ch 14 – the leaders of the future ch 15 – information warfare ch 14 by fernando flores ch 15 by...

30
Ch 14 – The Leaders of the Future Ch 15 – Information Warfare Ch 14 by Fernando Flores Ch 15 by Larry Druffel This totally awesome presentation by Les Fletcher

Upload: sharlene-brown

Post on 17-Dec-2015

217 views

Category:

Documents


0 download

TRANSCRIPT

Ch 14 – The Leaders of the FutureCh 15 – Information Warfare

Ch 14 by Fernando Flores

Ch 15 by Larry Druffel

This totally awesome presentation by Les Fletcher

Three Eras of Computers

“the use and interpretation of computers as information processing machines.”i.e. number crunchers

Three Eras of Computers

“a view of computers as communication devices.”

Three Eras of Computers

“where computers will increasingly be the medium in which companies and individuals articulate and shift their identities.”

Communication

Communication is about concerns and commitments “Not only are many overwhelmed by the amount of

information that is flooding in on them, but they are also having difficulty picking out what is most relevant in the constant flow of information.”

Communication

Communication is about concerns and commitments laboring under a mistaken view of

communication of it being merely a way to pass information back and forth, people communicate to get things done.

Speech Acts

DeclareRequestOffer/PromiseAssesAssert

Speech Acts

Declare

Speech Acts

Request

Speech Acts

Offer/Promise

Speech Acts

Asses

Speech Acts

Assert

Commitment Process

“a network of individual workflows configured to fulfill one of the recurrent commitments or objectives of an enterprise”

Articulating and Shifting Identities

“the articulation and rearticulation of a company’s is not one that is not a one-time thing, but rather it is a continuous activity of leadership and one that is undertaken in the normal course of business.”

Articulating and Shifting Identities

“we can also observe a recurrent structure in the way the process of articulation and rearticulation is done in companies, recurrences which can be built upon to produce an ongoing, much less perturbing process of change.”

Articulating and Shifting Identities

Must be able to recognize critical changes before they become competitive necessities

Articulating and Shifting Identities

Change must become the normal order of things so that people will more easily adapt to it.

Marginal Activities

Fringe activities that may or may not lead to a competitive advantage

Recursive Acts

DescribesWonderingAssessDeclaresSpeculate

Recursive Acts

Describes – the business his or her company is in

Recursive Acts

Wondering – how the leader could redirect the operations to align them with industry trends

Recursive Acts

Assess – which marginal practices that could be developed

Recursive Acts

Declares – the establishment of an exploratory organization

Recursive Acts

Speculate – on the impact of absorbing the results of the exploratory group

Information Warfare

Types of vulnerabilitiesNon-warfare attacks

Information Warfare

Types of vulnerabilities Denial of service Abuse of resources Corrupted data Lost data Stolen data

Information Warfare

Non-warfare attacks Vandalism Invasion of privacy Fraud or theft Espionage

Other Tidbits

Networked computing provide enormous power for good or evil

“Internet was developed with an open, trusting style.”

Anyone can be a victim of information warfare. They can either be targets or part of the collateral damage.

Information warfare does not happen merely between nation-states.

Users must take some responsibility, but also relinquish some rights to system administrators or similar authorities.

Information Warfare

A diagram from the Federation of American Scientists

Questions?