Slides for talk on "Understanding Invisible Labour" given by Gareth Edwards on 12 July 2018 at the IWMW 2018 event.
See http://iwmw.org/iwmw2018/talks/understanding-invisible-labour/
XD Immersive: Jessica Outlaw, Virtual Reality and the Future of Immersive Exp...UX STRAT
The document outlines an agenda for a workshop on virtual reality and immersive experiences. The agenda includes an overview of current VR technologies, demonstrations of VR experiences, a design activity, and a discussion of future VR technologies. During the activity, participants are asked to design VR experiences that incorporate gaze, voice, gesture, or controller input and provide sensory feedback synchronized with the content and user experience. The document emphasizes that VR experiences can be designed to deepen engagement, enhance education, provide escape, enable social connections, and influence human behavior through embodied cognition. It closes by asking participants to consider how discussed technologies could impact their work or industries and what they can do now to apply these technologies.
XD Immersive: Jessica Outlaw, Augmented Reality and the Future of Immersive E...UX STRAT
The document provides an overview of augmented reality and immersive experiences. It discusses current AR devices and experiences, content creation strategies, and design guidelines. It also explores future technologies like mixed reality and how they could transform areas like education, work, and social interaction. Hands-on activities are used to familiarize participants with 3D design concepts and prototyping AR experiences.
XD Immersive: Andrew McHugh, "Making the Transition to VR / AR Experience Des...UX STRAT
This document summarizes a presentation given by Andrew R McHugh on his personal journey from 2D to 3D product design. The presentation covers various topics like understanding constraints, learning tools like Unity and Blender, building prototypes, and the importance of continually experimenting and learning. It also discusses challenges like the expense of VR hardware and provides advice for designers starting out in 3D experiences. The overall message is that becoming proficient in 3D design takes time, but starting small and being willing to learn is important for success.
Social Media Content Creation helps you understand the target market, plan the best appropriate social media platform, and prepare content to create an effective social media campaign easily.
https://businessbuddiesph.wixsite.com/businessbuddiesph
SharePoint Saturday Redmond - Building solutions with the future in mindChris Johnson
Chris Johnson, General Manager of Provoke Solutions in Seattle, gave a presentation on designing and building solutions with the future in mind. He discussed the changes in the SharePoint app model between farm solutions and sandbox solutions. He explained the new SharePoint app architecture using app types, scopes, and catalogs. He provided advice on transitioning existing customizations to the new approaches and emphasized designing solutions with flexibility and the future in mind.
Chris Johnson, General Manager of Provoke Solutions in Seattle, gave a presentation on Yammer. He discussed Yammer 101 including how it is like Facebook for the enterprise. He reviewed Microsoft's vision for social which includes integrating Yammer and Office 365. He also covered how to decide between social options in the cloud or on-premises and how to develop with the Yammer APIs.
Slides for talk on "Understanding Invisible Labour" given by Gareth Edwards on 12 July 2018 at the IWMW 2018 event.
See http://iwmw.org/iwmw2018/talks/understanding-invisible-labour/
XD Immersive: Jessica Outlaw, Virtual Reality and the Future of Immersive Exp...UX STRAT
The document outlines an agenda for a workshop on virtual reality and immersive experiences. The agenda includes an overview of current VR technologies, demonstrations of VR experiences, a design activity, and a discussion of future VR technologies. During the activity, participants are asked to design VR experiences that incorporate gaze, voice, gesture, or controller input and provide sensory feedback synchronized with the content and user experience. The document emphasizes that VR experiences can be designed to deepen engagement, enhance education, provide escape, enable social connections, and influence human behavior through embodied cognition. It closes by asking participants to consider how discussed technologies could impact their work or industries and what they can do now to apply these technologies.
XD Immersive: Jessica Outlaw, Augmented Reality and the Future of Immersive E...UX STRAT
The document provides an overview of augmented reality and immersive experiences. It discusses current AR devices and experiences, content creation strategies, and design guidelines. It also explores future technologies like mixed reality and how they could transform areas like education, work, and social interaction. Hands-on activities are used to familiarize participants with 3D design concepts and prototyping AR experiences.
XD Immersive: Andrew McHugh, "Making the Transition to VR / AR Experience Des...UX STRAT
This document summarizes a presentation given by Andrew R McHugh on his personal journey from 2D to 3D product design. The presentation covers various topics like understanding constraints, learning tools like Unity and Blender, building prototypes, and the importance of continually experimenting and learning. It also discusses challenges like the expense of VR hardware and provides advice for designers starting out in 3D experiences. The overall message is that becoming proficient in 3D design takes time, but starting small and being willing to learn is important for success.
Social Media Content Creation helps you understand the target market, plan the best appropriate social media platform, and prepare content to create an effective social media campaign easily.
https://businessbuddiesph.wixsite.com/businessbuddiesph
SharePoint Saturday Redmond - Building solutions with the future in mindChris Johnson
Chris Johnson, General Manager of Provoke Solutions in Seattle, gave a presentation on designing and building solutions with the future in mind. He discussed the changes in the SharePoint app model between farm solutions and sandbox solutions. He explained the new SharePoint app architecture using app types, scopes, and catalogs. He provided advice on transitioning existing customizations to the new approaches and emphasized designing solutions with flexibility and the future in mind.
Chris Johnson, General Manager of Provoke Solutions in Seattle, gave a presentation on Yammer. He discussed Yammer 101 including how it is like Facebook for the enterprise. He reviewed Microsoft's vision for social which includes integrating Yammer and Office 365. He also covered how to decide between social options in the cloud or on-premises and how to develop with the Yammer APIs.
MVP-style influencer marketing programs can be strategic for your company. The oldest influencer program in enterprise IT & technology was the Microsoft MVP Program. The VMware vExperts have been wildly successful and have set the stage for the next generation of these type of professional communities. Learn how "MVP-Style" influencer programs can work for you in your company.
All Day DevOps: Calling Out A Terrible On-Call SystemMolly Struve
Back when our team was small, all the devs participated in a single on-call rotation. As our team started to grow, that single rotation became problematic. Eventually, the team was so big that people were going on-call every 2-3 months. This may seem like a dream come true, but in reality, it was far from it. Because shifts were so infrequent, devs did not get the on-call experience they needed to know how to handle on-call issues confidently. Morale began to suffer and on-call became something everyone dreaded.
We knew the system had to change if we wanted to continue growing and not lose our developer talent, but the question was how? Despite all of the developers working across a single application with no clearly defined lines of ownership, we devised a plan that broke our single rotation into 3 separate rotations. This allowed teams to take on-call ownership over smaller pieces of the application while still working across all of it. These individual rotations paid off in many different ways.
With a new sense of on-call ownership, the dev teams began improving alerting and monitoring for their respective systems. The improved alerting led to faster incident response because the monitoring was better and each team was more focused on a smaller piece of the system. In addition, having 3 devs on-call at once means no one ever feels alone because there are always 2 other people who are on-call with you. Finally, cross-team communication and awareness also drastically improved with the new system.
We are engaged in an exponentially growing cyber war that we are visibly losing. Within the next 3 years it has been estimated that the global cost will equal, or overtake, the UK GDP, and it is clear that our defences are inadequate and often ineffective. Malware and ransomer-ware continue to extort more money, and cause damage and inconvenience to individuals, organisations and society, whilst hacker groups, criminals and rogue states continue to innovate and maintain their advantage. At the same time, our defences are subverted and rendered ineffective as we operate in a reactive and prescriptive, after the fact, mode with no foresight or anticipation.
In any war it is essential to know and understand as much about the enemy as possible, it is also necessary to establish the truth and validity of any situation or development. Doing this in the cyber domain is orders of magnitude more difficult than the real world, but some of the relevant tools are now available or at an advanced stage of development. For example; fully automated fact checkers and truth engines have been demonstrated, whilst situational awareness technologies are commercially available. However, what is missing is some level of context assessment on a continual basis. Without this we will continue to be ‘blind-sided’ by the actions and developments of the attackers as they maintain their element of surprise along every line of innovation.
What do we need? In short ; a Context Engine that continually monitors networks, servers, routers, machines, devices and people for anomalous behaviours that flag pending attacks as behavioural deviations that are generally easy to detect. In the case of attacker groups we have observed precursor events and trends in network activity days ahead of some big offensive. However, this requires a shift in the defenders thinking and operations away for the reactive and short term, to the long term continual monitoring, data collection and analysis in order to establish threat assessments on a real time.
The behavioural analysis of people, networks and ITC, is at the core of our ‘Context Engine’ solution which completes the triangle of: Truth; Situation; Context Awareness to provide defenders with a fuller and transformative picture. Most of the known precursor elements of this undertaken have been studied in some depth, with some behavioural elements identified on real networks and some physical situations. The unknown can only add more accuracy!
It has been estimated that the global earnings of Cyber Criminals will equal or exceed the GDP of the UK sometime in the 2022/23 window. If this was the capability of a country they would be joining the G8! Clearly, we are losing the Cyber War hands down, and the time has long passed when we might ignore the threat scenarios surrounding us.
In this lecture we examine global networks from home and office through the ‘last mile,’ and on to national and international networks to identify the key vulnerabilities and points of potential ingress. We identify the cyber risks as escalating as we approach the periphery of all forms of network. For the most part, the core/carrier networks are virtually unassailable physically as they are dominated by terrestrial and undersea optical fibre cables.
Throughout the ‘carrier’ network levels the difficulty of physical interception, encryption, routing, and path diversity employed renders them secure in the extreme. Attackers, therefore, tend to focus on the exploitation of people, devices, services, home, and office appliances, and latterly, a poorly engineered IoT.
In reality, we are expanding the attack surface of the planet exponentially without due caution or care in the most exposed sectors and locations. And so, we explore potential tech and operational solutions for the future.
NOTE: This lecture is one of a series that has examined technology design and deployment, devices and the IoT, people fallibility, deviousness, internal and external threats.
In class; RED and BLUE Team Exercises have also been conducted in support of the complete Cyber Security Package to date.
Explore dozens case studies from a wide variety of institutions showcasing how WordPress is being used in higher ed: from course catalogs to permission systems, event management to LMS, commerce to academic publications, directories to food management, digital signage to internationalization. Interspersed are the results from a 486 respondent higher ed survey conducted in May 2016.
Case Studies come from interviews with MIT, Stanford, Boise State, Columbia, Boston University, Harvard, University of Washington, Conroe School District and many, many more.
The document provides an update on the TYPO3 SEO and Dashboard initiatives. It discusses the goals and planned features for each initiative through upcoming TYPO3 versions. The SEO initiative aims to improve page titles, meta tags, structured data, and XML sitemaps. The Dashboard initiative seeks to create a core extension for managing dashboards and widgets. It also announces an upcoming initiative week event for collaboration among initiative members.
This document summarizes a UX study conducted on the Grady Newsource website. The study involved observation of user behavior, interviews with staff and students, and usability testing. Findings showed the site has an unclear purpose and structure that makes basic tasks difficult. Recommendations include defining the target audience and purpose, restructuring navigation and content, and refreshing the design to be more modern and visually clear. The goal is to create a website that effectively serves the dual purposes of news and student work.
This document provides an overview of the BuddyPress plugin for WordPress, including its features for user profiles, activity streams, friend connections, private messaging, and groups. It highlights examples of how BuddyPress has been used by organizations like the National Park Service, non-profits, SaaS companies, communities, universities, and for conferences/events. The document recommends considering how BuddyPress can add value, testing with a default install, and ensuring good design/UX when planning BuddyPress projects. It also lists resources, project leaders, and other influential people within the BuddyPress community.
We live in a fast changing world and believe me it's always been like that. There are people who find out the direction the industry is going in sooner than other people do. Here is my take on where the industry is headed. #construction #architecture
The document discusses guerrilla marketing and social media marketing. It provides examples of guerrilla marketing techniques like graffiti, street art, and viral campaigns. It also discusses using various social media platforms like Facebook, Twitter, and Digg to engage customers, create buzz, and spread content virally. The conclusion states that guerrilla and social media marketing aim to access customers on a personal level outside of traditional advertising and can help brands find customers and develop their identity.
This presentation was created in support of a short keynote for ICGS3-21 (14-15 Jan21) UK to purposely highlight the reasons why we are losing the cyber war and what we have to do to win. The approach adopted quantifies the key weakness and shortcomings of our current defence strategies to give pointers to a more secure future.
In postulating remedies, we purposely fall back on the wisdoms of Sun Tzu and The Art of War to highlight and explain the meaning and implications of quoted insights (below) and their pertinence to modern cyber wars/security.
“To know your Enemy, you must become your Enemy”
In this way, we go beyond opinion and suspicion by quantifying the scale of the individual elements of the cyber security equation using a variant of Drake’s Equation. This gives us a good estimate of the scale of the problems we face. Beyond this we highlight some cultural and political issues that need urgent attention.
Finally, we link to comprehensive presentations going back to 2016 that detail specific Red and Blue team exercises thinking and preparation. These themes were invoked to widen the awareness and thinking in the student body @ The UoS.
No doubt Aldous Huxley and George Orwell would be pleased to see cameras and surveillance devices everywhere, just as they predicted, but they would then be amazed to find that we buy and install them and become upset if no one is watching! So the Dystopian futures they both predicted and feared are not here yet, but they might just be in the pipeline, and being built a device at a time by us!
Only 70 years ago close observation and surveillance was difficult and very expensive. Today, it is so very cheap, efficient, and everywhere: in our pockets; on our wrists; in our homes, offices, cars, trains, planes; in the streets and on the highways and major roads.
To some degree every country has embraced all the possibilities presented by the technology to make their societies safer and more progressive as organisms, but now here comes AI. Automatic voice, face, finger, eye, action, movement and habit recognition writ large along with all our messages, entertainment, work and recreation patterns monitored 24x7, so inference engines can check if we are good, bad, dangerous, safe, under threat and so on!
Some countries are now employing such technology to judge, sentence, and commit people for criminal acts and ant-social behaviours etc. At this point we have to proceed with care in the recognition that data errors ‘happen’ and human biases can be built in at the birth of such AI systems. Nothing is ever perfect - not people, and certainly not our machines, and we have to progressively drive out bias snd error…
This document outlines tactics for leadership and innovation. It discusses how leadership is shifting from a top-down model to empowering others. Leaders of the future will have vision, empower others, and be agile and adaptive. Tactics for success include identifying stakeholders, setting clear goals, gaining feedback through quick wins and transparency. Gamification, engagement strategies, and crowdsourcing can help empower others and validate solutions. The presentation provides examples of successful government innovation delivery structures and resources for performance tools. It encourages starting by shifting mindsets, embracing constraints, and operating in a continuous state of beta.
An analysis of Cyber Security publications sees >99% devoted to the technology of attack and defence, with <1% examining the biggest risk of all - People. But every Cyber hack, attack or failure involving technology, starts with some human indiscretion, error, fallibility, stupidity, revenge, malice, or act of vandalism.
This near exclusive focus on the technology is analogous to bolting the stable door after the horse has bolted, and it results in a vast redirection and waste of resources. In complete contrast, our adversaries (The Dark Side) are more cunning. It really is time to reconsider our strategy if we are to stem the growing tide of attacks.
For sure, people cannot ‘do’ security! And why should they? It really is the responsibility of industry who ought to be designing and supplying inherently secure products that defend users against themselves and The Dark Side. To engineer this would mean the deployment of systems to monitor the behaviours of people, devices, systems, applications and networks.
We have to establish patterns of behaviour at all levels if we are to detect and combat the exceptions that might constitute an attack. And whilst our knowledge of human behaviours and sociology are extensive, we know almost nothing about devices, systems, applications and networks. Perhaps even more threatening is our total lack of knowledge about Things: aka the IoT.
In this presentation we illustrate the fallibilities of people as well as some of their devious activities and propose some solutions.
Presentation by Martina F. Ferracane at European Business Summit (May 2015).
Video version available at this link: https://youtu.be/hrRHBCLcgqU - It shows also the videos presented in the PPT!
Our communications history is dominated by fixed networks of bounded linear predictability. These were based on precise engineering design giving assured information security, and measured operation. However, mobile devices, internet, social networks, IP, and Apps changed all that! Internets are inherently non-linear, unbounded, and essentially designoid — that is, mostly shaped by evolution, steered by demand/rapid innovation - highly adaptive and ‘learning’ in real time.
So, those who suppose we can control such networks to fully guard and protect the information of institutions and individuals are sadly mistaken. And further confounded by Industry 4.0 and the Internet of Things (IoT). Here, a mix of the information of individuals and things, is distributed across the planet on a scale far larger than ever conceived in the past, to become essential components in the survival of our species in realising sustainable societies.
Not surprising then, Privacy and Data protection are big issues for regulators, governments and civil liberties organisations. But so far, nothing has worked, and we see the UK Data Protection Act, EU-GDPR, EU-USA Shield, and Copyright Laws often ignored or worked around. These are largely derivatives of a paper based world and a pre-computing world are now largely unfit for purpose.
John Stauffer - Closing the Empathy Gap: Six Ways to Develop Better Consumer ...Julia Grosman
This document discusses identifying and addressing empathy gaps within businesses. It suggests that an empathy gap exists when:
- Clever segmentation is valued over customer insight
- Companies focus too much on quantitative data rather than understanding customer experiences
- Quantitative metrics take priority over qualitative feedback
The document emphasizes the importance of moving from strategic plans and quantitative analysis to testable hypotheses based on understanding the real experiences and needs of customers.
This document discusses Agile and Scrum methodology. It provides an overview of Agile principles and values based on the Agile Manifesto. It also describes Scrum roles, activities, artifacts and how Pronto implements Scrum in their work. Key Scrum concepts covered include sprints, product backlog, daily scrums, sprint planning and retrospectives. Common challenges with Scrum such as unclear requirements and lack of participation are also addressed.
This document discusses creating a social media game app that uses gamification techniques to engage users. It would allow users to earn points, compete on leaderboards, and receive rewards. The game would focus on sharing content and interacting with friends to continue gameplay. Features mentioned include challenges, badges, check-ins and donations. The goal is to create an emotionally engaging and viral experience for players.
MVP-style influencer marketing programs can be strategic for your company. The oldest influencer program in enterprise IT & technology was the Microsoft MVP Program. The VMware vExperts have been wildly successful and have set the stage for the next generation of these type of professional communities. Learn how "MVP-Style" influencer programs can work for you in your company.
All Day DevOps: Calling Out A Terrible On-Call SystemMolly Struve
Back when our team was small, all the devs participated in a single on-call rotation. As our team started to grow, that single rotation became problematic. Eventually, the team was so big that people were going on-call every 2-3 months. This may seem like a dream come true, but in reality, it was far from it. Because shifts were so infrequent, devs did not get the on-call experience they needed to know how to handle on-call issues confidently. Morale began to suffer and on-call became something everyone dreaded.
We knew the system had to change if we wanted to continue growing and not lose our developer talent, but the question was how? Despite all of the developers working across a single application with no clearly defined lines of ownership, we devised a plan that broke our single rotation into 3 separate rotations. This allowed teams to take on-call ownership over smaller pieces of the application while still working across all of it. These individual rotations paid off in many different ways.
With a new sense of on-call ownership, the dev teams began improving alerting and monitoring for their respective systems. The improved alerting led to faster incident response because the monitoring was better and each team was more focused on a smaller piece of the system. In addition, having 3 devs on-call at once means no one ever feels alone because there are always 2 other people who are on-call with you. Finally, cross-team communication and awareness also drastically improved with the new system.
We are engaged in an exponentially growing cyber war that we are visibly losing. Within the next 3 years it has been estimated that the global cost will equal, or overtake, the UK GDP, and it is clear that our defences are inadequate and often ineffective. Malware and ransomer-ware continue to extort more money, and cause damage and inconvenience to individuals, organisations and society, whilst hacker groups, criminals and rogue states continue to innovate and maintain their advantage. At the same time, our defences are subverted and rendered ineffective as we operate in a reactive and prescriptive, after the fact, mode with no foresight or anticipation.
In any war it is essential to know and understand as much about the enemy as possible, it is also necessary to establish the truth and validity of any situation or development. Doing this in the cyber domain is orders of magnitude more difficult than the real world, but some of the relevant tools are now available or at an advanced stage of development. For example; fully automated fact checkers and truth engines have been demonstrated, whilst situational awareness technologies are commercially available. However, what is missing is some level of context assessment on a continual basis. Without this we will continue to be ‘blind-sided’ by the actions and developments of the attackers as they maintain their element of surprise along every line of innovation.
What do we need? In short ; a Context Engine that continually monitors networks, servers, routers, machines, devices and people for anomalous behaviours that flag pending attacks as behavioural deviations that are generally easy to detect. In the case of attacker groups we have observed precursor events and trends in network activity days ahead of some big offensive. However, this requires a shift in the defenders thinking and operations away for the reactive and short term, to the long term continual monitoring, data collection and analysis in order to establish threat assessments on a real time.
The behavioural analysis of people, networks and ITC, is at the core of our ‘Context Engine’ solution which completes the triangle of: Truth; Situation; Context Awareness to provide defenders with a fuller and transformative picture. Most of the known precursor elements of this undertaken have been studied in some depth, with some behavioural elements identified on real networks and some physical situations. The unknown can only add more accuracy!
It has been estimated that the global earnings of Cyber Criminals will equal or exceed the GDP of the UK sometime in the 2022/23 window. If this was the capability of a country they would be joining the G8! Clearly, we are losing the Cyber War hands down, and the time has long passed when we might ignore the threat scenarios surrounding us.
In this lecture we examine global networks from home and office through the ‘last mile,’ and on to national and international networks to identify the key vulnerabilities and points of potential ingress. We identify the cyber risks as escalating as we approach the periphery of all forms of network. For the most part, the core/carrier networks are virtually unassailable physically as they are dominated by terrestrial and undersea optical fibre cables.
Throughout the ‘carrier’ network levels the difficulty of physical interception, encryption, routing, and path diversity employed renders them secure in the extreme. Attackers, therefore, tend to focus on the exploitation of people, devices, services, home, and office appliances, and latterly, a poorly engineered IoT.
In reality, we are expanding the attack surface of the planet exponentially without due caution or care in the most exposed sectors and locations. And so, we explore potential tech and operational solutions for the future.
NOTE: This lecture is one of a series that has examined technology design and deployment, devices and the IoT, people fallibility, deviousness, internal and external threats.
In class; RED and BLUE Team Exercises have also been conducted in support of the complete Cyber Security Package to date.
Explore dozens case studies from a wide variety of institutions showcasing how WordPress is being used in higher ed: from course catalogs to permission systems, event management to LMS, commerce to academic publications, directories to food management, digital signage to internationalization. Interspersed are the results from a 486 respondent higher ed survey conducted in May 2016.
Case Studies come from interviews with MIT, Stanford, Boise State, Columbia, Boston University, Harvard, University of Washington, Conroe School District and many, many more.
The document provides an update on the TYPO3 SEO and Dashboard initiatives. It discusses the goals and planned features for each initiative through upcoming TYPO3 versions. The SEO initiative aims to improve page titles, meta tags, structured data, and XML sitemaps. The Dashboard initiative seeks to create a core extension for managing dashboards and widgets. It also announces an upcoming initiative week event for collaboration among initiative members.
This document summarizes a UX study conducted on the Grady Newsource website. The study involved observation of user behavior, interviews with staff and students, and usability testing. Findings showed the site has an unclear purpose and structure that makes basic tasks difficult. Recommendations include defining the target audience and purpose, restructuring navigation and content, and refreshing the design to be more modern and visually clear. The goal is to create a website that effectively serves the dual purposes of news and student work.
This document provides an overview of the BuddyPress plugin for WordPress, including its features for user profiles, activity streams, friend connections, private messaging, and groups. It highlights examples of how BuddyPress has been used by organizations like the National Park Service, non-profits, SaaS companies, communities, universities, and for conferences/events. The document recommends considering how BuddyPress can add value, testing with a default install, and ensuring good design/UX when planning BuddyPress projects. It also lists resources, project leaders, and other influential people within the BuddyPress community.
We live in a fast changing world and believe me it's always been like that. There are people who find out the direction the industry is going in sooner than other people do. Here is my take on where the industry is headed. #construction #architecture
The document discusses guerrilla marketing and social media marketing. It provides examples of guerrilla marketing techniques like graffiti, street art, and viral campaigns. It also discusses using various social media platforms like Facebook, Twitter, and Digg to engage customers, create buzz, and spread content virally. The conclusion states that guerrilla and social media marketing aim to access customers on a personal level outside of traditional advertising and can help brands find customers and develop their identity.
This presentation was created in support of a short keynote for ICGS3-21 (14-15 Jan21) UK to purposely highlight the reasons why we are losing the cyber war and what we have to do to win. The approach adopted quantifies the key weakness and shortcomings of our current defence strategies to give pointers to a more secure future.
In postulating remedies, we purposely fall back on the wisdoms of Sun Tzu and The Art of War to highlight and explain the meaning and implications of quoted insights (below) and their pertinence to modern cyber wars/security.
“To know your Enemy, you must become your Enemy”
In this way, we go beyond opinion and suspicion by quantifying the scale of the individual elements of the cyber security equation using a variant of Drake’s Equation. This gives us a good estimate of the scale of the problems we face. Beyond this we highlight some cultural and political issues that need urgent attention.
Finally, we link to comprehensive presentations going back to 2016 that detail specific Red and Blue team exercises thinking and preparation. These themes were invoked to widen the awareness and thinking in the student body @ The UoS.
No doubt Aldous Huxley and George Orwell would be pleased to see cameras and surveillance devices everywhere, just as they predicted, but they would then be amazed to find that we buy and install them and become upset if no one is watching! So the Dystopian futures they both predicted and feared are not here yet, but they might just be in the pipeline, and being built a device at a time by us!
Only 70 years ago close observation and surveillance was difficult and very expensive. Today, it is so very cheap, efficient, and everywhere: in our pockets; on our wrists; in our homes, offices, cars, trains, planes; in the streets and on the highways and major roads.
To some degree every country has embraced all the possibilities presented by the technology to make their societies safer and more progressive as organisms, but now here comes AI. Automatic voice, face, finger, eye, action, movement and habit recognition writ large along with all our messages, entertainment, work and recreation patterns monitored 24x7, so inference engines can check if we are good, bad, dangerous, safe, under threat and so on!
Some countries are now employing such technology to judge, sentence, and commit people for criminal acts and ant-social behaviours etc. At this point we have to proceed with care in the recognition that data errors ‘happen’ and human biases can be built in at the birth of such AI systems. Nothing is ever perfect - not people, and certainly not our machines, and we have to progressively drive out bias snd error…
This document outlines tactics for leadership and innovation. It discusses how leadership is shifting from a top-down model to empowering others. Leaders of the future will have vision, empower others, and be agile and adaptive. Tactics for success include identifying stakeholders, setting clear goals, gaining feedback through quick wins and transparency. Gamification, engagement strategies, and crowdsourcing can help empower others and validate solutions. The presentation provides examples of successful government innovation delivery structures and resources for performance tools. It encourages starting by shifting mindsets, embracing constraints, and operating in a continuous state of beta.
An analysis of Cyber Security publications sees >99% devoted to the technology of attack and defence, with <1% examining the biggest risk of all - People. But every Cyber hack, attack or failure involving technology, starts with some human indiscretion, error, fallibility, stupidity, revenge, malice, or act of vandalism.
This near exclusive focus on the technology is analogous to bolting the stable door after the horse has bolted, and it results in a vast redirection and waste of resources. In complete contrast, our adversaries (The Dark Side) are more cunning. It really is time to reconsider our strategy if we are to stem the growing tide of attacks.
For sure, people cannot ‘do’ security! And why should they? It really is the responsibility of industry who ought to be designing and supplying inherently secure products that defend users against themselves and The Dark Side. To engineer this would mean the deployment of systems to monitor the behaviours of people, devices, systems, applications and networks.
We have to establish patterns of behaviour at all levels if we are to detect and combat the exceptions that might constitute an attack. And whilst our knowledge of human behaviours and sociology are extensive, we know almost nothing about devices, systems, applications and networks. Perhaps even more threatening is our total lack of knowledge about Things: aka the IoT.
In this presentation we illustrate the fallibilities of people as well as some of their devious activities and propose some solutions.
Presentation by Martina F. Ferracane at European Business Summit (May 2015).
Video version available at this link: https://youtu.be/hrRHBCLcgqU - It shows also the videos presented in the PPT!
Our communications history is dominated by fixed networks of bounded linear predictability. These were based on precise engineering design giving assured information security, and measured operation. However, mobile devices, internet, social networks, IP, and Apps changed all that! Internets are inherently non-linear, unbounded, and essentially designoid — that is, mostly shaped by evolution, steered by demand/rapid innovation - highly adaptive and ‘learning’ in real time.
So, those who suppose we can control such networks to fully guard and protect the information of institutions and individuals are sadly mistaken. And further confounded by Industry 4.0 and the Internet of Things (IoT). Here, a mix of the information of individuals and things, is distributed across the planet on a scale far larger than ever conceived in the past, to become essential components in the survival of our species in realising sustainable societies.
Not surprising then, Privacy and Data protection are big issues for regulators, governments and civil liberties organisations. But so far, nothing has worked, and we see the UK Data Protection Act, EU-GDPR, EU-USA Shield, and Copyright Laws often ignored or worked around. These are largely derivatives of a paper based world and a pre-computing world are now largely unfit for purpose.
John Stauffer - Closing the Empathy Gap: Six Ways to Develop Better Consumer ...Julia Grosman
This document discusses identifying and addressing empathy gaps within businesses. It suggests that an empathy gap exists when:
- Clever segmentation is valued over customer insight
- Companies focus too much on quantitative data rather than understanding customer experiences
- Quantitative metrics take priority over qualitative feedback
The document emphasizes the importance of moving from strategic plans and quantitative analysis to testable hypotheses based on understanding the real experiences and needs of customers.
This document discusses Agile and Scrum methodology. It provides an overview of Agile principles and values based on the Agile Manifesto. It also describes Scrum roles, activities, artifacts and how Pronto implements Scrum in their work. Key Scrum concepts covered include sprints, product backlog, daily scrums, sprint planning and retrospectives. Common challenges with Scrum such as unclear requirements and lack of participation are also addressed.
This document discusses creating a social media game app that uses gamification techniques to engage users. It would allow users to earn points, compete on leaderboards, and receive rewards. The game would focus on sharing content and interacting with friends to continue gameplay. Features mentioned include challenges, badges, check-ins and donations. The goal is to create an emotionally engaging and viral experience for players.
The document discusses creative design strategies in the modern digital world. It notes that the internet and mobile devices have fundamentally changed how people consume information, with shorter attention spans and brains rewiring due to increased online usage. It recommends designing for simplicity and storytelling. Examples of creative design include traditional advertising adapting to new formats, digital marketing using omnichannel experiences, and emerging technologies like augmented reality and 3D mapping. The presentation aims to help understand creative design in today's digital landscape and develop strategies for success.
Development and Deployment: The Human FactorBoris Adryan
Thingmonk 2017: End-to-end IoT solutions are often highly integrated. Even small changes to the UX of a product can have profound impact on hardware requirements, while physical constraints such as battery capacity can dictate software architecture. A holistic understanding of IoT is key to efficient implementation, the “T-shaped engineer” the star in every development team. Contrast this to intellectual silos and matrix organisation, and you may see why especially large companies fail to move quickly into IoT. Similar issues strike the application of IoT. Deploying a solution in the enterprise is just a cost factor if processes are not adjusted to leverage the connected device and its data. However, changes in process often affect companies across their entire organisational structure. This can require a change of mindsets, making the success of an IoT solution depending on the human factor.
Elements of User Experience for Mobile AppsPek Pongpaet
Pek Pongpaet presented on elements of user experience for mobile consumers. The presentation covered key principles for UX design including simplicity, usability, engagement, flow, virality, gamification, and delight. Examples were provided for each principle using apps and games like Apple Maps, Instagram, Duolingo, Angry Birds, Candy Crush, and others. The goal of the presentation was to provide best practices for designing optimal mobile experiences based on these user-centered design elements.
The document discusses four architectural patterns:
1) Domain-driven design which focuses on structuring a system around the domain and collaborating with domain experts.
2) Command-query segregation which separates interfaces that mutate data from those that read data for clean and reusable code.
3) Command-query responsibility segregation which further separates systems for creating and reading data at a domain level.
4) Event sourcing which uses a series of events as the source of truth for a domain and materializes views from the event stream.
5 Key Traits of High Performing Marketing Organizations Mathew Sweezey
We've researched over 7,000 companies over the past two years, and have found the 5 key traits to high performing marketing organizations. See how you rank, and or what you need to do to become a high performer.
Digital Disruption & Digital TransformationVanessa Shaw
Lead your company through digital disruption by innovating your company! Strategy, business models, skills, team design and team culture all needs to be innovative to truly excel through digital. Step by step guide of what needs to happen in a transformation.
Using Social Media to Improve Patient CareAndy Broomhead
A presentation on the different aspects of social media and how people with diabetes can use it to improve their own outcomes. Covers what social media is, why people may choose to use it, and how it can improve care.
Originally given during a workshop at the Association of Children's Diabetes Clinicians conference at University of Warwick 29th Jan 2016)
Create Success With Analytics: A Guide to Designing Delightful Dashboards Hannah Flynn
We’ve all seen the increasing industry trend of artificial intelligence and big data analytics. In a world of information overload, it's more important than ever to have a dashboard that provides data that's not only interesting but actually relevant and timely.
Dashboards assist decision makers facilitate new ideas and business opportunities, increase customer approval rates, and analyze current business process. All of these activities play a vital role in providing the superior experience your customers demand.
Create Success With Analytics: A Guide to Designing Delightful DashboardsAggregage
We’ve all seen the increasing industry trend of artificial intelligence and big data analytics. In a world of information overload, it's more important than ever to have a dashboard that provides data that's not only interesting but actually relevant and timely.
Dashboards assist decision makers facilitate new ideas and business opportunities, increase customer approval rates, and analyze current business process. All of these activities play a vital role in providing the superior experience your customers demand.
Offline-first: Making your app resilient to network failuresPedro Teixeira
The document discusses making applications resilient to network failures by embracing an offline-first development approach. It recommends using service workers to cache assets and enable offline access. It also recommends using a database like CouchDB that supports offline access through features like document syncing and a changes feed. The presentation provides an overview of CouchDB and recommends some open-source libraries for working with CouchDB, such as PouchDB. It emphasizes that offline access should be the expected experience rather than an exception, and that applications should leverage techniques like caching and syncing to handle network failures gracefully.
The document describes several projects that Joshua Griffin worked on as a project manager including:
1) DevTracker, a custom project management software implemented across a 75+ person organization using an Agile approach.
2) Process Improvement projects to define organizational standard practices and assets.
3) The Entrepreneurial Mind, an eLearning subscription platform for entrepreneurs.
4) EVVentus, a system using Bluetooth technology for electronic visit verification in home health care that underwent user testing.
Die Digitalisierung aus der Sicht der historischen Analogie. Sie wird verglichen mit der Erfindung eines revolustionären Produkte, wie des Autos, mit der Industrialisierung und mit der Einführung des Buchdrucks.
Only 40 years ago, the rate of technologically driven change was such that companies could re-organize efficiently and economically over considerable periods of time, but about 30 years ago this changed as the arrival of new technologies accelerated. We effectively moved from a world of slow periodic changes to one where change became a continuum. The leading-edge sectors were fast to recognize and adopt this new mode of continual adaptation driven by new technologies. This saw these ever more efficient and expansive companies dominating some sectors. For the majority, however, it seems that this transition was not recognized until relatively recently, and a so new movement was born under the banner of digitalization. This not only impacts the way people work, it affects company operations and changes markets, and it does so suddenly!.
Perhaps the most impactive and recent driver of change in this regard has been COVID which saw the adoption of video conferencing and working as a survival imperative in much less than a month. This now stands as a beacon of proof that companies, organizations, and society, can indeed change and adapt to the new at a rate previously considered impossible. The big danger for digitalization programmes now is the simple-minded view that there are singular (magic) solutions that fit every company and organization, but this is not the case. The reality is that the needs and culture of an organization are not the same and may not be uniform from top to bottom.
Manufacturing necessitates very steep hierarchical management structures and tight control to ensure the consistency of the quality of products. On the other hand, a research laboratory or design company requires a low flat management hierarchy and an apparently relaxed level of control. This is absolutely necessary to foster creativity, innovation, and invention. This presentation gives practical examples of management and organizational, extremes. We then go on to highlight the need to embrace AI and Quantum Computing over the coming decade to deal with future technologies, operating
and market complexity.
Heart on Sleeve: Librarianship As an Avocational Vocationchar booth
The document discusses concepts like ownership, ritual, community, engagement, intention, learning, experience, knowledge, advocacy, inquiry, freedom, and vocation. It emphasizes engaging in work you love and not fearing where your ideas lead. Images are credited to various sources. The document suggests embracing tectonic shifts to become advocates and innovators.
From the right process to a solid cultural changeFrancesco Zaia
There is no perfect solution to problems, but focusing on process, data, people and culture can help organizations improve. Key points discussed include: implementing data-driven iterations to make decisions based on metrics and customer data; creating repeatable uniqueness through strong branding and quality; and building a world-class culture by focusing on efficiency, determination and empowering people through learning and respect. The overall message is that process alone is not enough - an organization must also consider people and culture.
This document provides information about an office hours session on March 23, 2017 hosted by Suhaib Alfageeh. It includes quotes about thinking differently and doing great work. The document discusses Suhaib's work on mobile scanning software and reverse engineering iOS apps. It introduces tools like Frida and MITMProxy that can be used to intercept traffic and modify apps. The document provides an overview of the Tinder API and timelines the work.
The document introduces Dimitar Danailov and provides details about his professional experience and achievements, which include being a member of the Firefox Dev Team since 2018, having over 6000 points on his Stackoverflow profile, and co-founding Cloud Conf Varna. It also mentions that he works as a Technical Architect and has experience with Salesforce Commerce Cloud.
Designing and Sustaining Large-Scale Value-Centered Agile Ecosystems (powered...Alexey Krivitsky
Is Agile dead? It depends on what you mean by 'Agile'. If you mean that the organizations are not getting the promised benefits because they were focusing too much on the team-level agile "ways of working" instead of systemic global improvements -- then we are in agreement. It is a misunderstanding of Agility that led us down a dead-end. At Org Topologies, we see bright sparks -- the signs of the 'second wave of Agile' as we call it. The emphasis is shifting towards both in-team and inter-team collaboration. Away from false dichotomies. Both: team autonomy and shared broad product ownership are required to sustain true result-oriented organizational agility. Org Topologies is a package offering a visual language plus thinking tools required to communicate org development direction and can be used to help design and then sustain org change aiming at higher organizational archetypes.
Impact of Effective Performance Appraisal Systems on Employee Motivation and ...Dr. Nazrul Islam
Healthy economic development requires properly managing the banking industry of any
country. Along with state-owned banks, private banks play a critical role in the country's economy.
Managers in all types of banks now confront the same challenge: how to get the utmost output from
their employees. Therefore, Performance appraisal appears to be inevitable since it set the
standard for comparing actual performance to established objectives and recommending practical
solutions that help the organization achieve sustainable growth. Therefore, the purpose of this
research is to determine the effect of performance appraisal on employee motivation and retention.
Colby Hobson: Residential Construction Leader Building a Solid Reputation Thr...dsnow9802
Colby Hobson stands out as a dynamic leader in the residential construction industry. With a solid reputation built on his exceptional communication and presentation skills, Colby has proven himself to be an excellent team player, fostering a collaborative and efficient work environment.
A comprehensive-study-of-biparjoy-cyclone-disaster-management-in-gujarat-a-ca...Samirsinh Parmar
Disaster management;
Cyclone Disaster Management;;
Biparjoy Cyclone Case Study;
Meteorological Observations;
Best practices in Disaster Management;
Synchronization of Agencies;
GSDMA in Cyclone disaster Management;
History of Cyclone in Arabian ocean;
Intensity of Cyclone in Gujarat;
Cyclone preparedness;
Miscellaneous observations - Biparjoy cyclone;
Role of social Media in Disaster Management;
Unique features of Biparjoy cyclone;
Role of IMD in Biparjoy Prediction;
Lessons Learned; Disaster Preparedness; published paper;
Case study; for disaster management agencies; for guideline to manage cyclone disaster; cyclone management; cyclone risks; rescue and rehabilitation for cyclone; timely evacuation during cyclone; port closure; tourism closure etc.
Project Management Infographics . Power point projetSAMIBENREJEB1
Project Management Infographics ces modèle power Point peut vous aider a traiter votre projet initiative pour le gestion de projet. Essayer dès maintenant savoir plus c'est quoi le diagramme gant et perte, la durée de vie d'un projet , ainsi que les intervenants d'un projet et le cycle de projet . Alors la question c'est comment gérer son projet efficacement ? Le meilleur planning et l'intelligence sont les fondamentaux de projet
From Concept to reality : Implementing Lean Managements DMAIC Methodology for...Rokibul Hasan
The Ready-Made Garments (RMG) industry in Bangladesh is a cornerstone of the economy, but increasing costs and stagnant productivity pose significant challenges to profitability. This study explores the implementation of Lean Management in the Sampling Section of RMG factories to enhance productivity. Drawing from a comprehensive literature review, theoretical framework, and action research methodology, the study identifies key areas for improvement and proposes solutions.
Through the DMAIC approach (Define, Measure, Analyze, Improve, Control), the research identifies low productivity as the primary problem in the Sampling Section, with a PPH (Productivity per head) of only 4.0. Using Lean Management techniques such as 5S, Standardized work, PDCA/Kaizen, KANBAN, and Quick Changeover, the study addresses issues such as pre and post Quick Changeover (QCO) time, improper line balancing, and sudden plan changes.
The research employs regression analysis to test hypotheses, revealing a significant correlation between reducing QCO time and increasing productivity. With a regression equation of Y = -0.000501X + 6.72 and an R-squared value of 0.98, the study demonstrates a strong relationship between the independent variables (QCO downtime and improper line balancing downtime) and the dependent variable (productivity per head).
The findings suggest that by implementing Lean Management practices and addressing key productivity inhibitors, RMG factories can achieve substantial improvements in efficiency and profitability. The study provides valuable insights for practitioners, policymakers, and researchers seeking to enhance productivity in the RMG industry and similar manufacturing sectors.
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd tes...ssuserf63bd7
Small Business Management An Entrepreneur’s Guidebook 8th edition by Byrd test bank.docx
https://qidiantiku.com/test-bank-for-small-business-management-an-entrepreneurs-guidebook-8th-edition-by-mary-jane-byrd.shtml
Originally presented at XP2024 Bolzano
While agile has entered the post-mainstream age, possibly losing its mojo along the way, the rise of remote working is dealing a more severe blow than its industrialization.
In this talk we'll have a look to the cumulative effect of the constraints of a remote working environment and of the common countermeasures.
Leading Change_ Unveiling the Power of Transformational Leadership Style.pdfEnterprise Wired
In this comprehensive guide, we delve into the essence of transformational leadership style, its core principles, key characteristics, and its transformative impact on organizational culture and outcomes.
Leading Change_ Unveiling the Power of Transformational Leadership Style.pdf
IWMW18: Invisible Labour
1. 1
I N V I S I B L E L A B O U R
G A R E T H E D W A R D S
U n i v e r s i t y o f G r e e n w i c h
2. 2
VISIBLE LABOUR INVISIBLE LABOUR
T h e t a s k s y o u d o to a c c o m p l i s h y o u r d a i l y
( o r p r o j e c t ) w o r k
T h e h i d d e n m i c r o - t a s k s y o u d o to h e l p y o u r
u s e r s c o m p l e te t h e i r w o r k
@garius #iwmw18 #P3
3. 3
Adding a banner image
T h i s i s t h e s t a n d a r d , u n i v e r s i t y - w i d e p r o c e s s f o r u p l o a d i n g a n e w i m a g e
to t h e w e b s i te a n d a t t a c h i n g i t to t h e to p o f a p a g e o r a r t i c l e .
ONE: UPLOAD
Use the Web Hub to
upload your image
onto the website
TWO: NOTE ID
Copy (or note down)
the ID of the image
you uploaded
THREE: BROWSE
Find the page you
want to use the image
on and choose to edit
FOUR: ADD IT
Add the ID you copied
(or noted) into the
‘thumbnail’ field
FIVE: PUBLISH
Go to the details page
and choose to publish
your changes
@garius #iwmw18 #P3
4. 4
Adding a banner image
( Wi t h i n v i s i b l e l a b o u r )
ONE: UPLOAD
Use the Web Hub to
upload your image
onto the website
TWO: NOTE ID
Copy (or note down)
the ID of the image
you uploaded
QUERY IMAGE
Webteam asked for
feedback on picture
quality and relevance
RESIZE IMAGE
Send image to
webteam for resizing
as too big
UPLOAD FAILED
Webteam
troubleshoot why
image did not upload
@garius #iwmw18 #P3
5. 5
Adding a banner image (cont.)
( Wi t h i n v i s i b l e l a b o u r )
CAN’T SEEM TO EDIT
The edit link doesn’t
seem to work. Ask
webteam for help
THREE: BROWSE
Find the page you
want to use the image
on and choose to edit
FOUR: ADD IT
Add the ID you copied
(or noted) into the
‘thumbnail’ field
FIVE: PUBLISH
Go to the details page
and choose to publish
your changes
IMAGE ISN’T SHOWING
Ring Webteam and
ask them why it is not
showing
@garius #iwmw18 #P3
6. 6
“When's the last time
you had three or four
hours to yourself to get
work done? It probably
wasn't at the office.”
J a s o n F r i e d , 3 7 s i g n a l s
@garius #iwmw18 #P3
7. 7
THE IMPACT OF INVISIBLE
MICRO-TASKS
T A S K S W I T C H I N G
M i c r o - t a s k s d i s r u p t t h e w o r k p a t te r n a n d o f te n f o r c e ( o r m a ke a te a m m e m b e r i n i t i a te ) a t a s k
s w i tc h . A l l d a t a f r o m : M a r y Cz e r w i n s k i E r i c H o r v i t z S u s a n Wi l h i te ( 2 0 1 3 )
50
Average number of tasks
interrupted for another one,
per day
TASK SWITCHES
266%
Time-to-complete (TTC) for a
returned-to task over an
uninterrupted one
TTC (INTERRUPTED)
31%
Time spent answering the
phone or email, per day
TIME ON COMMS
40%
Number of switches that were
initiated by the team member
themselves.
SELF-MADE SWITCHES
@garius #iwmw18 #P3
8. 8
Understanding micro-tasks
I N V I S I B L E L A B O U R
I n v i s i b l e m i c r o - t a s k s e x i s t i n p r a c t i c a l l y e v e r y te a m , s y s te m o r p r o c e s s . T h e i m p o r t a n t t h i n g i s
h o w te a m s t r e a t a n d d e a l w i t h t h e m .
It’s rare that the initiator is trying to be disruptive
M I C R O - T A S K S A R E N O T I N H E R E N T LY B A D
The first step to addressing them is to drive them out into the open
M I C R O - T A S K S N E E D T O B E A C K N O W L E D G E D
Often they exist because of fixable problems within our systems or processes
M I C R O - T A S K S C A N B E E N G I N E E R E D O U T
@garius #iwmw18 #P3
9. T H E M A S S E F F E C T
Websites are spaceships. The bigger they are, the harder to turn.
10. 10
THE MASS
EFFECT
Entrepreneurial activities differ
substantially depending on the type of
organization and creativity.
Entrepreneurial activities differ
substantially depending on the type of
organization and creativity.
Entrepreneurial activities differMicro -tasks that exist because the
website is overly large, the
codebase too complex or a wide
range of admin systems exist
“That section is
set up
differently to
the other ones”
“This page looks
weird since you
made those
other changes”
“Can anyone
remember who
coded this?”
“Oh that page is
in the old style.
We have to
change it for
you”
@garius #iwmw18 #P3
11. 11
MANAGING MASS EFFECT
I N V I S I B L E L A B O U R
D e a l i n g w i t h M a s s E f f e c t r e q u i r e s te a m s to b e s t r i c te r i n h o w t h e y s c o p e a n d c o d e s y s te m s
CONSISTENTLY
B U I L D
Don’t create custom interfaces
or sections of your website
unless you really have to. This
ensures user skills are
transferable
COMPLEXITY
B L O C K
Don’t build complex layouts or
systems just because the user
likes them or feels they can
cope. Stick to the basics unless
its unavoidable
STANDARDS
M A I N T A I N
Use industry standard
techniques and languages.
Ensure that anyone on the
team can code something, or at
least navigate the code base
SEMANTIC
B E
Structure you content and code
semantically. This helps people
think the right way, and helps
keep things simple and easy to
update or improve
@garius #iwmw18 #P3
12. F E A R O F T H E
U N K N O W N
Some users won’t jump. They need a gentle push.
13. 13
FEAR OF THE
UNKNOWN
Entrepreneurial activities differ
substantially depending on the type of
organization and creativity.
Entrepreneurial activities differ
substantially depending on the type of
organization and creativity.
Entrepreneurial activities differMicro -tasks that exist because the
user is reluctant to make a
decision or unwilling to take an
action
“I don’t think
I’ve been
trained on this”
“It just needs
doing as my
manager says
it’s really
urgent”
“Can you just
stay on the
phone while I do
it?”
“I would try, but
it doesn’t seem
to want to let
me log in”
@garius #iwmw18 #P3
14. 14
MANAGING FEAR ITSELF
I N V I S I B L E L A B O U R
D e a l i n g w i t h Fe a r o f t h e U n k n o w n r e q u i r e s a n u n d e r s t a n d i n g o f h o w p e o p l e t h i n k a n d t h e
p s y c h o l o g y o f f a i l u r e a n d p r o c r a s t i n a t i o n .
TUTORIALS
M A K E
You don’t have to document
everything, but you do need to
provide easy guides for the
things people actually struggle
with.
SKILLS
D E M A N D
Set a baseline level of computer
ability you expect your users to
have before they can be
granted access to your systems.
PHONES
R O T A T E
Some users will latch on to the
people they see as helpful.
Make it harder for them to get
attached.
NO
S A Y
There are very few things that
genuinely require an urgent
intervention. Make failure have
a cost for the user so they are
motivated to change.
@garius #iwmw18 #P3
15. 15
L E E R O Y J E N K I N S !
That button you told people not to click yet? He’s clicking it.
16. 16
“ O k a y g u y s … t h e s e
e g g s h a v e g i v e n
u s a l o t o f t r o u b l e
i n t h e p a s t … ”
“ W h a t d o y o u
t h i n k A b d u l , c a n
y o u g i v e u s a
n u m b e r c r u n c h
r e a l q u i c k ? ”
“ I ’ m c o m i n g u p
w i t h 3 2 . 3 3 ,
r e p e a t i n g o f
c o u r s e ,
p e r c e n t a g e o f
s u r v i v a l … ”
“…alright chums
let’s do this!
LEEEEROY
JENKINS!!!”
“ O h m y G o d . H e
j u s t r a n i n . ”
@garius #iwmw18 #P3
18. 18
LEEROY
JENKINS!
Entrepreneurial activities differ
substantially depending on the type of
organization and creativity.
Entrepreneurial activities differ
substantially depending on the type of
organization and creativity.
Entrepreneurial activities differMicro -tasks that exist because the
user has done something they
shouldn’t have done
“Um. Something
weird has
happened”
“I thought I’d
try it myself
and…”
“The person
who set this up
isn’t here
anymore”
“We’ve hired a
graduate intern”
@garius #iwmw18 #P3
19. 19
MANAGING THE LEEROYS
I N V I S I B L E L A B O U R
D e a l i n g w i t h L e e r o y s m e a n s a c c e p t i n g t h a t ‘ b i g r e d b u t to n s ’ a r e j u s t to o te m p t i n g f o r s o m e
PERMISSIONS
D E F I N E
Make sure that your permission
structure correctly blocks
things you don’t want people to
do
SIMPLICITY
E N F O R C E
‘We can look at that in future,
but only after you’ve done the
basics first’
EXPERTS
B E
Expertise in a different subject,
or an outside interest in digital
media, does not make one an
expert. Be firm but clear
about this.
EVERYTHING
H I D E
Most CMS systems are a hotbed
of features that are designed to
look good in the showroom but
are rarely used. Hide them all!
@garius #iwmw18 #P3
21. 21
Quick wins
I N V I S I B L E L A B O U R
G e t t i n g b e t te r a t h a n d l i n g m i c r o - t a s k s d o e s n ’ t h a v e to s t a r t w i t h b i g c h a n g e s . A f e w c u l t u r a l
c h a n g e s c a n g o a l o n g w a y.
Build a team culture that acknowledges the need for concentration time
I T I S O K AY T O S AY ‘ N O T N O W ’
If a person cannot use a computer then there is a training issue, not a digital one
I T I S O K AY T O R E M O V E A C C E S S
If someone insists on complexity, make them prove it is necessary
I T I S O K AY T O S AY ‘ P R O V E I T ’
@garius #iwmw18 #P3