Thursday, October 14, 2021

Group Decision Making: Delphi vs. Structured Dialogic Design


The Delphi Methodology is a systematic approach towards group decision making. The Method relies on leveraging the knowledge of a group of individuals on a particular topic. First, the research topic is selected. Each member of the think tank is invited to provide foundational input as to the key areas of influence in the research. The results are submitted anonymously and the results are tabulated. Once an extensive list of content is generated, the list is redistributed to the original group. The original group then rates the list items by order of importance. The rating is again submitted anonymously. The ratings are tabulated and redistributed to the group. The group then has a final opportunity to justify their rating and why they agree or disagree with the rating (Yousuf, 2007).

The Structured Dialogic Design (SDD) is considerably different than the Delphi Method. SDD relies on think tank participants to physically be co-located for the duration of the decision making process. Each researcher enters with some knowledge on he topic and an understanding they will partake in an open, constructive conversation. Researchers discuss the problem at hand while notes are taken from each perspective shared. The researchers may utilize clustering techniques to recognize similarities in concepts shared. Researchers will also attempt to prioritize the presented results. The items are challenged against one another such that item 1 should be compared against the utility it may provide to item 2. This method is designed to prevent voting based on inherent bias or by topic popularity (Laouris, 2012).

 

References

 

Laouris, Y. (2012, 01/01). The ABCs of the science of structured dialogic design. Int. J. of Applied Systemic Studies, 4, ied Systemic Studies. https://doi.org/10.1504/IJASS.2012.052235

 

Yousuf, M. I. (2007, 2021-01-08). Using Experts` Opinions Through Delphi Technique. Practical Assessment, Research & Evaluation, 12, 4. https://coloradotech.idm.oclc.org/login?url=https://www.proquest.com/scholarly-journals/using-experts-opinions-through-delphi-technique/docview/2366825149/se-2

Image: https://pixabay.com/photos/compare-comparison-options-choice-5201278/

Wednesday, October 13, 2021

Horizon Report Analysis


The Horizon Report provides a structured platform for analyzing the suspected future state of trends while also providing guidance on future areas of interest. This report provides insights into future trends, key technologies and potential scenarios. Each of these areas provides an in depth analysis of what is yet to come.

The 2021 Horizon report discussed the technological drive towards preserving data integrity. The report assessed the critical role data integrity plays in maintaining authenticity. Data integrity may be maintained even when data confidentiality and availability is compromised. However, social and political forces may question the integrity of data that has become unavailable or if it has lost confidentiality. Political forces may question how the integrity of the data can be guaranteed while availability of the same data was compromised. While these two features are not directly related, these social forces may tie these perceptions together (Educause, 2021).

While data integrity concerns may loom, the Horizon report also provides insight into the shortage currently being experienced in the information security workforce. The demand for skilled professionals is estimated to grow more than 30% from 2019 to 2029. The lack in availability is predicted to lag substantially behind the estimated demand. It is critical for universities to prepare students to face this very shortage (Educause, 2021).


References

Educause. (2021, February 9). Horizon Reports: Identity and access management. Library | EDUCAUSE. https://library.educause.edu/topics/cybersecurity/identity-and-access-management

Image: https://pixabay.com/illustrations/sunset-sea-horizon-sun-sky-ocean-298850/

Sunday, October 3, 2021

Blog Name and Purpose

 The Hidden Layer

Basic AI Node Structure
 
This blog is titled "The Hidden Layer". This name refers to the layer of nodes in an Artificial Intelligence infrastructure that are the core of the model. This layer of nodes interprets the inputs and applies the trained model to the values to deliver a decision through the output.

This blog aims to replicate the mindset of the hidden layer. Through this blog, I aim to analyze technology as it is, leverage supporting data and trends, and make new predictions for what is to come. Technology is an ever changing industry with economical, ethical, societal and legal restrictions that shape both the current state and future opportunities. Through this blog, I intend to dive into how these forces may influence the future of technology.


Innovative Concept Video

https://animoto.com/play/glxk4zreI8HR2GHspn0ABQ