Donald Norman (1998) advocated the concept of invisible technology, however, as the design of information technology has developed and technology has become invisible, information has also lost is visibility. Action is needed to make information visible in information technology.
Email is perhaps one of the biggest contributing factors to information overload for many people. It has become the standard approach for communication, providing a record that contact was attempted and evidence, though unreliable, of whether the communication was reciprocated. This blog explores unwanted email and how to deal with the information you want or […]
2014 was again fraught with news stories of information being lost and the associated security risks that may arise from the loss. While public concern continues to rise about the security and privacy of electronic information from potential cyberattacks, key information challenges for 2015 should not be restricted to cybersecurity. The need to address information […]
Paddington Bear is known for being polite and well meaning, if a little accident prone. The fictional character created by Michael Bond in 1958 is the subject of a film released today in the UK. What lessons from Paddington Bear can we learn about managing information?
At a recent meeting, a committee was presented with some data. It took only a cursory glance for all members to recognize that the data were wrong and for these views to be vocally expressed. The Chair calmly said,
“Is ‘Big Data’ Just a Marketing Puff Term?” was the contentious title of an email circulated by ebulletins.co.uk. I am currently working with 25TB of data, so am I working with Big Data?
Plagiarism and forgery are at opposite ends of the declared ownership spectrum. Plagiarism involves attempting to present the work of others as if it were your own. In contrast,
In this inaugural blog post I am reminded of a comment that I made in my inaugural lecture some years ago: ‘just because you can, does not mean that you should’.