Discover how mastering email communication can boost business efficiency, avoid common pitfalls, and ensure secure, respectful online interactions.
Turkey Revenge
The turkeys are pissed this Thanksgiving they are seeking revenge.
Germs Infest 60% of Americas Phones
60% of Americans sleep with their phones, harboring germs. Cleaning regularly with UV sanitizer or alcohol wipes can help keep your phone and bed germ-free.
Smartphone Sanitizing: A Practical Guide
Securely erase personal data from your old smartphone before recycling. Protect your identity from hackers—easy steps to follow.
Why Soft Skills Matter in Today’s Job Market
Boost your career with essential soft skills like communication, teamwork, and emotional intelligence. Learn why they’re crucial for workplace success.
R Social Networks Bad 4 U?
The average U.S. Facebook user spends 6.5 hours a month on the site. There is growing global evidence that using social networks have a negative impact on their users. Not only do social networks open their users to malware (PDF) and identity theft, but the latest research from around the world suggests that social media can impact user’s emotional well-being.
BuzzFeed reports that social scientists at the University of Michigan looked at the impact of social networking. The UofM researchers released new research that using Facebook can make you feel bad. The U of M research published in the online journal Plos One found that Facebook use predicted declines in the well-being of surveyed participants.
The Michigan research indicates that using Facebook negatively impacts how people feel from one moment to the next. It also impacts their overall life satisfaction. As UM social psychologist Ethan Kross explained to BuzzFeed:
“On the surface, Facebook provides an invaluable resource for fulfilling the basic human need for social connection. Rather than enhancing well-being, however, these findings suggest that Facebook may undermine it.”
BuzzFeed points out that the results are just another piece in a larger stack of evidence. The evidence says that increased hours per month spent on Facebook could have a harmful effect on our lives. Professor Kross told the LA Times, “We measured lots and lots of other personality and behavioral dimensions … none of the factors that we assessed influenced the results. The more you used Facebook, the more your mood dropped.”
The Michigan study tested for and discounted alternative reasons that might account for Facebook’s negative impact on happiness. However, the article claims the deceased life satisfaction of Facebook users has more to do with behavioral patterns than the service itself.
The article equates Facebook use with gambling. The author cites Alexis Madrigal‘s article in the Atlantic, “The Machine Zone.” The Atlantic article says that Facebook users, similar to those who play slot machines, are unwittingly lulled into a time-distorting rhythm. They are lulled by repetitive and sometimes rewarding tasks — like looking at an endless stream of your friends’ photos. This behavior can mimic the deleterious effects of gambling and even addiction. The article claims this kind of problem stems from Facebook’s savvy design and engineering. Facebook takes advantage of how humans are wired to keep users on the site.
Social networks in China
TechEye also points out a study from researchers at China’s Beihang University. The Chinese study claims social networking sites are generating a lot of anger. The study, by Rui Fan, Jichang Zhao, Yan Chen, and Ke Xu, examined human emotions on China’s Twitter-like microblogging site Sina Weibo.
After reading 70 million messages from 200,000 users of Weibo, the researchers found that anger spreads faster and wider than other emotions like joy. The TechEye article suggests that posts you write out of anger will have more impact than those expressing happiness. The researchers also found that users with a larger number of friends have a more significant sentiment influence on their neighborhoods. According to the article, the Chinese researchers found that anger among users correlated much higher than that of joy. They concluded that angry emotions could spread more quickly and broadly in the network.
If a user sent an angry message, researchers looked at how likely the recipients were to also send out an angry message or retweet the same emotion. The BuzzFeed article also references a German study. The German study found that Facebook’s social pressures created noticeable stress and feelings of envy. These are emotions that could, ultimately, lead to people abandoning the social network.
Social networks FOMO
A Pew Research Center report released in May 2013 reinforces the risks Facebook faces. According to BuzzFeed, younger users told Pew the stress of needing to manage their reputation on Facebook contributes to their lack of enthusiasm for the social network. Nevertheless, the site is still where a large amount of socializing takes place. The teens reported feeling they need to stay on Facebook to not miss out.
The BuzzFeed article concludes that future social media networks will have to figure out have to survive if they make us sad. The question isn’t exclusive to Facebook. In a recent survey, social media as an industry ranked third to last in consumer satisfaction. Social networks ranked below the airline industry. They state that it’s not hard to imagine a future where users will demand social platforms that are not only intensely engaging but also keenly aware and respectful of how our psychological state works.
As Madrigal notes in his post, “fighting the great nullness at the heart of these coercive loops should be one of the goals of technology design, use, and criticism.” Facebook has succeeded in its mission to connect the world. But we’re only beginning to understand what that means for humanity.
Related articles
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
Farewell to Steve
Now that Microsoft’s (MSFT) CEO Steve Ballmer is on his farewell tour. GigaOM has an article “In Defense of Steve Ballmer” it’s an interesting read. However, I plan to commemorate Farmington Hills’ own Steve’s departure from MSFT in his own way.
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
7 Project Manager Personalities
NerdGraph posted this infographic put together by Zoho who came up with the following characteristics of a Project Manager; Micro-Manager, Overachiever, Superhero, Strategist, Macro-Manager, General, and Mentor. My Project Manager characteristics tell me I am part Strategist, part Macro-Manager and part Mentor.
What do you think your PM characteristics are?

Find more great infographics on NerdGraph Infographics
rb-
I have used Zoho products in the past, their help desk product is adequate (no global search of the database from the front end), it is their sales process that needs help. They would not send me a module-by-module quote. I ended up in a chicken and egg conversation where the sales guy wanted to know the modules I wanted before he would quote me – and I needed a quote so I could figure out what I was going to buy. In the end, we bought nothing and my recommendation was to replace the entire system.
Some way to treat an existing customer!
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
BYOD Love Affair Waning?
Tom Kaneshige at CIO.com warns that the “Bring Your Own Device” love affair is coming to an abrupt and bitter end, and the lawyers are circling. He argues that in the early days of BYOD, say, last year, employees, especially Millennials, fell madly in love with the idea of using their own Apple (AAPL) iPhones, Google (GOOG) Android smartphones, and newfangled tablets for work. Finally, they could finally ditch corporate-issued BlackBerrys (BBRY).
BYOD ushered in a new era of consumer tech in the enterprise, one that promised employees and employers will live happily ever after. But the BYOD romance has suddenly turned sour. Employees are questioning corporate intrusion on their personal devices. Did IT turn their beloved smartphone into a spy that tracks their whereabouts? The article says employees are beginning to sense companies taking advantage of BYOD by intruding on personal time to get free work time.
Now they’re thinking about suing. John Marshall, CEO at AirWatch, an enterprise mobile device management (MDM) vendor with 6,500 customers, told CIO, “I anticipate a bunch of little [lawsuits], then something big will happen that’ll be a class action and become headline news.”
CEO Marshall reports that the suits have already started. A federal case in Chicago is winding its way through the courts which claims that the city owes some 200 police officers millions of dollars in overtime back pay. The case centers on allegations that the city pressured officers into answering work-related calls and emails over department-issued BlackBerrys during off-hours.
There’s no question BYOD blurs the line even more between work life and personal life. The Airwatch CEO not surprisingly recommends a Mobile Device Management (MDM) application to control email delivery to BYOD devices. This way an employer can set a business rule that won’t allow delivery of corporate email to a subset of users during off-hours. Or a CIO can address this issue in the BYOD terms-of-use agreement. (rb– Both would be best)
The CIO article offers up another legal nightmare scenario: Lacking MDM tools to block out what can and cannot be seen on a BYOD smartphone, a help desk technician notices that an employee’s device has a lot of personal apps about a health problem—and mentions his concern to the employee in the cafeteria.
“The employee can say, ‘How in the world did you know that?‘” Mr. Marshall says. “All of a sudden, something that’s very benign and innocuous turns into something that’s blown out of proportion.” (rb- Help Net Security cites recent U.S. DHSS seven-figure settlements from healthcare institutions that failed to protect patients’ health information under HIPAA regs.)
Mr. Marshall recommends a comprehensive BYOD terms-of-use agreement, along with transparency about the capabilities and limitations of the technology, will help ward off such scenarios. The IT staff also needs to be educated about their role in a BYOD environment.
However, this doesn’t mean problems won’t crop up. Part of the problem, the article indicates, is that BYOD often puts business unit managers who aren’t well-versed in technical user agreements in a leadership position with mobile apps. They’re likely to give the green light to rogue mobile apps that violate such agreements.
For instance, employees are chiefly concerned about privacy and especially location-based services with BYOD, and so many user agreements stipulate that apps will not collect location-based information. But someone who wants to be helpful, builds a map app for the corporate campus that allows employees to schedule conference rooms and find safety information, such as where to go if there’s a tornado. Airwatch’s Marshall explains:
Maybe there’s also a button on there that says where you are in the campus … All of a sudden people wake up and realize that every single device using that app is collecting location-based information—that’s an issue. These are really plausible scenarios … There’s so much copy and paste and reuse of all these components that these things can happen very innocently.
Then there’s the dreaded remote wipe, which can land a company in some legal hot water according to the article. Help Net Security says there is little to no case law in this area. CIO.com reports that just last year, CIOs said they felt comfortable with BYOD because they held security’s holy grail: remote wipe, a scorched-earth capability for wiping all data on a mobile device.
But employees weren’t happy with the idea that the company can wipe personal data on their personal device. Some employees refused to take part in the BYOD program for this reason. Others waited days or weeks before reporting a lost or stolen device so that IT wouldn’t wipe it.
MDM software advanced quickly and seemed to come up with a fix. Now companies can wipe only corporate apps from a BYOD smartphone or tablet, leaving personal apps untouched. In fact, AirWatch won’t even allow a full device wipe anymore for legal reasons. While this helps tremendously, it doesn’t completely solve the problem.
Mr. Marshall proposed a scenario where a company buys the popular productivity app, Evernote, for employees to put on their BYOD smartphones. Since the company paid for the app, the company can remove it at any time. The note-taking app collects company data but also might store personal data, too. An employee can use Evernote to create a shopping list, recipes, vacation plans, or perhaps something more critical to their job.
Guess what happens to this personal data when the employee leaves the company? The app, along with all the data, is wiped from the device and account. If the BYOD terms-of-use agreement about Evernote wasn’t spelled out clearly, who is liable for the lost data?
The bloom is off the BYOD rose, and so companies had better add protections against employee lawsuits in the BYOD terms-of-use agreement and leverage MDM to make sure the agreement is followed.
Truth is, employees tend to get a bit emotional when their privacy is violated or their location is tracked via a mobile device that they personally own. They don’t like their personal data to be wiped, either. When these things happen, companies can expect the wrath of a scorned employee. “That’s where it gets tricky,” Mr. Marshall told CIO.com.
Tony Busseri, CEO of Canadian digital security firm Route1, told Help Net Security:
Along with security concerns, BYOD has brought the potential of major legal issues for the Enterprise … Many current BYOD corporate policies leave enterprise data unprotected in the event of a security breach and during an employee’s exit from the company. The policy of tracking and wiping an employee’s personal device opens the enterprise up to the potential for mass litigation.
rb-
Misco in the UK reported that the majority of employees will not cooperate with employers’ BYOD efforts. According to the data:
- 82% of the survey participants viewed their employer’s ability to track their location as an invasion of privacy;
- 82% are concerned or extremely concerned about having their browsing history monitored;
- 76% stated that they would not allow their company to view the applications installed on their personal mobile devices;
- 75% said they would not go along with an installation made by their employer;
- Only 15% had no concerns about employers tracking activities.
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.
2013 Most Dangerous Celebrities Online
Anti-malware firm McAfee has released it annual Most Dangerous Celebrities list and daughter of rock musician Phil Collins actress Lily Collins is 2013’s most dangerous celeb to search for online. Ms. Collins has starred in such classic movies as “Mirror, Mirror” and “The Mortal Instruments: City of Bones” unseated “Harry Potter“ star Emma Watson who topped the list in 2012.
Rank Celebrity Risk %
1 Lily Collins 14.5
2 Avril Lavigne
12.7
3 Sandra Bullock
10.8
4 Kathy Griffin
10.6
5 Zoe Saldana
10.5
6 Katy Perry
10.4
7 Britney Spears
10.1
8 Jon Hamm
10.0
9 Adriana Lima
9.9
10 Emma Roberts 9.8
Female celebrities were the overwhelming lure to malware; “Mad Men” star Jon Hamm was the only man in the top 10. A person could be led to malware after doing a general search and clicking on dubious links, but risks increased when searchers added phrases like “free apps” or “nude photos.”
To better protect yourself on the web McAfee suggests:
- Be wary of links to free content or too-good-to-be-true offers
- Be extra cautious when searching on hot topics, which often lead to fake and malicious sites created by cyber-criminals
- Check the web address for misspellings or other clues that the link might lead to a phony website
- Protect yourself with comprehensive security, including a tool that identifies risky websites in search results
rb-
This is an annual thing from McAfee, but nobody pays attention. I covered Heidi Klum in 2010, Cameron Diaz in 2011, and Emma Watson in 2012.
Ralph Bach has been in IT long enough to know better and has blogged from his Bach Seat about IT, careers, and anything else that catches his attention since 2005. You can follow him on LinkedIn, Facebook, and Twitter. Email the Bach Seat here.