“Flexible Security”: A Sensible Social Policy for our Digital Age

Irving Wladawsky-Berger

Or, do we also need social policies to promote job creation and assist workers who’ve lost their jobs? One of the Foreign Affairs articles, - The Next Safety Net: Social Policy for a Digital Age by Nicolas Colin and Bruno Palier , - offers some answers to these questions. “As

AI and Public Policy

Irving Wladawsky-Berger

The report is organized into three main sections: Section I described the key research trends influencing AI’s future; Section II examined the key economic sectors that are most likely to be impacted by AI; and Section III looked into issues surrounding AI and public policy.

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Innovation and National Security in the 21st Century

Irving Wladawsky-Berger

The Task Force noted that leadership in innovation, research and technology since World War II has made the US the most secure and economically prosperous nation on earth. However, “Chinese theft of intellectual property (IP) and its market-manipulating industrial policies threaten U.S.

Securing the Foundations of our Digital Economy

Irving Wladawsky-Berger

On December 1 the Commission issued its final Report on Securing and Growing the Digital Economy. Technological advancement is outpacing security and will continue to do so unless we change how we approach and implement cybersecurity strategies and practices.

cooperation, measurement, security and more

Harold Jarche

Politicians believe that testing must be the cornerstone of any education policy. The implication for policy is that there is no inescapable trend in occupational developments. Every fortnight I curate some of the observations and insights that were shared on social media.

Medicare: Does Policy Trump Politics?

Nine Shift

We know this because they fought over sewer systems, 40 hour work week, unions, Social Security, cars and highways, and the infrastructure of the last century before accepting/agreeing on them. The new infrastructure of the 21st century will gain political consensus. But did that consensus begin this week with Paul Ryan's new Medicare plan that includes saving the traditional federal plan? Health insurance, Medicare, trains, unions, taxes - - all are being fought over by politicians.

Hillary Clinton’s Internet policy speech

David Weinberger

We need our networks to be secure, especially from evil organizations. “Information freedom&# is not just good policy, but it’s a universal value and good for business. First, my overall reaction to Hillary Clinton’s speech: It’s thrilling that a Secretary of State would claim “freedom to connect&# as a basic human right. That’s a very bit stake in the ground.

About face

Doc Searls

If that person returns in the future and the facial-recognition software detects them, security will be dispatched to ask the gambler to leave.” the largest variety of existing and imaginable ways that security can be breached. We can know more than we can tell.

Security Issues and and Business Opportunities - Panel

Stephen Downes: Half an Hour

The challenge is how to minimize the privacy and security risk without compromising health care. As the keynote said, you can paralyze the good stuff by trying to secure everything. In Canada - here is no legislation to inform people about breaches of security - in the U.S. there is - 40 percent of medicaid companes have experienced a security breach in the last year - we don't know that level in Canada. They need help on security, compliance, risk management,etc.

Privacy, Security and Trust: Challenges for the Intangible Economy

Stephen Downes: Half an Hour

How do I as a paranoid security person deal with all the baggage I bring to the discussion? I see identity management as the real issue that is going to link security and privacy. I cannot engage most security professionals in discussions about privacy. And vice versa. -- Part One Personal baggage - I have a defence and security background. The real advancement in the discussion is going to come from the privacy advocates, not the security advocates.

International Organizations and Social Media: News, Engagement, and Social Data for Policy Change

Beth Kanter

Not every student in my class is focused on the same policy issue. They will be placed with organizations working on policies in these areas, many part of large international networks, nonprofits, and government. Citizen Digital Engagement in Policy Discussions and Action.

Can one really co-create with war criminals?

Adaptive Path

As an advocate of design participation in nontraditional design areas, I was glad to hear about (but bummed I didn’t attend) the Glen Cove Conference on Strategic Design and Public Policy (my former professor, Richard Buchanan, apparently participated). If you’re interested in the role of design in public policy, take a look through the conference writeup by Lucy Kimbell. Tags: Interaction Design Service Design public policy strategy

A Nonprofit’s Legal Counsel Is The Social Media Manager’s Best Friend!

Beth Kanter

The session will focus on exploring how nonprofits are expanding their efforts to influence public policy through social channels and understanding the legal issues and how to evaluate the work. (I’ll That’s why it is good to have an going relationship and a policy group.

The Canadian Government and Cryptocurrency

Stephen Downes: Half an Hour

This is a policy-neutal document; that is, I don't advocate one way or another for any of the items described below. Canada Revenue Agency Policy Their information page is here: [link] In a nutshell: cryptocurrency is not legal tender in Canada, which means you are not required to accept it.

The Third Wave of the Digital Economy - Promises and Challenges

Irving Wladawsky-Berger

Atkinson is founder and president of the Information Technology and Innovation Foundation (ITIF), a think tank focused on science and technology policy. They need to make the next-wave digital evolution a central policy goal. Support policies where the benefits are largely unequivocal.

Data 228

The MIT Work of the Future Report

Irving Wladawsky-Berger

With this in mind, the work of the future can be shaped beneficially by new policies, renewed support for labor, and reformed institutions, not just new technologies. Policy Proposals for the future.

Report 178

The Identity Challenge: On the Internet, Nobody Knows You're a Dog

Irving Wladawsky-Berger

The report outlines a policy agenda for improving the privacy and security of digital systems and help combat identity fraud. Change the way America uses the Social Security Number.

Data 190

The Challenges of Automation in a Fast Changing Economy

Irving Wladawsky-Berger

The report is divided into two sections: The Case for Action , which explores how automation impacts the economic security and opportunity of American workers, and Policies for Shared Prosperity , which outlines a policy agenda for addressing automation’s challenges and opportunities.

Change 177

The Economic Potential of The Internet of Things

Irving Wladawsky-Berger

Home - Energy management, security, safety, and automation of home chores. Offices - Organizational and personal productivity, training, energy monitoring, building security. Adoption depends on having certain technologies, organizational capabilities, and policies in place.

Data 260

Towards a Trusted Framework for Identity and Data Sharing

Irving Wladawsky-Berger

As the economy and society move toward a world where interactions are primarily governed by digital data and transactions, our existing methods of managing identity and data security are proving inadequate.

Data 247

Blockchain and the Promise of an Open, Decentralized Internet

Irving Wladawsky-Berger

Their deployment time-lags are longer because attaining their full benefits requires a number of complementary co-inventions and investments, including additional technologies, applications, processes, business models, and regulatory policies.

The Promise and Current State of Blockchain

Irving Wladawsky-Berger

I said that I look at the value of blockchain through two complementary lenses: enhancing the security of the Internet, and reducing the inefficiencies and overheads in applications, like supply chains, involving multiple institutions.

Peering into a Confusing, Paradoxical Future

Irving Wladawsky-Berger

This unclassified strategic report is intended to provide the incoming administration and other senior leaders with a framework for long-range policy assessment.

Trends 206

Global Arbitrage and the Productivity Puzzle

Irving Wladawsky-Berger

These managerial elites have effectively controlled the major means of production in their economies as well as key policy planning institutions in government.

The World Bank’s Human Capital Index

Irving Wladawsky-Berger

Improvements in human capital do not depend exclusively on social sector policies. It will put security at risk, too, as unmet aspirations can lead to unrest.”. Last week I wrote about a recently published World Bank report, The Changing Nature of Work.

Data 184

risk?

Dave Snowden

What even fewer people know about is a key moment that happened in Japan when Steve Jobs approved a $10 million dollar expenditure that secured a key piece to their disruptive innovation at that time… the iPod 1.

The Link Between BYOD and Increased Productivity

TOPYX LMS

IBM MobileFirst gives an excellent definition of BYOD: “ Bring your own device (BYOD) is an IT policy where employees are allowed or encouraged to use their personal mobile devices—and, increasingly, notebook PCs—to access enterprise data and systems. Can an LMS Remedy BYOD Security Issues?

The Expertise Strikes Back

Martijn Linssen

When I worked at a think tank, right out of a brief Air Force career in Intelligence, I had lots of scattered ideas and an agile mind – but no background in national security studies beyond eight years’ operational experience of a very limited scope.

Toward no longer running naked through the digital world

Doc Searls

Now also comes Bruce Schneier , with his perfectly titled book Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World , which Farhad Manjoo in The New York Times sources in A Future Where Everything Becomes a Computer Is as Creepy as You Feared.

The Impact of Automation on Everyday Life

Irving Wladawsky-Berger

There’s broad public support for policies that limit the scope of automation technologies and bring humans more fully into the process. A 2016 Pew Research study , The State of American Jobs , found that most Americans were happy and secure in their jobs.

Survey 212

Next Week: The Fray by the Bay

Andy McAfee

has to date been focused largely on immigration, but is now taking up issues related to technological progress, innovation and growth, and the economic security of American workers. and leaders in tech, politics and policy for a panel discussion nextThursday, February 20th, at Dropbox.

Class 245

Is Blockchain Now Transitioning to a More Mundane and Useful Era?

Irving Wladawsky-Berger

This problem is now being addressed by companies like Chainlink , a startup that’s developed a tamper-proof system that securely feeds the necessary data to smart contracts on a blockchain.

Issues 191

Now hiring: The future of privacy in this country

David Weinberger

Date: March 11, 2010 11:32:22 AM EST. To: undisclosed-recipients:; Subject: [VACANCY ANNOUNCEMENT] Director of Privacy Policy and Senior Advisor. Department of Homeland Security Privacy Office. As the Director of Privacy Policy and Senior Advisor at the Department’s head quarters Privacy Office, you will have direct policy responsibility for complex and cutting edge privacy issues such as social media, cloud computing, information security and risk management.

Municipal nets, municipal electric power, and learning from history

David Weinberger

Jim Baller, who has been writing about the laws, policies, and economics of network deployment for decades, has found an eerie resonance of this contemporary debate. The debate over whether municipalities should be allowed to provide Internet access has been heating up. Twenty states ban it.

Coherent Implications

Clark Quinn

You get security concerns here, but you need to find a balance, or you’re cutting off half of the organizational brain! It’s about policies and technologies (and of course culture, but that’s another story).

Waking up.

Martijn Linssen

The last time I developed a taxonomy, it was for an HR department who wanted to ensure their far-flung workforce applied established policies consistently. For most (not all) Chief Information Officers (CIOs)- the measure of success is highly reliable and secure systems.

White House: Innovation in Higher Education

George Siemens

The White House is secure. As a “foreign national” it took me over two hours to clear three layers of security, was provided a special pink badge to identify me as a foreign national and was required to navigate only with an escort (including restroom visits and ultimately WH departure). VC funds are flowing aggressively and these funders are also targeting policy change at local, state, and national levels.

Is Blockchain Ready to “Cross the Chasm”? Lessons from the Internet

Irving Wladawsky-Berger

Their responses suggest that they view blockchain as a kind of trust accelerator , helping to build trust in several ways: increased transactional transparency, higher data quality and accuracy, increased trust in transaction reliability, and improved security against fraud and cybercrime.

On the Governance of Blockchain: Lessons from the Internet

Irving Wladawsky-Berger

In addition to developing standards and organizing technical, industry and policy activities, these various organization make available open source implementations of their software releases, thus encouraging collaborative, open innovation.

Issues 206

Thinking Strategy, Pt. 2

Clark Quinn

And there will need to be policies around what responsibility there will be for support, access to resources, and other issues that will guide how the strategy is put in place, accounting for issues like security and risk.

Evaluation of CL/4291 “Draft text of the Recommendation concerning Open Educational Resources”, UNESCO

Stephen Downes: Half an Hour

Overall this proposed policy represents well the state of the art in open educational resources (OER) and would serve to further the aims and objectives of open online education. ii) Developing supportive policy 12. I think there’s an important policy point here.

How Will AI Likely Impact How We Work, Live and Play?

Irving Wladawsky-Berger

Section II looks into AI’s overall impact on various sectors of the economy, while the third Section, examines AI issues related to public policy. Public safety and security. “One of the more successful uses of AI analytics is in detecting white collar crime, such as credit card fraud.

System 264

Fidelity in complex systems consultancy

Dave Snowden

It’s a wider issue, if we look at policy making in Government there is a general tendency for policy advisors to focus on being invited back to the table rather than to tell a hard truth, or provide all the facts.