Security?

Dave Snowden

At that level the concept of intractable problems for which there is no obvious solution is common place so many of the complexity messages fall onto fertile ground. The post Security? I had three presentations today and my voice held up, just. I’ve had a bad cold for weeks and jumping time zones is not the best way to shake that off. But I fell back on a trusted recipe of lemsip, whisky, throat sweets and a degree of self-delusion as to my condition.

Adventure & security

Dave Snowden

In the presentation I used a quote from T S Eliot which I found the other day and which is apposite to the current state of affairs in complexity theory. Nothing pleases people more than to go on thinking what they have always thought, and at the same time imagine that they are thinking something new and daring: it combines the advantage of security and the delight of adventure. We see a lot of work here on complexity modelling and the like.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Innovation and National Security in the 21st Century

Irving Wladawsky-Berger

“Countries that can harness the current wave of innovation, mitigate its potential disruptions, and capitalize on its transformative power will gain economic and military advantages over potential rivals,” was the top finding of the Innovation and National Security Task Force which was commissioned by the Council of Foreign Relations (CFR) to assess the current state of US technological innovation. economic competitiveness and national security.”.

Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. The interconnectedness and openness made possible by the Internet and broader digital ecosystem create unparalleled value for society,” notes the report in its Executive Summary. “But these same qualities make securing today’s cyber landscape difficult. Why wasn’t stronger security designed into the original Internet infrastructure?

cooperation, measurement, security and more

Harold Jarche

Teachers and many parents understand that children’s development is far too complex to capture with an hour or two taking a standardized test. The proper way to conduct ourselves in the complex domain is through experiments. Every fortnight I curate some of the observations and insights that were shared on social media. I call these Friday’s Finds. hrheingold : “Don’t refuse to believe; refuse to start out believing.” ” #crapdetection.

“Flexible Security”: A Sensible Social Policy for our Digital Age

Irving Wladawsky-Berger

The article makes a strong case for flexicurity - shorthand for flexible security, - a social model from the Nordic countries which aims to achieve both flexibility in labor markets and security for workers. Like me, many workers enjoyed relatively secure, stable jobs and a number of company benefits, including health care insurance, vacations and retirement pensions. Entrepreneurship and flexible security.

Fidelity in complex systems consultancy

Dave Snowden

Returning yesterday from my first TedX in Cyprus I was chatting with Sonja Blignaut about some upcoming activities and differences between approaches to sense-making and complexity. Now it is an understandable issue; if you work for yourself then securing revenue is as vital and shooting, or failing to rehire the messenger is all to frequent. In a complex system we: start journeys with a general sense of direction but without precise targets.

[shorenstein][liveblog] Juliette Kayyem on communicating about security

David Weinberger

Juliette Kayyem , a former Boston Globe columnist, a commentator, Homeland Security advisor to Gov. Deval Patrick, and a former candidate for governor of Massachusetts, is giving a Shorenstein Center talk about how to talk with the public about security issues. Juliette oversaw the local Homeland Security response to the Marathon Bombing and had participated in the security planning. She learned that last lesson from her security experience.

the complexity of capitalism

Harold Jarche

“I suspect that the clean, uncomplicated notions put forward in the book [Organizing for Complexity, by Frédéric Laloux] will be undone by context, the actual details of implementation and to a large extent power-dynamics (for example, autocratic ‘Teal’ leaders making ‘non-Teal’ people do things they don’t want to do). And like all instruments it appeals to a certain instrumental logic, one that craves a simpler world and shies away from complexity.

“Complicated” vs. “Complex”

Martijn Linssen

The background: A gentleman who makes a living “reducing complexity” for IT systems keeps running into some of us on Twitter who study complexity. The ask: There is a group of complexity aficionados that criticize my use of the word “complexity.” ” In general, these are folks who are influenced by the Cynefin framework that considers complexity and complicated to be different attributes of a system. The Emergence of Complexity.

The Firm as a Large, Complex, Extended Family

Irving Wladawsky-Berger

A firms is best viewed as a kind-of rather large and highly complex family. We also form companies and other such organizations to get things done in our work, especially more complex objectives that require the collective skills of multiple people. We depend on colleagues to do well in our jobs, and to achieve whatever professional recognition and financial security we are after.

How Can We Ensure that Our Complex AI Systems Do What We Want Them to Do?

Irving Wladawsky-Berger

Things are even tougher with people-centric sociotechnical systems, which not only have to deal with potential software problems, but with the even more complex issues involved in human behaviors and interactions. And, at the bleeding-edges of complexity are data-driven AI systems , which are generally based on statistical analysis and machine learning methods. . What is it that makes these systems so intrinsically complex? What purpose does this complexity serve?

System 167

Complexity and Design in Warfare

Irving Wladawsky-Berger

The workshop explored how design-oriented approaches can help us better understand and deal with the very complex problems we are increasingly encountering in all aspects of business, economies, government, public policy, military operations and society in general. Some of the areas explored by the Forum are emerging technologies, organizational development, economic competition, and the changing concept of security.

On the Complex Evolution toward Mobile Digital Payments

Irving Wladawsky-Berger

On September 9, Apple announced Apple Pay , an easy, secure way to make mobile payments using their latest devices , - the iPhone 6’s and Apple Watch. Apple Pay is embracing a number of industry standards , including NFC (near-field communications) for contact-less payments; Secure Element , a dedicated device chip; and network-based tokenization to protect sensitive financial data.

The Complex Transition to the Age of the Cloud

Irving Wladawsky-Berger

While the skeptics’ concerns, - security, reliability, privacy, costs and others, - are quite real, the hardest part of implementing cloud strategies has little to do with technology. Cloud computing is a highly complex initiative - at the technical, business and organizational levels. And, one of the key lessons we all hopefully learned from the dot-com era is that complex, global initiatives take time. In June of 2008 I participated in a conference on cloud computing.

Complex Sociotechnical Systems: the Case for a New Field of Study

Irving Wladawsky-Berger

They generally exhibit a level of complexity that is often beyond our ability to understand and control. Not only do they have to deal with the complexities associated with large scale hardware and software infrastructures, but with the even more complex issues involved in human and organizational behaviors. . A few weeks ago, MIT professor Joseph Sussman addressed these issues in a lecture - Complex Sociotechnical Systems: The Case for a New Field of Study.

System 167

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

Contributing factors include expanding networks, growing e-commerce, complex software, greater pressure to reduce time to market, and the ubiquity of computers. A system is only as secure as its weakest point. Feynman also got involved in safe-cracking - he would try to find patterns in the security. From a security implementor's point of view - stupid defenses only keep out stupid attackers. Planning for security in the design stage is rarely done.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The key question is whether government and industry can collaborate successfully in a complex regulatory environment. The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. They need help on security, compliance, risk management,etc.

Knowledge sharing: for doing complex work in a complex world

Nancy White

Here’s what I’m up to this week - today prepping for the FAO/CGIAR/BIOVERSITY/WFP/IFAD joint 3 day knowledge Share Fair, with a close focus on KS in global development as it relates to agriculture and food security. One of the activities is a 90 second challenge to talk about what IS Knowledge Sharing… “Knowledge sharing is necessary to do complex work in a complex world&#.

Would a Distributed Model of Government be More Suitable for a Complex, Diverse 21st Century Democracy?

Irving Wladawsky-Berger

While business and government have clearly different objectives, many of the challenges involved in managing a complex, fast changing organization are similar. If large global companies have had to embrace a more distributed management style, why not large, complex governments? He believes that a number of key responsibilities must remain with the federal government, including Social Security and Medicare benefits. “. Your social security number is good anywhere.”.

New Directions for Government in the Digital Age

Irving Wladawsky-Berger

Ensure security, privacy, autonomy, and citizen-owned identities. In a world increasingly driven by digital transactions and data, our existing methods for managing security, privacy , and digital identities are far from adequate.

Oxytocin is a complex character

Mind Hacks

Those who were more secure in their relationships reacted in the opposite way – they remembered mum as being closer and more caring when they took the oxytocin. Not Exactly Rocket Science elegantly covers a new study that counters the tired ‘love drug’ stereotype associated with the hormone oxytocin.

Ten IT Predictions for the Post-Pandemic New Normal

Irving Wladawsky-Berger

Remediate and adapt : “Identify shortcomings in existing IT environments such as decision support systems, remote work, and business/IT resiliency as well as addressing shortcomings in areas such as connectivity/security introduced during initial emergency responses.”.

Building Better Jobs in an Age of Intelligent Machines

Irving Wladawsky-Berger

must innovate to rebalance the desire of employers for low-cost, minimal commitment, and maximal flexibility, with the necessity that workers receive fair treatment, reasonable compensation, and a measure of economic security.

Data 214

The Collapse of Complex Business Models ? Clay Shirky

Clay Shirky

The Times’ Paywall and Newsletter Economics » The Collapse of Complex Business Models. In 1988, Joseph Tainter wrote a chilling book called The Collapse of Complex Societies. Every one of those groups had rich traditions, complex social structures, advanced technology, but despite their sophistication, they collapsed, impoverishing and scattering their citizens and leaving little but future archeological sites as evidence of previous greatness. Clay Shirky.

The Real Business of Blockchain

Irving Wladawsky-Berger

Blockchains support the secure exchange of value in the form of tokens. “Tokens might function as digital representations of physical assets, as a reward mechanism to incentivize network participants, or to enable the creation and exchange of new forms of value.”.

Irving Wladawsky-Berger: The Complex Chemistry between Brands and Customers - Some Personal Experiences

Irving Wladawsky-Berger

Home Archives Subscribe « Welcome to Adam Smiths World | Main | Social networks and Organizational Governance » October 08, 2007 The Complex Chemistry between Brands and Customers - Some Personal Experiences People have very complex relationships with companies and the products and services they offer. " The relationship between a brand and its customers is a complex one indeed, full of emotional connections and chemistry.

The State of Financial Health Around the World

Irving Wladawsky-Berger

Conducted by Gallup in partnership with the MetLife Foundation and the Rockefeller Philanthropy Advisors , the study aimed to develop two key financial measures: how secure do people feel around the world, and how much control and influence they believe they have over their financial situations. While researchers have developed valuable measures of financial inclusion and financial literacy, data on financial security and control have never existed before.

Could AI Reshape the Global Balance of Power?

Irving Wladawsky-Berger

The National Security Commission on Artificial Intelligence (NSCAI) was established by the US Congress in Fiscal Year 2019 to “advance the development of artificial intelligence, machine learning, and associated technologies by the United States to comprehensively address the national security and defense needs of the United States.” AI has the potential to significantly advance national security. Apply AI to National Security Missions.

The Transformative Power of Blockchain

Irving Wladawsky-Berger

It succinctly defines blockchain as “a shared, decentralized, cryptographically secured, and immutable digital ledger,” and then adds a few key attributes that are particularly important to enterprise blockchains: Accountability. Security. “Enterprise blockchains are fault-tolerant. But, to keep InternetOne as simple and flexible as possible, just about everything else, - including identity and security management, - became the responsibility of the applications in InternetTwo.

Building a More Resilient, Data-Driven Economy

Irving Wladawsky-Berger

In the US, for example, “almost 100 million people are members of credit unions, not-for-profit institutions owned by their members, and already chartered to securely manage their members’ digital data and to represent them in a wide variety of financial transactions, including insurance, investments, and benefits. We must thus ensure that these highly complex digital legal systems are safe, secure and achieve the desired societal objectives.

Data 161

The Urgent Need to Strengthen the Nation’s Resilience

Irving Wladawsky-Berger

These included a significant expansion of government support for scientific research in universities and R&D labs, leading to product innovations from the private sector and better weapons from the defense industry, - and making the US the most prosperous and secure nation in the world. A recent task force on Innovation and National Security noted that “Washington has failed to maintain adequate levels of public support and funding for basic science.

Price 168

How Will the Pandemic Reshape Labor Markets?

Irving Wladawsky-Berger

Complex Systems Economic Issues Education and Talent Future of Work Innovation Management and Leadership Political Issues Services Innovation Society and Culture

Issues 165

An Increasingly Digital “New Normal”

Irving Wladawsky-Berger

Good design aims to make our interactions with complex products and institutions, - e.g., a business, a healthcare provider, a classroom, a government function, - as appealing and intuitive as possible. Given the huge complexities and challenges of this forced virtualization, organizations must take advantage of agile kinds of methods to help them simplify, focus, and avoid being overwhelmed.

Data 159

Blockchain and Public Health Solutions

Irving Wladawsky-Berger

To reach a higher level of privacy and security, we need to establish a trusted data ecosystem for each kind of identity, which requires the exchange and sharing of data across a variety of institutions. However, safeguarding the data used to validate identities creates security and privacy issues of its own. The Blockchain Research Institute (BRI) is a global think tank dedicated to the strategic implications of blockchain technologies to business, government and society.

The Blockchain Value Framework

Irving Wladawsky-Berger

Across all industries, the top three priorities were “full traceability of information on the blockchain”; “ability to ensure data has not been tampered with”; and “increased security”. “New business products or services” ranked last among the options for investing in blockchain, suggesting that at this early stage, improving existing products and services is a higher priority than considering new business opportunities.

Survey 150

The Long-Term Future of Work and Education: Three Potential Scenarios

Irving Wladawsky-Berger

The framework includes five categories of skills: communicating, collaborating and sharing online; handling information and content securely; buying, selling and managing transactions; finding solutions to problems using digital tools; and being safe and legal online. Artificial Intelligence Complex Systems Economic Issues Education and Talent Future of Work Management and Leadership Political Issues Services Innovation Smart Systems Society and Culture Technology and Strategy

Blockchain - the Networked Ecosystem is the Business

Irving Wladawsky-Berger

The infrastructures, processes and ecosystems of supply chains are significantly less complex than those in financial services, healthcare, music, and other industries Their objectives are relatively straightforward: increase the speed, security and accuracy of financial and commercial settlements; track the supply chain lifecycle of any component or product; and securely protect all the transactions and data moving through the supply chain.

The Economic Value of Digital Identity

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are proving inadequate. Protects user privacy and ensures control over personal data: includes strong privacy and security safeguards, while giving users access to, and control over who can access their data. Identity plays a major role in our everyday life.

Data 153

The Internet of Things is Changing the World

Irving Wladawsky-Berger

We’ve long thought of products as physical entities built with a combination of mechanical and electrical components, - e.g., appliances, cars, agricultural machines, industrial equipment, - some quite simple and some highly complex. Using a smartphone app, the home owner can watch and talk to the visitor, while a video of their interaction is saved for an added level of security.

Change 130

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

As the economy and society move toward a world where interactions are primarily governed by digital data and transactions, our existing methods of managing identity and data security are proving inadequate. These include social security ID, passport number, driver’s license number, e-mail address, telephone numbers, and login IDs and passwords. Since users in Enigma are owners of their data, we use the blockchain as a decentralized secure database that is not owned by any party.

Data 178

About face

Doc Searls

If that person returns in the future and the facial-recognition software detects them, security will be dispatched to ask the gambler to leave.” For example, in Barcelona, CaixaBank is rolling out facial recognition at its ATMs, claiming that 70% of surveyed customers are ready to use it as an alternative to keying in a PIN, and that “66% of respondents highlighted the sense of security that comes with facial recognition.” We can know more than we can tell.

Leveraging AI to Transform Government

Irving Wladawsky-Berger

Since the LA Airport police doesn’t have enough officers to staff checkpoints at all times on the eight roads leading to the airport, the USC team developed an AI system to make security schedules unpredictable. After analyzing potential targets, the system recommended randomized police patrol routes and schedules so that terrorists could not anticipate where and when they would run into security checkpoints. Conquering the Complexities of Federal Purchases.

Data 117