Category Archives: article

Cognitive Dissonance and Asperger’s Syndrome: Navigating Mental Conflicts

This article examines how cognitive dissonance manifests in individuals with Asperger’s Syndrome, a form of Autism Spectrum Disorder. It highlights the unique challenges faced by these individuals, such as conflicting social expectations, rigid thinking patterns, and struggles with ambiguity. The article offers coping strategies to manage cognitive dissonance, including developing self-awareness, seeking clarity, building flexibility, and utilizing therapeutic interventions like cognitive-behavioural therapy (CBT). It emphasizes the importance of a supportive environment in helping individuals with Asperger’s navigate mental conflicts and enhance their well-being.

Continue reading

Cognitive Dissonance: Understanding the Mental Tug-of-War

This article explores cognitive dissonance, the psychological discomfort from holding contradictory beliefs or values. It delves into the mechanisms of cognitive dissonance, its impact on behaviour and decision-making, and common everyday scenarios where it occurs. The article also provides strategies for managing and reducing cognitive dissonance, emphasizing the importance of self-awareness, open-mindedness, and consistent decision-making.

Continue reading

Cyber Governance at a Crossroads: Responding to DSIT’s Consultation

This framing article summarises a set of responses to DSIT’s Cyber Governance Code of Practice consultation in Jan/Feb 2024. It highlights practitioner and institutional submissions, alongside thematic deep dives on law, assurance, incentives, and professionalism. The message: DSIT asked the right questions, but the hardest answers were still missing.

Continue reading

Professionalism and Accountability: Why Cyber Needs Recognition like Law and Engineering

This article argues that DSIT’s Cyber Governance Code of Practice must embed professional recognition for cyber experts, just as directors rely on lawyers, accountants, and engineers. Without a register of recognised professionals, directors risk being accountable without credible support.

Continue reading

Incentives, Not Just Obligations: Driving Real Uptake of Cyber Governance

This article argues that obligations alone will not drive the adoption of DSIT’s Cyber Governance Code of Practice. To succeed, the Code must be backed by incentives — tax relief, insurance benefits, procurement levers, and reputational recognition — that make governance valuable to boards. Obligations can enforce compliance; incentives will create commitment.

Continue reading

From Cyber Essentials to Corporate Governance: Raising the Bar

Cyber Essentials has value as a baseline, but reaches only 0.3% of UK organisations and says little about governance. This article argues that DSIT’s Cyber Governance Code of Practice must raise the bar, from compliance to accountability, from self-attestation to credible assurance, and from one-off certificates to continuous governance. Cyber Essentials is the floor; governance must be the ceiling.

Continue reading

Comparing and Mapping ISO 27001 and ISO 31000

This article delves into the comparative analysis and practical integration of ISO 27001 and ISO 31000 standards, focusing on their synergies in enhancing organizational risk management strategies. It offers insights into the distinct yet complementary roles of ISO 27001’s information security management and ISO 31000’s broader risk management frameworks, advocating for a unified approach to manage and mitigate diverse organizational risks effectively.

Continue reading

Understanding Key Product Development Roles: Product Owner, Product Manager, Development Manager, Customer Advocate, Project Manager, Programme Manager, and Change Manager

This guide delineates the distinct yet interrelated roles of Product Owner, Product Manager, Development Manager, Customer Advocate, Project Manager, Programme Manager, and Change Manager within the product development ecosystem. It aims to clarify the focus, responsibilities, and objectives of each role, highlighting how they contribute to the successful development and management of products.

Continue reading

Why Self-Attestation Doesn’t Work: Lessons for the DSIT Code

This article argues that self-attestation has failed as a credible assurance mechanism, citing Cyber Essentials’ low uptake and ISO 27001’s limits. It warns that if DSIT builds the Cyber Governance Code of Practice on self-assessment, it will fail. To succeed, the Code must mandate independent, accredited assurance that directors, investors, and regulators can trust.

Continue reading

Lester Dent’s Master Plot Formula: A Guide for Structuring Compelling Narratives

This article outlines Lester Dent’s Master Plot Formula, a systematic approach designed to help writers craft engaging and tightly structured stories. Originating from the pulp fiction era, Dent’s formula divides a story into four equal parts, each with specific goals and challenges for the protagonist, culminating in a resolution that ties up the narrative threads. It offers a practical framework for narrative development, emphasizing pacing, character predicaments, and a satisfying conclusion.

Continue reading