Browse Definitions :
Definition

unknown unknown

An unknown unknown is unidentified information. An individual or organization may realize that such information exists and is relevant to them but its specifics are completely outside of their scope of awareness. The term is one of four categories of information, which also includes known knowns, unknown knowns and known unknowns.

Unknown unknowns are pertinent to many areas of information technology, including big data, text mining, project management, software design and cybersecurity. In the context of big data, for example, an unknown unknown may represent an unidentified asset. Many organizations access and store huge volumes of unstructured data without much knowledge of its potential value. However, big data analytics software may identify patterns and connections among data that yield useful information.

In project management and security, on the other hand, unknown unknowns are more often spoken of as unidentified risks. Nevertheless, there is benefit in understanding that there may be completely unpredictable events and outcomes that could have a significant effect on an organization, and reserving some contingency resources to respond to such situations.

Current discussion about unknown unknowns and its variations arose from then-United States Secretary of Defense Donald Rumsfeld’s 2002 comment at a Defence Department briefing:

“There are known knowns. There are things we know that we know. There are known unknowns. That is to say, there are things that we now know we don't know. But there are also unknown unknowns. There are things we do not know we don't know.”

Rumsfeld was differentiating categories of knowledge in a military context. The comment was generally considered nonsensical and public response was derisive. Since then, however, the terms have been elaborated upon and applied in business, the sciences and other areas of endeavor.

This was last updated in February 2019

Continue Reading About unknown unknown

Networking
Security
  • personally identifiable information (PII)

    Personally identifiable information (PII) is any data that could potentially identify a specific individual.

  • zero-day vulnerability

    A zero-day vulnerability is a security loophole in software, hardware or firmware that threat actors exploit before the vendors ...

  • DNS attack

    A DNS attack is an exploit in which an attacker takes advantage of vulnerabilities in the domain name system.

CIO
  • data collection

    Data collection is the process of gathering data for use in business decision-making, strategic planning, research and other ...

  • chief trust officer

    A chief trust officer (CTrO) in the IT industry is an executive job title given to the person responsible for building confidence...

  • green IT (green information technology)

    Green IT (green information technology) is the practice of creating and using environmentally sustainable computing resources.

HRSoftware
  • diversity, equity and inclusion (DEI)

    Diversity, equity and inclusion is a term used to describe policies and programs that promote the representation and ...

  • ADP Mobile Solutions

    ADP Mobile Solutions is a self-service mobile app that enables employees to access work records such as pay, schedules, timecards...

  • director of employee engagement

    Director of employee engagement is one of the job titles for a human resources (HR) manager who is responsible for an ...

Customer Experience
  • digital marketing

    Digital marketing is the promotion and marketing of goods and services to consumers through digital channels and electronic ...

  • contact center schedule adherence

    Contact center schedule adherence is a standard metric used in business contact centers to determine whether contact center ...

  • customer retention

    Customer retention is a metric that measures customer loyalty, or an organization's ability to retain customers over time.

Close