May 24, 2015

6 Psychological Triggers That Make UX Design Persuasive
You must learn about human psychology to design compelling user experiences. If you understand how the human mind works, it’s easier to get people’s attention and keep it. It’s also easier to get them to take some form of action (like subscribing or buying). But how do you find out what goes on inside the mind of your users? Well that’s where psychological triggers come in. They’re invisible forces that influence and persuade people. And when you use them in your design you can get more people to say yes to what you’re asking. In this post I’ll break down psychological experiments and academic research into simple, actionable steps that can help you design better experiences that lead to more sales online.


5 Smart Ways to Convince your CEO to Go Mobile
A common (and surprising) complaint I have been hearing is the difficulty CIOs and CTOs face in persuading CEOs to extend their business to mobile platforms. Today the mobile revolution seems to be pretty obvious just by looking at Apple’s performance. However, I realized that some are still reluctant to change their success formula. ... As mobile technology is evolving, we are finding newer ways to interact. Apple recently updated touch screens with force touch. Voice assistants are getting smarter, wearable devices have gained interest, fingerprint technology has become a lot better and new payment methods like Apple Pay are available. All these advancements have significant business applications. It’s important to be proactive and be a company that innovates instead of waiting for your industry to change dramatically and then reacting.


Security Concerns Extend to ‘Big Data Life Cycle’
The security flaws in Hadoop are well known. Apache Hadoop was an open source development project with little initial regard for security. As Hadoop’s security problems emerged, distributors and the Apache community began offering security add-ons for access control and authentication (Apache Knox), authorization (Apache Sentry), encryption (Cloudera’s Project Rhino) along with security policy management and user monitoring (the proposed Apache Argus based on Hortonworks‘ XA Secure acquisition). “Hadoop itself is very weak in security. You can be a Linux user and take all the data from Hadoop,” Manmeet Singh, co-founder and CEO of Dataguise, a provider of data masking and encryption tools for Hadoop, told Datanami last November. “The problem is the insider threat. Anybody can walk away with billions of credit card numbers.”


The City of Burnaby’s CIO offers an Internet of Things reality check
“What we’d like to get to is really to start thinking of these sensors more out of the optimization of the business process to how we can do things better as a city,” she said. This could include smarter traffic flows, remote proactive information before infrastructure fails, or being able to email citizens or send out tweets about something important happening in their area. Other use-case scenarios for sensor-based technologies today is on the City of Burnaby’s pump stations, which Wallace said are used to remotely monitor things like pressure flow and depth. “What really interests me is the education piece: if your water usage has gone up for 20 percent, for example, this is what it means for our reservoir,” she said. “Some of these things we’re doing were not called the Internet of Things. They were just things good cities did.”


Banking on IT Governance: Benefits and Practices
In banking today, more systems, applications and services are exposed to the customer through self-service channels which have a direct bearing on customer experience. They can create significant opportunities but increase the risk of poor performance. Thus, quality of IT governance has become an important tool for managing risk and marketplace effectiveness. However, IT governance comes with a slew of risks, and the distinctions among them are distorted with the merger of people, process and technology. This can lead to a serious impact on operational effectiveness. There is a need for security governance within banks, which entails building a robust framework and laying down a comprehensive information security policy. In addition, it relates to creating a data prevention framework for minimizing data breach.


Halamka and Branzell Urge CIOs To Be “Revolutionaries”
It is particularly difficult now that CIOs are pelted daily with new requests and demands from inside and outside their organizations, Halamka said. “People say, ‘OK, I get it, we need to be prepared for the accountable care future, we need to prepare for care management and care in the home, and even though there’s this cool project that some stakeholder wants, we really don’t have the bandwidth for that.’ And so what not to do” as a CIO “is as important as what to do, because each of us gets this laundry list of hundreds of things that stakeholders wants.” He said with a bit of humor, “The technique I usually use is not to say ‘no’; ‘no’ is such a negative word, so loaded with emotion. So, I say, ‘not now.’” Meanwhile, he added, “My role on the resource side is not to create fear, uncertainty and doubt, but to explain to the board what we need to do.”


DAM and the Art of Governance
A good DAM manager, like a librarian who is differentiating between reference-only items and circulating materials, will keep records. These may take the form of spreadsheets or flowcharts in a secure location delineating user group permissions, asset restrictions, metadata fields both required and optional, workflows, controlled vocabulary terms and taxonomy structure. The most important aspects of the governance strategy are the organizational buy-in on the policies for digital asset management and the documentation of these rules. The benefit will be the ease of decision-making enabled by an established governance plan. Don’t worry about how formal or official these policies may be – the value is in having the discussions leading to the creation of the governance plan and simply in having it all written down.


Three Ways Data Breaches Are Reshaping Data Governance
With the public increasingly cognizant of the amount of personal data they share with businesses, the organizations that collect this information will need to do a better job of determining how much stored data could be potentially exposed in a breach. Businesses need more context around stored data and a stronger understanding of the type of personal information that is collected and how it is protected. Metadata analysis enables businesses to take stock and identify which systems interact with what data, where that data is stored, how much of it is personally identifiable data (PID), and more. This can reveal gaps in data security or material risk factors – a crucial capability for businesses that desire proactive breach mitigation.


Is MDM BI?
There is certainly a reliance on each other; however, a solid BI strategy cannot exist without MDM. Let's face it, a report is only as good as the data from which it is drawn. ... MDM ensures the data you present in your BI layer is clean, complete, consistent and de-duplicated. These data issues arise when you are combining several data sources, eg, CRM, ERP, billing, stock, helpdesk, etc. Duplicates also arise as a result of fast-growing companies which, while on the acquisition path, acquire many new ERP and CRM systems along the way. ... If all this data is pulled into a data warehouse, they will be seen as different records and be counted as different customers. When creating BI views or reports, the data will be incorrect because of underlying problems in the source systems.


e-Book: Managing Third-Party Risks
This e-Book, produced by Compliance Week in cooperation with ProcessUnity, reviews the latest thinking in vendor and third-party risk. It provides compliance professionals with everything they need to know about third-party risk management and how to avoid regulatory complications. In the first article, we explore topics from a recent executive forum, which discussed vendor risks and why building a systematic approach is important. Next, in “Four Keys to Creating a Vendor Risk Management Program That Works,” ProcessUnity deconstructs the idea of vendor risk management and provides four principles that compliance practitioners should follow. Then we examine what happens when third parties engage in bribery and corruption. “Mapping Third-Party Risks” discusses the size and scope of the third-party universe and why companies should have a plan to monitor their vendors.




Quote for the day:

"If you can’t handle others’ disapproval, then leadership isn’t for you." -- Miles Anthony Smith