Author Archives: Ben Woelk

  • 4

Value Proposition or Vision Statement?

Category:Infosec Communicator,Leadchange,STC,STC Rochester,Summit,Uncategorized Tags : 

Our STC Rochester Council is working with Neil Hair‘s Marketing Concepts class at the Rochester Institute of Technology to develop a marketing strategy as we seek to redefine our value proposition as an STC chapter. Some members of the council had a status meeting with the Marketing Concepts class team earlier this week. The team is analyzing similar organizations in our area (ASTD, ISPI, IEEE, etc.) to determine how we compare on key activities and services.

The Marketing Concepts team’s initial slide was:

Value proposition

STC is the best network for excellence in technical communications

In our discussion at council and in following correspondence, we’ve had an extended discussion of what constitutes a Value Proposition. Although there’s been some confusion, including “what is networking,” I think we’ve decided that this is more of a Vision Statement than a Value Proposition.

Value propositions can be expressed in different ways. One way of looking at them is

Value = BenefitsCost

When STC raised its dues for 2010 to $240 per year for International +  Chapter membership, membership renewals plummeted.  For many of the members, the perceived Benefits were outweighed by the Cost.

According to Rackham (stolen from wikipedia), a Value Proposition should include the following:

  • Capability – what it is you do and how you do it
  • Impact – what benefits or difference your capability will make
  • Proof – what evidence substantiates your impact
  • Cost – the cost (or risk) of your capability and impact

If our Value Proposition includes these elements, it’s obviously a bit more complicated. We would have different value propositions for members, employers in our community, etc.

What about Personas?

Usability practitioners use Personas to help programmers visualize the different users of the software they’re creating.  A Persona is a fictional person whose “attributes” are based on different types of users and the business processes for which they might use the software. (This is obviously highly simplified.)

Could we use the concept of a Persona to help develop and articulate value propositions? Would it make sense to start with testimonials of specific members? Can I articulate the Value Proposition of STC Rochester for myself?

Enhanced by Zemanta

  • 4

Determining our Value Proposition

Category:Infosec Communicator,STC,STC Rochester,Summit Tags : 

All of us wear a number of hats. One of my hats is president of the Rochester Chapter of STC (Society for Technical Communication), a professional organization of ~70 members locally. STC has struggled in recent years, with membership declining from ~20,000 worldwide a couple of years ago to ~8000 members today. The decline has been due to a number of factors–questions of relevancy, maybe the bad economy, rising dues, aging membership, etc.

The decline in both local and international membership is causing us to reexamine who we are and what value we bring. In other words, what’s our value proposition?

Our STC Rochester leadership council is working on this issue. What value do we provide to our local members? What value do we provide to our community, especially to local employers?

A key input for redefining our value proposition is understanding who our membership is.

Technical communicators work in a number of fields. We’re not all technical writers. Some of us write marketing materials. Some of us design training. Some of us may be grant writers. Others may work in usability. As the business base in Rochester has changed from large manufacturing companies–Eastman Kodak, Xerox, Bausch and Lomb, AC-Delco, etc.–to a number of small companies, the number of straight “technical writer” jobs available has decreased significantly. In other words, our membership is heterogeneous and requires a wider breadth of programs/activities addressing their needs and interests.

This week we started defining goals for our chapter. We’ll see where that takes us.

Open Mike: Blogging with Mike Hughes

Enhanced by Zemanta

  • 0

Higher Ed, Where’s the Mobile Content?

Category:Higher Education,Infosec Communicator,mobile device,Uncategorized Tags : 

In general, the pace of change far exceeds the ability of any large organization to adapt and adopt, be it a professional organization, an educational institution, or many companies. Mobile content is a good example. Although we’ve know that the rate of adoption is high, in a recent Chronicle of Higher Education Wired blog posting,  Kelly Truong stated that a research study at Ball State University found that about 90% of students were using their smartphones to access the internet.

At the Rochester Institute of Technology, we’re seeing some movement towards providing mobile content, including online coursework. The E. Philip Saunders College of Business has also designed a smartphone app for their students.

Do you use a smartphone to access the internet? Are you happy with the experience? Are any of your companies/colleges, etc. designing web pages for mobile users? Are you designing coursework for mobile users? Developing any corporate apps for iPhone, Android, Blackberry, etc.?

Enhanced by Zemanta

  • 1

Best Security Awareness Videos for College Students

Category:Facebook,Information Security,Infosec Communicator,Internet Safety,Social Networking,Uncategorized Tags : 

Each fall, the RIT Information Security Office provides a Digital Self Defense orientation to first year students. The session helps the students understand the information security threats they will face. We also communicate their responsibility for keeping themselves and others safe online. As you might imagine, keeping the attention of these students midway through their orientation week can be challenging. To help hold their interest, we use a number of security awareness videos in our presentation.

The list of videos below includes an amateur and professional videos and student-created entries in the EDUCAUSE Annual Security Video contest.

Video resources

Facebook Stalker
https://www.youtube.com/watch?v=wCh9bmg0zGg

The Onion: Facebook, Twitter Revolutionizing How Parents Stalk their College-Aged Kids https://www.theonion.com/video/facebook-twitter-revolutionizing-how-parents-stalk,14364/

Weird “Al” Yankovic Virus Alert
https://www.youtube.com/watch?v=zvfD5rnkTws

Identity Theft for Criminals student video
https://www.youtube.com/watch?v=agmHVBJL_fk

Check out the EDUCAUSE Video Contest Page on Facebook for more videos.

If you know of other good security awareness videos, please add a comment!

src=”https://media.theonion.com/flash/video/embedded_player.swf” type=”application/x-shockwave-flash” allowScriptAccess=”always” allowFullScreen=”true” wmode=”transparent” width=”480″ height=”430″ flashvars=”videoid=14364″>
Facebook, Twitter Revolutionizing How Parents Stalk Their College-Aged Kids

  • 3

Is “Secure Mobile” an Oxymoron?

Category:Information Security,Infosec Communicator,mobile device,Risk Tags : 

If you haven’t noticed, mobile device use is pretty much ubiquitous. Apple iPhone/iPod/iPad, Windows Mobile, Palm, Google Android, Blackberry–all of these device families have their own Operating Systems that could be exploited by an attacker.  Yet, we’re seeing more and more mobile device use in business settings.

SMobile published a white paper yesterday (6/22), Threat Analysis of the Android Market,  about the ~20% of apps available from the Google Android Market that are granted permissions to potentially exploitable features/information when they’re installed. As they point out, it’s pretty easy for an attacker to encourage a potential target to install a seemingly innocent application when that application is available from the Google Market and was never vetted for security issues.

Another big issue is how easy it is to lose a mobile device. If the device is not encrypted, any confidential or private information you’ve placed on the device is at risk. If you’ve cached login credentials to your institution’s network, an attacker has easy access.

We’re working on developing mobile device security guidelines for use in accessing our university data. Because almost all devices are individually-owned and pose their own unique security risks, it’s hard to develop a one-size-fits-all policy. We’re looking at both general and device-specific guidelines.

I’ve included a preliminary draft below, parts of it based on materials developed by EDUCAUSE member institutions.  What would you add or subtract? Is it a good approach?

General Guidelines for Mobile Device Use

  • Configure mobile devices securely. Depending on the specific device, you may be able to:
    • Enable auto-lock. (This may correspond to your screen timeout setting.)
    • Enable password protection.
      • Use a reasonably complex password where possible.
      • Avoid using auto-complete features that remember user names or passwords.
      • You may want to use a password safe application where available.
    • Ensure that browser security settings are configured appropriately.
    • Enable remote wipe options.
      • If you’re connecting to the university email with ActiveSync for email and calendaring, you may be able to wipe the email and calendaring information from your device remotely.
      • Third party applications may also provide the ability to remotely wipe the device.
    • Ensure that SSL protection is enabled.
  • For improved performance and security, register your device and connect to the university WPA2 network where available.
  • Disable Bluetooth (if not needed). This will help prolong battery life and provide better security.
  • Keep your mobile device and applications on the device up to date. Use automatic update options if available.
  • Install an antivirus/security program and configure automatic updates if possible. Like computers, mobile devices have operating systems with weaknesses that attackers may exploit.
  • Use an encryption solution to keep portable data secure in transit and at rest. WPA2 is encrypted. 3G encryption has been cracked. Use an SSL (https) connection where available.
  • Take appropriate physical security measures to prevent theft of mobile devices.
    • Never leave your mobile device unattended.
    • Report lost or stolen devices and change any passwords immediately.
    • Include contact information with the device.
      • On the lock screen (if possible). For example, “If found, please call 585-475-HELP.”
      • Engraved on the device.
      • Inserted into the case.
  • Know your mobile vendor’s policies on lost or stolen devices. Know the steps you need to take if you lose your device. Report the loss to your carrier ASAP so they can deactivate the device.
  • Use appropriate sanitization and disposal procedures for mobile devices.
Enhanced by Zemanta

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 2,235 other subscribers

Categories

Support Introverted Leadership on Patreon

Blubrry affiliate banner