Innovation and National Security in the 21st Century

Irving Wladawsky-Berger

The Task Force noted that leadership in innovation, research and technology since World War II has made the US the most secure and economically prosperous nation on earth. economic competitiveness and national security.”.

Building a More Resilient, Data-Driven Economy

Irving Wladawsky-Berger

Today we face two simultaneous disruptions: one is the COVID-19 pandemic and resulting economic shock, and the second is the rise of pervasive digital data, crypto systems, and artificial intelligence (AI).” T he two disruptions are highly interrelated. Data and AI: A new ecology.

Data 188

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. Large-scale fraud, data breaches, and identity thefts are becoming more common. Why wasn’t stronger security designed into the original Internet infrastructure?

The Emerging Data Economy

Irving Wladawsky-Berger

The Economist’ s May 6 issue referred to data in its cover as the world’s most valuable resource. Similarly, data centers “power all kinds of online services and, increasingly, the real world as devices become more and more connected.”.

Data 206

online privacy and security

Harold Jarche

As the internet becomes an essential part of lives — enabling us to access government services, connect with friends, and earn a living — there are frustratingly few ways to maintain privacy or security online.

cooperation, measurement, security and more

Harold Jarche

Constant, short, safe-to-fail experiments that give us empirical data on what works. Every fortnight I curate some of the observations and insights that were shared on social media. I call these Friday’s Finds. hrheingold : “Don’t refuse to believe; refuse to start out believing.”

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

As the economy and society move toward a world where interactions are primarily governed by digital data and transactions, our existing methods of managing identity and data security are proving inadequate. Few institutions will let their critical data out of their premises.

Data 238

Digital Identity - the Key to Privacy and Security in the Digital World

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are no longer adequate. Data breaches, identity theft and large-scale fraud are becoming more common.

A Framework for the Safe Management of Digital Identities and Data

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are proving inadequate. Data breaches, large-scale fraud, and identity theft are becoming more common. Decentralized data architecture.

Data 166

Owning our data

Harold Jarche

With the internet of everything (IoE), once everything is connected, where will our data reside? If things do not work, will we know what has happened to our data? Individual control over data may be a more robust way to to ensure some level of privacy. Do you own your data?

Data 234

Data, Data Everywhere

George Siemens

This article has been an open tab on my browser for a few months (tabs are just another way to store massive amounts of information that I’ll likely never get to): Data, Data Everywhere : All these examples tell the same story: that the world contains an unimaginably vast amount of digital information which is getting ever vaster ever more rapidly.

Data 136

Rethinking Personal Data

Irving Wladawsky-Berger

In 2010, the World Economic Forum (WEF), launched a project on Rethinking Personal Data. The project brought together experts from business, government, academia and end user privacy and rights groups to examine the challenges and opportunities involved in properly managing the explosive growth of personal data in the digital world. In January of 2011 they published their first report, - Personal Data: the Emergence of a New Asset Class. .

Data 147

In Defense of Data Centrism

Martijn Linssen

Home About Complexity Reading List Knowledge Management Reading List In Defense of Data Centrism John 0 comments Education System Dec 23 In the never ending search to know “what works,” we have a few choices. We can look to theories, i.e., this ‘should’ work; or we can look to data.

Data 208

A Framework for the Safe Management of Digital Identities and Data

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are proving inadequate. Data breaches, large-scale fraud, and identity theft are becoming more common. Data attributes are generally siloed within different private and public sector institutions, each using its data for its own purposes. Decentralized data architecture. Data Federation.

Data 100

Blockchain and Public Health Solutions

Irving Wladawsky-Berger

Given the broad scope of the report, I will focus my attention on one area in particular: identity, health records and shared data. Countries with good access to data, - e.g., China, Singapore, South Korea, - were able to take effective steps to control the spread of the pandemic.

Employee Training in Cyber Security: 4 Tips and Techniques

TOPYX LMS

The current landscape of cyber security is frightening and implementing processes to tackle the growing problem seems daunting. 48 percent of data security breaches are caused by acts of malicious intent. In the past several years, corporations including Anthem, Sony, Ebay, and Target experienced serious data breaches that resulted in a loss of millions of dollars. Preventing many attacks is as simple as a few hours of security training. Security.

New Tools Beget Revolutions: Big Data and the 21st Century Information-based Society

Irving Wladawsky-Berger

While a number of transformative technologies were discussed, big data was the most prominent. . MIT professor Erik Brynjolfsson led an all-MIT academic panel of experts on The Reality of Big Data. We need to change from opinions and hunches and go with facts and data,” he said.

Data 193

Reinventing Society in the Wake of Big Data

Irving Wladawsky-Berger

For several years now, big data has been one of the hottest topics in the IT industry. But, what do we mean by big data ? A number of recent articles have been sounding the alarm that big data may be at the peak of inflated expectations in Gartner’s hype cycle.

Data 276

[liveblog] Data & Technology in Government

David Weinberger

DJ Patil, the first US Chief Data Science, five days into his tenure. Lynn Overmann – Deputy Chief Data Officer, US Dept. ” The velocity is the support of the President who deeply believes in open data and technology. Data scientists are force multipliers. has huge amounts of data and needs help unlocking it. [ In a previous session, Lynn explained that Commerce offers almost no public-facing servies except gathering and releasing data.

Data 135

About face

Doc Searls

Given a base of data about individual faces, and of names associated with those faces, a computer programmed to be adept at facial recognition can also connect faces to names, and say “This is (whomever).” Identity language Law Life privacy problems Research Science security

An Increasingly Digital “New Normal”

Irving Wladawsky-Berger

To do so, they need to frequently collect and quickly evaluate real-time data about customers and markets to help determine what’s working, what isn’t, why, and how to correct or change course. “It’s

Data 198

The 2019 Artificial Intelligence Index

Irving Wladawsky-Berger

The AI Index aims to “provide unbiased, rigorous, and comprehensive data for policymakers, researchers, journalists, executives, and the general public to develop a deeper understanding of the complex field of AI.”.

Data 201

[liveblog][bkc] Paola Villarreal on Public Interest in Data Science

David Weinberger

I’m at a Berkman Klein Center lunch time talk by Paola Villarreal [twitter: paw ], a BKC fellow, on “Public Interest in Data Science.” Data science extracts knowledge and insight from data in various forms, using math, statistics, research, info science and computer science. She is going to talk about the Data for Justice project, which is supported by the Ford Foundation , the ACLU , and the Mozilla Foundation.

Data 126

[liveblog] Noam Chomsky and Bart Gellman at Engaging Data

David Weinberger

I’m at the Engaging Data 2013 conference where Noam Chomsky and Pulitzer Prize winner (twice!) Barton Gellman are going to talk about Big Data in the Snowden Age, moderated by Ludwig Siegele of the Economist. The conference aims at having us rethink how we use Big Data and how it’s used. I’ve been writing articles that are pretty skeptical about Big Data. LS: You’ve said that Big Data is for people who want to do the easy stuff.

Data 184

The State of Financial Health Around the World

Irving Wladawsky-Berger

Conducted by Gallup in partnership with the MetLife Foundation and the Rockefeller Philanthropy Advisors , the study aimed to develop two key financial measures: how secure do people feel around the world, and how much control and influence they believe they have over their financial situations.

The Economic Value of Digital Identity

Irving Wladawsky-Berger

In a world that’s increasingly governed by digital transactions and data, our existing methods for managing security and privacy are proving inadequate. Data breaches, large-scale fraud, and identity theft have become more common.

Data 206

The problem for people isn’t advertising, and the problem for advertising isn’t blocking. The problem for both is tracking.

Doc Searls

At the very least, regulations will force companies harvesting personal data to obey those they harvest it from, by fining them for not obeying. Both are a helluva lot more leveraged than the ill-gotten data gains harvested by the Lumascape doing unwelcome surveillance.

Using Agile Processes to Develop AI-Based Solutions

Irving Wladawsky-Berger

It’s also quite applicable for mission critical software and infrastructure projects where security, availability, scalability and other ilities are paramount. These AI-based systems are generally software-intensive, user-centric, and data-driven.

Pseudorandom Thoughts on Privacy, Security and Trust

Stephen Downes: Half an Hour

Data breaches: we are concerned not just about the breaches, but also data quality. We need to make sure data is accurate. An organization has clients, which give them data. As more clients are added, and through marketing and other activities, the organization has a great deal of data. Even finding the data can be a challenge, knowing who touched the data, when, why. A system is only as secure as its weakest point.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. there is - 40 percent of medicaid companes have experienced a security breach in the last year - we don't know that level in Canada. They need help on security, compliance, risk management,etc.

The Internet of Things is Changing the World

Irving Wladawsky-Berger

In addition to mechanical and electrical components, these new products use digital components like microprocessors, sensors, data storage, software, and connectivity in a wide variety of ways.

Change 159

Impact of AI on Government - Opportunities and Challenges

Irving Wladawsky-Berger

In particular, AI will have a major impact in three key areas: the transformation of the federal workday, the potential for personalized customer service and the increased importance of technical and data skills. Security.

Data 143

Reality mining, pervasive data capture, and how Big Data can create value

Ross Dawson

CIO magazine did a nice article titled IIIS: Big Data driving new trends which reviews my keynote and the one immediately after from Steve Duplessie , one of the world’s top analysts on data and storage. If you look at an office environment there is an extraordinary amount of data to look at. You can literally get terabytes of data out of just a few hours of this. This requires all that data within the organisation to be captured and used effectively.”.

Data 186

Leveraging AI to Transform Government

Irving Wladawsky-Berger

Since the LA Airport police doesn’t have enough officers to staff checkpoints at all times on the eight roads leading to the airport, the USC team developed an AI system to make security schedules unpredictable. Data shows that over 50% of people in jails around the country have mental issues.

Data 145

The Third Wave of the Digital Economy - Promises and Challenges

Irving Wladawsky-Berger

big data, smartphones and cloud computing. Artificial Intelligence Complex Systems Data Science and Big Data Economic Issues Education and Talent Future of Work Innovation Management and Leadership Political Issues Society and Culture Technology and Strategy

Data 221

The Economic Value of Artificial Intelligence

Irving Wladawsky-Berger

Moreover, network effects, - that is, the more data and better insights companies are able to gather, the more appealing the products and services they’ll be able to develop, - will further increase consumer demand.

Data 245

The Identity Challenge: On the Internet, Nobody Knows You're a Dog

Irving Wladawsky-Berger

The report outlines a policy agenda for improving the privacy and security of digital systems and help combat identity fraud. Data breaches, large-scale fraud, and identity theft are becoming more common. Change the way America uses the Social Security Number.

Social Physics and Cybercrime Detection

Irving Wladawsky-Berger

Social physics is based on the premise that all event-data representing human activity, - e,g,, phone call records, credit card purchases, taxi rides, web activity, - contain a special set of group behavior patterns. Data derived from human behavior is quite different.

Data 186

Blockchain Beyond the Hype

Irving Wladawsky-Berger

Every piece of information in the ledger is secure because it’s encrypted using public-key cryptography , which can only be decrypted with the appropriate private key. Blockchain enables the members of an ecosystem to securely share data even if all the members are not fully trusted.

Data 176

The Data Center in the Cambrian Age

Irving Wladawsky-Berger

And, at the other end of the spectrum, we are seeing the data center itself, whose roots go back to the earliest days of computers, being completely reinvented as well. The question then arises whether WSCs and Cloud data centers in general are only applicable for born-to-the-Cloud , relatively young companies like Google, Amazon and Yahoo who run a small number of huge workloads each of which exhibits a very high degree of parallelism.

Data 141

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. And vice versa. -- Part One Personal baggage - I have a defence and security background. The real advancement in the discussion is going to come from the privacy advocates, not the security advocates.

Unlocking Data for Philanthropy: Notes from Global Philanthropy Forum Session

Beth Kanter

I went to cover one session, “ Building An Information Infrastructure: Unlocking Data for Philanthropy.” ” For further context on mindset and work practice changes in philanthropy to embrace data, here’s some points from Lucy Bernholz.

Data 91

Blockchains: the Promise of More Frictionless, Trusted Economies

Irving Wladawsky-Berger

Large-scale fraud, data breaches, and identity thefts are becoming more common, and companies are finding that cyber-attacks are costly to prevent and recover from. . Why wasn’t stronger security designed into the original Internet infrastructure? Foremost among them is security.

Data 234