Looking at Technology Solutions Through an Operational Prism

Looking at Technology Solutions Through an Operational Prism

Looking at Technology Solutions Through an Operational Prism

Anyone who has purchased a new phone, vehicle, or tool at some point asks themselves why certain functions exists. Why does it work this way, why did they change this, and exactly who did they obtain requirements from? End users are usually left pondering “if only they had asked me.”

When it comes to information technology (IT) tools, providers typically cater functionality and usability requirements to large and diverse populations. Providers have become adept at the process of identifying global needs, first considering the masses to address the needs of the most possible users.

Creating IT tools for use in operational environments is not dramatically different, but there are some nuances that designers and developers need to understand and consider. First, designing tools for mission operators and environments requires the understanding that this audience is always going to be laser-focused on mission success. For IT solutions in these environments, complexity is the enemy of usability. Simple to use tools maximize mission impact. In a law enforcement environment, you should also expect a heightened sense of urgency due to the nature of what they do – provide safety, response, and recovery.

Mining core IT needs from these groups that addresses mission gaps and provides measurable impact requires not just understanding the mission, but how the mission is accomplished. Look for and evaluate solutions through an ‘operational prism.’ To deliver powerful systems, walk in the shoes of a Border Patrol agent, an immigration officer, or Secret Service agent.

These understated considerations are often ignored. Design teams should consider:

  • Form and Function – Empathizing with the end user’s operational environment is the key to understanding the difference between what the tool was designed to support, versus how it performs under extreme operational circumstances
  • Accessibility – Operational responders are rarely in a static environment, often attempting access from a patrol car, van, or forward temporary post. Understanding their challenges requires direct observation of personnel on the ground and testing in an operational environment
  • Usability – Know the users – their abilities and their pain points. Understand and appreciate that for the tool to be successful it needs to be employed by the novice IT user, who’s use could impact the safety of those they are responding to support. If operators can’t easily and quickly get to it, they won’t use it

If we listen, learn, and fully appreciate what users are up against, we have a much better chance of creating tools and solutions that mission operators will use and share across the mission space.

About Arc Aspicio
Arc Aspicio is a management, strategy, and technology consulting firm that takes a mission-oriented approach to complex client challenges. Focused on innovation, Arc Aspicio provides services in strategy, design, human capital, operations, analytics and visualization, technology, and information sharing. The company is known for a strong, collaborative culture that values gratitude, provides leadership opportunities, and explores the future. Our teams use a human-centered approach to working with clients and are flexible and responsive within dynamic Government client environments that often have new priorities and evolving missions. We thrive on these situations and promote continuous improvement and new ideas. And, #welovedogs! Follow us on Twitter @arcaspicio or learn more at www.arcaspicio.com.

Contributors

Jim Mackin | Jim joins Arc Aspicio with a wealth of experience in law enforcement, Intelligence, and public affairs. For more than 27 years, Jim served as a Special Agent with the United States Secret Service, retiring as a Deputy Assistant Director (DAD) in the agency’s Office of Protective Operations. Jim had previously served as the DAD in the Office of Government and Public Affairs, where he was the primary spokesperson for the agency, responsible for all internal and external communications and inter-agency liaison activities. Jim has a proven track record for developing resolutions to problems and crises that agencies sometimes face through proactive mitigation strategies and effective communication. Jim’s work within the Intelligence community provides him great insight and first hand experience in information collection, reporting, and dissemination. His background within the Department of Homeland Security makes him well suited to provide clients with both tried and innovative options for change and resolution strategies

Behavioral Science – Using Behavioral Science to Affect Action

Behavioral Science – Using Behavioral Science to Affect Action

How do organizations encourage behavior change in their customers? Increasingly, they focus on customer experience, and as a consequence employ behavioral science methodologies. At the heart of behavioral science is the consideration of how an organization can make small investments that generate incremental savings/returns while considering both customers and organizational benefits. One example is Transportation Security Administration’s (TSA) Pre✓® and U.C. Customs and Border Protection’s Global Entry programs.

Launching into #Action Through Strategy

Launching into #Action Through Strategy

As a new employee, your first company-wide meeting can make you nervous. This was how I felt.

Arc Aspicio’s recent Strategy Launch Day was so well planned and it involved participants so that I learned that I had nothing to worry about! The company treats each employee equally and equips even the newest joiners with the information and skills they need to have a meaningful experience

What Being a Consultant Means to Me

What Being a Consultant Means to Me

As a Consulting Associate at Arc Aspicio, I provide expertise and insight to help clients solve difficult problems. To be successful, a consultant does not need only to be a subject matter expert on their client’s industry and needs - though this often ends up happening over time.

Captivate Your Audience Through Design+Data

Captivate Your Audience Through Design+Data

So often, senior leaders must communicate their strategic and simple vision in a world of growing complexity. They must make decisions – and frequently explain them – based on an enterprise view of their data. It’s getting easier to do this these days through data visualizations and infographics that speak to specific employee and stakeholder audiences. Design+Data is what we call it at Arc Aspicio.

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

Chief Data Officers: Six Steps to Manage Data as an Enterprise Asset

With an exponential increase in the types and quantities of data, organizations need defined strategies and techniques to manage data as an enterprise asset. To create enterprise-wide use of data, a Chief Data Officer (CDO) needs a clear data agenda for leadership and the whole organization to address current and future needs. CDOs should follow this six-part data plan to achieve short term capability gains and plot a path to greater enterprise data maturity.

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Securing Cyberspace: Agile Strategy to Counter Changing Threats

Cybersecurity, managing and protecting computer systems from attacks, is evolving just as quickly as the techniques hackers use to cause damage. Historically, the public and private sectors believed that stronger technology and more advanced computer systems alone were enough to prevent attacks. As new trends emerge and the technologies used to both conduct and prevent hackings improve, cybersecurity strategies must remain agile, trying new tactics to counter changing threats.

Hacking Back – Do the Benefits Outweigh the Risks?

Hacking Back – Do the Benefits Outweigh the Risks?

With the increased frequency and sophistication of cyber-attacks worldwide, companies and executives are becoming frustrated with a traditional focus on defensive tactics. As a result, some private sector actors are taking a more active role in cybersecurity by “hacking back” – hacking against the very groups that are attacking their systems in retaliation or to retrieve stolen data. As hacking back rises in popularity, it is important to consider a number of political and legal issues and the risks to counter-terrorism efforts.

LeadersNest Names Lynn Ann Casey a FedFem Award Honoree

LeadersNest Names Lynn Ann Casey a FedFem Award Honoree

Washington, DC, October 19, 2018 — LeadersNest named Arc Aspicio CEO Lynn Ann Casey a FedFem Award Honoree. The FedFem awards salute high-impact women executives and leaders of the government contracting community. FedFem Award Honorees blend their entrepreneurial courage and Federal government support that effectively impacts the industry, national economy, and the local marketplace. 

Boosting the Mission: Developing Acquisition Requirements Guidance

Boosting the Mission: Developing Acquisition Requirements Guidance

To keep up with the fast pace of change in the field of Government acquisitions, Department of Homeland Security (DHS) components are developing their own acquisition requirements (AR) policies. However, without specific timeframes to finalize these policies, DHS agencies often lack guidance on how to develop ARs. Among DHS agencies, the U.S. Coast Guard is leading the way with their own formal policy to describe this process. To compliment the U.S. Coast Guard’s policy, DHS created the Joint Requirements Integration and Management System (JRIMS) to offer direction for agencies—to review, validate, and suggest solutions for capability gaps and requirements.