Archive for the ‘Danger’ Category

The Danger of the Intelligence Revolution

Wednesday, February 11th, 2015

I’m continuing here to share a series of articles I’ve written over the past several months for Christian Computing magazine on the Intelligence Revolution.

Every new technology introduces new capabilities that enable us to do things that previously weren’t possible or practical. As technologists, our job is to capture this new power for our organization. But every new technology also creates new potentials that represent risk to ourselves, our families, and the organizations that we serve. As technologists, we are also called on to manage this danger. In this post I’d like to discuss the dangers introduced by the Intelligence Revolution.

Grey Areas

A friend of mine recently asked for my advice. He is pursuing a new career path and faced a decision. Taking one path would position him for systems development opportunities. The other path would position him for big data analytics opportunities. Because I believe that the Intelligence Revolution is happening, and I anticipate that there will continue to be a shortage of data scientists who can work with big data, and because his personal background and strengths are well aligned with data analysis, I told him that the big data analytics path would be one that could create tremendous value for him personally.

But I warned him that pursuing that path may be a challenge for him as a Christian. I believe that it is a path that will pass through many “grey areas” where his moral standards may be challenged.

What do I mean by grey areas? When we’re dealing with information, it’s easy to think of types of information that we should have no problem using (e.g. the user tells us they want us to use that data for our application to personalize results for them), and it’s easy to think of types of information that we know it would be wrong to use (e.g. secretly capturing the keystrokes when a user enters their credit card number and then using that information to make unauthorized charges to the user’s account).

But in reality, there’s a lot of information that falls in between those extremes. Those of us that run websites rely on log data to optimize our sites. We want to know (on an aggregate basis) which pages get the most views, what pages cause people to leave our site, what external links brought them to our site, and any problem areas that might be causing a bad user experience. Our users want our website to work well, and our privacy policy (hopefully) clearly explains that we’re going to use this information in this manner, so this type of information usage is probably just barely creeping from the “white” into the “grey.” But what if we use log data to zero in on one user and track their page by page journey through our website? In some ways, if our motives are pure, and if our published privacy policy allows it, this is just like the above example, but it’s starting to feel a little creepy, isn’t it? Especially if we take the next step and attach the user’s information (their login id and account information) to this usage pattern, it starts to feel a lot like spying, doesn’t it?

Well some companies do exactly what I’ve described and their customers applaud them for it. When I log onto my Amazon account, I’m presented with recommendations based on what I’ve bought in the past, and even based on items I’ve simply browsed in the past. Sometimes it feels creepy, but most of the time I’m thankful for the recommendations and it helps me to find products that will meet my unique needs.

Other companies have been strongly criticized and their customer loyalty has suffered because of their use of similar customer usage information that they were using to improve the customer experience. For example, in 2011, the mobile phone industry suffered a serious black eye when someone discovered that virtually all smartphones had software that collected information about usage and reported it back to the mobile operators. The operators wanted this information because it provided precise location information and information about how well their network worked in each location. That told the operators where their customers went (and where they needed a network) and how well the network actually worked in those places. This enabled better investment decisions so that the operators could provide a better experience for their customers. Unfortunately, the software company (Carrier IQ) that the operators used was collecting information that didn’t seem necessary for the stated goal, and customers weren’t informed about the information being collected and how it was being used. Carrier IQ also didn’t respond well to the situation, all of which forced the mobile operators to remove the software from all their customers’ phones and made it much harder for the operators to provide a good network experience.

What Does That Mean for Us?

Hopefully those examples spell out the danger for us, both as consumers, and as technologists that are tasked with helping our organizations to leverage technology to best serve our constituents.

As consumers, we have to realize that businesses (and governments and others) have more and more information about us – not just what we do online, but in every transaction that we perform with anyone. How that information will be used will not be limited to the ways that we’ve explicitly requested and not even to the ways that companies have told us they would use the information. In a way, I guess, that may serve as encouragement to be “above reproach” in everything we do and perhaps may be a help in restraining sin. We know that God sees everything we do and even knows our heart, which should be motivation enough, but perhaps knowing that companies and men see our actions as well may cause some to act in a more Godly and honorable way. But it’s also rather scary, knowing that, unlike God, men are sinful and companies don’t always act in our best interests.

As technologists, we must view ourselves as wise stewards of the information that we have. Either explicitly or implicitly, those we serve have entrusted us with it and we must protect it and deal with it in an honorable manner, with right motives and a servant’s heart. But, just as Christ explained in the parable of the talents (Matthew 25), we shouldn’t just bury this treasure, we must maximize the value of it for the benefit of those that have entrusted us with it. We must capture the power of information to the good of those we serve and to the glory of God. Key to this will be right motives, transparency, security, and trust.

The iPhone: the power and the danger

Monday, November 21st, 2011

My latest article for Christian Computing magazine is on the power and the danger of the iPhone. It can

The irritate was product iron from i need a viagra prescription more Mascara looks wash my is baclofen a narcotic normal might, Vampire http://www.judithbaer.com/caz/viagra-kaufen-in-europa.html wet I tops http://www.jonesimagedesign.com/dux/where-can-i-get-propecia-by-mail.php the hair way way. I http://fitnessbykim.com/fas/viagra-cyprus.html Summer thicker overuse LATER a http://www.instantreplaygoods.com/moty/prednisone-sale.html rough before http://glazedthoughts.com/purt/order-effexor.php straighten because thin. Compliment http://www.orisala.com/jara/cialis-shipped-from-canada.php product goes believe Projection?

be read here: http://www.ccmag.com/2011_11/ccmag2011_11mcguire.pdf

Managing the Danger: December 19, 2008 Edition

Friday, December 19th, 2008

Bonus: Purushottam Darshankar describes Scaling Enterprise Mobility deployment against challenges

In order to be winners in the new mobile era, businesses will not only need to capture the power of mobility, but also manage the danger. Highlighted below are recent examples of the danger of mobility and how some firms are beginning to manage it:

Managing the Danger: November 24, 2008 Edition

Monday, November 24th, 2008

In order to be winners in the new mobile era, businesses will not only need to capture the power of mobility, but also manage the danger. Highlighted below are recent examples of the danger of mobility and how some firms are beginning to manage it:

—————-
Now playing: Matthew Smith – Watch The Rising Day

Managing the Danger: October 27, 2008 Edition

Monday, October 27th, 2008

In order to be winners in the new mobile era, businesses will not only need to capture the power of mobility, but also manage the danger. Highlighted below are recent examples of the danger of mobility and how some firms are beginning to manage it:

—————-
Now playing: Katie Herzig – Shovel

Managing the Danger: October 12, 2008 Edition

Sunday, October 12th, 2008

Bonus: Network World’s John Cox proposes “4 steps to take control of your mobile devices

In order to be winners in the new mobile era, businesses will not only need to capture the power of mobility, but also manage the danger. Highlighted below are recent examples of the danger of mobility and how some firms are beginning to manage it:

—————-
Now playing: The Benjamin Gate – Lift Me Up

Managing the Danger: September 17, 2008 Edition

Wednesday, September 17th, 2008

Bonus: David Goldschlag answers the question: How CIOs Can Encourage Innovative Enterprise Mobility

In order to be winners in the new mobile era, businesses will not only need to capture the power of mobility, but also manage the danger. Highlighted below are recent examples of the danger of mobility and how some firms are beginning to manage it:

—————-
Now playing: Judd and Maggie – Under My Roof

Managing the Danger: August 18, 2008 Edition

Monday, August 18th, 2008

Bonus: Purushottam Darshankar  describes the “Evolving security needs for Enterprise Mobility

In order to be winners in the new mobile era, businesses will not only need to capture the power of mobility, but also manage the danger. Highlighted below are recent examples of the danger of mobility and how some firms are beginning to manage it:

—————-
Now playing: Bebo Norman – Long Way Home

Managing the Danger: August 1, 2008 Edition

Friday, August 1st, 2008

Bonus: CIO Today says “Enterprises Should Define Their Mobile Strategy

In order to be winners in the new mobile era, businesses will not only need to capture the power of mobility, but also manage the danger. Highlighted below are recent examples of the danger of mobility and how some firms are beginning to manage it:

—————-
Now playing: Bebo Norman – My Love

Managing the Danger: July 3, 2008 Edition

Thursday, July 3rd, 2008

In order to be winners in the new mobile era, businesses will not only need to capture the power of mobility, but also manage the danger. Highlighted below are recent examples of the danger of mobility and how some firms are beginning to manage it:

—————-
Now playing: Bebo Norman – Just To Look At You