Decision-Making Warning Flag 1a – The Gambler’s Fallacy

StrategyDriven Decision-Making Article | Decision-Making Warning Flag 1a - The Gambler's Fallacy“The Gambler’s Fallacy, also known as the Monte Carlo Fallacy, is the false belief that the probability of an event in a random sequence is dependent on preceding events, its probability increasing with each successive occasion on which it fails to occur.”

Gambler’s Fallacy
Wikipedia

Seated at a roulette table, a gambler must decide on what color to place his next bet, red or black. He knows there is a 50 percent chance of getting either red or black and that the first four spins of the wheel yielded all reds. The gambler reasons that because half of all spins should result in black and the first four were red, it is more likely the fifth spin of the roulette wheel will be black and places his bet. While his logic appears reasonable, the roulette player has just fallen victim to the Gambler’s Fallacy.


Hi there! Gain access to this article with a FREE StrategyDriven Insights Library – Sample Subscription. It’s FREE Forever with No Credit Card Required.

Sign-up now for your FREE StrategyDriven Insights Library – Sample Subscription

In addition to receiving access to Decision-Making Warning Flag 1a – The Gambler’s Fallacy, you’ll help advance your career and business programs through anytime, anywhere access to:

  • A sampling of dozens of Premium how-to documents across 7 business functions and 28 associated programs
  • 2,500+ Expert Contributor management and leadership articles
  • Expert advice provided via StrategyDriven’s Advisors Corner

Best of all, it’s FREE Forever with No Credit Card Required.

Additional Information

Additional insight to the warning signs, causes, and results of logic errors can be found in the StrategyDriven website feature: Decision-Making Warning Flag 1 – Logic Fallacies Introduction.

Decision-Making Warning Flag 2 – The Silent Nod

StrategyDriven Decision Making Article | Silent NodAll too often it is not clear to executives and managers that they are in a decision-making situation. In many of these instances, they find themselves attending a briefing during which the presenter makes a recommendation for which he or she is seeking approval. As the presentation goes on, the briefing attendees listen attentively and nod silently. No verbal decision is communicated but the nodding continues. At the end of the presentation, the presenter is songs adulated for making a thorough presentation and providing an insightful recommendation. There is applause. Exiting the meeting, the presenter remembers the affirmative statements and, most importantly the silent nods. These now become the unintended affirmative decision the presenter sought and the leaders failed to recognize they were making.


Hi there! Gain access to this article with a StrategyDriven Insights Library – Total Access subscription or buy access to the article itself.

Subscribe to the StrategyDriven Insights Library

Sign-up now for your StrategyDriven Insights Library – Total Access subscription for as low as $15 / month (paid annually).

Not sure? Click here to learn more.

Buy the Article

Don’t need a subscription? Buy access to Decision-Making Warning Flag 2 – The Silent Nod for just $2!

How to deal with cyber-attacks: publicly or privately?

StrategyDriven Risk Management Article | How to deal with cyber-attacks: publicly or privately?Cyber attacks spiked 164% in the first half of 2017, compared to the same period in 2016, entailing 918 disclosed breaches-according reports on broadcaster CNBC. Threats vary from sector to sector. Healthcare, for example, is more susceptible to crypto-locker ransomware like the infamous WannaCry.

Internet-connected consumer devices often fall prey to malware that shackles them to remotely controlled botnets such as Mirai. Varied though the threat may be, and staggering though these numbers are, the word disclosed highlights a central paradox: While transparency contributes to the overall fortification of cyber-security protocols and procedures, battening down the hatches presumably mitigates further financial risk.

Sure, a disclosure is immensely beneficial in terms of buttressing industrial safeguards, national and global security, and customer protection – not to mention mitigating the longer-term repercussions of an attack – but so too can disclosure exact lasting damage on a bottom line.

Fighting back

The nature, intent, and consequences of an attack notwithstanding, the way companies have responded to breaches is closely related to their designation: public or private. CFOs at public and private companies face different risks and pressures when it comes to cyber-security and disclosure, and exhibit divergent perspectives when it comes to preparation.

Broadly speaking, public company CFOs are more likely to outsource cyber-security to third-party firms, while private CFOs tend to invest in in-house IT teams. Regardless of who secures a company’s network, breaches are often known by CFOs before they are made public. By disclosing a breach, CFOs of publicly traded companies might trigger investor panic and sell-off, whereas private company CFOs risk irreparable harm to consumer and employee confidence.

On one hand, foreknowledge of pending disclosures can put unique pressure on public company executives, who often own considerable amounts of company stock. The ongoing federal investigation of three Equifax C-suite managers for insider trading arose due to alleged stock dumping prior to the revelation of the company’s catastrophic cyber-attack.
Equifax underscores the tension between a public corporation’s responsibility to its board, shareholders, and customers, and the financial implications of both the breach itself and legal requirements governing its reporting and remediation.

On the other, while private companies aren’t under the same legal obligations in terms of disclosure, and while the short-term consequences may be less impactful, these companies still face long-term pitfalls, such as lost trust and tarnished brands. Moreover, a medium-sized business may not have the capital or reserves to recover reputationally or financially after a major data breach the way a multinational corporation can.

Additionally, the moderate scale of many private companies sometimes instills a false sense of security. Middle-market businesses often assume they’ll be overlooked by attackers, whether due to a large number of similar companies, or a lack of enticing assets. After all, isn’t it the bigger fish that stockpile the type of data and info that hackers tend to target?

Be prepared

A lack of proper preparation only exacerbates the panic once an attack does occur. Attempting to deal with an attack on the down low can earn private enterprises a reputation as easy marks, and provoke subsequent attacks. Further, if the rearguard strategy backfires, or is exposed by the press, this can amplify the damage to a company’s brand and leadership, not to mention potential legal consequences if a court can prove negligence.

In terms of the bigger picture, the lack of reliable data pertaining to attacks on private companies leads to lopsided analysis regarding the multifaceted aims and motives driving these attacks, resulting in a sort of half-finished portrait of the threat landscape.

While cybersecurity prevention could be vastly improved by greater information sharing, some surveys of CSOs indicate that only one in seven attacks are reported to authorities. Alas, as it stands, adequate event modeling, and risk and security assessments, are being stymied by a lack of shared intel on private company breaches, effectively hampering the development of comprehensive prevention and management strategies.

This lack has precipitated the introduction of numerous cyber-security regulations around the world, and though the regulatory ecosystem is in a state of flux, the global trend is invariably toward greater transparency. CNBC notes that “governments around the world are introducing legislation which will force more companies to disclose data breaches,” a reach that already extends to private enterprises.

Regulatory environment

Both private and public companies are compelled to comply with local, national and global disclosure regulations, including Sarbanes-Oxley (SOX), the Health Insurance Portability and Accountability Act (HIPPA), and the EU’s General Data Protection Regulation (GDPR).

The GDPR, which regulates the collection and storage of customer information and data, and can levy fines of up to €20 million, requires that private companies disclose if they have a footprint in Europe, or otherwise handle the information of European citizens.

In the US, Sarbanes-Oxley (SOX) indexes the responsibilities of both public and private companies, including rules pertaining to compliance with federal prosecutors, and criminal penalties. Further, HIPAA governs how any company, public or private, handles personal health information.

Though public companies, traditionally, may have shouldered an inordinate amount of the fallout from disclosure, this has left them better readied for the implementation of legislation designed to enforce transparency. Even more advantageous, public companies now have hard-won practice mitigating the financial risks and ramifications resulting from disclosure.

Private companies, by contrast, are less aware and agile in terms of prevention and response; protecting their brand, for example, or proactively communicating with clients. Simply put, having been in battle, public CFOs are stepping up and getting more involved with cyber-security, while private CFOs, hovering on the sidelines, appear far more circumspect.

Make no mistake: this problem is only getting worse. The situation could improve rapidly if execs from companies of all stripes and sizes shared details of attacks with the larger corporate community.

Whether you are a CFO of an international, publicly-traded conglomerate, or a mid-sized regional business, it is well within your portfolio to do everything possible to properly prepare for the threat. Engage with the board, secure funding for proper security controls, and encourage leadership to be forthcoming when not if, your company’s cyber attack occurs.


About the Author

Andrew Douthwaite has over 17 years of technology experience joining VirtualArmour in 2007 as a senior engineer. Now as Chief Technology Officer, Andrew focuses on leading growth in the managed security services business and ensuring VirtualArmour is a thought leader in the security industry.

StrategyDriven Enterprises

StrategyDriven Enterprises, LLC

StrategyDriven is dedicated to providing executives and managers with the planning and execution advice, tools, and practices needed to create greater organizational alignment and accountability for the achievement of superior results.

We help our clients create and execute a clear, forward-looking strategy – translatable to the day-to-day activities of all organization members – that’s critical to their realizing success in today’s fast paced market environment. Not only does a compelling, well executed strategy align individuals to a common purpose, it ensures that purpose best serves the company’s mission.

The StrategyDriven website provides access to a wide array of best practice business planning and execution tools, streamlined process flows, how-to articles, example-rich podcasts, and customizable ready-to-use program management templates. Premium Members receive access to over 200 members-only articles, whitepapers, models, and tools and templates; providing an in-depth look into critical business performance areas; placing specific focus on the alignment of organizational standards, programs, and behaviors to the optimal achievement of mission goals. Sevian Business Program purchasers receive fully implementable business performance improvement processes out-of-the-box, enabling the acceleration of business growth and heightening of operational efficiency needed to significantly improve bottom line results.

Collectively, our products offer business leaders the opportunity to access the knowledge of a highly educated and experienced staff without the associated overhead expense.

At StrategyDriven, our seasoned business leaders deliver real-world strategic business planning and tactical execution best practice advice – a blending of workplace experience with sound research and academic principles – to business leaders who may not otherwise have access to these resources.

Contact StrategyDriven Enterprises, LLC

Phone: (770) 765-3692

Email: [email protected]

Website: https://www.strategydriven.com

StrategyDriven Service Provider Network Provider Network Disclaimer

How Data Management Can Help You Get More from BI

StrategyDriven Organizational Performance Measures ArticleMaking sound business decisions often relies on extensive analysis from a wide variety of sources, which can be a difficult and laborious process without proper data management solutions. Not taking advantage of modern software services made to manage and govern your information stores in an effective manner can diminish your chances of competing with organisations that do. The business world of today moves at a fast pace, leaving little room for error or experimentation.

To show how business intelligence can be improved via better data management, let’s take a look at how proper data management procedures can drive positive resolutions.

Data Management Suites to Handle Automated Processes

Manually gathering, sorting, and analysing relevant data for your business can be a monumental task that requires a massive amount of manpower. Having the ability to more quickly and efficiently store and retrieve your information in a format that is easy-to-understand and reliable can set you apart from the competition.

Without a proper data management tool such as ZAP Data Hub, you risk missing out on a lot of important data that just can’t be obtained using traditional methods. This reduces your chances of making intelligent business decisions. Data management suites and services are offered by a variety of vendors to meet any industry’s requirements.

Expanding BI Availability Within Your Organisation

If you’re not using information gathering and data-driven decision making across all departments, then you could be missing out on increased productivity and metrics. Lower-level management depends on reports and statistics to be able to do their job effectively; their efforts are hampered by the lack of a fast and simple way to acquire the data they need.

Putting more power into the hands of those who actually use business intelligence to make important decisions can liberate their reliance on other groups and allow for much faster solutions.

Real Time Results Can Make for Quick Decision Making

The slow turnaround time from the request of a data report to its delivery can be a huge roadblock that deters the ability to make speedy resolutions on the fly. The time it takes for a team of people to collect, analyse, and extrapolate real information from a chunk of data is monumental compared to the relative ease in which automated systems can process the same data. Lightning-fast collection and reporting – in real time – allows for far greater flexibility for decision makers and speedy response times.

Automation Allows More Time Spent on Examination

Traditional methods of reporting usually rely on IT or executive branches of your organisation to do the heavy lifting when it comes to data acquisition and publication. In today’s heavily data-driven environment, the need for expedient delivery of records is paramount to success. Following traditional procedures puts your organisation at a disadvantage compared to those who understand the importance of proper data management. It has never been easier to automate these laborious data collection and reporting tasks with modern data management solutions, thereby giving your IT department more time to work on their primary tasks.

Companies live and die by the fortitude of their data management and governance principles. Those that have a tenuous grasp of their data and what it really means are doomed to make poor decisions. Getting the most out of your BI tool requires modern methods and technology-driven protocols.