Cognitive Bias from whatis.com
|
Cognitive
bias is a limitation in objective thinking that is caused by the
tendency for the human brain to perceive information through a filter of
personal experience and preferences. The filtering process is called
heuristics; it's a coping mechanism that allows the brain to prioritize and
process the vast amount of input it receives each second. While the mechanism
is very effective, its limitations can cause errors that can be exploited. It may not be totally possible to eliminate the brain's predisposition to take shortcuts, but understanding that bias exists can be useful when making decisions. A continually evolving list of cognitive biases has been identified over the last six decades of research on human judgment and decision-making in cognitive science, social psychology and behavioral economics. They include:
Anchoring effect - the tendency for
the brain to rely too much on the first instance of information it received
when making decisions later on.
Availability bias - the tendency for
the brain to conclude that a known instance is more representative of the
whole than is actually the case.
Bandwagon effect - the tendency for
the brain to conclude that something must be desirable because other people
desire it.
Bias blind spot - the tendency for
the brain to recognize another's bias but not its own.
Clustering illusion - the tendency for
the brain to want to see a pattern in what is actually a random sequence of
numbers or events.
Confirmation bias - the tendency for
the brain to value new information that supports existing ideas.
Framing effect - the tendency of
the brain to arrive at different conclusions when reviewing the same
information depending upon how the information is presented.
Group think - the tendency for
the brain to place value on consensus.
Negativity bias - the tendency for
the brain to subconsciously place more significance on negative events than positive
ones. This bias probably evolved as a survival technique. Assuming the worst
of a situation that turns out not to be dangerous is much safer than not
expecting danger that turns out to be present.
Recency bias - the tendency for
the brain to subconsciously place more value on the last information it
received about a topic.
Sunk cost effect - the tendency for
the brain to continue investing in something that clearly isn't working in
order to avoid failure.
Survivorship bias - the tendency for
the brain to focus on positive outcomes in favor of negative ones. A related
phenomenon is the ostrich effect, in which people metaphorically bury their
heads in the sand to avoid bad news.
Cognitive
bias and its impact on data analyticsBeing aware of how human bias can cloud analytics analysis is an important first step toward preventing it from happening. While data analytics tools can help business executives make data-driven decisions, it is still up to humans to select what data should be analyzed. This is why it is important for business managers to understand that cognitive biases that occur when selecting data can cause digital tools used in predictive analytics and prescriptive analytics to generate false results. Throughout history, analysts have learned the hard way about the pitfalls of deploying and using predictive modeling without examining the data selected for analysis for cognitive bias. For example, pollsters and election forecasters predicted large margins of victory for Hillary Clinton in the 2016 United States presidential election. The culmination of many types of bias played a part in predictions that inaccurately forecast Hillary Clinton would be elected president and reliance on weak polling data and flawed predictive models resulted in an unpredicted outcome. |
October as official month By Lahle Wolfe
Updated January
14, 2019
If
you're Italian-American, if you're a cookbook author, or, if you're a
country music artist, then October is the month for you.
That's because October is National Italian-American Heritage Month, Cook Book Author Month, and Country Music Month,
as well as (the more serious) National Cholesterol Month. The United
States is very prolific at creating "national month" events. In
addition to businesses (from major corporations to local ma and pa shops)
numerous worthwhile organizations and special interest groups establish a
promotion during a calendar month to get their name and message out to the
public.
In addition to
fostering awareness, creating a national month designation is an excellent
way to celebrate a nationality, a religion, an interest, or a cause.
While you may
not want to hug a "Texas chef" or believe that vegetarian and
pork lovers should celebrate their food preference in different months,
you'll definitely find something in October to celebrate or pay attention to.
The following
events are observed every year for the entire calendar month.
October Is "National Month" Calendar
- All American Breakfast Month
- Better Breakfast Month
- Computer Learning Month
- Cook Book Month
- Country Music Month
- Disability Employment Awareness Month
- Diversity Awareness Month
- Emergency Care Month
- Family History Month
- German-American Heritage Month
- Gourmet Adventures Month
- Hunger Awareness Month
- Hug a Texas Chef Month
- Lesbian, Gay, and Bisexual History Month
- Mom & Apple Pie Month
- National AIDS Awareness Month
- National Apple Month
- National Applejack Month
- National Book Fair Month
- National Car Care Month
- National Caramel Month
- National Collegiate Alcohol Awareness Month
- National Cookie Month
- National Cosmetology Month
- National Country Ham Month
- National Depression Education and Awareness Month
- National Dessert Month
- National Health Care Food Service Month
- National Hispanic Heritage Month (Mexico): September 15th-October 15th
- National Kitchen and Bath Month
- National Pasta Month
- National Pickled Peppers Month
- National Pizza Month
- National Popcorn Poppin' Month
- National Pork Month
- National Pretzel Month
- National Restaurant Hospitality Month
- National Seafood Month
- National Stamp Collecting Month (Canada)
- National Biscuit Month
- National Breast Cancer Awareness Month
- National Chicken Month
- National Cholesterol Awareness Month
- National Courtesy Month
- National Disability Employment Awareness Month
- National Hispanic Month
- National Honey Month
- National Italian-American Heritage Month
- National Mental Illness Awareness Month
- National Mushroom Month
- National Organic Harvest Month
- National Papaya Month (also, June)
- National Piano Month
- National Potato Month
- National Rice Month
- National Roller Skating Month
- National Sight Saving Month
- National Spinach-Lovers' Month
- National Toilet Tank Repair Month
- Polish-American Heritage Month
- Self-Improvement Month
- Vegetarian Awareness Month
- Women of Achievement Month
- Women's History Month (Canada)
09/30/2019 05:09 PM EDT
Original release date: September 30,
2019
October is
National Cybersecurity Awareness Month (NCSAM), which is a collaborative effort
between the Cybersecurity and Infrastructure Security Agency (CISA) and its
public and private partners—including the National Cyber Security Alliance (NCSA)—to
ensure every American has the resources they need to stay safe and secure
online while increasing the resilience of the Nation against cyber threats.
This year’s theme, “Own IT. Secure IT. Protect IT.,” focuses on promoting
personal accountability and positive behavior when it comes to cybersecurity.
CISA
encourages organizations to see the NCSAM 2019 webpage and the NCSAM 2019 Toolkit
Paul, every year
millions of Americans find themselves unable to vote because they miss a
registration deadline, don’t update their registration, or aren’t sure how to
register.
Our partners at Vote Forward have made it easy to contact historically under-represented, not-yet-registered voters living in key 2020 swing states to provide them with everything they need to register to vote.
Click the link to set up an account or sign in, then scroll down to the second row of options and choose one of the campaigns that includes voter registration forms.
+++++++++++++++++++++++++++++++++++++++++++++++++
Our partners at Vote Forward have made it easy to contact historically under-represented, not-yet-registered voters living in key 2020 swing states to provide them with everything they need to register to vote.
Click the link to set up an account or sign in, then scroll down to the second row of options and choose one of the campaigns that includes voter registration forms.
+++++++++++++++++++++++++++++++++++++++++++++++++
air
gapping
|
Air
gapping is a security measure that involves physically isolating a
computer or network to prevent it from connecting directly or wirelessly to
other systems that can connect to the Internet. Air gapping is used to
protect many types of critical systems, including those that support the
stock market, the military, the government and industrial power industries.
To prevent unauthorized data extrusion
through electromagnetic or electronic exploits, there must be a specified
amount of space between the air-gapped system and outside walls and between
its wires and the wires for other technical equipment. In the United States,
the U.S. National Security Agency TEMPEST project provides best practices for
using air gaps as a security measure.
For a system with extremely sensitive data,
a Faraday cage can be used to prevent electromagnetic radiation (EMR) escaping
from the air-gapped equipment. Although such measures may seem extreme, van
Eck phreaking can be used to intercept data such as key strokes or screen
images from demodulated EMR waves, using special equipment from some distance
away. Other proof-of-concept (POC) attacks for air- gapped systems have shown
that electromagnetic emanations from infected sound cards on isolated
computers can be exploited and continuous wave irradiation can be used to
reflect and gather information from isolated screens, keyboards and other
computer components.
As of this writing, the Defense Advanced
Research Projects Agency (DARPA) is awarding grants for prototype hardware
and software designs that will keep sensitive data physically isolated. The
grants are made possible under the Guaranteed Architecture for Physical
Security (GAPS) program.
Enhancing air-gapped security
measures
The problem with physical separation as a
security technique is that, as complexity increases in some system or network
to be isolated, so does the likelihood that some unknown or unauthorized
external connection will arise.
Perhaps the most important way to protect a
computing device or network from an air gap attack is through end user
security awareness training. The infamous Stuxnet worm, which was designed to
attack air-gapped industrial control systems, is thought to have been
introduced by infected thumb drives found by employees or obtained as free
giveaways.
The software-defined
perimeter (SDP) framework is another tool network engineers can use to create
a type of "virtual air gapping" through policy enforcement. SDP
requires external endpoints that want to access internal infrastructure to
comply with authentication policies and ensures that only authenticated
systems can see internal IP addresses. |
In my books, noted below, I often lament about the lack of civility, deterioration of written communication and abuse of the power of the Internet. Electronic communication, in my opinion, breeds negativity and behavior which does not exist in direct communication.
The following is an except from my first book which addresses angry email replies.
Enjoy the article and check out the website!
==================================================
======================
For a great satire on email, please see the following:
https://www.youtube.com/watch?v=HTgYHHKs0Zwscoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618
===============================================
Good Netiquette And A Green Internet To All!
Special Bulletin - My just released book,
"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...)
is now on sales at Amazon.com
Great Reasons for Purchasing Netiquette IQ
·
Get more
email opens. Improve 100% or more.
·
Receive
more responses, interviews, appointments, prospects and sales.
·
Be better
understood.
·
Eliminate
indecision.
·
Avoid
being spammed 100% or more.
·
Have
recipient finish reading your email content.
·
Save time
by reducing questions.
·
Increase
your level of clarity.
·
Improve
you time management with your email.
·
Have
quick access to a wealth of relevant email information.
Enjoy
most of what you need for email in a single book.
=================================
**Important note** - contact our company for very powerful solutions for IPmanagement (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================
Another Special Announcement - Tune in to my radio interview, on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.
In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:www.amazon.com/author/paulbabicki
In addition to this blog, I maintain a radio show on BlogtalkRadio and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and Yahoo. I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and PSG of Mercer County, NJ.
I am the president of Tabula Rosa Systems,
a “best of breed” reseller of products for communications, email,
network management software, security products and professional
services. Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.
Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================
No comments:
Post a Comment