Ch 14 – The Leaders of the FutureCh 15 – Information Warfare
Ch 14 by Fernando Flores
Ch 15 by Larry Druffel
This totally awesome presentation by Les Fletcher
Three Eras of Computers
“the use and interpretation of computers as information processing machines.”i.e. number crunchers
Three Eras of Computers
“where computers will increasingly be the medium in which companies and individuals articulate and shift their identities.”
Communication
Communication is about concerns and commitments “Not only are many overwhelmed by the amount of
information that is flooding in on them, but they are also having difficulty picking out what is most relevant in the constant flow of information.”
Communication
Communication is about concerns and commitments laboring under a mistaken view of
communication of it being merely a way to pass information back and forth, people communicate to get things done.
Commitment Process
“a network of individual workflows configured to fulfill one of the recurrent commitments or objectives of an enterprise”
Articulating and Shifting Identities
“the articulation and rearticulation of a company’s is not one that is not a one-time thing, but rather it is a continuous activity of leadership and one that is undertaken in the normal course of business.”
Articulating and Shifting Identities
“we can also observe a recurrent structure in the way the process of articulation and rearticulation is done in companies, recurrences which can be built upon to produce an ongoing, much less perturbing process of change.”
Articulating and Shifting Identities
Must be able to recognize critical changes before they become competitive necessities
Articulating and Shifting Identities
Change must become the normal order of things so that people will more easily adapt to it.
Recursive Acts
Wondering – how the leader could redirect the operations to align them with industry trends
Information Warfare
Types of vulnerabilities Denial of service Abuse of resources Corrupted data Lost data Stolen data
Other Tidbits
Networked computing provide enormous power for good or evil
“Internet was developed with an open, trusting style.”
Anyone can be a victim of information warfare. They can either be targets or part of the collateral damage.
Information warfare does not happen merely between nation-states.
Users must take some responsibility, but also relinquish some rights to system administrators or similar authorities.