Archive for the ‘Information Security’ Category

Critical Thinking and IT   Leave a comment

Having been involved in IT for quite a number of years I have been personally across an extensive list of faults, projects and to-do lists. Where the faults have ranged all the way from printing problems on a PC to Active Directory synchronization errors across multiple global domains. Where the projects have included things like office relocations, SAN upgrades and WiFi rollouts. And where to-do lists (IT strategies) have revolved around understanding the needs of multiple stakeholders, the timing of investment decisions and the availability of resources.

And one of the critical abilities that is common to all of these is the ability to think critically.

Not in the sense of being critical about others, but the process of thought and reasoning.

I’ve seen fellow IT professionals simply content to hit refresh buttons and just go for the software re-install.

I’ve seen projects fall over because some first and second order impacts weren’t considered.

And I’ve seen action items added to strategies for no other reason than it just felt right to the sponsor.

Sigh!

So, while the following list can apply to other areas of endeavor that requires fault analysis, project management or strategic approaches, all of these aspects of critical thinking do apply to the full gamut of activities associated with information technology.

Eight principles of critical thinking:

  1. define the purpose
  2. what is the question you are wanting to answer
  3. collect information
  4. consider your inferences
  5. check your assumptions
  6. be clear about the concepts in use
  7. what exactly is your perspective
  8. what are the implications

Regarding purpose. What is the objective of that project? What is it that is really trying to be achieved?

Regarding question. How clear are you about the fault you are trying to fix? What are its symptons and underlying causes?

Regarding information. Do you have all the facts and evidence with respect to that fault? How long has it been going on, under what conditions is it triggered, and so on.

Regarding inferences. Looking at that set of strategic objectives, what interpretations and conclusions can you draw out from that body of proposed work?

Regarding assumptions. What beliefs and biases do you hold, and what beliefs and biases do you believe that others hold?

Regarding assumptions. With respect to that project, what are you taking for granted? With respect to that strategy, what are you assuming about the business?

Regarding concepts. What exactly is that idea you have about the cause of that fault? What is the theory you have about the use of that particular technology for that project?

Regarding perspective. Can you step back and see your point of view dispassionately? In the project management discussions, is your point of view valid?

Regarding implications. When you take that step to fix up the fault, what will happen? What is likely to occur as you execute that strategy?

The ability to think critically is increasingly important. Do you take the time and effort to apply any or all of these eight aspects of thought and reasoning to the tasks at hand?

 
For more of what I have to offer, visit Dellium Advisory, follow on Twitter, connect using LinkedIn, or review my strategy and futures-centric blog.

Advertisements

Is your Data an Asset?   Leave a comment

Think about the all the data you have in your organisation.

For a business there is customer data, sales data, advertising information and personnel files. For not-for-profits there are donor registers, volunteer lists and information about those you support.

How do you view that information? Do you treat it as an asset worth protecting? Do you see it as a resource for operating more effectively?

If you view your information as an asset, do you treat that asset like you treat other assets? With the protection of insurance and with the care of regular maintenance?

For viewing data as an asset, this insurance comes in the form of information security. That your data is protected from unauthorised access, copying, destruction, disclosure, disruption, modification and use. Its kept safe, its backed up and it available to who it should be available to.

For viewing data as a resource, its use comes in the form as data mining. Its where your data is analysed for trends and patterns. For the discovering of knowledge. For its through techniques such as cluster analysis (looking at groups of records), anomaly detection (unusual actions) and rule association (dependencies) that new knowledge can come to light. And from that knowledge, operational effectiveness or strategic responsiveness can be improved.

 
For more, visit Dellium Advisory, follow on Twitter, connect using LinkedIn, or review my strategy and futures-centric blog.

Posted July 17, 2014 by terop in Data Mining, ICT Strategy, Information Security