Innovation and National Security in the 21st Century

Irving Wladawsky-Berger

The Task Force noted that leadership in innovation, research and technology since World War II has made the US the most secure and economically prosperous nation on earth. However, “Chinese theft of intellectual property (IP) and its market-manipulating industrial policies threaten U.S.

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. And vice versa. -- Part One Personal baggage - I have a defence and security background. The real advancement in the discussion is going to come from the privacy advocates, not the security advocates.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

The Third Wave of the Digital Economy - Promises and Challenges

Irving Wladawsky-Berger

Atkinson is founder and president of the Information Technology and Innovation Foundation (ITIF), a think tank focused on science and technology policy. They need to make the next-wave digital evolution a central policy goal. Support policies where the benefits are largely unequivocal.

Data 232

A Nonprofit’s Legal Counsel Is The Social Media Manager’s Best Friend!

Beth Kanter

The session will focus on exploring how nonprofits are expanding their efforts to influence public policy through social channels and understanding the legal issues and how to evaluate the work. (I’ll That’s why it is good to have an going relationship and a policy group.

The Economic Potential of The Internet of Things

Irving Wladawsky-Berger

Home - Energy management, security, safety, and automation of home chores. Offices - Organizational and personal productivity, training, energy monitoring, building security. Adoption depends on having certain technologies, organizational capabilities, and policies in place.

Data 263

Is Blockchain Ready to “Cross the Chasm”? Lessons from the Internet

Irving Wladawsky-Berger

Earlier this year, IBM conducted the largest study to date on the state of adoption of blockchain. With such technologies, you typically have a relatively small number of early adopters. The Internet’s early adopters arrived in two phases.

The Identity Challenge: On the Internet, Nobody Knows You're a Dog

Irving Wladawsky-Berger

I recently read Better Identity in America , a report by the Better Identity Coalition , an organization launched earlier this year to focus on promoting the development and adoption of solutions for identity verification and authentication.

Data 193

Blockchain and the Promise of an Open, Decentralized Internet

Irving Wladawsky-Berger

There’s generally a considerable time-lag between the time we start reading articles about their exciting potential and their adoption by companies and industries across the marketplace.

Is Blockchain Now Transitioning to a More Mundane and Useful Era?

Irving Wladawsky-Berger

Most potentially transformative technologies go through the kind of adoption cycles that Orcutt has (metaphorically) compressed into three years. Blockchain was created around a decade ago as the public, distributed ledger for the Bitcoin cryptocurrency.

Issues 195

The Impact of Automation on Everyday Life

Irving Wladawsky-Berger

Recent studies suggest that this transparency can improve user trust and automation adoption.”. There’s broad public support for policies that limit the scope of automation technologies and bring humans more fully into the process.

Survey 216

The Promise and Current State of Blockchain

Irving Wladawsky-Berger

I said that I look at the value of blockchain through two complementary lenses: enhancing the security of the Internet, and reducing the inefficiencies and overheads in applications, like supply chains, involving multiple institutions.

Is Blockchain Ready to “Cross the Chasm”? Lessons from the Internet

Irving Wladawsky-Berger

Earlier this year, IBM conducted the largest study to date on the state of adoption of blockchain. With such technologies, you typically have a relatively small number of early adopters. The Internet’s early adopters arrived in two phases.

Peering into a Confusing, Paradoxical Future

Irving Wladawsky-Berger

This unclassified strategic report is intended to provide the incoming administration and other senior leaders with a framework for long-range policy assessment.

Trends 206

On the Governance of Blockchain: Lessons from the Internet

Irving Wladawsky-Berger

In addition to developing standards and organizing technical, industry and policy activities, these various organization make available open source implementations of their software releases, thus encouraging collaborative, open innovation.

Issues 206

How Will AI Likely Impact How We Work, Live and Play?

Irving Wladawsky-Berger

Section II looks into AI’s overall impact on various sectors of the economy, while the third Section, examines AI issues related to public policy. Public safety and security. “One of the more successful uses of AI analytics is in detecting white collar crime, such as credit card fraud.

System 265

Should the US Slowly Phase Out the $100 Bill?

Irving Wladawsky-Berger

There are important issues of privacy, cyber-security, but it would certainly have big advantages.”. The plan is guided by three key principles: Any plan should be adopted very gradually to allow for mid-course corrections when unexpected problems arise.

Issues 199

The Link Between BYOD and Increased Productivity

TOPYX LMS

Accessing mission critical information, including eLearning and other online learning resources, with an employee’s own device whenever and wherever they may be reduces a barrier that limits adoption and engagement. 43% of companies have unveiled a BYOD security strategy.

The Digital Evolution Index

Irving Wladawsky-Berger

Measurements include available bandwidth, access to digital content, security of transactions, business use of IT, consumer financial services, and quality of roads. Institutional Environment : Are government policies and regulations facilitating the creation of digital ecosystems?

Data 231

Evaluation of CL/4291 “Draft text of the Recommendation concerning Open Educational Resources”, UNESCO

Stephen Downes: Half an Hour

Overall this proposed policy represents well the state of the art in open educational resources (OER) and would serve to further the aims and objectives of open online education. ii) Developing supportive policy 12. I think there’s an important policy point here.

The Jobs Outlook for 2022

Irving Wladawsky-Berger

The survey identified four specific technology advances that are set to dominate business growth over the next five years: ubiquitous, high speed mobile Internet; widespread adoption of big data analytics; artificial intelligence; and cloud computing.

Survey 188

Blockchain and the Promise of an Open, Decentralized Internet

Irving Wladawsky-Berger

There’s generally a considerable time-lag between the time we start reading articles about their exciting potential and their adoption by companies and industries across the marketplace. Their deployment time-lags are longer because attaining their full benefits requires a number of complementary co-inventions and investments, including additional technologies, applications, processes, business models, and regulatory policies.

The Future of Financial Services

Irving Wladawsky-Berger

The wide adoption of the Internet in the 1990s led not only to online banking, but paved the way for e-commerce. . Privacy and security become key competitive advantages.

Data 234

The Continuing Evolution of Cloud Computing

Irving Wladawsky-Berger

Early adopters viewed cloud as computing-on-demand. Skeptics are still not convinced that cloud can provide the necessary security, reliability, privacy and governance.

The Promise and Current State of Blockchain

Irving Wladawsky-Berger

I said that I look at the value of blockchain through two complementary lenses: enhancing the security of the Internet, and reducing the inefficiencies and overheads in applications, like supply chains, involving multiple institutions. In particular, t he design decisions that shaped the Internet back in the mid-late 1980s didn’t optimize for secure, trustworthy operations.

The MIT Intelligence Quest

Irving Wladawsky-Berger

AI was reborn in the 1990s when it adopted a more applied, engineering-oriented paradigm. In addition, the initiative will explore the societal and ethical implications of AI, including the impact of AI on the future of work and on public policy.

Data 167

The Fourth Industrial Revolution

Irving Wladawsky-Berger

Realizing the potential of the Fourth Industrial Revolution, - e.g., Internet of Things , health analytics , smart cities , autonomous vehicles , - requires considerable support and actions from policy makers.

The Vital Role of Research in Preserving the American Dream

Irving Wladawsky-Berger

Secure America’s Leadership in Science and Engineering Research – Especially Basic Research – by Providing Sustainable Federal Funding and Setting Long-Term Investment Goals. .

The USAID-Citi Mobile Money Alliance

Irving Wladawsky-Berger

Last month, the US Agency for International Development (USAID) and Citi announced a partnership aimed at accelerating mobile money adoption in developing countries. USAID and Citi share a common belief that expanding the adoption of mobile financial solutions is a critical economic development strategy with the potential to drive growth and increase financial access and security for the developing world’s poor population.

The Top Ten Emerging Technologies of 2017

Irving Wladawsky-Berger

In the security camera industry, [deep learning networks] are making it possible to understanding crowd behavior, which will make public places and airports safer.

The Impact of Automation on Everyday Life

Irving Wladawsky-Berger

Recent studies suggest that this transparency can improve user trust and automation adoption.”. There’s broad public support for policies that limit the scope of automation technologies and bring humans more fully into the process. The vast majority of respondents would support policies that limit these advanced technologies to specific situation, while bringing humans more fully into their operations.

Survey 100

Whence the Virtue of Open

Stephen Downes: Half an Hour

One good example ( page 20 ) is sufficient to make the point: On the one hand, the government's open data policy says, "The information provider grants you a worldwide, royalty-free, perpetual, non-exclusive licence to use the information, including for commercial purposes.”

New Issues for OERs

Stephen Downes: Half an Hour

The relation between OER and wider social-economic-political issues - not just inclusivity and access (mentioned above) but the role of OERs in promoting individual security, identity, voice, opportunity - is it an educational resource if it doesn’t advance the learner? Encouraging faculty use and creation of OER by changing promotion/tenure policies so that faculty “get credit” for OER Better support for faculty interested in practicing open pedagogy (e.g.,

Issues 146

In Defense of Data Centrism

Martijn Linssen

A senior education administrator meekly suggests the adoption of international standards, PISA , as a baseline for common standards only to be scolded by a peer; “But this is America!” in Public Policy, which focused on Organizational Informatics.

Data 208

The MIT Intelligence Quest

Irving Wladawsky-Berger

AI was reborn in the 1990s when it adopted a more applied, engineering-oriented paradigm. In addition, the initiative will explore the societal and ethical implications of AI, including the impact of AI on the future of work and on public policy. It includes the use of machine-learning models for consumer credit risk management and applications of secure multi-party computation to financial regulation.

APA facilitated CIA torture programme at highest levels

Mind Hacks

The long-awaited independent report , commissioned by the American Psychological Association, into the role of the organisation in the CIA’s torture programme has cited direct collusion at the highest levels of the APA to ensure psychologists could participate in abusive interrogation practices. Reporter James Risen, who has been chasing the story for some time, revealed the damning report and its conclusions in an article for The New York Times but the text of the 524 page report more than speaks for itself. From page 9: Our investigation determined that key APA officials, principally the APA Ethics Director joined and supported at times by other APA officials, colluded with important DoD [Department of Defense] officials to have APA issue loose, high-level ethical guidelines that did not constrain DoD in any greater fashion than existing DoD interrogation guidelines. We concluded that APA’s principal motive in doing so was to align APA and curry favor with DoD. There were two other important motives: to create a good public-relations response, and to keep the growth of psychology unrestrained in this area. We also found that in the three years following the adoption of the 2005 PENS [Psychological Ethics and National Security] Task Force report as APA policy, APA officials engaged in a pattern of secret collaboration with DoD officials to defeat efforts by the APA Council of Representatives to introduce and pass resolutions that would have definitively prohibited psychologists from participating in interrogations at Guantanamo Bay and other U.S. detention centers abroad. The principal APA official involved in these efforts was once again the APA Ethics Director, who effectively formed an undisclosed joint venture with a small number of DoD officials to ensure that APA’s statements and actions fell squarely in line with DoD’s goals and preferences. In numerous confidential email exchanges and conversations, the APA Ethics Director regularly sought and received pre-clearance from an influential, senior psychology leader in the U.S. Army Special Operations Command before determining what APA’s position should be, what its public statements should say, and what strategy to pursue on this issue. The report is vindication for the long-time critics of the APA who have accused the organisation of a deliberate cover-up in its role in the CIA’s torture programme. Nevertheless, even critics might be surprised at the level of collusion which was more direct and explicit than many had suspected. Or perhaps, suspected would ever be revealed. The APA have released a statement saying “Our internal checks and balances failed to detect the collusion, or properly acknowledge a significant conflict of interest, nor did they provide meaningful field guidance for psychologists” and pledges a number of significant reforms to prevent psychologists from being involved in abusive practices including the vetting of all changes to ethics guidance. The repercussions are likely to be significant and long-lasting not least as the full contents of the reports 524 pages are fully digested. Link to article in The New York Times. Link to full text of report from the APA. News

The Real Goal of Open Educational Resources

Stephen Downes: Half an Hour

OER Lebanon - "Our mission is to ensure that the benefits of open educational resources reach every school and university in Lebanon and to foster equal access to quality education through the adoption of OER." He writes: "In the new context of inclusive access models, arguments about 'reducing the cost of college' and providing students with 'day one access' are increasingly ineffective at persuading faculty to adopt OER because publishers have completely co-opted these messages."

Evolve, Dammit!

Martijn Linssen

military adopted ancient models when it structured decision making as a distributed function, within established rules and roles. About John Dr. John Bordeaux brings 28 years’ experience working issues of national security and knowledge management.

Open, Collaborative Trust Frameworks

Irving Wladawsky-Berger

For example, the National Strategy for Trusted Identities in Cyberspace (NSTIC) was launched by the White House earlier this year to enable “Individuals and organizations [to] utilize secure, efficient, easy-to-use, and interoperable identity solutions to access online services in a manner that promotes confidence, privacy, choice, and innovation.” Regulatory and policy practices cannot possibly keep pace with technological change.

A refocus of military influence

Mind Hacks

The change in focus has been prompted by a growing realisation that the success of security strategy depends as much on influencing populations at home and abroad as it does through military force.

Business or Pleasure? - why not both: Do you Fear the End-Of-Year.

Martijn Linssen

Is all of that fixed and clearly regulated via written-down company policies, or does most depend on your managers opinion - or, lets say, mood? Subscribe Top Posts Generations, Social and Enterprise: adopt vs adapt Enterprise 2.0: Business or Pleasure? -

Revolution from the Edge

John Hagel

And that leads to a third item, how would we re-think public policy - all public policy, not just education - through the lens of talent development?    What public policies would we adopt in areas like immigration, trade, financial regulation, intellectual property, etc.   As flow gains momentum, it underdemines the precious knowledge stocks that in the past gave us security and wealth. What fills you with wonder? What do you wonder about?

[berkman] Miriam Meckel on communicating trustworthiness

David Weinberger

Trust enables us to manage the complexity of our social world, reduces the cost of negotiations, facilitates the adoption of new technologies, and reduces perceived risks. A: People don’t read privacy policies when they’re changed. Q: Maybe it’s that when the privacy policy looks impressive, it’s a signal of the quality of the service. But, the key question is whether people who say privacy policies are a trust driver actually read them.

Survey 133

Beyond Free ? Open Learning in a Networked World

Stephen Downes: Half an Hour

This is Tony Bates reporting that adoption by faculty and instructors remains a major challenge. Peter Suber and the aforementioned Steven Harnad have come to argue that institutions need to adopt mandatory open archiving policies. Policies to puncture the student loan bubble.