Carnival of Quality Management Articles and Blogs – December 2019

Welcome to December 2019 edition of Carnival of Quality Management Articles and Blogs.

Our core subject of Quality Management – Road Ahead to Digital Transformation during the year 2019, we have covered The Basics of Digitization, Digitalization and Digital Transformation, The foundation of the Digital Quality Management, Quality 4.0 and Industry 4.0 technologies Big Data Analytics, Cloud computing, Robotics, Augmented Reality, Simulation, Additive Manufacturing, Industrial Internet of Things  and Horizontal and Vertical System Integration.

We will now take up last of the nine disruptive technologies of Industry 4.0 –– Cybersecurity.

Cybersecurity is the practice of protecting systems, networks, and programs from digital attacks. These cyberattacks are usually aimed at accessing, changing, or destroying sensitive information; extorting money from users; or interrupting normal business processes…A successful cybersecurity approach has multiple layers of protection spread across the computers, networks, programs, or data that one intends to keep safe. In an organization, the people, processes, and technology must all complement one another to create an effective defense from cyber-attacks.[1]

Cybersecurity in Industry 4.0 has an immediate effect on CPS, the Internet of Things (IoT) and the Internet of Services (IoS).

Industry 4.0 and its connection with Internet and Information and Communication Technologies. (Source: Germany Trade & Invest. 2013)-

Each brings its own range of threats, vulnerabilities and possible challenges/safeguards with regard to cybersecurity. Below, a number of these are outlined:

Cybersecurity must therefore be thought of as a protective mechanism, but also, especially, as a basic requirement in order for business to continue.[2] That is where the quality management core principles come into the play and so-called traditional quality people need to learn these new concepts so as to help build good practices, work groups and reference architectures.

The seven steps of a cyber-attack, which can lead to dire consequences. To prepare oneself against such an attack and to reduce the attack vector, one should design a six-step approach.

The three-pillar approach to cyber security consists of people, process, and data and information.

The first pillar is people. People are an easy target to pick the bite of the phishing bait, Through frequent exposure and regular training, your organization will develop a culture of cyber security awareness. The second of the three pillars is process. The process pillar is made up of multiple parts: management systems, governance, policies and procedures and managing third parties. All of these parts must be addressed for the process pillar to be effective.

When all is said and done about Industry 4.0 or Quality 4.0 in these sets of episodes, the message that very clearly seems to come out is that Quality 4.0 Takes More Than Technology – To effectively implement Quality 4.0—the technological as well as the non-technological aspects—companies should take a structured approach that includes the following elements:

    • Prioritize pain points to address first on the basis of potential to unlock value and reduce risk;
    • Identify, test and scale up use cases. Begin implementation with proof-of-concept (PoC) pilots that focus on high-value use cases.;
    • Develop a vision and road-m which articulates how Quality 4.0 promotes the company’s overall business strategy and how it contributes to creating a sustainable competitive advantage.
    • Establish technology and data enablers of Quality 4.0, including the IoT infrastructure and data architecture;
    • Build the required skills – whether by upskilling or retraining the current workforce or by recruiting digital specialists;
    • Manage the changes across the enterprise, including the implementation of a comprehensive digital strategy;
    • Foster a quality culture through an across-the-organization involvement in the necessary changes to the context in which people work, addressing topics such as metrics and incentives, role mandates, and organizational structures.

We will now turn to our regular sections:

For the present episode we have picked up article, Digitizing Culture: Are You Doing It Wrong? on Insights and Analysis From Gallup column of Management Matters Network ….

      • It’s crucial for companies to create an effective digital workplace culture
      • Digital culture is even harder to get right than in-person culture
      • Culture tools are only as good as the way they’re used

We also have one more article  that deals with the process of (digital) transformation – Thawing the frozen middle – As businesses put trillions of dollars into digital transformations, they need a plan to ensure that middle management is helping make the most of the investment… Transformation failures are not caused by one person or one single issue. By understanding the psyche of the middle management layer, CEOs can identify the levers that will work and unlock the benefits of transformation. It’s a matter of focusing on human capital and valuing the skills that their people have and can develop. They can then redeploy their creative, resilient, upskilled people to tackle more problems and create more value. Technology fundamentally changes the role of middle managers, but it simultaneously makes them even more important.

We now watch ASQ TV, wherein we look at a few relevant videos:

    • Cybersecurity in Retail – What is cybersecurity? Learn what it is, why it’s important and how it can make or break your business.
    • Protect Your Organization From Cyber Attacks – Dave Nelson, Founder, Pratum, offers practical suggestions to protect your organization from cyber-attacks. Nelson suggests using gap analysis and process mapping to make sure you have adequate security and, in case of an attack, have sound processes in place to mitigate the damage.

Jim L. Smith’s Jim’s Gems posting for November 2019 is:

    • Excuses – It’s a safe bet that everyone has used excuses to avoid doing something or to delay the inevitable… It is much easier to give in to the excuses. However, when you do give in all you’re left with is regret…Rather than take the easier path by using the excuses, it is more difficult to do those things you know you’re capable of doing. From that difficulty, however, comes the golden experience of the life you were meant to experience… All you have to lose are those excuses and a lot of regret but there is so much more to be gained.
    • Growth – In some way, personal growth is almost always uncomfortable. However, refusing to grow is often, in the long run, much more uncomfortable… To grow, it requires that we admit where we’re weak and then work to strengthen those aspects of our life – personal and professional… Whatever is going on in our life this very moment offers valuable opportunities for us to grow stronger, more effective, and more positively directed toward real fulfillment…. Embrace these opportunities even though they may seem a little uncomfortable… And as we grow, the positive possibilities will grow even more superlative in our world.

This brings us to the end of our journeys to the Carnival of Blogs on Quality Management for the year 2019. Till we meet to resume our journey in 2020, with a fresh look on the fundamentals, I wish you all a great year-end that provides a strong jumping board to more challenging, more fulfilling and more satisfying 2020.

Note: The images depicted here above are through courtesy of respective websites who have the copyrights for the respective images.

[1] What Is Cybersecurity?

[2] Cybersecurity in Industry 4.0

P.S. – All episodes of Quality Blog Carnival 2019 edition can be viewed / downloaded in a unified file by clicking the hyper link.


In July 2011, I opted to retire from my active career as a practicing management professional. In the 38 years that I pursued this career, I had opportunity to work in diverse capacities, in small-to-medium-to-large engineering companies. Whether I was setting up Greenfield projects or Brownfield projects, nurturing the new start-ups or accelerating the stabilized unit to a next phase growth, I had many more occasions to take the paths uncharted. The life then was so challenging! One of the biggest casualty in that phase was my disregards towards my hobbies - Be with The Family, Enjoy Music form Films of 1940s to mid-1970s period, write on whatever I liked to read, pursue amateur photography and indulge in solving the chess problems. So I commenced my Second Innings to focus on this area of my life as the primary occupation. At the end of four years, I am now quite a regular blogger. I have been able to build a few very strong pen-relationships. I maintain contact with 38-years of my First Innings as freelance trainer and process facilitator. And yet, The woods are lovely, dark and deep. But I have promises to keep, And miles to go before I sleep, And miles to go before I sleep.

Leave a Reply

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out /  Change )

Twitter picture

You are commenting using your Twitter account. Log Out /  Change )

Facebook photo

You are commenting using your Facebook account. Log Out /  Change )

Connecting to %s

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: