundaries out of organizational-controlled network infrastructure and into a wider borderless networked world. An example of the increased number of remote students based on a survey performed by the National Center for Education Statistics identified 7,313,623 students enrolled in distance education courses from post-secondary institutions in 2019 (Institute of Education Sciences, 2015).
To maintain the visibility of mobile and remote devices, information security teams must have a window into the network security and device security posture to identify potential abuse and breaches. Higher education information security teams can use EPP provided to end-users to monitor these remote systems accessing organizational data. The organizations will have to work through legal and licensing challenges with vendors that may complicate software deployment of organizational purchased software to personally owned devices. In addition, software must remain easy to deploy, maintain, and use to ensure that convenient access to data is not subject to technological barriers and thus decrease the chances of user adoption and use. In my past role on a higher education information security team, the organization was able to work with vendors to provide EPP to students, faculty, staff, and affiliates without a significant increase in product cost. In addition, open and transparent participation and communication with faculty, staff, students, and affiliates to develop policy that specified how organizational software on personal devices could and would be used improved willingness to install and comply with information security requirements. Even though the network boundaries are shifting and appear borderless, higher education organizations will find that they can benefit by using EPP that is widely deployed to continue providing information security benefits across the spectrum of devices accessing organizational data. References EDUCAUSE. (2021). Information Security Edition (p. 10). EDUCAUSE 2021. https://library.educause.edu/-/media/files/library/2021/2/2021_horizon_report_infosec.pdf?la=en&hash=6F5254070245E2F4234C3FDE6AA1AA00ED7960FB Institute of Education Sciences. (2015). The NCES Fast Facts Tool provides quick answers to many education questions (National Center for Education Statistics). Ed.gov; National Center for Education Statistics. https://nces.ed.gov/fastfacts/display.asp?id=80 "Hello world." This is a loaded statement being that printing "Hello World" is the most commonly taught first example used when teaching computer programming; it also happens to be a great introduction for my reinvigorated blog about futuring and innovation. My past blog posts focused on cybersecurity related interests and information that I have taught to other students in high school, at work, or through my own curiosity. My current graduate course "Futuring and Innovation" has fired up my imagination regarding cybersecurity, the future, and innovation and this blog theme gives me a broader range of blog topics. My favorite topics to imagine for the future of humanity are cybersecurity, space exploration, and artificial intelligence. I happen to be a Science Fiction fan and my most recent favorite in the genre is the book series The Expanse by pen-name authors James S.A. Corey (Corey, 2011). This book (and now TV) series takes place a few hundred years in the future after humanity has colonized the solar system, Mars, the asteroid belt, and some habitable moons and planets and a company discovers an ancient alien molecule. The technical, political, societal, and economical aspects considered in the series all combine to create a realistic human space drama with what I imagine a colonized solar system in the future will very likely mirror. Oh, and a bonus as the series was turned into an amazing and realistic in-space drama demonstrating future technology and the politics of a colonized solar system (Fergus and Ostby, 2015). The series was purchased and continued to be produced from Amazon after a brief Sci-Fi network run. Excluding the alien molecule aspect, the technical, political, and societal aspects are all possible extensions of existing technology and human interactions.
I am interested in imagining how we get to a point that mirrors what the book and show demonstrate with regard to the usage of artificial intelligence applications, computers, communications, space technology, weaponry, and handheld tablets/phones. The applications of artificial intelligence show that it is used to augment, but not replace humans. For example, AI in the show will take a series of verbal parameters and provide calculations for space travel around the solar system, however, humans may take manual control when the AI may provide less intuitive actions. Additionally, computer viruses, trojan horses, jamming, and other cyberattacks occur during conflicts and as means to infiltrate and steal information from warring political and societal factions. The software, while similar, is often evolved to evade counter-measures and detection from anti-virus software. Most critically, everything is logged and available for analysis in the event that the unexpected occurs during communications, analysis, and computer activities. I imagine a future where artificial intelligence is used to analyze the log activity of Information and Communication Technology (ICT) and highlight the anomalies. This particular area of study has captured my imagination and I am working to contribute to this study of knowledge by learning where I can provide value for the application of artificial intelligence and ICT log analysis to assist cyber defenders. I find the inclusion of these types of analysis in The Expanse to be realistic and refreshing. If you have not seen the show on Amazon or read the book series then you're really missing out on an amazingly accurate portrayal of the interactions of humans and technology. References Corey, J. S. A. (2011). The Expanse Series. Little Brown & Co. Fergus, M., & Ostby, H. (2015, December 14). The Expanse [TV and Internet series]. SciFy and Amazon Studios. This may have ended up a dead blog for a while, but in perspective when comparing this blog's lack of activity to the gravity of 4.34 million people who have died from COVID-19 over the past year and a half makes it seem insignificant. That said, the misrepresentation of information and "fake news" that now pervades most news organizations (primarily in the U.S.) is truly heartbreaking. It 100% contributed to the worldwide death count. It is still contributing to it.
What does the above have to do with cybersecurity? Misinformation and "fake news" related to cybersecurity can also affect people's lives. For example, many applications and sites still practice poor password hygiene. Products that have known vulnerabilities continue to be released. The misinformation here is that it's harmless profit growth. Senior executives and budget forecasters and analysts know that it is less expensive to market an inferior and flawed product to earn a quick buck and potentially pay the restitution than it is to integrate secure software engineering practices. Overcoming this misinformation will require a cultural shift to change this dynamic, but often times it requires pain; in the form of data breaches, stolen money, data theft, hacked infrastructure, or deaths. The misrepresentation of information prevalent in today's headlines and newspapers is also going to require a cultural shift to overcome it. I do not have much insight into what changing the world news sphere will require, but I do know that in my organization, I can gather data, present cases, and create processes to implement secure practices to market great products. I'll just focus on biting of what I can chew in these anti-vaccine, anti-secure practice world. |
AuthorI am a Doctoral Scholar at Colorado Technical University and a graduate of the Cyber Security Operations and Leadership program from the University of San Diego. I work in cybersecurity, and have accumulated twenty years in the IT industry. There are few IT roles I have not performed, which gives me great insights into making sense of all the IT confusion. Archives
February 2022
Categories
All
|