Making the USPS Irrelevant One Disastrous Decision at a Time!

The viral post office | Viral post, Post office, Postal policeBy now, it is apparent that the USPS has utterly failed in its primary job of delivering the mail.  That the US PS has been failing for my entire life is a topic the politicians do not want to discuss.  That the business model the USPS is based upon has never been a profitable one, the overhead is disastrously expensive, and the labor costs beyond exorbitant are also not topics the politicians ever want to discuss.  They prefer smoke and mirrors, purple squirrels, and Hollywood celebrity scandals to actually doing their jobs.  But, I digress; last week, the USPS announced that postal service would revert to the slowest it has been since the 1970s, and the cost for that dismal service is going to increase dramatically.

All weekend the reasons for the USPS being in this fix have been stewing in my mind, and I would like your insight as I discuss the main reasons why the USPS is in such bad shape.  Feel free to disagree.  Feel free to comment.  Feel free to ask questions and research further.  To my mind, the most damning problems to the USPS come from the following areas, too much overhead, labor union expenses, business model, and no clear political place in government.Save the US Postal Service! By a zillion dollars comics | Politics Cartoon | TOONPOOL

Labor Union Expenses

Let’s get something clear, the labor unions in government are living high on the hog of taxpayer forced taxation and mandated union dues.  Consider the following comment from Representative Dennis Ross.

“UPS (Union) – about 66% of their total operating costs are labor. FedEx (non-union) – about 45% of their total operating costs are labor. USPS – 80-82%.”

Here’s the rub in comparing UPS, FedEx, and USPS; they are not apples and apples; it’s more like apples to rocks.  Why?  Because UPS and FedEx must show a profit to shareholders at the end of the year; thus, anytime USPS runs into an unprofitable situation, they rely upon USPS to fill the gap.  FedEx operates slightly differently based on its business model. From observation from living in extreme rural areas, it does not appear to rely upon USPS as often to cover the gaps in service.

However, the labor costs at USPS continue to run extremely high, and the excuses for these labor costs continue to run thinner and thinner every year.  Looking at six specific USPS explicit labor union-negotiated labor costs:

      1. Compensation levels – What each employee under the collective bargaining agreement is paid.
      2. Work rules – How often an employee works, who they report to, uniforms, and a host of other processes and procedures, which can and do increase business operating costs.
      3. Contracting – Includes independent contractors, contracts for retail locations, pickup locations, and much more.
      4. Network differences – Differences in the network affect the labor involved in delivery, sortation, transportation, and retail portions of an end-to-end movement.
      5. Capital intensity – Differences in capital requirements affecting the amount of non-labor costs needed to provide services offered.
      6. Congressional requirements – Congressional requirements focus on the aspects of the Postal Service that add more labor costs influencing capital spending.

Hence, if we take Rep. Ross’s statement as accurate, Congress is to blame for some of the added expenses the USPS incurs and the hidden taxes the taxpayer pays to interact with the USPS.  This is why the place in government is such an influential portion of this discussion.  Congress has been pushing the costs of regulating the USPS onto the taxpayer as a hidden tax since the USPS was started. This is unacceptable, especially since the taxpayers did not have a voice in allowing the USPS to become unionized, tripling labor costs year-over-year.P.S.E Context of PA: SWOT Analysis of the United States Postal Service

Please note, when discussing labor costs tripling, we are not just discussing wage earners’ take-home pay.  Labor costs, as shown above, include those six items, plus a host of labor union contracted benefits, plus retirement benefits, plus administrative staff to handle these benefit packages, the regulatory burdens, the reporting burdens, and much more.  Thus, while comparing UPS, FedEx, and USPS is unfair and illogical, the labor costs are pretty close to accurate even though they cannot be compared due to business model, Congressional reporting, and quasi-governmental meddling by politicians.  Any company with 80-82% labor costs will be struggling with labor problems and turning a profit.  Labor costs, fed by a labor union, are a reality that needs rectification and addressing.USPS 2011

Outdated Business Model

2009 the USPS paid a lot of money to have their business model reviewed, and the result was an excellently written document that outlined two potential steps for the USPS to take.  Where is the USPS in adopting either of these actions in 2021; nowhere!  Why has the USPS not taken any action on this document since 2009; Congress!  Item number six in labor costs continues to rear its ugly and monstrous head, and the problem is not so much on USPS; although they indeed share the blame, Congress continues to drag its feet and refuses to scrutinize the government appropriately.Several logos, mottos have represented USPS through the years | PostalReporter.com

When discussing the USPS business model, the industry is discussing “optimizing the last mile” in the supply chain.  That last mile is where the USPS has traditionally filled in the gap and made the final customer delivery.  However, USPS is inefficient, costly, and labor-intensive.  Yet, until science fiction realizes a Star Trek-like replicator in every home, optimizing the last mile is the discussion we need to be having, and solutions are available!

The 2009 business model review offered franchisee options as a business model — what a novel idea.  Imagine getting your mail on your commute route, no more having it delivered to an apartment box, packages waiting on a doorstep for thieves, stop by a convenient place on your regular commute route, and get all your mail.  Why not have your mail delivered to your office?  Then your office mailroom becomes an arm of the post office; it can sell stamps, handling packages, and then you do not have an extra stop at all.  Talk about an employer-based incentive!  Better still, for a fee turning over retail establishments to non-profit groups for work programs.  Guess what; that has the benefit of increasing public outreach and building communities.  Yet, the USPS languishes because Congress refuses to take up serious topics, and our tax dollars are squandered!

Place in Government

Engineering Professor Calculates How Fast The Eagle In The USPS Logo is GoingRead the US Constitution, the US Bill of Rights, other founding documents, wherein is a postal service discussed?  Find me the article claiming we need a Federal Postal Service.  Name me the reason why the Postal Service is required.  Selling stamps, that can be done using a myriad of different methods.  Sending packages, mailing letters, again, many other options are available.  Passports, hundreds of other options are available; why not put that into DMV’s across the US?  Why not simplify the Passport process entirely?

What is the reason for the USPS?  Give me the why and justify the existence for the next 20-years for the USPS.  My entire life, I have been asking why the USPS is needed, and I have been asking this since before email, fax machines, and other technological leaps.

Overhead

USPS TESSWhen was the last time the USPS had personnel layoffs to balance their accounts?  1970, under President Richard Nixon, USPS had a strike, got a unionized workforce, and, as they call it, “a living wage.”  From 1970 to 2021, there has been nothing but problems in the USPS; from retirement benefits costing too much, to labor expenses, to Congressional expenses increasing year-over-year, the overhead does nothing but balloon.  I was recently in a flagship USPS for Phoenix, AZ.  The building is a disgrace, the parking lot is neglected, the lobby is dark and missing half the materials, no forms, no boxes, everything is behind the barred and locked counter, and the retail associates are criminally negligent in their duties.  What’s worse, this was a good USPS office to visit in Phoenix, AZ.

Take an honest appraisal of your local USPS and ask yourself, are your taxpayer dollars represented in your USPS in a manner acceptable to you?  I visited a USPS in Las Cruces, NM.  The design of the building lends a bright feeling to the building atmosphere; the retail area is small and naturally illuminated.  Same problem with retail associates, but not as noticeable.  However, this was also before the latest changes from Washington, where the employees were told it was okay to work slower and charge more.More is Less at the USPS | Freeport Press

It is my personal opinion that the USPS has outlived its usefulness, and it is time for the USPS to be eliminated from quasi-government offices of the United States.  Nothing fruitful can be gained from continuing the charade of the USPS.  Congress needs to return to the states the ability to issue addresses and organize their communities and end the USPS debacle!

© 2021 M. Dave Salisbury
All Rights Reserved
The images used herein were obtained in the public domain; this author holds no copyright to the images displayed.

Advertisement

Let’s Talk – Thoughts on Several Issues

GavelMountainview Medical, the surgical center in Las Cruces, NM., informed me politely that I was not welcome as a patient for my inability to wear a mask.  Once my failure to wear a mask was resolved, I was welcome to return, but I was not welcome until then.  This was made pretty clear to me today (27 September 2021).  Regardless of a wet signature signed letter from my VA-provided primary care provider, I cannot wear a mask, irrespective of the fact that the VA had arranged this appointment and was paying the bill.  I was persona non grata.

One would think that having accepted a contract, the accepter would do everything to fulfill the contract.  Yet, apparently, a mask is sufficient legal cause to forfeit a contract.  Does anyone else find this strange and odd?  Would a lawyer please step forward and explain contract law to me.  When I have accepted a contract, my job has been to fulfill that contract to the best of my abilities or be found in breach and liable for the damages to the contract issuer.Apathy

Changing topics.  I was taught, look people in the eye when speaking to them.  Be honest, forthright, and confident enough as a person to render respect.  I have studied people and psychology for a long time.  I am lost on this topic and if you have insight, please feel free to add your comments below.  Why do women feel the need to either become hostile or play with their clothes, hair, or refuse eye contact when talking to me?  I am not horrendous to look upon; I am certainly not good-looking either.  I am not flirting; I interact with other people for professional reasons; yet, I cannot get people to look me in the eye and have professional conversations.

What has happened to eye contact in American society?  What has happened to confidence in communicating?  Look, I get it; right now, the media has everyone scared to shake hands.  I was raised providing a firm handshake, looking people in the eye, and socially interacting is the highest skill you can learn to succeed.  I was having this conversation randomly the other day, and the other person was scapegoating millennials.  I feel this is 100% unfair as the problem is multi-generational and crosses all industries and situations.  Consider the following, and let’s have this conversation.Einstein

Changing topics.  What is more acceptable to you; all talk and no action, or all action and no talk?  In reviewing some transcripts of a ZOOM meeting where President Biden was in attendance with many Democratic National Committee (DNC) leaders and party flunkies, the president made remarks to the effect that since he was the only one speaking to a point, the DNC should be grateful.  One of the reasons I have been hesitant to expand the blog is that I prefer to be a person of action.  Yet, with my disabilities, I find taking action less and less the course I can physically handle.  Thus, I must find new outlets, and training others is a course of action I am good at.  Thus, the blog was born; but not taken without reservations.

QuestionNow, America finds itself at the mercy of a person who considers himself a person of words and thinks others should be grateful to have his words on a particular subject.  In psychology, this method of thinking is generally classified as narcissistic.  A narcissist is a person full of pride and egoism, which shows extreme love for themselves and only for themself.  I cannot think of a better adjective to describe Joe Biden.  Thus, I wonder about the question posed, do you prefer a person of many words and little action, or do you prefer someone of few words and plenty of action?

Strip politics, identity, sex, gender, and all other adjectives and names from this comparison.  Simply make a distinction between words and no action and lots of action and few words.  Then lay that preference out on the world and make choices based upon that preference.  As a person of action, I prefer other people of action.  I like people of action for actions can always be guided and shifted; words mean everything is stuck awaiting action.  If you prefer words to action, please let me know in the comments section why and explain to me how words are better than action.  I am genuinely interested in and appreciate logic and reason.kpi

Changing topics.  Last week my cousin succumbed to his injuries and passed this mortal coil.  I learned something that made me furious, and frankly, I am still not my “cherub-like self.”  I had always thought my cousins escaped the chains of abuse.  My uncle and aunt on my father’s side are just so tender-hearted and innocent; I thought their kids would escape the evils of abuse so prevalent on my side of the family circle.  Unfortunately, the clutches of sexual abuse tormented their family, and my cousin did not ever receive the training needed to overcome the abuse and was a victim his entire life.

I learned from an early age how to fight.  I was raised to be the last bastard standing in a room full of bastards.  I learned how to win, fight dirty, and be it fists, words, ideas, or weapons, I was going to be the victor.  I grew the antibodies against abuse by being abused.  I do not like admitting this, but it is the truth, plain and simple.  My cousin never got this training, I never knew he needed this training, and his family has suffered incredibly from a guidance counselor in the school district who abused my cousin in the second grade.Grit - Defined

To the abused; I am sorry!  You are now faced with a choice, do you give the person who abused, or is still abusing you, power over the rest of your life, or do you choose to fight and win back your life, dignity, and potential?  That is the only choice you make, and you will make this choice every day for the rest of your life.  How you choose dictates your destiny; do you have gravel in your guts sufficient to take back what was stolen from you or not?  You have friends, associates, and support, but at the end of the day, in the wee hours of the morning, you, and only you, have the power to defeat your abuser, and you must wield the sword to defeat the abuser!Angry Wet Chicken

To the abusers; I detest you!  With all the power I possess, I will actively work against you to defeat you!  There is nowhere you can run, nowhere you can hide, and nothing you can do to evade and escape.  I am not justice; I am simply a man who will not allow you the power to continue to abuse.  I know many like me who are just as committed to seeing you stand in front of a judge and be punished for your crimes, and we will continue to work for this day to our dying breath!

I have met too many abused and broken people who do not understand the simplicity of conquering abuse.  The action is simple, choose to stop allowing yourself to be abused.  The reality and activities to support that choice are hard, painful, and the struggle is real physically, mentally, emotionally, and on every level possible.  But, I promise you, freedom from abuse is possible!  Make the choice to stop allowing yourself to be abused!  Need a friend, contact me; need help, reach out.  There are plenty of people locally and more virtually who understand and are happy to help.  Just allow us to be there for you!Angry Grizzly Bear

The accepted praxis in society is to not talk about abuse and abuse recovery as this is a topic for “someone else” to discuss.  Well, that myth ends today!  Abuse is happening too often to continue to ignore, sidestep, or push it under the table.  Abuse is not just a topic for annual teacher training classes, nurses, and doctors.  Abuse does not just happen to low-income families, bad people, or those who “deserve it.”  Abuse comes in many different types and styles, forms, and methodologies.  The single unifying factor in abuse is a single person who is gaining power over another person through manipulation and dominion.

Sexual abuse is about power and dominion, as well as sexual gratification.  Sexual abuse is NEVER about love, and I do not care if it is male-on-male, male-on-female, or female-on-female; it is always about power, not love!  Physical abuse is always about dominion and power over another person; they are always selected for their weakness.  The abused person is constantly victimized until they cannot live without the abuse, or so they are trained.  Verbal abuse is all about power and dominion, feeding the ego of the abuser on the weakness of those abused.  When directed at another for personal gain, apathy is abuse and needs to be corrected before additional harm and further abuse are committed.

Pornography and masturbation are self-abuse.  Drug abuse is self-abuse, alcohol abuse is self-abuse, and these abuses lead to physical, sexual, verbal, and other types of abuse.  Abuse of self leads to abuse of others.  Abuse of others causes society to detest and denigrate you, exasperating self-abuse and addictive behaviors, which further exasperate drug and alcohol abuse and abuse of others.  Vicious cycle indeed!

Knowledge Check!Agree or disagree, leave a comment and let’s have the conversations that need to be discussed.  Let’s openly discuss root causes and look to create solutions that can generate positive outcomes.  Better, let’s open our hearts and hands to lift and support.  There has undoubtedly been sufficient abuse, torment, anger, and hatred in this world.  We need to find different solutions!

© 2021 M. Dave Salisbury
All Rights Reserved
The images used herein were obtained in the public domain; this author holds no copyright to the images displayed.

The Role of Customer Service – Find Solutions!

Bird of Prey24 September 2021 UPDATE:  For the record, the doctor’s appointment forming the central element of this article was with Advanced Neurology Epilepsy & Sleep Center (ANESC), Dr. Aamr A. Herekar M.D.  The staff are now trying to report that I was threatening, demanding, insulting, and reportedly told the commando secretary to “sit on my lap.”  All of which I strongly and hotly contest.  I was at all times professional, but firm.  I did not swear.  I did not insult the staff.  I did not breach professional conduct.  I have never asked any male or female to EVER sit on my lap.  When told to get a face shield, I went to my vehicle, retrieved the face shield, and wore the face shield for the appointment.  For the commando secretary and other staff to accuse me of this behavior is disingenuous at best and I am glad to be rid of this provider.  If you are in the El Paso, TX., are, beware if you are referred to this clinic!

I do not care if there is a pandemic or not!  I care even less if there is sunshine or rain, wind, snow, sleet, or hurricanes.  Guess what; neither do those people expecting customer service.  They want solutions, and when they do not obtain solutions, that customer will be looking at your competition and wondering if their needs can be met elsewhere.Angry Grizzly Bear

Let me set the scene.  I have a follow-up doctor’s appointment this morning.  I traveled more than an hour for an early morning appointment, which included surviving multiple school zones, crazy rush hour parents trying to get kids into school and themselves onto work, and the inevitable school buses working tirelessly to deliver children to school safely.  All of this I can accept; I agreed to the early morning doctor’s appointment as I need to do things this afternoon.  Upon arrival at the doctor’s office, I am greeted by a commando secretary, who knows I have a breathing problem and cannot wear a mask.  Who invents a reason to deny me care.  She calls a supervisor, then “politely” invites me to a back room to try and tell me off.  She then walks out when I suggested she had two options, move my care to another neurologist or have me wear a face shield, and I was leaning towards option 1.

Since January, this scene has repeated itself more than 10-times in two different states, and frankly, I am sick to death of customer service people who refuse to look first for solutions!  Your first duty in customer relations is to find solutions, not complain someone is not wearing a mask, not embarrass, isolate, and denigrate.  Your entire mission is to find solutions that will work with government mandates, business policies, and customer needs.

?u=http3.bp.blogspot.com-CIl2VSm-mmgTZ0wMvH5UGIAAAAAAAAB20QA9_IiyVhYss1600showme_board3.jpg&f=1&nofb=1For example, I was a new patient at a medical clinic.  I explained my mask predicament, and the business already had a procedure to protect those wearing masks and accommodate those who could not wear a mask.  Better still, it did not require a supervisor, it did not require special approval, I did not have to be embarrassed by office staff judgments, nor did I have to fight for my right to breathe.  Two different medical offices, two wildly different approaches to the same customer problem, and two phenomenally different solutions and different mental strategies from staff to provide customer service.

Was discussing cellphone service providers; provider one has deplorable customer service, provider two is not much better, and there is no third option.  I asked about solutions for small businesses to compare between the two providers and was aghast at the lack of interest in providing help to owner/operator small businesses.  I do upwards of $3600 in cellphone business a year; yet, even though I have five lines personally and pay for an additional one for my spouse, and am a small business owner, the cellphone provider is not interested in looking for solutions for small businesses.  Is it any wonder that customers are looking for options to ditch their phones?

Call Center BeansInternet providers are another huge pain point for me and my business on the topic of service providers and detestable customer service.  After moving, I am paying double for my Internet service connection, not paying double for the same speeds.  Paying double and not getting similar speeds.  Worse, the customer inattention has gone downhill since I was last a customer of this company 18-months prior.  I have been told that deregulation is why Internet providers cannot compete fairly in markets and scoff.  I have been informed, several times, that the reason the costs are so high for Internet connection is from outdated equipment.  I have scoffed again.  When Google tried to muscle into Phoenix, the current Internet providers threw an unholy fit, and Google was rejected the permits through legal, regulatory means.  Apparently, competition continues to be anathema to cellular phones and Internet service providers, all while these same providers abuse customers and refuse to perform basic customer service, such as finding solutions!

What is the solution; I offer the following as potential places to begin launching a customer service revolution.

    1. Commit to finding solutions first. Quicken Loans is one company I know that asserts that they want to say YES before saying no.  Commit to the same; demand your people learn how to say YES!
    2. This might sound old-fashioned, but believe it or not, it works. Smile and say please and thank you!  When you are thanked, say you’re welcome.  Manners matter in setting the tone in customer relations.  A smile goes a long way to setting the proper tone.
    3. Another potentially old-fashioned idea, but worth considering if your front office staff looks rough. Customers will automatically not want to do business with you if their first impression is tattoos, body piercings, crazy hair, long nails, and scowling faces.  The doctor’s office, the lead office support person, is covered in tattoos, has a body piercing that draws attention to body areas that make professional interactions difficult to conduct. Her hair matches her demeanor, rough and disruptive.

Knowledge Check!Please note, I am not against tattoos and body piercings.  In professional settings, restraint is needed to show respect to the business environment and not distract properly.  The nursing staff all have tattoos, and they are not as disruptive as the lead office support person.  Others have body piercings on their faces, ears, heads, and body parts.  But, these are not distracting, and drawing attention to body parts best left unnoticed in professional settings.  There is a distinct difference between acceptable and unacceptable, and business owners will need to draw a line or be prepared to have problems with customers.

    1. Post in a prominent position what the customer commitment is and who to contact if customer attention fails. Want to raise awareness of customer solutions, post your commitment, and then live that commitment.
    2. Technology is wonderful; there need to be reliable replacement channels when you eliminate a communication channel. For example, the doctor I visited they do not have incoming phone calls.  You can text the doctor’s office, you can fax the doctor’s office, you can send messages through a group insurance website, and you can email the doctor’s office.  When you insist the doctor’s office do something to fit another bureaucracy, e.g., the VA, the office support staff through a fit and stop responding to text messages and emails.   So, not only is their attitudes inappropriate, the customer service communication channels are throttled intentionally to avoid angry callers.  Forcing patients to have to deal in person when technology is made to fail.

WhyCommit to customer relations, find solutions.  Commit to saying YES!  You will be surprised how fast people become customers and want to remain customers when employees representing your business are committed to finding solutions first and excuses NEVER!  End the abuse of customers; I know which doctor I will be ending my relationship with as soon as humanly possible, and I will leave online customer service reports.  Abuse me as a customer, and I will go out of my way to make sure other customers and potential customers know.

© 2021 M. Dave Salisbury
All Rights Reserved
The images used herein were obtained in the public domain; this author holds no copyright to the images displayed.

NO MORE BS: What Would The Founders Do – Privacy of Individuals

Angry Wet ChickenPrivacy is the paramount right of individuals.  To be free inside their own homes, their papers (business), and their actions.  Except, from every front, an individuals’ privacy is being stolen through technology, government edict, and the courts’ power.  Do you even realize how much of your privacy is being subverted for the gain of others?  The more I research privacy, the madder I get!

Here is the foundational statement by the Founding Fathers of America on an individuals privacy from the US Bill of Rights and US Constitution as amended:

      • Amendment I
        (Privacy of Beliefs)
        Congress shall make no law respecting an establishment of religion, or prohibiting the free exercise thereof; or abridging the freedom of speech, or of the press; or the right of the people peaceably to assemble and petition the government for a redress of grievances.
      • Amendment III
        (Privacy of the Home)
        No Soldier shall, in time of peace be quartered in any house, without the consent of the Owner, nor in time of war, but in a manner to be prescribed by law.
      • Amendment IV
        (Privacy of the Person and Possessions)
        The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no Warrants shall issue, but upon probable cause, supported by Oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized.
      • Amendment IX
        (More General Protection for Privacy?)
        The enumeration in the Constitution, of certain rights, shall not be construed to deny or disparage others retained by the people.
      • Liberty Clause of the Fourteenth Amendment
        No state shall make or enforce any law which shall abridge the privileges or immunities of citizens of the United States; nor shall any state deprive any person of life, liberty, or property, without due process of law; nor deny to any person within its jurisdiction the equal protection of the laws.

Apathy1961, Griswold v. Connecticut Justice William O. Douglas declared there are “zones of privacy” that allowed Griswold to purchase contraceptives against the State of Connecticut’s desires.  Except, in ruling this way, the “zones of privacy” became the black hole sucking in all the abuses of privacy by technology companies, by the government, and by the courts.  Under the “zones of privacy,” abortion has been made legal along with gay sex, both of which fall into the founder’s old legal phrase, “The privacy of families.”

Millstone of Designed IncompetenceThe statute of “The Privacy of Families” stretches back into history and means exactly as it states, the government, the lawyers, and society have no business sticking their noses into “The Privacy of Families.”  Only to violate individuals’ privacy and intrude into an individual or family’s business, “Privacy of Families” has been used as a legal excuse for violating privacy and destroying individuals.  Consider the sale of educational research data from K-12 students, the sale of HIPAA data for research purposes.  If you live in a socialized medicine country, you have even less protection for your private medical data.  The business of buying and selling data for research purposes is vast, and anyone who can create an excuse can meet the legal standards of violating your privacy for “science.”

Is the problem a little more explicit; what started as a good thing, “zones of privacy” and “The Privacy of Families,” has morphed into the legal nooses of red tape hanging an individual and family over an ethical morass while some bureaucrat is chopping on the rope.  In a legal twist of irony, Alexander Hamilton had to admit he committed adultery and was bribed, over a honey trap created by a married couple, to beat a charge of worse behavior to his social reputation.  Hence, the citizenry needs to understand how far the government will stretch to breach an individual’s privacy.

Broken RobotDoesn’t America have laws like FERPA and HIPAA and other privacy legal requirements; absolutely, but are you going to trust the government to protect your records?  Were you affected by the OPM Federal Government data breach (2015), the multiple VA data breaches since the loss of 26.5 million unencrypted veterans records (2006), or been a victim of the DMV selling your personal data?  I guarantee you have been affected either as a primary, secondary, or tertiary victim of a data hack.  Yet, the FISA courts and the “Patriot Act” were explicitly invented to destroy individual and family privacy as unconstitutional actions by a legally elected government.

Reality check, what does the government hold as records?

The stolen VA data has included the names, Social Security numbers, dates of births, and disability ratings for 26.5 million veterans and spouses, on an unencrypted laptop hard drive.  Since this first data breach in 2006, the VA has regularly lost additional private medical records, emergency contact information, children records, and other data.  I have regularly received a letter from the VA that my data was included in a data breach.  I have written about how the VA brags that the flow of data from the VA into nefarious hands slowed a tenth of a percentage point and is to be applauded.  Not ended, not stopped, slowed a tenth of a percentage point, as if that was progress.

Angry Grizzly BearIf you believe the hype, the VA congratulates themselves for not losing any financial data, like account numbers, credit card numbers, and bank information.  Except if you lose someone’s full legal name, date of birth, Social Security number, that person WILL take a financial hit!  My identity has been stolen, cost me almost $5k in bank fees, overdraft fees, and other charges.  The day after I closed my bank account in Phoenix, AZ., a person with my identity walked into the bank branch in Janesville, WI., presenting a check for cash for $500.00.  I had spent from January to July complaining that my data had been hacked; the Janesville bank branch did not even bother to call the police.

The Office of Personnel Management data breach, June 2015 (you want to click that link) is as egregious a loss as humanly possible for several reasons:

      1. Nobody knows how long the tap was leaking data. If you believe the media, the tap was only open for a few short months.  If you believe the industry investigators, the tap had been in place for years.
      2. The data lost included everything on an SF-86 form for background checks and security clearances. My first SF-86 was completed over five days with a military recruiter.  It included all my brothers and sister private data, the names and addresses of friends and close associates, and extended family members.  My Navy SF-86 was longer as I had previously held security clearances, and a deeper check was ordered.
      3. Have you ever applied for a security clearance or applied for employment with the Federal Government? Do you have relatives or friends who work for the Federal Government?  Guess what; you are either a secondary or tertiary victim of the OPM Data Hack, and nobody has been held accountable, nor has a full accounting of the problem ever been made known to the public.

Dont Tread On MeHence, the next time you hear about the government “working hard to protect your privacy,” ask them about those data centers in Utah’s desert that hold private data for the government alphabet agencies.  Ask about the OPM and VA data hacks.  Better still, ask about the IRS data hack in the spring of 2015.  While the IRS claims “only 104,000 taxpayers were involved, the reality is much higher, and politicians play games with the truth.  Eventually, the game of political hot-potato will end, and that will indeed be a great and dreadful day!

© 2021 M. Dave Salisbury
All Rights Reserved
The images used herein were obtained in the public domain; this author holds no copyright to the images displayed.

Leadership and the Department of Veterans Affairs – Shifting the Paradigm on Killing Veterans

I-Care

Since the beginning of 2019, a running theme in the Department of Veterans Affairs Office of Inspector General (VA-OIG) reports, that I have delivered via email, has been the lack of leadership.  Today’s VA-OIG report is a perfect example of discussion and remains significant due to a veteran being killed by the Spinal Cord Unit in San Diego, CA.  I fully submit that VA Secretary Wilkie is trying to reform the Department of Veterans Affairs.  I fully offer that the nurses and providers, as well as other front-level employees at the Department of Veterans Affairs, are trying to do a difficult job in a bureaucratic nightmare.  I contend that the mid-level managers between the supervisors and Secretary Wilkie need removed and processes redesigned.

Using today’s report, we find causation for removing mid-level managers to streamline leadership effectiveness and potentially save patients.  The VA-OIG claimed, “At the time of the patient’s death, the SCI unit used an outdated nurse call system that required the use of a splitter to connect the ventilator to the call system, none of the respiratory therapy staff had training or competency assessments related to PMV use, staff failed to report the patient’s ventilator tubing disconnections through the Patient Safety reporting system, and SCI leaders failed to follow the standard operating procedure for the management of clinical alarms.”

Outdated technology is inexcusable, especially for all the money continually pumped into the Department of Veterans Affairs to update technology.  Who are the mid-level managers in charge of procurement that have failed to do their job and improve technology effectively?  VA-OIG, was the role of technology procurement included in this investigation?  If not, why?  If so, where is that report?  I have personally witnessed 10+-year-old technology used for patient care due to inadequate leadership efforts and procurement people wasting time, as well as other resources.  If a root cause in a patient dying is old technology, why are we not holding those in procurement an IT accountable?

Training at the Department of Veterans Affairs is a colossal joke; either the training is bloated, and the user cannot identify which parts are valuable to their job duties specifically, or the training is so shallow that the topics are considered a waste of time.  But, there is also a third option for training; training only applies to managers due to the labor union collective bargaining agreement.  Thus, the front-line worker could use the knowledge, but the union is preventing that knowledge from spreading as that policy has not been approved.  The leaders in charge of training cannot answer basic questions regarding applicability, usefulness, or point to policies and procedures that govern why certain topics are required to specific audiences.  The lines of communication breakdown in training have reached monumental proportions, and as witnessed, is killing patients.  Worse, the training at the VA is governed by third-party LMS software that can quickly be completed without ever influencing the actions of the individual.  Classroom training is a rehash of the LMS training and does not cover the gaps or explain why.  Front-line supervisors cannot answer basic questions about the why behind a process or procedure, nor can they point to a resource where the information can be discovered.

The VA-OIG noted a root cause in their investigation, “The OIG could not determine what the ventilator settings were at the time of the patient’s death, because facility staff who inspected the ventilator immediately thereafter changed the settings to check whether alarms were functional and then reportedly returned the settings to the previous levels.”  If the setting on a piece of equipment is required for a patient safety report, why are there not digital pictures taken?  I find the VA-OIG being unable to ascertain equipment settings to be a complete failure of current technology.  How many smartphones are possessed by patients, staff, providers, etc. that could snap a picture of a piece of equipment for an official record?  Does not the VA issue phones to mid-level managers?  One of the most egregious problems at the VA is designed incompetence to allow a malefactor the ability to hide behind bureaucracy to avoid accountability and responsibility.  Designed incompetence is the problem and I do not see any of the mid-level managers, leaders, supervisors, trainers, etc. acting to eliminate designed incompetence to the improvement of the Department of Veterans Affairs.  Consider for a moment the hundreds of millions of dollars lost in bloated construction projects.  The project leader has vague, inaccurate, old, etc. processes and procedures to blame the failures upon; this is an example of systemic designed incompetence, that protects a lazy employee and costs the taxpayers resources, and the Department of Veterans Affairs reputation.

The VA-OIG reported more root causes in the death of a patient to include, “… the facility did not implement risk mitigation strategies for the use of the in-line Passy-Muir® Valve (PMV) on ventilated patients. The facility did not have a backup monitoring plan when the ventilator alarms were off, patient criteria to determine when the valve should be removed, policies for facility staff and patient/family education on the use of the PMV, policies or procedures for monitoring and documenting ventilator and alarm settings while using the PMV, or a policy to use anti-disconnect devices.”  Risk mitigation is everyone’s job in a VA Medical Center.  Risk mitigation is a facet of every post and included in the third-party software training programs for providers, nursing staff, and clerical staff.  Why did this patient die from a lack of risk mitigation?  What are the tactical risk mitigation actions that support risk reduction strategies?  I have asked this exact question, as an employee and a patient, in two separate VA Medical Facilities and never received an answer beyond simple platitudes.  A root cause in a patient dying was risk mitigation strategies; VA-OIG, there is a bigger problem here that merely making a recommendation to leadership can resolve.  If a strategy is not supported with tactical action, there are no strategies; simply wishful thinking and hope statements.  Are the mid-level managers going to be held accountable for dropping the tactical ball here and letting a patient die from systemic designed incompetence?

The US Military believes in redundancy; every mechanical system has a backup, that backup has a backup, and there is a manual backup for when all else fails.  How can the Department of Veterans Affairs claim to serve America’s military veterans without redundancies?  Without training on redundancies?  Without education and real-life training scenarios, to prod thinking before an emergency occurs?  The simple answer, the VA cannot represent, serve, or support America’s veterans without these core competencies built into the processes and procedures that power a learning organization.

I am sick and tired of seeing veterans harmed, abused, and killed at the hands of bureaucratic ineptitude and systemic incompetence that protects the lazy and useless at the expense of veterans.  I am beyond disgusted that mid-level managers, supervisors, directors, etc. have the power to arbitrarily pick winners and losers based solely upon the worship that employee does to the boss when the employee cannot do the job they were hired to accomplish.  It is beyond inexcusable to see no job-specific duties, processes, and procedures that provide tactical action for strategic aims at every workstation where training is held daily to meet the strategic goals of the medical facility.  The Department of Veterans Affairs needs to begin cleaning house of the criminals, the incompetent, and the lazy that are supporting a reputation of killing veterans through designed incompetence, as they masquerade as supervisors, directors, managers, etc.; there is no excuse for killing another veteran!

© 2019 M. Dave Salisbury

All Rights Reserved

The images used herein were obtained in the public domain, this author holds no copyright to the images displayed.

The Johari Window: A Tool of Incredible Proportion – Understanding a Key Psychology Tool in Call Center Relations

The Interest GridTo understand a principle takes time; to apply that principle involves experience; but to indeed change a person, the principle must be absorbed into the very fiber or essence of an individual, reaching comprehension through mental, physical, and spiritual understanding, some might even say the soul of the individual.  Freedom is one such principle; the tool for remaining free is the ability to choose, or agency.  When applied to organizations, the same path to success must be tread, but with many individuals onboarding the principles is a challenge.  Many people believing the same way is often described as a culture (Greenwald, 2008, p 192-195), or society, and when belief turns into dedicated and repetitive action, a paradigm is created (Kuhn, 1996), also called business processes and procedures.

Agency theory is a tool for understanding how organizational cultures become cultures.  Individuals apply agency, and when many make the same choices, the creation of an organizational culture occurs.  Emirbayer & Mische (1998) expand the term agency that gives reason why Tosi (2009) and Ekanayake (2004) both classify agency theory as an “economic theory” and how agency theory “… shapes social action [p 963].”  If Emirbayer and Mische (1998) are correct, placing more emphasis upon individual agency opens doors into re-shaping controls, control mechanisms, and affects the entire organization.  The power of agency to change people, organizations, and societies is immense.  Recognizing that people will always exercise agency, guiding that agency exercise is not so much a discussion of control, but of harnessing energy and momentum to develop individuals into a cohesive whole.

Johari WindowThe Johari Window is a tool for quickly assessing a situation before making a choice.  Consider the job of a call center agent; they must be technically savvy, adept at handling multiple tasks while engaging in productive conversation, and must be able to keep a caller enthusiastically engaged in reaching a solution quickly so that the agent ay meet business set metrics and production goals.  The Johari Window is suggested as a desktop guide in promoting self-knowledge in the call center agent to improve performance.  Having personally employed the Johari Window as part of logical thinking, I explicitly recommend, that before handing an agent this tool, training must be accomplished to help allow for clearer thinking that often leads to more speedy action.  The first Johari Window represented links to a .pdf that contains additional specific information for improving training in the Johari Window principles.

Open Area

Of all the locations in the window, the open area position is where the majority of people want to stay; wherein everybody and everything knows and is known. The unknown is frightening, and change in this location comes the slowest, if at all.  Each call center agent wants to, and needs to, feel confident in what is known and where they go when they do not know; hence, training as a continual process remains the catchword in this location, even though it might not be well received.

While the location is desirable, rarely will customers call in because they already know something.  Agents in a call center should leave new hire and continual employment training and start every working day from this location where they are known and know.  The open area could also be referred to as the preparation location.

Hidden Area

The hidden area is where business in a call center will occur most effectively.  The customer knows what they want, and the call center agent knows how to deliver what is wanted and through reflective communication mutual understanding is achieved to make the hidden area become known.  Imperative to understanding in this area is the power of choice, agency, to choose to reveal only pieces of what is wanted.  If the customer chooses not to disclose what is wanted, it is not poor service when the customer’s wants are not fulfilled. This point is especially important in understanding the voice of the customer (VOC) survey results and quality call review.  The only time the agent is in the wrong, in this location, is when the agent cannot choose and thereby communicates less effectively to the customer, delivering a poor performance in need of remediation.  Both the agent and the customer have something hidden and something known.  The importance of clear communication remains pre-eminent in this location.

For instance, two top call center agents were continally competing with each other for first place evaluation. The agent who routinely came in second asked why. The answer to improving performance is found in the hidden area, opportunities that guided the agent to drop AHT/ACW and increase VOC into productive communication towards a solution.  There is power in the hidden area to capture and employ. Train agents to be alert for hidden areas to gain improved performance, not through active listening, but through reflective listening where mutual understanding between the customer and the agent is reached.

Blind Area

Of all the locations in the Johari Window, the blind area is the most dangerous for call center agents.  When the customer has information the agent does not know, the result is lost resources, productivity, and customers.  Of course, the reverse is also true.  When the agent has information about the customer and does not voluntarily devolve the information, the customer is surprised upon becoming aware and is lost because of this blind area.  Then organizational reputation damage is complete.

For example, I was working in a credit card call center and regularly saw agents not bother to bring up account issues to save AHT/VOC and other metrics.  Hence, the customer upon learning of the negative actions would call back because opportunity in the blind area was sacrificed for potential short-term gains.  Operating blind means the agent and the customer are in danger.

Unknown Area

Chinese CrisisOf all the locations in the Johari Window, the unknown area possesses the most opportunity for delivering upon a service commitment.  Consider the Chinese character for a crisis that includes danger and opportunity as equals.  The unknown always combines danger and opportunity.  Danger is risk, risk of losing a customer, risk of saying the wrong thing and insulting, etc.  Opportunity lies in making the unknown known.  In the Johari Window, when the unknown becomes known, the unknown quadrant shrinks and the known quadrant grows.  The unknown quadrant could be considered the crisis quadrant.  Good skills in mastering the unknown to thwart a crisis, eliminate danger, and win the opportunity to create a powerful customer interaction.  The unknown area is where confidence in training overlaps with the customer’s crisis to maximize opportunities for service excellence.  If there is a single shred of doubt communicated to the customer in crisis, the opportunity is lost forever because the danger was not ameliorated. The unknown has many hidden dangers to be wary, but fear is not one of them because of excellence in training.

Working as an agent in customer retention was very lucrative.  When we could probe, dig, and investigate, generally we could save a customer and generate new business.  While the company spoke about, preached around, and dictated the use of active listening, the retention department was using reflective listening to glean details and save customers through reaching mutual understanding. In the unknown area, both parties struggle with not knowing and being unknown. Therein lies the opportunity for increasing business by becoming known and learning knowledge that is not currently possessed.

While the current Johari Window reflects proportional space for each location, reality rarely allows for such clarity.  Many times, an agent’s Johari Window will look like any one of the following, none of the following, or a mixture of all:

This slideshow requires JavaScript.

The key for call center leaders is to train the call center representatives to first understand themselves and then to visualize who they are in the Johari Window in each call.  The more familiar the agent is with data gleaned from knowing themselves and the business, the more power each agent will have to handle the calls more effectively and efficiently.  In teaching the Johari Window, one of the many lessons I have learned is that people do not understand and second guess their limitations.  If a person has, or considers having, a small blind area, do they know their equally important unknown or open areas.  More than likely the answer is no; why, because of the need to invest time and other resources into improving themselves and their approach to others.

When discussing the agents understanding themselves, the call center trainer, first line supervisor, and managers will employ the eleven principles of change as discussed by Luft.  The agent will need to understand the energy lost in hiding, deceiving themselves, and the problems this causes them.  Cause and effect play a significant role in visually attuning the Johari Window to daily work activities.  The call center trainer, first line supervisors, and managers will need to be able to answer clearly and effectively “why” based questions about processes and procedures, while exemplifying the Johari Window principles.  Luft’s Point No. 5point number five is critical in this process, “Interpersonal learning means a change [is taking] place so that Quadrant 1 is larger, and one or more of the other quadrants has grown smaller.”  Do we understand what this means; as leaders, we exemplify making Quadrant 1 (Open Area) larger by learning.  Leaders are teachers, teachers are leaders, but both teachers and leaders must remain loyal to learning.

Consider Gilderoy Lockhart from Harry Potter.  Gilderoy Lockhart considered himself highly capable, gifted, and talented, but reality proved his ineffectiveness and limitations.  His example opens a second issue when using the Johari Window tool in a call center:  personal perception versus reality.  Gilderoy Lockhart would see his Johari Window as thus:

Johari Window - GL 1

Reality would suggest the following might be truer:

Johari Window - GL 2

The disparity between a person’s perceived understanding and reality causes significant problems in interactions in all types of societies.  In the call center, the agent will interact with various kinds of personalities; hence, the need to train agents in this tool and to understand themselves, including their likes, dislikes, triggers, emotional hooks, and talents brought to each call.  For the best opportunities for your agents to interact successfully, training them in understanding themselves is just as important as training the agent in organizational policies, business products, services, and sales techniques.

Ongoing, regular training remains a key component to highly effective call centers and capable workforces.  Without refresher training, regular training for new products, and annual training, the capable employee gets into a rut, the rut becomes a paradigm, and the employee becomes lost to attrition and slower productivity; but most especially, lost customer interactions hamper all levels of business performance.  One employee working slow can ruin a business, and the first indicator something is wrong is the higher cost of doing business.  Win the employee through training and then treat them respectfully to reduce operational costs and increase sales through training.

In conclusion, never stop asking why, encourage learning, and never fear using the answer, “At this time, I do not know, but I will find out and report back.”  When the discovery loop is closed with the individual, everyone learns, Quadrant 1 grows, and other quadrants reduce perceptibly.  Proving once again the veracity of the axiom, “Train people well enough to leave; treat people well enough to stay; and grow together as an act of personal commitment to the team.”

References

Ekanayake, S. (2004). Agency theory, national culture, and management control systems. Journal of American Academy of Business, Cambridge, 4(1), 49-54. Retrieved from http://search.proquest.com/docview/222857814?accountid=35812

Emirbayer, M., & Mische, A. (1998). What is agency? The American Journal of Sociology, 103(4), 962-1023. Retrieved from: http://www.jstor.org/stable/2782934

Greenwald, H. P. (2008). Organizations: Management without control. Thousand Oaks, CA: Sage Publications.

Kuhn, T. S. (1996). The structure of scientific revolutions. (Third ed., Vol. VIII). Chicago, ILL: The University of Chicago Press.

Tosi, H. L. (2009), Theories of organization. Thousand Oaks, CA: Sage Publications.

© 2017 M. Dave Salisbury

All Rights Reserved

The images used herein, obtained from the public domain, this author holds no copyright to the images displayed.

 

Customer Call Center Leader – Part 6: The Role of Technology in Creating a Culture of Adaptability

The role of technology is to act the neutral part in the human work relationship. Technology is a tool, like a hammer, designed for a specific role embodying potential for good or ill, delivering a specific role, and serving a specific function. Technology is not positive or negative and possesses no value matrix beyond addressing the concern, “does technology fill the role it was designed for or not” (Budworth and Cox, 2005; Ertmer, 1999; and Ropohl, 1999). Technological philosophy, detailed by Ropohl (1999), provides greater details into the underlying core issues leaders and organizations face daily when merging technology and people together. Yet, always in application do we find managers attempting to make technology more than what technology can ever be, the neutral variable in the human technology work relationship while thwarting culture and other organizational changes.

The automatic dishwasher is an example; if the dishes go in dirty and come out dirty, the blame is the technology instead of the human interaction in the technology work relationship. I was on a call to customer service recently and heard no less than five times in a 10-minute phone call, the “system is slow,” the “computer is not working right,” or some other similar excuse from the agent not being able to answer questions from the customer. How many times has human resources heard, “the car wouldn’t start,” “my GPS gave me wrong directions,” or my personal favorite, “the alarm clock failed.” The technology is not at fault as the neutral variable; human interaction with the technology is where the fault lies.

Application of technology to leadership and organizations may be summed by Wixom and Todd (2005) as they quote Fishbein and Ajzen (1975) for the specific principle espoused by Trist (1981) and applicable here, “For accurate prediction, beliefs and attitudes must be specified in a manner consistent in time, target, and context with behavior of interest” (Wixom and Todd, 2005, p. 89). Virtual and non-virtual teams are connected by the specific behaviors of those being led; the attitudes of the users predict beliefs and flow into production, especially into call centers and other front-line/customer-facing positions. Technology brings leadership into possibility, but the potential cannot be realized unless the leader knows how to harness negative beliefs, core out the actual problem, address user concerns, and then redirect the negative into either neutral or positive productivity.

The answer to leaders needing to harness user beliefs is found in proper communications aided by technology, as detailed by London and Beatty (1983). Empowering the users with 360-degree feedback, empowering the leader with another channel for 360-degree feedback, and operating a third channel for the organization in 360-degree feedback places the user in the driver seat to improve their technology beliefs and attitudes. Ropohl (1999) and Omar, Takim, and Nawawi (2012) combine to complete the puzzle in addressing how technology applies to leadership and virtual teams by underscoring the people element in the technological equation. Omar, et al. (2012) claim,

“…Technological capability refers to an organisation’s [sic] capacity to deploy, develop and utilise [sic] technological resources and integrate them with other complementary resources to supply the differentiated products and services. Technological capability is embodied not only in the employees’ knowledge and skills [combined with] the technical system, but also in the managerial system, values and norms” (Omar et al., 2012, p. 211).

360-Degree FeedbackAs the image reflects in the convergence of the three channels of 360-degree feedback, the power of communication is enhanced by the technology employed as a neutral variable in the human technology work relationship. If technology fails, the relationships in the channels remain and the relationships are not separated or closed. When discussing flexibility and adaptability in organizations, clearly understanding the roles of technology and communication empower the combined user, leader, and organization relationships.

The leader and organization need to understand and develop these principles to harness the innovative power of the human element where technology interacts with the human work relationship. If technology, especially technological improvement, is not thought through, planned, discussed, and elevated, Dandira (2012) claims the result is ‘Organizational Cancer.’ The power of technology as a force multiplier to unleash the power of humans cannot be understated, but the flip side of the technological coin is that as a force multiplier, if technology is not handled correctly, the negative aspects are as large as the positive aspects. Toor and Ofori (2008) detail how leaders need to understand and embody the differences between managers and leaders to contribute fully to the technology implementation and daily use in production. If leaders cannot lead physical teams, they will never understand virtual teams where technology must be understood more completely, and managers need not ever apply as the mindset is not conducive to creating success in the human technology work relationship.

A recent technological change was heralded, marketed, bragged, and positioned to the stakeholders in a company as akin to being better than “sliced bread.” The new system was discussed for three years before images of the new system began to be floated. Everything was prepared to have the technology play a more flexible and vital role in the organization. The problem was managers and programmers implemented the technology instead of users and leaders. User interfaces were ungainly, illogical, and made no sense in the completion of user work processes. More specifically, the impact for every single process and procedure in the current technology was not considered and revamped during the rollout of the new system. The result was chaos among users, failure to deliver the promised products and services, and a customer service disaster. Early in the rollout of the technology, managers directing the rollout were alerted that processes and procedures needed to be revamped, and the user was being left behind in how the system was “supposed to work” resulting in compounded chaos, increasing customer dissatisfaction, and further diminishing the company reputation. The managerial response was to “sit and wait” for the programmers to finish building the system and changing the technology to “fit.” Where a leader was needed, a plethora of managers existed and they actively worked to make the problems worse for the end user, the customer, and the other managers.

Creating a culture follows a basic set of principles, namely, the example of the leaders, including their words and actions, followed by repetition, and the passage of time (Tribus, n.d.). Tribus (n.d.) specifically places the core of culture in the example of the leaders regardless of whether the organizational leader is a leader or a manager as evidenced by action and word. To create a culture specific to adaptability, several other key components are required, namely, written instructions, freedom, and two-directional communication in the hierarchy (Aboelmaged, 2012; Bethencourt, 2012; Deci and Ryan, 2000; and Kuczmarski, 1996 & 2003). Two-directional communication has been warped into 360-degree communication. Regardless of name, the input from the workers and the customer is more critical than the voices of managers to organizational excellence.

Alvesson and Willmott (2002) add another component to this discussion. As the organizational culture takes hold of an individual employee, the employee begins to embody the culture, for good or ill, in their daily interactions both personally and professionally. This hold becomes an identity adding another level of control from the organization over the employee binding them to the organization. The identity control becomes a two-edged sword because the employee will form loyal opposition that can be misinterpreted to be intransigence, and the loss of that employee causes other employees to question their identity and the organizational culture. More to the point, the changed employee becomes habitualized into the current culture and then hardens into intransigency when changes are needed to help the organization survive.

Creating a culture attuned to adapting, the organizational leader needs to communicate, be seen exemplifying the organizational culture, and building that culture one employee at a time; until the changed employees can then begin to sponsor other employees into the organization’s new culture. The organizational leader must set clear goals, define the vision, and obtain employee buy-in prior to enacting change, then exemplify that vision after the change (Deci and Ryan, 1980, 1985, & 2000) while remaining open to the possibility of a need to change direction if indicated. Key to this process is Tribus’ (n.d.) [p. 3-4] “Learning Society” vs. “Knowing Society.” The distinction is crucial. The organizational culture must be learned and the process for continually learning honed and promoted to protect the culture while adapting to variables both internal and external. Learning societies know change occurs because of new thinking and inputs and remains adaptable to that change as a positive force in improvement. Knowing societies remain afraid of changes due to the fear of losing perks, benefits, or personal power and actively thwart change at every turn, usually while preaching the need to change.

To be clear, technology is a neutral force and can neither be a positive or a negative in an organization. The need for leaders cannot be overstated as the driving force in organizational change, or simply day-to-day leadership. Leaders must be seen and heard living the organizational culture. If, and when, changes are required, leaders must listen to user, customers, and the managers, but the weight and value are not the same and should never tilt in favor of the managers. Finally, if the organization needs to adapt, the organization must provide employees in front-line/customer-facing positions with freedom to act and the technology to record the actions, which are supported by back-office processes and procedures that respond to the front-line, not the other way round.

With the “.dot com” bubble burst in 2000, the world of business changed dramatically. As more baby-boomers leave the workforce and are replaced with millennial workers, the business culture is going to change more. To adapt, the engaged and determined business leader needs to embody a spirit of freedom and adaptability into the business culture, into the processes and procedures that define “work,” and into the customer relationship (internally and externally) or the business will continue to fail, struggle, and breed chaos.

References

Aboelmaged, M. (2012). Harvesting organizational knowledge and innovation practices: An empirical examination of their effects on operations strategy. Business Process Management Journal, 18(5), 712-734.

Alvesson M, & Willmott H. (2002, July) Identity regulation as organizational control: Producing the appropriate individual. Journal Of Management Studies 39(5):619-644. Available from: Business Source Complete, Ipswich, MA. Accessed July 27, 2014.

Bethencourt, L. A. (2012). Employee engagement and self-determination theory. (Order No. 3552273, Northern Illinois University). ProQuest Dissertations and Theses, 121. Retrieved from http://search.proquest.com/docview/1294580434?accountid=458. (prod.academic_MSTAR_1294580434).

Budworth, N., & Cox, S. (2005). Trusting tools. The Safety & Health Practitioner, 23(7), 46-48. Retrieved from http://search.proquest.com/docview/201021810?accountid=458

Dandira, M. (2012). Dysfunctional leadership: Organizational cancer. Business Strategy Series, 13(4), 187-192. doi: http://dx.doi.org/10.1108/17515631211246267

Deci, E. L., & Ryan, R. M. (1980). The empirical exploration of intrinsic motivational processes. In L. Berkowitz (Ed.), Advances in experimental social psychology (Vol. 13, pp. 39–80). New York: Academic Press.

Deci, E. L., & Ryan, R. M. (1985). Intrinsic motivation and self-determination in human behavior. New York: Plenum.

Deci, E. L., & Ryan, R. M. (2000). The “what” and “why” of goal pursuits: Human needs and the self-determination of behavior. Psychological Inquiry, 11, 227–268.

Ertmer, P. A. (1999). Addressing first- and second-order barriers to change: Strategies for technology integration. Educational Technology, Research and Development, 47(4), 47. Retrieved from http://search.proquest.com/docview/218016186?accountid=458

Kuczmarski, T. (1996). What is innovation? The art of welcoming risk. Journal of Consumer Marketing, 13(5), 7-11.

Kuczmarski, T. (2003). What is innovation? And why aren’t companies doing more of it? What Is Innovation? And Why Aren’t Companies Doing More of It?” 20(6), 536-541.

London, M., & Beatty, R. W. (1993). 360-degree feedback as a competitive advantage. Human Resource Management (1986-1998), 32(2-3), 353. Retrieved from http://search.proquest.com/docview/224341530?accountid=458

Omar, R., Takim, R., & Nawawi, A. H. (2012). Measuring of technological capabilities in technology transfer (TT) projects. Asian Social Science, 8(15), 211-221. Retrieved from http://search.proquest.com/docview/1338249931?accountid=458

Ropohl, G. (1999). Philosophy of Socio-Technical Systems. Society for Philosophy and Technology, 4. Retrieved June 29, 2014, from: http://scholar.lib.vt.edu/ejournals/SPT/v4_n3html/ROPOHL.html

Toor, S., & Ofori, G. (2008). Leadership versus Management: How They Are Different, and Why. Leadership & Management in Engineering, 8(2), 61-71. doi:10.1061/(ASCE)1532-6748(2008)8:2(61)

Tribus, M. (n.d.). Changing the Corporate Culture Some Rules and Tools. Retrieved from: Changing the Corporate Culture Some Rules and Tools Web site: http://deming.eng.clemson.edu/den/change_cult.pdf

Trist, E. (1981). The evolution of socio-technical systems: A conceptual framework and an action program. Occasional Paper. Retrieved June 29, 2014, from: http://www.sociotech.net/wiki/images/9/94/Evolution_of_socio_technical_systems.pdf

© 2016 M. Dave Salisbury

All Rights Reserved

 

Technology Integration: An Evaluation – Understanding Technology

Please note:  The following is Part II of the conversation on technology and the workplace.  While written from an academic perspective, the author hopes to launch a conversation on integrating technology and shifting the current paradigm into a more holistic and practical approach to technology.  Please comment.  – –  Thank you!

Currently many organizations have a problem with technology integration. A new operating system, new legacy systems for employees, and new support systems for employees and customers have all been launched, but the resulting chaos needs to be addressed. Even while the legacy systems and previous technology, had problems, the new is not trusted and a culture of distrust is representing Dandira’s (2012) leadership dysfunction causing organizational cancer. The organizational leadership disconnection to the problems of both the external and internal customers reflects poor technology integration. The following evaluation aims to both highlight the problem and offer best practices to correct the problem, not from a distant point in the future, but from where the organization is now. The purpose of this document is to positively affect the technology integration, bringing forth a new culture while correcting inherent problems in the current organizational design and culture.

Problem Statement

Ropohl (1999) defines the problem advocating that all technology comes with social change. The ideal technological integration would include aspects of Ropohl (1999) to both alert organizational leaders to the change, while also supporting the new culture with leadership presence. The reality is that current front-line thinking reflects organizational leadership as never considering the problems with integration such as, the problems experienced in learning curves to learn the new technology, processes disconnected from legacy systems to the new support technology, SOP’s not current or plain wrong, and never planned for the cultural or technological shift, only the technology was important. The consequence as detailed by Dandira (2012), exasperated current problems with employee and customer frustration including more regionalism, less collaboration, higher stress, and, most disruptive, political culture growing and separating the organizational leaders more from the front-line employees and external customers. The growing feelings of disconnection are the main target of this research. Since technology disrupted an already exasperated problem, the solution can, and should, include the new technology integration. Measuring the technology integration and providing empirical evidence in where to pour resources is the aim of this document.

A Technology Integration Model

Using the core business combined with the disparate duties of each region in the business model, it remains of premier import to not ruin the business model, but restrain regionalism and political games. Thus, Wixom and Todd (2005) provide sound guidance. By focusing resources, as suggested by Wixom and Todd (2005) on both “User Satisfaction” and “Technology Acceptance” the organizational leaders may begin to gather the much needed data to empower decisions. The Wixom and Todd (2005) model is as follows:

  1. Focus early design on user interface. This includes “how work is done” and “why work processes flow the way they do.” Organizations invest many resources into the user interfaces, but the common perception is that broken processes will remain broken.  The process is how the use will interface with the technology to do the work of the organization.  Even small shifts in technology will change the processes and they will need reviewing.
  2. Practical utility. This is not a job for marketing, or a role to be onboarded by a single department or entity. The question to focus upon remains, “Will the user be able to utilize efficiently the new technology?” Other questions branch from this question, pointing to how work is accomplished, why, where, when, and a dream list of users for the new technology.
  3. Attitudes and beliefs influence behavior. Employ “object-based beliefs and attitudes” to positively affect “behavioral-based beliefs and attitudes” (Wixom and Todd, 2005, p. 86). This simply means dispelling the beliefs that one legacy is inherently bad because of a lack of training or another employee’s personal opinion, and another piece of technology is inherently good for the same ambiguous reasons. Currently on the production floor, there are thousands of these beliefs and attitudes hampering productivity. Omar, Takim, and Nawawi (2012) discuss the principles contained here, in-depth referring to this as technological capability (TC). TC is more than the sum total of training, experience, technology, and access to technology; TC is the inherent momentum building motivation into an organizational culture.  Note, motivation is more than desire and capturing motivation, including negative motivation requires leadership interfacing with front-line employees directly, not through command edicts and measuring adherence through statistics.

Trist (1981) employs similar methodology in coal mining as suggested by Wixom and Todd (2005), in improving technology, by focusing on end users, making the processes and procedures easier to adopt, decluttering screens, moving buttons and links to a more natural position on screens, defining terms, etc. practical usability increases and the attitudes and beliefs change dramatically. Ropohl (1999) extends this discussion in reminding organizational leaders of the social aspect to work, especially when work involves high-level technology to accomplish social interactions. Wixom and Todd (2005) quote Fishbein and Ajzen (1975) for the specific principle espoused by Trist (1981) and applicable here, “For accurate prediction, beliefs and attitudes, must be specified in a manner consistent in time, target, and context with behavior of interest” (Wixom and Todd, 2005, p. 89). Specificity of connections between actual instances and timely response remains one of the steps missed. For example, why three legacy systems that all customer service facing employees should be knowledgeable in; when 50% of the front-line employees have no access to one legacy system due to work design. One system is only used for a single process infrequently employed to complete work; yet all three systems are not trained, necessitating desk guides, QA controls, and more resource investment for no appreciable gain. These long-term employees, considered as subject-matter experts, receive tasking’s to train new hires, but the long-term employee spends more time passing on genetic knowledge, assumption, bias, and opinion, than actually training to a specific standard.

London and Beatty (1993) offer sound counsel for the remedy in suggesting 360-degree feedback loops tailed to the end of each tasking. These feedback loops should be end user controlled, so if additional questions, comments, and concerns arise, the problem does not sit in a manager’s workload, but becomes part of the directors tasking to complete to the satisfaction of the front-line employee, not the director. Wixom and Todd’s (2005) model specifies both a need for practical utility and employing technology to change end used behaviors and attitudes. Integrating technology requires building trust. Trist (1981) discusses this topic obliquely when discussing how employees treated researchers until trust and relationships of trust were established. The same trust issues arise in Wixom and Todd (2005) and Ertmer (1999) capitulates that end user trust is a critical building block in socio-technical systems (STS), without this element, all the specialized technology in the world cannot overcome the inherent mistrust and thus lack of usage of technological solutions.

While discussing safety in the workplace, Budworth and Cox (2005) provide sound guidance applicable to technology integration by insisting that trust involves four elements: “Commitment throughout the organisation [sic] (especially from the top); Competence at all levels of the organisation [sic], through directors, managers, advisors and employees; A structure; and A high level of involvement” (Budworth and Cox, 2005, 46). These elements form the bedrock of any relationship in an organization requiring trust and receive reference in Trist (1981) when discussing the organizational changes required when performing STS successfully.

Scoring the Integration

London and Beatty (1993) demonstrate a valuable insight by describing many “360-Degree Feedback” loops as only “270-Degree” (p. 353). Thus, the first effort in scoring technological integration is ‘360-Degree’s’ of feedback. Those initiating the technological shift, regardless of the technology or lack thereof need to understand the social implications of the change.  A simple scorecard is an effortless tracking system and should be made available to all parties involved in the change. Budworth and Cox (2005) expound upon trust, developing trust, and keeping trust, this is a day-to-day action an organizational leader initiates to followers.

Coombs and Bierly (2006) provide the next items for measurement in scoring technology and the integration process is as follows, “The following six measures of performance are used as dependent variables: return on assets, return on equity, return on sales, market value, market value added, and economic value added” (Coombs and Bierly, 2006, p. 421). Several of these ‘six measures of performance’ include human elements to which McKinnon (2003) and Ropohl (1999) both espouse as critical to technology and integrating technology into an organization. For example, a return on assets for computers purchased to interact with server and intranet technology requires end users. If the end user is unable to effectively use the tool, maximum return on assets remains unachievable, linking back to Wixom and Todd (2005) placing premier emphasis upon “Practical Utility” (p. 86). The same process remains traceable from each of the ‘six measures’ (Coombs and Bierly, 2006, p. 421) to the model espoused and delineated by Wixom and Todd (2005) mentioned above. The same pattern then expanded to each of the items on the scorecard. Leadership, inferred from Robinson (1999) and Toor and Ofori (2008), requires action, differentiation, and risk, along with active empathic listening, to build committed followers. The leader must be a follower and their actions transparent to build the committed trust advocated by London and Beatty (1993).

Suggestions from Research for Best Practices

Ropohl (1999) advocates, Trist (1981) implies, Coombs and Bierly (2006) infer, yet Omar, Takim and Nawawi (2012) emphatically state, a holistic approach to technology integration in STS remains a primary goal.

“…Technological capability refers to an organisation’s [sic] capacity to deploy, develop and utilise [sic] technological resources and integrate them with other complementary resources to supply the differentiated products and services. Technological capability is embodied not only in the employees’ knowledge and skills and the technical system, but also in the managerial system, values and norms” (Omar et al., 2012, p. 211).

More simply summarized, get everyone involved, allow for suggestions from outside the core group of developers and programmers, and keep the three main principles expounded upon by Wixom and Todd (2005) to be the focal point of energy. Technology must first focus on how work is done currently and designed for how work ‘will be done’ eventually. Include the SOP’s in the design; operating procedures develop from both technology and human element exposure. By not including upgrades and revisions to operating procedures while designing and integrating critical design steps, opportunities will be missed and greater expense incurred.

Discussed extensively has been some manner of ‘360-Degree Feedback’ loop in communication. Organizational leaders need to face the fact that they do not have all the answers and feedback is valuable to building the type of trust needed in a constantly changing atmosphere. While feedback loops are part of best practices, the importance of these types of communication requires realization and action. Consider the external customer, as a valuable stakeholder, stop presuming organizational leaders know what is required in every process, procedure, and organizational action taken by every employee at every organizational level, obtain feedback and then market who suggested it e.g. the actual customer gets credit, to build trust and affection for the leadership and the organization by all outside the organization. The same principle applies to internal customers or employees; when a suggestion warrants inclusion, advertise who made the suggestion, when, and display how this is an improvement. 360-Degree Feedback loops also include policies, procedures, work processes, etc. Wixom and Todd (2005) along with Omar et al., (2012) advocate this action as initially prescribed by Toor and Ofori (2008).

Omar et al., (2012) provides the concluding and paramount best practice in technological integration into an STS model, “keep it simple.” Many times an axiom a useful to remember this principle is ‘KISS’ or ‘Keep It Supremely Simple.’ Trist (1981) exemplified this principle by keeping the pieces small, the approach simple, and allowing as much holistic growth from inside the organization as possible. Organizational leaders do not need to ‘dumb down’ the message, but simplify. The difference is vast; the approach declares the difference between ‘dumbing down’ and simplified communications. Consider a ‘dumbed down’ message originates from the position of, “I am better than you, you are too stupid to bother with, and I must talk to you in small terms for your benefit;” whereas, a simple message originates from a position of equality with a desire to be understood primarily. Dandira (2012) places the responsibility for simplicity at the feet of the CEO. When the entire organization, led by the CEO, is engaged in simplification, less political games occur, less regionalism, lowered stress, and higher productivity result. Dandira (2012) calls this approach a cure for organizational cancer, discovery of an organizational cancer cure and a best practice renders itself bench-marketable.

Conclusion

            This document has presented a STS integration model designed by Wixom and Todd (2005) as a preferred set of principles to launch STS. Many organizations are currently engaged upon a major or minor technology shift, thus some of the early design work has been done on the technology, but none of the processes control work have been revamped and new SOP’s published. This woeful lapse will continue to hamper STS until rectified and while this primarily will rest upon organizational leaders, purchasing buy-in from employees and other major stakeholders remains an advocated best practice. By calling upon other IT integration researchers, namely Omar et al., (2012), Wixom and Todd (2005), along with Ertmer (1999), other factors discussed include measurement tools and additional principles for design, implementation, and ultimately integration. The author advocates a holistic approach as supported by the research to embolden employees, value customers, and enhance the brand experience, regardless of position or role in the organization.

References

Budworth, N., & Cox, S. (2005). Trusting tools. The Safety & Health Practitioner, 23(7), 46-48. Retrieved from http://search.proquest.com/docview/201021810?accountid=458

Coombs, J. E., & Bierly, P. E. (2006). Measuring technological capability and performance. R&D Management, 36(4), 421-438. doi:10.1111/j.1467-9310.2006.00444.x

Dandira, M. (2012). Dysfunctional leadership: Organizational cancer. Business Strategy Series, 13(4), 187-192. doi: http://dx.doi.org/10.1108/17515631211246267

Ertmer, P. A. (1999). Addressing first- and second-order barriers to change: Strategies for technology integration. Educational Technology, Research and Development, 47(4), 47. Retrieved from http://search.proquest.com/docview/218016186?accountid=458

London, M., & Beatty, R. W. (1993). 360-degree feedback as a competitive advantage. Human Resource Management (1986-1998), 32(2-3), 353. Retrieved from http://search.proquest.com/docview/224341530?accountid=458

Omar, R., Takim, R., & Nawawi, A. H. (2012). Measuring of technological capabilities in technology transfer (TT) projects. Asian Social Science, 8(15), 211-221. Retrieved from http://search.proquest.com/docview/1338249931?accountid=458

Robinson, G. (1999). Leadership vs management. The British Journal of Administrative Management, 20-21. Retrieved from http://search.proquest.com/docview/224620071?accountid=458

Ropohl, G. (1999). Philosophy of Socio-Technical Systems. Society for Philosophy and Technology, 4. Retrieved June 29, 2014, from: http://scholar.lib.vt.edu/ejournals/SPT/v4_n3html/ROPOHL.html

Toor, S., & Ofori, G. (2008). Leadership versus Management: How They Are Different, and Why. Leadership & Management in Engineering, 8(2), 61-71. doi:10.1061/(ASCE)1532-6748(2008)8:2(61)

Trist, E. (1981). The evolution of socio-technical systems: A conceptual framework and an action program. Occasional Paper. Retrieved June 29, 2014, from: http://www.sociotech.net/wiki/images/9/94/Evolution_of_socio_technical_systems.pdf

Wixom, B. H., & Todd, P. A. (2005). A theoretical integration of user satisfaction and technology acceptance. Information Systems Research, 16(1), 85-102. Retrieved from http://search.proquest.com/docview/208159952?accountid=458

© 2014 M. Dave Salisbury

All Rights Reserved

Technology and People – Shifting the Paradigm in Understanding Technology

Please Note:  The following is an academic assignment for UoPX.  I have published this work to launch a conversation about how technology is seen and understood.  I have several other pieces on this topic to share as part of understanding the role of technology in an organization.  Enjoy, comment, and even if you disagree, let’s discuss this topic.  – –  Thank you!

The role of technology is always the same, to act the neutral part as a force multiplier, not possessing the power to hold valuation as “positive or negative.” Technology is a tool, like a hammer, designed for a specific role, embodying potential, delivering a specific purpose, and serving a specific function. To repeat, technology is not positive or negative, cannot possess a value matrix beyond addressing the concern, “does technology fill the role it was designed for or not” (Budworth and Cox, 2005; Ertmer, 1999; and Ropohl, 1999). Technological philosophy, detailed by Ropohl (1999), provides greater details into the underlying core issues eLeaders, virtual teams, and organizations face daily when merging technology and people together.

Application of technology to eLeadership and virtual teams may be summed by Wixom and Todd (2005) as they quote Fishbein and Ajzen (1975) for the specific principle espoused by Trist (1981) and applicable here, “For accurate prediction, beliefs and attitudes, must be specified in a manner consistent in time, target, and context with behavior of interest” (Wixom and Todd, 2005, p. 89).  Virtual teams are connected by the specific behaviors of those being led; the attitudes of the users predict beliefs and flow into production. Technology brings eLeadership into possibility, but the potential cannot be realized unless the eLeaders know how to harness negative beliefs, core out the actual problem, address the user concerns, and then redirect the negative into either neutral or positive productivity. The answer to eLeaders needing to harness user beliefs is found in a non-technological advancement, but can be enhanced through new technology, 360-degree feedback communication loops as detailed by London and Beatty (1983). Empowering the users with 360-degree feedback, empowering the eLeader with another channel for 360-degree feedback, and operating a third channel for the organization in 360-degree feedback places the user in the driver seat to improve their technology beliefs and attitudes. Ropohl (1999) and Omar, Takim, and Nawawi (2012) combine to complete the puzzle in addressing how technology applies to eLeadership and virtual teams, by underscoring the people element in the technological equation. Omar, et al. (2012) claim,

“…Technological capability refers to an organisation’s [sic] capacity to deploy, develop and utilise [sic] technological resources and integrate them with other complementary resources to supply the differentiated products and services. Technological capability is embodied not only in the employees’ knowledge and skills and the technical system, but also in the managerial system, values and norms” (Omar et al., 2012, p. 211).

The eLeader and organization need to understand and develop these principles to harness the innovative power of the human element. If this is not thought through, discussed, and elevated, Dandira (2012) claims the result is ‘Organizational Cancer.’ The power of technology as a force multiplier to unleash the power of humans cannot be understated, but the flip side of the technological coin is that as a force multiplier, if technology is not handled correctly, the negative aspects are as large as the positive aspects. Toor and Ofori (2008) detail how leaders, especially eLeaders, need to understand and embody the differences between managers and leaders, to contribute fully to the technology implementation and daily use in production. If eLeaders cannot lead physical teams, they will never understand virtual teams, and managers need not apply. The case for leadership in virtual teams cannot be understated; user beliefs and attitudes are multiplied by the technology and through the technological interface. Virtual teams need to know, trust, and rely upon the organizational systems more so than physical teams, thus the eLeader has more to do and be, not less, than their physical team counterparts in leading well.

References

Budworth, N., & Cox, S. (2005). Trusting tools. The Safety & Health Practitioner, 23(7), 46-48. Retrieved from http://search.proquest.com/docview/201021810?accountid=458

Dandira, M. (2012). Dysfunctional leadership: Organizational cancer. Business Strategy Series, 13(4), 187-192. doi: http://dx.doi.org/10.1108/17515631211246267

Ertmer, P. A. (1999). Addressing first- and second-order barriers to change: Strategies for technology integration. Educational Technology, Research and Development, 47(4), 47. Retrieved from http://search.proquest.com/docview/218016186?accountid=458

London, M., & Beatty, R. W. (1993). 360-degree feedback as a competitive advantage. Human Resource Management (1986-1998), 32(2-3), 353. Retrieved from http://search.proquest.com/docview/224341530?accountid=458

Omar, R., Takim, R., & Nawawi, A. H. (2012). Measuring of technological capabilities in technology transfer (TT) projects. Asian Social Science, 8(15), 211-221. Retrieved from http://search.proquest.com/docview/1338249931?accountid=458

Ropohl, G. (1999). Philosophy of Socio-Technical Systems. Society for Philosophy and Technology, 4. Retrieved June 29, 2014, from: http://scholar.lib.vt.edu/ejournals/SPT/v4_n3html/ROPOHL.html

Toor, S., & Ofori, G. (2008). Leadership versus Management: How They Are Different, and Why. Leadership & Management in Engineering, 8(2), 61-71. doi:10.1061/(ASCE)1532-6748(2008)8:2(61)

Trist, E. (1981). The evolution of socio-technical systems: A conceptual framework and an action program. Occasional Paper. Retrieved June 29, 2014, from: http://www.sociotech.net/wiki/images/9/94/Evolution_of_socio_technical_systems.pdf

© 2014 M. Dave Salisbury

All Rights Reserved

The Technology Control – Revealing the 800lb Gorrilla

Nielson as quoted by Olsen, Pederson, and Hendricks (2009) in an amazing fit of alacrity, makes several points where technology and workers interact. Namely, technology allows for employee control and the disparity between developed societies and developing societies being able to see the same information via the Internet, but remaining disparate. Regarding the former point, the current employee/employer model hinges upon a small few controlling the masses employing tacit and explicit knowledge, combined with technology, and enforced by rigid discipline. More importantly and in connection to the control of employees is the lack of knowledge in developing worlds to advance.

Technology is available, the information to employ that technology, and centuries of knowledge is now at the fingertips of millions across the globe. Yet, the same environment from the early days of the Industrial Revolution remains in every nation and society across the globe; namely, agrarian subsistence living where technological innovation has not spurned an improved society. Lin-Hua and Nielson still quoted from Olsen, Pederson, and Hendricks (2009) brings the keys to the problem and hint at the solution. The key to the problem is not more technology, but training in using that technology. Before training can occur and be effective, two things must transpire value in the technology must both be seen and be personal. Second, governmental controls must reduce to increase individual freedom. Like the employer using technology to control masses of employees, governments employ technology to control citizens, stripping them of dignity, worth, and in many cases actively showing hostility towards their citizens for personal power. Lin-Hua from Olsen, Pederson, and Hendricks (2009) implies organization is also required to bridge the gap between possessing access to knowledge and technology and effectively employing knowledge and technology to improve society. Several times China receives mention in Olsen, Pederson, and Hendricks (2009) as examples of technology, organization, and knowledge. China remains a wonderful example as thief’s of technology and knowledge (Clarke, 2012), totalitarian governmental system (Christian, 2013), absolute control exercised over citizenry through common fear and high technology (Christian, 2013), along with a culture breeding “Middle Kingdom Complex (Kennedy, 2011).” Clearly, the solution is not more government, but less. The solution is not more technology, but experience and time to explore current technology. Knowledge, both tacit and explicit, requires familiarity. Familiarity breeds from both time and exposure, mixed with training and desire.

References

Christian, R. (2013, November 21). China’s positive reforms and it’s enduring totalitarian tendencies. Millennial. Retrieved from: http://millennialjournal.com/2013/11/21/chinas-positive-reforms-and-its-enduring-totalitarian-tendencies/

Clarke, R. A. (2012, April 2). How china steals our secrets. The New York Times. Retrieved from: http://www.nytimes.com/2012/04/03/opinion/how-china-steals-our-secrets.html

Kennedy, S. (2011). Beyond the Middle Kingdom: Comparative Perspectives on China’s Capitalist Transformation. Redwood City, CA: Stanford University Press.

Olsen, J. K., Pederson, S. A., & Hendricks, V. F. (2009). A Companion to the Philosophy of Technology. West Sussex, UK: Blackwell Publishing.

© 2014 M. Dave Salisbury

All Rights Reserved