We don’t need another Hero

Developing strategies and approaches to change this culture is key to moving our organizations to a Service Management model. It all starts with taking the time to plan, analyze and implement processes. Not easy but the end results are far more effective than ad hoc solutions created in a time of crisis. We don’t need another Hero!

The post We don’t need another Hero appeared first on Enterprise Architecture in Higher Education.

Does anonymity promote ill-informed consensus?

There are a spate of new Social Media apps that have emerged lately, all of which allow people to post comments and ideas anonymously.  They are being quickly adopted, especially among the very important 13-18 year old “adolescent market.”  They are also being quickly banned for promoting cyberstalking, cyberbullying, and otherwise cruel behavior.  Does anonymity protect cruelty?  And what does that say about more established Anonymous sites, like Wikipedia?

Normally I don’t comment on Social Media.  My regular readers know that I tend to focus primarily on enterprise architectural concerns like business model viability and strategic alignment.  But there is an interesting cross-over between Enterprise Architecture and Social Media, especially anonymous social media: the creation of community consensus.

The state of anonymity

For those not keeping up, there is a spate of new social media apps that have emerged lately, from Whisper to Secret to Yik Yak, that allow smartphone users to sign up and then post messages unfiltered and anonymously.  When in anonymous mode, users tend to say things that they feel uncomfortable saying on Twitter or Facebook (where their friends, family, and coworkers may discover a side of them that they may not agree with). 

YikYak especially is troubling because it uses a geolocation filter… you can see things posted by people within a certain distance of you.  Sounds innocent, right?  After all, young adults filtering through Bourbon Street festivities in New Orleans could share that a particular bar was playing really good jazz, or that drinks are strong and cheap across the street.  But you may quickly see the problem when I use two words: middle school.  Already, some High Schools and Middle Schools have had to ban the app because it became a platform for bullying and cruel comments.

The effects of anonymity

But what does it mean to be anonymous?  What are these comments that the guy next to you would like to send to “the world” without anyone knowing it was him?

You can look for yourself at Whisper.sh.  I spent a few minutes browsing through some of today’s messages.  Most were simple secrets… many were sexual or related to dating.  Some were work related.  Most had responses from equally anonymous people, and most were fairly benign.  Of course, there could be some judicious editing going on for the sake of casual surfers like me that own a Windows phone (and therefore can’t use the app).  Secret and Yik Yak don’t even make an effort to show any of their messages on their website.  It’s all in the app (once again, only for IPhone or, in the case of YikYak, android).

Of these, I think Yik Yak is the most interesting from a consensus point of view, because it is the only one that attempts to filter according to a community.  GeoLocation, especially when it comes to universities or even small towns, is sure to limit the reach of a message to people who share something in common with you.  That sense of “sharing something in common” is really what defines a community, and consensus only really matters in a community.

Anonymity and consensus

Does anonymity work to create consensus?  Sure.  Think of standing in a large crowd.  If one person yells something, you don’t normally turn to them and identify the source before considering, and possibly agreeing with, the content.  This is the very essence of a political rally or a protest march.  Taking in unfiltered ideas and deciding on them, on the spot, is part of how consensus is built.  Of course, there is no good way to take in ONLY good ideas when you are in a crowd.  We count on the crowd to do that for us.  If someone in a political rally yells “Death to the other guys!” we would expect the folks standing next to them to react, possibly causing the rabble-rouser to back down.  (Unless your protest march is in Karachi or Tehran or Cairo… but that’s another post).

In that sense, standing in a crowd is only “partially” anonymous.  There are still people who can see you, and if you do something really outrageous, there are people who could react by hitting you.  This is why you won’t find many people who will go to a crowded Yom Kippur (Jewish) service and stand up in the middle of the crowd and yell “Hitler was right!”  Pandemonium. 

But consensus and anonymity online is very different than standing in a crowd, and I think we need to be aware of the differences. 

The perils of anonymity online

Online, you can make claims that are difficult for another person to dispel, without consequence at all.  There is no one next to you ready to elbow you when you use name calling, or circulate unfounded rumors, or simply make things up!  Even when we use our actual names, we may participate in a discussion where we are not in the same room, or even the same continent, as our peers, and this can cause problems.

I cannot count the number of times I’ve witnessed this on LinkedIn.  A person will ask a question about frameworks, and I may point them to PEAF (a framework created by Kevin Smith).  No problem.  But if Kevin himself gets on the thread and mentions PEAF, his messages are blocked and he may even be kicked out of the discussion.  Why?  Because someone somewhere made a spurious charge (that he makes money when you use PEAF, which is not true).  Since the administrators of most LinkedIn Groups are anonymous, they can make bad decisions without consequence.  There is no good way for Kevin to clear his name of these charges because he does not know who the administrators are, and they appear unwilling to consider the possibility that he is not, in fact, using the platform to promote his own self interests.  Rumor rules the roost.  Not good.

I believe that the same thing applies to Wikipedia. 

Wikipedia, with its millions of articles, has emerged as one of the chief sources of encyclopedic content on the Internet.  It is widely respected, and most search engines make a point of returning Wikipedia entries near the top of their search results.  However, the administrators on Wikipedia are mostly anonymous.  (They use pseudonyms to do their editing work). 

This causes the same problems to occur in Wikipedia that occur in any other setting where people can be anonymous… mostly benign behavior with occasional outburst of bad behavior (with nearly no consequence). 

There is an essay (not a policy) on Wikipedia that says “Only Martians Should Edit.”  This policy says that some topics are so controversial that anyone associated with the actual content would be too biased to edit the content in a neutral manner.  Therefore, topics dealing with such things as State or Provincial politics, or national boundary disputes, or whether specific historic events should be counted as a genocide.  These things trigger strong emotions, so having people edit the articles as though they are “from Mars” can be a good policy.

On the other hand, for some topics that are very narrow, it is not possible to edit the article without knowledge of the subject.  If you are not an expert in African pop music, you may not do a good job discussing Azonto music and dance from Ghana.  In this case, an editor with no grounding in the subject is likely to make mistakes. 

The problem is that Wikipedia is based on consensus, and you may find yourself editing a page on Wikipedia where you have to build consensus among anonymous people, people that may or may not have ANY understanding of the subject matter.  And those people can be nice, or cruel, with no consequence.  There is no one in the crowd next to them ready to elbow them for making an outrageous statement… because the other editors don’t know if the statement is outrageous!  You can build credibility on how well you enforce the rules, and then use that credibility to attack someone, and no one else can tell the difference.

Anonymity: Handle With Care

I’m of the opinion that anonymity on the Internet has to be handled with care.  There are times when it is necessary, especially when attempting to avoid governmental or organized oppression to free speech.  On the other hand, there are times when it is a license for ill-informed people to promote nonsense as a consensus.  After all, one third of Louisiana Republicans have been misled into thinking that Obama is to blame for the poor response to Hurricane Katrina.  I can think of a other examples of an ill-fated consensus among the ill-informed, but rarely one so laughable.

I believe that Sites and Apps should not leverage anonymity as a feature.  I make exceptions for Tahrir Square and Occupy Wall Street, etc, where rumor may be the only information you can trust, but that is not what these apps do. For normal social interactions, anonymity is actually a problem.  On Wikipedia, I believe that anonymity has outlived its usefulness. 

What‘chu Talkin’ ‘Bout, Business?

I’ve been around a few organisations now where I still see Enterprise Architecture being nothing more than a thing that IT people do.  There is a terrible lack of trust between the Business and IT […]

The post What‘chu Talkin’ ‘Bout, Business? appeared first on Enterprise Architects.

Career Path – Management

Career Path for Management Roles There are three job descriptions in the management career path for our IT department.  The entry level position is Team Leader.  The Team Leader role has day to day operational responsibility for the services delivered by their team.  The role also has tactical responsibility for project resourcing and reports to […]

The post Career Path – Management appeared first on Enterprise Architecture in Higher Education.

A Project Portfolio Management Approach

I introduced an approach to project portfolio managment (PPM) to my IT team at the American University of Sharjah.  After 9 months here, I have a real sense that we were doing too many projects for the resources that we had available.   The result of trying to do too much was that our planning […]

The post A Project Portfolio Management Approach appeared first on Enterprise Architecture in Higher Education.

What are Your Services?

We discussed Who is Your Customer?  in my previous post, now it is time to start to think about what services we deliver to our community.  After running an exercise on identifying our customers and the categories they fit in, we started to work on the services we deliver to our University community. The IT […]

The post What are Your Services? appeared first on Enterprise Architecture in Higher Education.

Has in-person communication become the unwilling victim of technology?

In Enterprise Architecture, one of the most important aspects of the job is not only to communicate, but to lead change.  In other words, it is great to have the data to point to a problem in an enterprise.  It is better to help that enterprise overcome it by changing something (processes, technology, training, staff levels, departmental structures, roles and responsibilities, artifacts, governance mechanisms, etc).  Change requires more than simple communication.  It requires a kind of in-person, face-to-face, listening and hearing and absorbing interaction that is difficult or impossible over written mechanisms like e-mail, word documents, and powerpoint presentations.

Our technology has led us to the point, in modern business, that we consider outsourcing and remote work to be a net benefit for all involved, but each of these “distance” mechanisms introduces the RISK of poor communication.  That risk is magnified when the person on one end of the line is hoping to change something that the person on the other end is doing.  Change is harder across distance, and that difficulty becomes magnified when dealing with the array of different interactions that are needed at the enterprise level.

I wonder if the PC revolution, that brought us personal access to written communication, has created a deep reliance on written communication in corporate processes.  I wonder, further, if that access to technology isn’t directly harming our ability to look a person in the eyes and communicate with them.

As a culture, we have moved from the age of face-to-face all the way to text-messaging-someone-in-the-same-room in the course of a single generation. 

Enterprise Architecture is more difficult because of this shift in communication patterns.  All forms of face-to-face communication are hampered by it.

Modern technology has done more to damage interpersonal communication than any other paradigm shift in human history.

This worries me.

Implementing Organizational Structure and Focus

When I joined the IT Department at the American University of Sharjah as the Director, I was presented with an organizational structure challenge.  I found out that I had 21 direct reports and that my department did not have a concept of operational management!  I had just come from being the Manager, Business Application Services […]

The post Implementing Organizational Structure and Focus appeared first on Enterprise Architecture in Higher Education.

Work from home and making adult choices

My friend and colleague Jack Santos sent me a link to the NYTimes story “Looking for a lesson in Google’s Perks” by James B. Stewart. Jack knows I am interested in work from home and anything else for that matter related to employee engagement. The article states that “Google doesn’t require employees to work from […]

Work from home and making adult choices

My friend and colleague Jack Santos sent me a link to the NYTimes story “Looking for a lesson in Google’s Perks” by James B. Stewart. Jack knows I am interested in work from home and anything else for that matter related to employee engagement. The article states that “Google doesn’t require employees to work from […]

The post Work from home and making adult choices appeared first on Mike Rollings.

My First 180 Days as a CIO

Hard to believe that time has gone so quickly in my CIO role.  On March 17, 2013 I have been the Director of Information Technology at the American University of Sharjah in Sharjah, United Arab Emirates for 180 days. It has been a huge change for me especially after spending 20 years at the British Columbia […]

The post My First 180 Days as a CIO appeared first on Enterprise Architecture in Higher Education.

Take Every Opportunity to Document

I am always surprised (and I really shouldn’t be) that we do a great job of responding to critical incidents but almost always fail to document what we did so it can be referenced in the future. As IT leaders we need to proactively document the impacts of planned and unplanned changes.  Whethere it is […]

The post Take Every Opportunity to Document appeared first on Enterprise Architecture in Higher Education.