Happiness_HeaderI had a wake up call the other morning. A colleague of mine – someone I consider an informal mentor and a major player in the profession – sent me an email a few minutes after I had posted an article on this site. She wrote, “Steven, what’s your Twitter handle? I think I’ve been tweeting these out using the wrong one!” I was caught. There was no elegant way out other than to dash to Twitter and create an account. Here someone had been paying me the supreme compliment by reposting my blog articles, and I was off napping in the weeds (metaphorically speaking, of course) with no Twitter presence. Say “Hello” to @TheBIMuse.

As I have mentioned before, my relationship with social media is uncomfortable on a good day, so adding yet another medium was intimidating. To be honest, it is going to take some time to find my level on Twitter. There is a very low signal to noise ratio, which I see as the main challenge for me to manage. Still, a gem will pass the window every now and again.

1-800 Got Aphorism?
Because of the 140-character limit on a post, #Twitter is a haven for the shallow #aphorism. My Twitter feed is littered with them like a field of #dandelions. And the older I get, the more #cynical I become about them. Do they really mean what they seem to mean? Because of the enforced brevity, have we turned an otherwise profound thought into #nonsense? Such was the case with one post. It read, “Success does not guarantee happiness.”

On the surface of it, the statement reads like a #truism. Of course success does not guarantee happiness. But if you let the #cynic demand that you define both “success” and “happiness,” the picture crumbles into confetti. Several of us picked up that definition ball and ran with it, and in the rapid little world of Twitter it ended with “Happiness is living your values” followed by “Success could be defined as living your values too.”

This brief exchange of ideas starting me thinking about what “happiness” really is and about its role in our lives and work. Why do we care so much about it? Why do we strive so hard to achieve it? In reality, I can only speculate about what happiness is for anyone else, so I will try to confine my metaphysical musing to my own experience. That said, I think the tweeter who posted “Happiness is living your values” came closest to nailing it for me. But even then, the phrase does not really capture the essence.

The Value of Values
What does it mean, “Living our Values?” I consulted my unabridged Random House dictionary for the meaning of “values” in order to establish a starting point. Get this: “…the ideals, customs, institutions, etc., of a society toward which the people of the group have an affective regard.” This is not very helpful and almost begs for a definition of the definition. I will cut to the chase. The reason that any society or group or individual holds anything in “affective regard” is because it delivers meaningful value to that group or individual. Values, therefore, are those behaviors we have identified that will achieve those conditions of meaningful value.

I used the word “behaviors” deliberately. A value cannot truly be a value if it is not actionable. If I value family, then my values are those actions I want to take in order to nurture my family and its members. If I value my integrity, then my values are those actions I want to take (or not take) in order to keep that value intact. Values cannot be passive; they must be active in order to be real. The more we are able to act on these values, the more fulfilled – the happier, perhaps – we are as human beings.

Because values guide how we might act, they are a key element in decision-making. In particular, values drive prioritization because they illuminate the expected return. If your values align more closely with profit than family, your prioritization of the family vacation on the calendar may be affected. We are confronted every day with choices requiring us to act based on our values.

Logical Values
Going back to the original question, though, let us test the syllogism with this new paradigm.

If success is living one’s values AND
If living one’s values delivers meaningful value AND
If happiness results from meaningful value THEN
Success delivers happiness

It is a well-formed syllogism, to be sure, but something is still wrong. It presumes that the person in question actually knows and understands his/her values. If a person believes that the accumulation of wealth will bring them happiness and it does not, then it is clear that there are one or more higher values toward which the person is not working, probably because they have not identified them. Let us adjust the syllogism.

If a person accurately understands his/her values AND
If all success is living one’s values AND
If living one’s values delivers meaningful value AND
If happiness results from meaningful value THEN
Success delivers happiness

I have gone to a great deal of trouble just to disprove the original aphorism. I have done this more out of puckish mischief than the need to elucidate any significant insight. Still, two truths emerge from the frippery. First is the importance of actively living one’s values in the pursuit of #happiness. The second is to beware the superficial #aphorism. You may find that you are not saying what you thought you were.

How do you keep your organization’s values at the front of mind? Do you find a correlation between values and fulfillment?

And by the way, how do you sort the value from the dross on #Twitter? Any #hints?

For those of you seeking happiness on the job, check out Tennis ball.



Here’s Looking at You, Kid

In my last article, I mentioned that our ability to mine unstructured data presented some new issues with respect to digital privacy.  This resonated for one of my readers who raised some good questions on the subject.  That prompted me to think seriously about my own personal computing habits, my personal online exposure, and the ethics surrounding how all of these data touch points are used by total strangers for purposes over which I have little control.  Being a Business Intelligence professional as well, this raised a mirror to my face.

My first step was to take stock of my own online habits and digital exposure.  I have resisted convergence for years, so I’m not nearly as connected as others may be.  Still, I was shocked at how wired-in I really am, and how potentially exposed.  For purposes of this discussion, I present a short list.  I may as well be honest about it.  It is all out there already.

  • Social Media (personal):  Facebook and Quora
  • Social Media (professional):  LinkedIn and Facebook
  • Email:  A personal account, one for my firm, and at least one at each of my clients
  • Instant Messaging:  Skype
  • Blogging:  WordPress
  • Online data storage:  Amazon S3 and DropBox
  • Active online vendors (one or more purchases per month):  5
  • Periodic online vendors (one or more purchases per year): ~30
  • Devices:  Smartphone and iPad
  • Web sites: One for my firm as well as a family site
  • Online banking and investment data

That is a lot of digital me in cyberspace. And while there is no clear legal definition for digital privacy yet, I have my own ideas about what it should be.  First, this is my content and it belongs to me.  Consequently, it should be mine to control and to decide how it is used and shared, and who may use and share it.  For those services for which I pay, this goes without saying.  Not so for the majority of these digital relationships.  These are the free ones, with the services deriving their income from advertising or other means.  This means that in exchange for the free service from which I derive value, I give up some measure of privacy.  And that is the crux of the matter.  What is that measure?  How do I trust that each of these services will make ethical use of my personal information?  Where will each of them draw the line?

The answer, of course, is that each entity draws its line in a different place, and not always where one would expect or desire.  Here are three examples.


Congress passed the Electronic Communications Privacy Act (ECPA) in 1986 to protect electronic communication such as email from being accessed by law enforcement without a judicial warrant.  But the Act was written for the technology of the time, and Federal law enforcement agencies have not had to play by the rules you and I would expect today.  Any electronic communication older than 180 days is subject to subpoena without a warrant, bypassing any requirement of probable cause.  Any more recent mail that is opened, as well as email drafts, are included.  Warrants are required only for email that is both unopened and less than 180 old and in this day and age, there is no such thing. The case of former CIA Director David Petraeus is a perfect example of the consequences of such unregulated access, which resulted in the destruction of careers and relationships.  The good news is that Senator Patrick Leahy introduced a bi-partisan amendment to the ECPA in March that will require a judicial warrant for any email.  It is a step in the right direction, but it is not law yet.

Social Media as Big Brother

On October 1, 2012 a new law went into affect in Maryland prohibiting employers from being able to require that applicants or employees turn over personal social media credentials.  This came following discovery that a government agency had made it a mandatory condition of employment.  Unfortunately, the legislation does not extend to students at either public or private educational institutions.  The practice is particularly widespread in collegiate athletics, where athletes are often required to “friend” a coach or advisor, who is then responsible for monitoring their online lives.  In some cases, they are required to divulge their account passwords.  It is an outrageous violation of first amendment rights just by itself.  It is also a violation of the Terms of Service for most social media services.  While many states are following Maryland’s lead, we are far from securing our digital privacy on this front.

Google vs. CNIL

When Google first announced the consolidation of its security policies in early 2012, cries of Foul! went up all over, but no louder than in Europe.  CNIL, the French data protection commissioner, agreed to take the lead for the European community to investigate the implications and legality of the changes.  “By merging the privacy policies of its services, Google makes it impossible to understand which purposes, personal data, recipients or access rights are relevant to the use of a specific service.  As such, Google’s new policy fails to meet the requirements of the European Data Protection Directive (95/46/CE) regarding the information that must be provided to data subjects.  Google should supplement existing information with processing- and purpose-specific information.”  Google unilaterally implemented the changes in March 2012 as planned, and has yet to materially address the European concerns.  In the latest development, individual countries are launching their own independent actions.  Here again, we come down to a vague line of trust that the stewards of our personal information are respecting our rights.

What is interesting about these three examples is that while highlighting the legal and ethical fuzziness of what personal digital privacy is, in all three cases we are talking about the good guys.  These are not the criminals who hack into our accounts, steal identities, and wreck mayhem.  These are our service providers, our law enforcement officials, our governments, and our educational institutions.  What is our digital vulnerability from the bad guys?  They do not need our putative permission (passive or otherwise) to look into and disrupt our lives.  If they can hack into the Pentagon, they can certainly hack me.  And it doesn’t take much of a geek to track my IP and know whether I’m in San Francisco or Sequim.

So what does this mean for those of us who are practitioners of Business Intelligence?  In many respects, we are integrally entwined in this debate.  Especially as we march into the future of Big Data computing, we will be dealing increasingly with unstructured data, mining it and monetizing it for the benefit of our clients and employers.  As we do so, we will be forced to draw our own ethical lines with regard to what we know about individual people and what we do with that knowledge.  That is a huge responsibility and the lines are both delicate and vague.  Let me illustrate with two more examples.

I enjoy the “anonymity” of shopping online.  It is fast, convenient, and offers a range of options impossible in a conventional store. But every single click is being tracked.  Every item I look at is being recorded (irrespective of my reasons for doing so). Everything I purchase is remembered.  Does this bother me?  Well, no and yes.  As long the retailer is using the information only to sharpen my experience and build my loyalty, then it doesn’t.   If that information is being used in some other way, or is being shared, then I most certainly do mind, particularly because the profile might be harmfully erroneous.  My shopping and buying habits could be easily and, frankly, seriously misconstrued.  That brings me to my second example.

I never click through the ads on Facebook, even if something interests me. But I don’t ignore them either. I am fascinated by what Facebook thinks it knows about me. For instance, FB knows that I play the piano and so I see ads for shady “get proficient quick” piano lessons.  It has not figured out that I have a degree in piano performance, which indicates that FB may not be using my profile data.  It knows that I have some hair loss so I see a persistent ad for a spurious miracle cure. It knows that I visited a particular web site in early February looking for the perfect Valentine’s Day gift and now there is an ad from that retailer suggesting that I need some “summer flirt factor.”  During the elections last year, FB thought it knew my political party.  It was 100% wrong.

So here’s my point.  The danger to me – and to all of us – is not just when and how my data are being used, but also how they are being interpreted.  I’m inclined to be forgiving for now because my relationship with my online providers is symbiotic and none have crossed the line as far as I know.  Besides, the imp in me thinks it is hysterical that FB has me pegged as a bald female libertarian.  And yet, is that really so funny?  It demonstrates just how easy it is to reveal facts that are inappropriate or that could lead to incorrect or even harmful conclusions. I think it is vital for all of us to be aware of and participate in the digital privacy debate, and continually examine our own ethical compass.  I think we need to be cognizant, informed, and proactive in both our personal online practices as well as our professional lives.  I think we need to be ready to act when that line is crossed and our personal information ceases to be our own.

I put it to you.  What steps do you already take to secure your personal information and protect your online footprint?  More important, what steps can we all take now to raise the profile of this debate in our industry?