Skip to main content

Home/ Sensorica Knowledge/ Group items tagged multi

Rss Feed Group items tagged

Tiberius Brastaviceanu

Decision making - Wikipedia, the free encyclopedia - 1 views

  • mental processes
  • examine individual decisions in the context of a set of needs, preferences an individual has and values they seek.
  • psychological perspective
  • ...59 more annotations...
  • cognitive perspective
  • continuous process integrated in the interaction with the environment
  • normative perspective
  • logic of decision making
  • and rationality
  • decision making is a reasoning or emotional process which can be rational or irrational, can be based on explicit assumptions or tacit assumptions.
  • Logical decision making
  • making informed decisions
  • recognition primed decision approach
  • without weighing alternatives
  • integrated uncertainty into the decision making process
  • A major part of decision making involves the analysis of a finite set of alternatives described in terms of some evaluative criteria.
  • multi-criteria decision analysis (MCDA) also known as multi-criteria decision making (MCDM).
  • differentiate between problem analysis and decision making
  • Problem analysis must be done first, then the information gathered in that process may be used towards decision making.[4]
  • decision making techniques people use in everyday life
  • Pros and Cons
  • Simple Prioritization:
  • Decision-Making Stages
  • Orientation stage
  • Conflict stage
  • Emergence stage
  • Reinforcement stage
  • Decision-Making Steps
  • Outline your goal and outcome
  • Gather data
  • Brainstorm to develop alternatives
  • List pros and cons of each alternative
  • Make the decision
  • take action
  • Learn from, and reflect on the decision making
  • Cognitive and personal biases
  • Selective search for evidence
  • Premature termination of search for evidence
  • Inertia
  • Selective perception
  • Wishful thinking or optimism bias
  • Choice-supportive bias
  • Recency
  • Repetition bias
  • Anchoring and adjustment
  • Group think – Peer pressure
  • Source credibility bias
  • Incremental decision making and escalating commitment
  • Attribution asymmetry
  • Role fulfillment
  • Underestimating uncertainty and the illusion of control
  • a person's decision making process depends to a significant degree on their cognitive style
  • thinking and feeling; extroversion and introversion; judgment and perception; and sensing and intuition.
  • someone who scored near the thinking, extroversion, sensing, and judgment
  • would tend to have a logical, analytical, objective, critical, and empirical decision making style.
  • national or cross-cultural differences
  • distinctive national style of decision making
  • human decision-making is limited by available information, available time, and the information-processing ability of the mind.
  • two cognitive styles: maximizers
  • satisficers
    • Tiberius Brastaviceanu
       
      I think we are at the CONFLICT stage at this moment
    • Tiberius Brastaviceanu
       
      These are the steps we need to go through to make a decision of the 4 items proposed by Ivan
    • Tiberius Brastaviceanu
       
      This is also interesting, where are you on these 4 dimensions? 
Tiberius Brastaviceanu

Access control - Wikipedia, the free encyclopedia - 0 views

  • The act of accessing may mean consuming, entering, or using.
  • Permission to access a resource is called authorization.
  • Locks and login credentials are two analogous mechanisms of access control.
  • ...26 more annotations...
  • Geographical access control may be enforced by personnel (e.g., border guard, bouncer, ticket checker)
  • n alternative of access control in the strict sense (physically controlling access itself) is a system of checking authorized presence, see e.g. Ticket controller (transportation). A variant is exit control, e.g. of a shop (checkout) or a country
  • access control refers to the practice of restricting entrance to a property, a building, or a room to authorized persons
  • can be achieved by a human (a guard, bouncer, or receptionist), through mechanical means such as locks and keys, or through technological means such as access control systems like the mantrap.
  • Physical access control is a matter of who, where, and when
  • Historically, this was partially accomplished through keys and locks. When a door is locked, only someone with a key can enter through the door, depending on how the lock is configured. Mechanical locks and keys do not allow restriction of the key holder to specific times or dates. Mechanical locks and keys do not provide records of the key used on any specific door, and the keys can be easily copied or transferred to an unauthorized person. When a mechanical key is lost or the key holder is no longer authorized to use the protected area, the locks must be re-keyed.[citation needed] Electronic access control uses computers to solve the limitations of mechanical locks and keys. A wide range of credentials can be used to replace mechanical keys. The electronic access control system grants access based on the credential presented. When access is granted, the door is unlocked for a predetermined time and the transaction is recorded. When access is refused, the door remains locked and the attempted access is recorded. The system will also monitor the door and alarm if the door is forced open or held open too long after being unlocked
  • Credential
  • Access control system operation
  • The above description illustrates a single factor transaction. Credentials can be passed around, thus subverting the access control list. For example, Alice has access rights to the server room, but Bob does not. Alice either gives Bob her credential, or Bob takes it; he now has access to the server room. To prevent this, two-factor authentication can be used. In a two factor transaction, the presented credential and a second factor are needed for access to be granted; another factor can be a PIN, a second credential, operator intervention, or a biometric input
  • There are three types (factors) of authenticating information:[2] something the user knows, e.g. a password, pass-phrase or PIN something the user has, such as smart card or a key fob something the user is, such as fingerprint, verified by biometric measurement
  • Passwords are a common means of verifying a user's identity before access is given to information systems. In addition, a fourth factor of authentication is now recognized: someone you know, whereby another person who knows you can provide a human element of authentication in situations where systems have been set up to allow for such scenarios
  • When a credential is presented to a reader, the reader sends the credential’s information, usually a number, to a control panel, a highly reliable processor. The control panel compares the credential's number to an access control list, grants or denies the presented request, and sends a transaction log to a database. When access is denied based on the access control list, the door remains locked.
  • A credential is a physical/tangible object, a piece of knowledge, or a facet of a person's physical being, that enables an individual access to a given physical facility or computer-based information system. Typically, credentials can be something a person knows (such as a number or PIN), something they have (such as an access badge), something they are (such as a biometric feature) or some combination of these items. This is known as multi-factor authentication. The typical credential is an access card or key-fob, and newer software can also turn users' smartphones into access devices.
  • An access control point, which can be a door, turnstile, parking gate, elevator, or other physical barrier, where granting access can be electronically controlled. Typically, the access point is a door. An electronic access control door can contain several elements. At its most basic, there is a stand-alone electric lock. The lock is unlocked by an operator with a switch. To automate this, operator intervention is replaced by a reader. The reader could be a keypad where a code is entered, it could be a card reader, or it could be a biometric reader. Readers do not usually make an access decision, but send a card number to an access control panel that verifies the number against an access list
  • monitor the door position
  • Generally only entry is controlled, and exit is uncontrolled. In cases where exit is also controlled, a second reader is used on the opposite side of the door. In cases where exit is not controlled, free exit, a device called a request-to-exit (REX) is used. Request-to-exit devices can be a push-button or a motion detector. When the button is pushed, or the motion detector detects motion at the door, the door alarm is temporarily ignored while the door is opened. Exiting a door without having to electrically unlock the door is called mechanical free egress. This is an important safety feature. In cases where the lock must be electrically unlocked on exit, the request-to-exit device also unlocks the doo
  • Access control topology
  • Access control decisions are made by comparing the credential to an access control list. This look-up can be done by a host or server, by an access control panel, or by a reader. The development of access control systems has seen a steady push of the look-up out from a central host to the edge of the system, or the reader. The predominant topology circa 2009 is hub and spoke with a control panel as the hub, and the readers as the spokes. The look-up and control functions are by the control panel. The spokes communicate through a serial connection; usually RS-485. Some manufactures are pushing the decision making to the edge by placing a controller at the door. The controllers are IP enabled, and connect to a host and database using standard networks
  • Access control readers may be classified by the functions they are able to perform
  • and forward it to a control panel.
  • Basic (non-intelligent) readers: simply read
  • Semi-intelligent readers: have all inputs and outputs necessary to control door hardware (lock, door contact, exit button), but do not make any access decisions. When a user presents a card or enters a PIN, the reader sends information to the main controller, and waits for its response. If the connection to the main controller is interrupted, such readers stop working, or function in a degraded mode. Usually semi-intelligent readers are connected to a control panel via an RS-485 bus.
  • Intelligent readers: have all inputs and outputs necessary to control door hardware; they also have memory and processing power necessary to make access decisions independently. Like semi-intelligent readers, they are connected to a control panel via an RS-485 bus. The control panel sends configuration updates, and retrieves events from the readers.
  • Systems with IP readers usually do not have traditional control panels, and readers communicate directly to a PC that acts as a host
  • a built in webservice to make it user friendly
  • Some readers may have additional features such as an LCD and function buttons for data collection purposes (i.e. clock-in/clock-out events for attendance reports), camera/speaker/microphone for intercom, and smart card read/write support
Francois Bergeron

Cell Tester Opens the Window of Discovery | Product Information | Articles - 0 views

  • Written by Lisa J Fulghum    Physiologic Mechanisms in Cardiac Myocytes and Skeletal Muscle Cells The revolutionary Cell Tester SI-CTS200 is a new research tool for cellular investiga
  • The revolutionary Cell Tester SI-CTS200 is a new research tool for cellular investigation that can (without any changes) be used for one single living cell, for a small multi-cellular preparation and for single or larger skinned muscle strip preparations. Translational experiments from the single living cells to the intact multi-cellular level can be accomplished.
  • The Cell Tester offers: Integral microtweezer apparatus that facilitates cellular attachment Two integrated piezo manipulators are included Bio-compatible adhesive (MyoTak™) included Unique rotational stage that allows for easy cellular alignment, improved experimental throughput (shown in the image above) Ultra-quiet force transducer included Linear displacement motor stretches or compresses cells with 25nm precision Fits ANY inverted microscope Use native cuvette or ANY 35mm glass bottom dish
  •  
    The revolutionary Cell Tester SI-CTS200 is a new research tool
Kurt Laitner

Owning Together Is the New Sharing by Nathan Schneider - YES! Magazine - 0 views

  • VC-backed sharing economy companies like Airbnb and Uber have caused trouble for legacy industries, but gone is the illusion that they are doing it with actual sharing
  • Their main contribution to society has been facilitating new kinds of transactions
  • The notion that sharing would do away with the need for owning has been one of the mantras of sharing economy promoters. We could share cars, houses, and labor, trusting in the platforms to provide. But it’s becoming clear that ownership matters as much as ever.
  • ...30 more annotations...
  • Whoever owns the platforms that help us share decides who accumulates wealth from them, and how
  • Léonard and his collaborators are part of a widespread effort to make new kinds of ownership the new norm. There are cooperatives, networks of freelancers, cryptocurrencies, and countless hacks in between. Plans are being made for a driver-owned Lyft, a cooperative version of eBay, and Amazon Mechanical Turk workers are scheming to build a crowdsourcing platform they can run themselves. Each idea has its prospects and shortcomings, but together they aspire toward an economy, and an Internet, that is more fully ours.
  • Jeremy Rifkin, a futurist to CEOs and governments, contends that the Internet-of-things and 3-D printers are ushering in a “ zero marginal cost society“ in which the “collaborative commons” will be more competitive than extractive corporations
  • once the VC-backed sharing companies clear away regulatory hurdles, local co-ops will be poised to swoop in and spread the wealth
  • People are recognizing that doing business differently will require changing who gets to own what.
  • “We’re moving into a new economic age,” says Marjorie Kelly, who spent two decades at the helm of Business Ethics magazine and now advises social entrepreneurs. “It needs to be sustainable. It needs to be inclusive. And the foundation of what defines an economic age is its form of ownership.”
  • It’s a worker-owned cooperative that produces open-source software to help people practice consensus—though they prefer the term “collaboration”—about decisions that affect their lives.
  • From the start Loomio was part of Enspiral, an “open value network“ of freelancers and social enterprises devoted to mutual support and the common good.
  • a companion tool, CoBudget, to help them allocate resources together
  • The team members recently had to come to terms with the fact that, for the time being, only some of them could be paid for full-time work They called the process “participatory downsizing.”
  • And they can take many forms. Loomio and other tech companies, for instance, are aspiring toward the model of a multi-stakeholder cooperative—one in which not just workers or consumers are voting members, but several such groups at once.
  • Loconomics is a San Francisco-based startup designed, like TaskRabbit, to manage short-term freelance jobs
  • “People who have been without for a long time,” she says, “often operate with a mindset that they can’t share what they have, because they don’t know when that resource will come along again.”
  • As Loconomics prepares to begin operations this winter, it’s running out of the pocket of the founder, Josh Danielson
  • The ambition of a cooperative Facebook or Uber—competitive, widespread, and owned by its community—still seems out of reach for enterprises not willing to sell large parts of themselves to investors. Organizations like 
  • His fellow OuiShare founder Benjamin Tincq is concerned that too much fixation on a particular model will make it hard for well-meaning ventures to be successful. “I like the idea that we don’t need to have a specific legal status,” he says. “It’s more about hacking an existing legal status and making these hacks work.”
  • Fenton’s new undertaking, Sovolve, proposes to “create innovative solutions to accelerate social change,” much as CouchSurfing did, but it’s doing the innovating cautiously. All work is done by worker-owners located around the world. Sovolve uses an internal platform—soon to become a product in its own right—through which contributors decide how much they want to be paid in cash and how much in equity. They can see how much others are earning. Their virtual workplace is gamified, with everyone working to nudge their first product, WonderApp, into virality
  • Loomio’s members use a similar system, which they call Loomio Points. But Sovolve is no cooperative; contributors are not in charge.
  • Open-source software and share-alike licenses have revived the ancient idea of the commons for an Internet age. But the “ commons-based peer production“ that Sensorica seeks to practice doesn’t arise overnight. Just as today’s business culture rests on generations of accumulated law, habit, and training, learning to manage a commons successfully takes time
  • It makes possible decentralized autonomous organizations, or DAOs, which exist entirely on a shared network
  • The most ambitious successor to Bitcoin, Ethereum, has raised more than $15 million in crowdfunding on the promise of creating such a network.
  • all with technology that makes collective ownership a lot easier than a conventional legal structure
  • A project called Eris is developing a collective decision-making tool designed to govern DAOs on Ethereum, though the platform may still be months from release.
  • For now, the burden of reinventing every wheel at once makes it hard for companies like Sensorica and Loomio to compete
  • For instance, Cutting Edge Capital specializes in helping companies raise money through a long-standing mechanism called the direct public investment, or DPO, which allows for small, non-accredited investors.
  • Venture funding may be in competition with Dietz’s cryptoequity vision, but it provides a fearsome head start
  • Co-ops help ensure that the people who contribute to and depend on an enterprise keep control and keep profits, so they’re a possible remedy for worsening economic inequality
  • Sooner or later, transforming a system of gross inequality and concentrated wealth will require more than isolated experiments at the fringes—it will require capturing that wealth and redirecting its flows
  • A less consensual strategy was employed to fund the Catalan Integral Cooperative in Spain; over the course of a few years, one activist borrowed around $600,000 from Spanish banks without paying any of it back.
  • In Jackson, Mississippi, Chokwe Lumumba was elected mayor in 2013 on a platform of fostering worker-owned cooperatives, although much of the momentum was lost when Lumumba died just a few months later.
Kurt Laitner

Guidelines on Measuring Subjective Well-being.pdf - 0 views

  • such as interest,engagement and meaning,
  • subjective well-being is taken to be:2Good mental states, including all of the various evaluations, positive and negative, that peoplemake of their lives, and the affective reactions of people to their experiences
  • “subjective well-being is an umbrella term for the different valuationspeople make regarding their lives, the events happening to them, their bodies and minds,and the circumstances in which they live”.
  • ...16 more annotations...
  • In measuring overall human well-being then, subjective well-being should be placedalongside measures of non-subjective outcomes, such as income, health, knowledge andskills, safety, environmental quality and social connections
  • Inparticular, a distinction is commonly made between life evaluations, which involve acognitive evaluation of the respondent’s life as a whole (or aspects of it), and measures ofaffect, which capture the feelings experienced by the respondent at a particular point in time(Diener, 1984; Kahneman et al., 1999
  • eudaimonic aspect ofsubjective well-being, reflecting people’s sense of purpose and engagement
  • The framework used here covers all three concepts of well-being:●Life evaluation.●Affect.●Eudaimonia (psychological “flourishing”)
  • the result of a judgement by the individual rather than thedescription of an emotional state.
  • Elements of subjective well-beingLife evaluation
  • making an evaluation of this sort as involving the individual constructing a “standard” thatthey perceive as appropriate for themselves, and then comparing the circumstances oftheir life to that standard
  • Life evaluations are based on how people remember their experiences (Kahneman et al.,1999) and can differ significantly from how they actually experienced things at the time
  • It is for this reason that life evaluations are sometimes characterised as measures of“decision utility” in contrast to “experienced utility”
  • One of the mostwell documented measures of life evaluation – thePersonal Wellbeing Index– consists of eightquestions, covering satisfactions with eight different aspects of life, which are summedusing equal weights to calculate an overall index (International Wellbeing Group, 2006)
  • (job satisfaction, financial satisfaction, house satisfaction, healthsatisfaction, leisure satisfaction and environmental satisfaction),
  • AffectAffect is the term psychologists use to describe a person’s feelings. Measures of affectcan be thought of as measures of particular feelings or emotional states, and they aretypically measured with reference to a particular point in time.
  • Such measures capturehow people experience life rather than how they remember it (Kahneman and Krueger,2006
  • While an overall evaluation of life can be captured in a single measure, affect has atleast two distinct hedonic dimensions: positive affect and negative affect (Kahneman et al.,1999; Diener et al., 1999
  • positive affect is thought to be largely uni-dimensional
  • negative affect may be more multi-dimensional.
Tiberius Brastaviceanu

In networks, cooperation trumps collaboration | Harold Jarche - 0 views

  • Collaboration happens around some kind of plan or structure
  • cooperation presumes the freedom of individuals to join and participate
  • Cooperation is a driver of creativity
  • ...10 more annotations...
  • use networks as our primary form of living and working
  • Tribal; Institutional; Markets; Networks
  • how we have evolved as a civilisation
  • network
  • a form in itself that can address issues that the three other forms could not
  • Chaordic refers to a system of governance that blends characteristics of chaos and order.
  • Wirearchy: a dynamic multi-way flow of power and authority based on information, knowledge, trust and credibility, enabled by interconnected people and technology.
  • Collaboration is only part of working in networks
  • Cooperation is also necessary, but it’s much less controllable than our institutions, hierarchies and HR practices would like to admit.
  • In networks, cooperation trumps collaboration
Kurt Laitner

Value Creating Service Systems: From Service Systems to Digital Lives - 0 views

  •  
    "Service dominant logic suggest that value is always co-created in context of use and experience. Co-creation is not an option (Vargo and Lusch, 2004, 2008). "Moving things along meant a focus on 2 key aspects. philosophy and methods. "An SD logic approach is not one that you can run a survey of attitude, behaviours or intentions. The person is embedded in his actions and practices of value creation. The focus on context means the unit of analysis is in the sociology of real life behaviours. A sociological approach makes methods a problem because we've inherited a world where we have created tools from analysing water in a bucket, not by looking at its behaviour in a river. "GD logic is compelling not only because it is entrenched for over 500 years, but also because you could measure its constructs. GDP, sales, revenues, CPI - they are all constructs of a GD logic society. What SD logic needed was better methods and new constructs. "To that end, and rather ironically, I found an ally in digital technology. Here was a world of sensors and actuators with an enthusiastic community looking for novel ways of deploying them into homes and buildings i.e. the internet-of-things. "I also found, as an ally, the thinking around new economic and business models. Here was another strand of literature largely marginalised by mainstream business literature because it was (the way I interpreted it) taking a systemic view of value proposition, value creation and value capture (ie, change one, change all) and the way the organisation had to be agile and transformed for it - which sat very nicely with SD logic. "Customised products are firm centric. Personalised products are customer initiated and empowering. Personalised products also tend to move the product into becoming platforms to afford co-creation, which advanced the notion of symmetry in value co-creation further. Finally, with the advent of platforms, the economics of 2 or multi-sided markets completed my set of theoretica
  •  
    an interesting starting point for research
Tiberius Brastaviceanu

Open Collaboration - The Next Economic Paradigm - 0 views

  • we’re in the midst of a collapsing paradigm
  • to be replaced by something new
  • I will explain what the new paradigm
  • ...40 more annotations...
  • business
  • government
  • education
  • research
  • The old economic paradigm was a service economy built on the digital communications revolution that began in the early 1970′s.
  • financial capital has decoupled from productive capital
  • financial meltdown
  • major societal institutions have stalled
  • the funding models
  • no longer work properly
  • The new model is the Open Collaboration Paradigm
  • we will see a radical departure from old institutional models.
  • social capital is increasingly recognized
  • generating wealth for society
  • This will be a profoundly social economy, built on unprecedented capabilities to self-organize people and resources in the crowd.
  • Social media
  • connect ideas, people, and institutions
  • blur the inside/outside distinctions
  • Network connections
  • radical transparency will be the new norm
  • Another profound shift will occur in the realm of ownership
  • No longer
  • viable
  • to horde intellectual property
  •  Collaborative consumption will arise as a more robust business paradigm,
  • risk is distributed
  • implications for business
  •  Those who can leverage the wisdom of crowds for market research, product development, and efficient resource allocation will be more adept and agile in the face of rapid change.
  • Those who build walls around themselves will fail to tap into the flow of knowledge and resources running rampant in the crowd
  • governments will have to become more transparent and responsive to their citizens
  • information becomes more immersive and dynamic
  • Research has already begun to use open collaboration that goes beyond the halls of academia.
  • collaborative approach to research will become the norm,
  • The era of “user generated content” and “prosumption” — where consumers of goods and services co-create what they will consume — is now a decade along in its evolution.  We will increasingly see collaborative design and production of consumables across society.
  • In the education arena, we will see more curricula as shareware and an increased emphasis on multi-perspective teamwork as the necessary skills for engaging in collaborative projects.
  • Expert/amateur boundaries have already blurred to the point where individuals can acquire graduate-level knowledge through self-directed learning on the internet.
  • distance learning
  •  Lifetime learning
  • active pedagogy
  • So get ready for the new economic paradigm.
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
1 - 15 of 15
Showing 20 items per page