ICANN ICANN Email List Archives

[dssa]


<<< Chronological Index >>>    <<< Thread Index >>>

[dssa] Ranking -- A work-assignment for all members -- due by the end of the day next Tuesday 15-Nov

  • To: dssa@xxxxxxxxx
  • Subject: [dssa] Ranking -- A work-assignment for all members -- due by the end of the day next Tuesday 15-Nov
  • From: "Mike O'Connor" <mike@xxxxxxxxxx>
  • Date: Thu, 10 Nov 2011 15:25:13 -0600

<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: 
space; -webkit-line-break: after-white-space; ">hi all,<div><br></div><div>as 
we move into the "analysis" phase of our work, it is important that we take a 
moment to decide *which* topics we would like to start 
with.</div><div><br></div><div>so we've developed these two worksheets for you 
to fill out -- one to rank the threats that we have identified, the other to 
rank the vulnerabilities.</div><div><br></div><div><b>the 
context</b></div><div><br></div><div>this should not be viewed as a final 
ranking, but rather more an informal poll to get an indication of where we 
agree and where we disagree. &nbsp;so these results, while public, are by no 
means final. &nbsp;partly this is because we are likely to disagree on some 
topics. &nbsp;but two other factors should be considered as 
well:</div><div><br></div><div>-- we haven't finished developing our lists of 
threats and vulnerabilities (indeed, two other groups are doing similar work 
and we will want to take a look at their results before making our lists 
final)</div><div><br></div><div>-- we need to consider the *context* of our 
ranking choices -- eg. we may find that we would rank items differently 
depending on whether it's happening right now, or a future 
threat</div><div><br></div><div>but this first ranking exercise will help us 
learn about all of that and more, so we're going to go ahead and give it a 
try.</div><div><br></div><div><b>the 
details</b></div><div><b><br></b></div><div>- this first-try version of the 
worksheet is best completed using Excel. &nbsp;Open Office is a fine 
substitute, you just won't be able to see your ranking. &nbsp;Google Docs makes 
a complete hash of it. &nbsp;we'll try to improve that in subsequent drafts, 
but there's a lot going on behind the scenes that doesn't translate all that 
well right now</div><div><br></div><div>- each spreadsheet has 3 tabs. 
&nbsp;the important one is the "middle" one (Step 1 -- Making the Choices). 
&nbsp;this is where you make choices between pairs of options. &nbsp;you'll 
quickly see that you are being forced to choose between all of our threats and 
vulnerabilities -- but only two at a time. &nbsp;which is more important to 
you, this one or that one? &nbsp;</div><div><br></div><div>- as you choose 
between possibilities, your choices are tallied on the third tab -- please add 
your name and organization to that page, it will make tallying 
easier.</div><div><br></div><div>- once you have completed your work, please 
send your spreadsheet back to the list -- <b>the deadline is 2400 your time on 
Tuesday 15-Nov</b></div><div><br></div><div>- i will combine all the 
spreadsheets and do arithmetic (mean, median, standard deviation, etc.) on the 
results in time for our call next Thursday</div><div><br></div><div><b>the 
future</b></div><div><br></div><div>we're pretty sure we'll do this several 
times. &nbsp;this first time we'll just be learning where we all agree and 
disagree. &nbsp;and how this process works. &nbsp;once we've had more 
discussion, we hope the process will get better and our results will start 
converging. &nbsp;but we'll see. &nbsp;look at it this way, it can't be any 
worse than the mess i made of our Dakar meeting. 
&nbsp;</div><div><br></div><div>thanks in advance -- this will take some time 
(i'd budget about half an hour), but they will be very helpful in guiding our 
work.</div><div><br></div><div>do it! &nbsp;do it now! 
&nbsp;:-)</div><div><br></div><div>mikey</div><div><br></div><div></div></body></html>

Attachment: DSSA -- Threats -- Ranking v1.xls
Description:

<html><body style="word-wrap: break-word; -webkit-nbsp-mode: space; 
-webkit-line-break: after-white-space; "><head></head><div></div></body></html>

Attachment: DSSA -- Vulnerabilities -- Ranking v1.xls
Description:

<html><head></head><body style="word-wrap: break-word; -webkit-nbsp-mode: 
space; -webkit-line-break: after-white-space; "><div></div><div><div>
<div><div style="font-size: 12px; ">- - - - - - - - -</div><div 
style="font-size: 12px; ">phone&nbsp;<span class="Apple-tab-span" 
style="white-space: pre; ">   </span>651-647-6109 &nbsp;</div><div 
style="font-size: 12px; ">fax &nbsp;<span class="Apple-tab-span" 
style="white-space: pre; ">               </span>866-280-2356 &nbsp;</div><div 
style="font-size: 12px; ">web&nbsp;<span class="Apple-tab-span" 
style="white-space: pre; ">        </span><a 
href="http://www.haven2.com";>http://www.haven2.com</a></div><div 
style="font-size: 12px; ">handle<span class="Apple-tab-span" 
style="white-space: pre; ">     </span>OConnorStP (ID for public places like 
Twitter, Facebook, Google, etc.)</div></div>
</div>
<br></div></body></html>


<<< Chronological Index >>>    <<< Thread Index >>>

Privacy Policy | Terms of Service | Cookies Policy