Skip to main content

Home/ Sensorica Knowledge/ Group items tagged opportunities

Rss Feed Group items tagged

Tiberius Brastaviceanu

INSO-5-2015 - 0 views

  • Scope:  The scope is that of creating a Community, involving social innovators, researchers, citizens, policy makers, which will bring together on the one hand research actions and results and on the other implementation actions, new initiatives, and policy developments.
  • help promote social innovation initiatives
  • increase relevance of policies and actions
  • ...13 more annotations...
  • development of a common understanding
  • evidence and methodologies that contribute to social innovation up-scaling
  • This does not concern only European but also international developments.
  • Such a social innovation community could be seen also as a “network of networks”.
  • Activities should include:
  • rganisation of brokerage events to enhance the networking
  • information and awareness activities t
  • design strategies/activities for ensuring the best possible use of the research results
  • the organisation of events aimed at identifying priorities for collaboration
  • supporting grassroots experiments, replication, incubation and policy uptake of research results
  • setting up of a network of 'Local Facilitators' for a better dissemination and uptake at all levels.
  • EUR 3 million
  • enable convergence towards a common understanding of social innovation as a tool and outcome.
  •  
    "Topic: Social innovation Community INSO-5-2015"
Tiberius Brastaviceanu

Sustainable food chains through public policies SFS-20-2015 - 0 views

  •  
    "Topic: Sustainable food chains through public policies: the cases of the EU quality policy and of public sector food procurement"
Tiberius Brastaviceanu

Small farms but global markets SFS-18-2015 - 0 views

  •  
    "Topic: Small farms but global markets: the role of small and familiy farms in food and nutrition security"
Tiberius Brastaviceanu

agricultural waste, co-products and by-products WASTE-7-2015 - 0 views

  •  
    "Topic: Ensuring sustainable use of agricultural waste, co-products and by-products"
Tiberius Brastaviceanu

Bio-chemical detection SFS-13-2015 - 0 views

  •  
    "Topic: Biological contamination of crops and the food chain SFS-13-2015"
Tiberius Brastaviceanu

Sustainable crop production ISIB-12d-2015 - 1 views

  •  
    "Topic: Sustainable crop production"
Tiberius Brastaviceanu

Collaborations: The rise of research networks : Nature : Nature Publishing Group - 0 views

  • Co-authorship has been increasing inexorably3, 4. Recently it has exploded.
  • Collaboration is normally a good thing from a wider public perspective. Knowledge is better transferred and combined by collaboration, and co-authored papers tend to be cited more frequently
  • The first paper with 1,000 authors was published in 2004
  • ...33 more annotations...
  • a paper with 3,000 authors came in 2008
  • By last year, a total of 120 physics papers had more than 1,000 authors and 44 had more than 3,000
  • independent contributions to joint efforts, usually in the form of data, that involve only weak intellectual interaction
  • Papers with hundreds of co-authors contribute to the apparent pervasiveness of collaboration between countries.
  • Consequently, distinguishing Malta's own science performance is already impossible. This blurring of national distinctiveness could be a growing issue.
  • The rapid growth of each nation's research base and regional links, driven by relatively strong economies investing in innovation, will undoubtedly produce a regional research labour force to be reckoned with by 2020
  • China's rapid growth since 2000 is leading to closer research collaboration with Japan
  • Taiwan
  • South Korea
  • Australia
  • Asia-Pacific region
  • India has a growing research network with Japan, South Korea and Taiwan, although it is not as frequent a collaborator with China as one might expect
  • Middle East, Egypt and Saudi Arabia have a strong research partnership that is drawing in neighbours including Tunisia and Algeria.
  • Latin America has an emerging research network focused around Brazil,
  • has doubled its collaboration with Argentina, Chile and Mexico in the past five years
  • Africa has three distinct networks: in southern Africa, in French-speaking countries in West Africa and in English-speaking nations in East Africa.
  • proximity is just one of several factors in networks
  • use paths of least resistance to partnership, rather than routes that might provide other strategic gains
  • Commonwealth countries
  • have adopted similar research structures
  • Students
  • proximity
  • lower cost of living
  • generous government scholarships
  • Job opportunities
  • countries in science's old guard must drop their patrician tendencies, open up clear communication channels and join in with new alliances as equal participants before they find themselves the supplicants.
  • Collaboration between the public and private sectors has become more apparent because of government interest in exploiting research for economic competitiveness. Some data show that industrial investment in research seems to be dropping — perhaps a reaction to the recession, but the trend seems to be long term, at least in the United Kingdom9
  • Incentives for collaborative innovation investment that draws directly on the science base would be a good start.
  • So what are the costs and benefits of collaboration? It provides access to resources, including funding, facilities and ideas. It will be essential for grand challenges in physics, environment and health to have large, international teams supported by major facilities and rich data, which encourage the rapid spread of knowledge.
  • Research networks are a tool of international diplomacy.
  • As for costs, collaboration takes time and travel and means a shared agenda
  • The risk is that international, national and institutional agendas may become driven by the same bland establishment consensus.
  • The iconoclastic, the maverick and the marginal may find a highly collaborative world a difficult place to flourish
  •  
    "Co-authorship has been increasing inexorably3, 4. Recently it has exploded."
sebastianklemm

Tyddyn Teg - Tyddyn Teg - 0 views

  •  
    Recommended by Billy Smith (via Mastodon)
  •  
    The Tyddyn Teg cooperative has eight members and some lovely volunteer helpers. We share a commitment to the importance of quality local food and the challenges of sustainability in the twenty first century. We see ourselves as part of the global family of small farmers and aim to become a practice based centre for research and education for sustainable local food production. Our primary objective has been to maintain vegetable production and meet the needs and expectations of our veg box customers. In this we have had a great deal of help and advice from John and Pippa (who were the previous owners of the farm). We are also supplying vegetables to Moelyci Shop and Dimensions Shop in Bangor. Our aims over the coming years are: Expand and improve our vegetable growing Develop the Farm to support WWOOFing Create new spaces for events Open opportunities to have a small scale restaurant/cafe on the farm Establish a luxury camping business where people can come and stay Provide a living wage to every member of the cooperative
Tiberius Brastaviceanu

How Peer to Peer Communities will change the World - 0 views

  • role of p2p movement
  • historical role
  • horizontalisation of human relationships
  • ...55 more annotations...
  • allowing the free aggregation of individuals around shared values or common value creation
  • a huge sociological shift
  • new life forms, social practices and human institutions
  • emergent communities of practice are developing new social practices that are informed by the p2p paradigm
  • ethical revolution
  • openness
  • participation
  • inclusivity
  • cooperation
  • commons
  • the open content industry in the U.S. to reach one sixth of GDP.
  • political expressions
  • the movement has two wings
  • constructive
  • building new tools and practices
  • resistance to neoliberalism
  • we are at a stage of emergence
  • difficulty of implementing full p2p solutions in the current dominant system
  • At this stage, there is a co-dependency between peer producers creating value, and for-profit firms ‘capturing that value’, but they both need each other.
  • Peer producers need a business ecology to insure the social reproduction of their system and financial sustainability of its participants, and capital needs the positive externalities of social cooperation which flow from p2p collaboration.
  • peer producing communities should create their own ‘mission-oriented’ social businesses, so that the surplus value remains with the value creators, i.e. the commoners themselves, but this is hardly happening now.
  • Instead what we see is a mutual accomodation between netarchical capital on one side, and peer production communities on the other.
  • the horizontal meets the vertical
  • mostly hybrid ‘diagonal’ adaptations
  • For peer producers the question becomes, if we cannot create our own fully autonomous institutions, how can we adapt while maintaining maximum autonomy and sustainability as a commons and as a community.
  • Why p2p have failed to create successful alternatives in some areas?
  • In commons-oriented peer production, where people aggegrate around a common object which requires deep cooperation, they usually have their own infrastructures of cooperation and a ecology combining community, a for-benefit association managing the infrastructure, and for-profit companies operating on the market place; in the sharing economy, where individuals merely share their own expressions, third party platforms are the norm. It is clear that for-profit companies have different priorities, and want to enclose value so that it can be sold on the marketplace. This in fact the class struggle of the p2p era, the struggle between communities and corporations around various issues because of partly differential interests.
  • Even commercially controlled platforms are being used for a massive horizontalisation and self-aggregation of human relationships, and communities, including political and radical groups are effectively using them to mobilize. What’s important is not just to focus on the limitations and intentions of the platform owners, but to use whatever we can to strengthen the autonomy of peer communities.
  • requires a clever adaptation
  • use for our own benefit
  • The fact today is that capital is still capable of marshaling vast financial and material resources, so that it can create,
  • platforms that can easily and quickly offer services, creating network effects
  • without network effects, there is no ‘there’ there, just an empty potential platform.
  • p2p activists should work on both fronts
  • using mainstream platforms for spreading their ideas and culture and reach greater numbers of people, while also developing their own autonomous media ecologies, that can operate independently, and the latter is an engagement for the ‘long haul’, i.e. the slow construction of an alternative lifeworld.
  • The commons and p2p are really just different aspects of the same phenomena; the commons is the object that p2p dynamics are building; and p2p takes place wherever there are commons.
  • So both p2p and the commons, as they create abundant (digital) or sufficient (material) value for the commoners, at the same time create opportunities to create added value for the marketplace. There is no domain that is excluded from p2p, no field that can say, “we wouldn’t be stronger by opening up to participation and community dynamics”. And there is no p2p community that can say, we are in the long term fully sustainable within the present system, without extra resources coming from the market sector.
  • One trend is the distribution of current infrastructures and practices, i.e. introducing crowdsourcing, crowdfunding, social lending, digital currencies, in order to achieve wider participation in current practices. That is a good thing, but not sufficient. All the things that I mention above, move to a distributed infrastructure, but do not change the fundamental logic of what they are doing.
  • we are talking about the distribution of capitalism, not about a deeper change in the logic of our economy.
  • No matter how good you are, no matter how much capital you have to hire the best people, you cannot compete with the innovative potential of open global communities.
  • the p2p dynamics
  • the new networked culture
  • the opposite is also happening, as we outlined above, more and more commons-oriented value communities are creating their own entrepreneurial coalitions. Of course, some type of companies, because of their monopoly positions and legacy systems, may have a very difficult time undergoing that adaptation, in which case new players will appear that can do it more effectively.
  • the corporate form is unable to deal with ecological and sustainability issues, because its very DNA, the legal obligation to enrich the shareholders, makes its strive to lower input costs,  and ignore externalities.
  • we need new corporate structures, a new type of market entity, for which profit is a means, but not an end, dedicated to a ‘benefit‘, a ‘mission’, or the sustenance of a particular community and/or commons.
  • abundance destroys scarcity and therefore markets
  • open design community
  • will inherently design for sustainability
  • for inclusion
  • conceive more distributed forms of manufacturing
  • entrepreneurs attaching themselves to open design projects start working from an entirely different space, even if they still use the classic corporate form. Prevent the sharing of sustainability designs through IP monopolies is also in my view unethical and allowing such patents should be a minimalist option, not a maximalist one.
  • The high road scenario proposes an enlightened government that ‘enables and empowers’ social production and value creation and allows a much smoother transition to p2p models; the low road scenario is one in which no structural reforms take place, the global situation descends into various forms of chaos, and p2p becomes a survival and resilience tactic in extremely difficult social, political and economic circumstances.
  • accelerated end of capitalism
  • Making sure that we get a better alternative is actually the historical task of the p2p movement. In other words, it depends on us!
  • I don’t really think in terms of technological breakthroughs, because the essential one, globally networked collective intelligence enabled by the internetworks, is already behind us; that is the major change, all other technological breakthroughs will be informed by this new social reality of the horizontalisation of our civilisation. The important thing now is to defend and extend our communication and organisation rights, against a concerted attempt to turn back the clock. While the latter is really an impossibility, this does not mean that the attempts by governments and large corporations cannot create great harm and difficulties. We need p2p technology to enable the global solution finding and implementation of the systemic crises we are facing.
Kurt Laitner

Crowding Out - P2P Foundation - 1 views

  • The curve indicates that while workers will initially chose to work more when paid more per hour, there is a point after which rational workers will choose to work less
    • Kurt Laitner
       
      in other words, people are financially motivated until they are financially secure, then other motivations come in
  • "leaders" elsewhere will come and become your low-paid employees
  • At that point, the leaders are no longer leaders of a community, and they turn out to be suckers after all, working for pittance, comparatively speaking
    • Kurt Laitner
       
      so part of the dynamic is that everyone is paid fairly, if not there is the feeling of exploitation
  • ...36 more annotations...
  • under certain structural conditions non-price-based production is extraordinarily robust
    • Kurt Laitner
       
      which are... abundance?
  • There is, in fact, a massive amount of research that supports the idea that when you pay people to do something for you, they stop enjoying it, and distrust their own motivations. The mysterious something that goes away, and that “Factor X” even has a name: intrinsic motivation.
    • Kurt Laitner
       
      the real question though is why, and whether it is the paying them that is the problem, or perhaps how that is determined, and who else gets what on what basis..  if you have to have them question the fairness of the situation, they will likely check out
  • giving rewards to customers can actually undermine a company’s relationship with them
  • It just is not so easy to assume that because people behave productively in one framework (the social process of peer production that is Wikipedia, free and open source software, or Digg), that you can take the same exact behavior, with the same exact set of people, and harness them to your goals by attaching a price to what previously they were doing in a social process.
  • Extrinsic rewards suggest that there is actually an instrumental relationship at work, that you do the activity in order to get something else
  • If you pay me for it, it must be work
    • Kurt Laitner
       
      only because a dichotomy of work and play exists in western culture
  • It’s what we would call a robust effect. It shows up in many contexts. And there’s been considerable testing to try to find out exactly why it works. A major school of thought is that there is an “Overjustification Effect.” (http://kozinets.net/archives/133)
    • Kurt Laitner
       
      yes, why is key
  • interesting examples of an effect called crowding
  • Offering financial rewards for contributions to online communities basically means mixing external and intrinsic motivation.
  • A good example is children who are paid by their parents for mowing the family lawn. Once they expect to receive money for that task, they are only willing to do it again if they indeed receive monetary compensation. The induced unwillingness to do anything for free may also extend to other household chores.
  • Once ‘gold-stars’ were introduced as a symbolic reward for a certain amount of time spent practicing the instrument, the girl lost all interest in trying new, difficult pieces. Instead of aiming at improving her skills, her goal shifted towards spending time playing well-learned, easy pieces in order to receive the award (Deci with Flaste 1995)
    • Kurt Laitner
       
      this is a more troubling example, as playing the harder pieces is also practicing - I would take this as a more complex mechanism at work - perhaps the reinterpretation by the girl that all playing was considered equal, due to the pricing mechanism, in which case the proximal solution would be to pay more for more complex pieces, or for levels of achievement - the question remains of why the extrinsic reward was introduced in the first place (unwillingness to practice as much as her parents wanted?) - which would indicate intrinsic motivation was insufficient in this case
  • Suddenly, she managed to follow the prescription, as her own (intrinsic) motivation was recognized and thereby reinforced.
    • Kurt Laitner
       
      or perhaps the key was to help her fit the medication into her day, which she was having trouble with...
  • The introduction of a monetary fine transforms the relationship between parents and teachers from a non-monetary into a monetary one
    • Kurt Laitner
       
      absolutely, in some sense the guilt of being late is replaced by a rationalization that you are paying them - it is still a rationalization, and parents in this case need to be reminded that staff have lives too to reinforce the moral suasion
  • "The effects of external interventions on intrinsic motivation have been attributed to two psychological processes: (a) Impaired self-determination. When individuals perceive an external intervention to reduce their self-determination, they substitute intrinsic motivation by extrinsic control. Following Rotter (1966), the locus of control shifts from the inside to the outside of the person affected. Individuals who are forced to behave in a specific way by outside intervention, feel overjustified if they maintained their intrinsic motivation. (b) Impaired self-esteem. When an intervention from outside carries the notion that the actor's motivation is not acknowledged, his or her intrinsic motivation is effectively rejected. The person affected feels that his or her involvement and competence is not appreciated which debases its value. An intrinsically motivated person is taken away the chance to display his or her own interest and involvement in an activity when someone else offers a reward, or commands, to undertake it. As a result of impaired self-esteem, individuals reduce effort.
    • Kurt Laitner
       
      these are finally very useful - so from (a) as long as self determination is maintained (actively) extrinsic reward should not shut down intrinsic motivation AND (b) so long as motivations are recognized and reward dimensions OTHER THAN financial continue to operate, extrinsic reward should not affect intrinsic motivation
  • External interventions crowd-out intrinsic motivation if the individuals affected perceive them to be controlling
    • Kurt Laitner
       
      emphasis on "if" and replacing that with "in so far as"
  • External interventions crowd-in intrinsic motivation if the individuals concerned perceive it as supportive
    • Kurt Laitner
       
      interesting footnote
  • In that case, self-esteem is fostered, and individuals feel that they are given more freedom to act, thus enlarging self-determination
    • Kurt Laitner
       
      so effectively a system needs to ensure it is acting on all dimensions of reward, or at least those most important to the particular participant, ego (pride, recognition, guilt reduction, feeling needed, being helpful, etc), money (sustenance, beyond which it is less potent), meaning/purpose etc.  If one ran experiments controlling for financial self sufficiency, then providing appreciation and recognition as well as the introduced financial reward, they might yield different results
  • cultural categories that oppose marketplace modes of behavior (or “market logics”) with the more family-like modes of behavior of caring and sharing that we observe in close-knit communities (”community logics”)
    • Kurt Laitner
       
      are these learned or intrinsic?
  • this is labor, this is work, just do it.
    • Kurt Laitner
       
      except that this cultural meme is already a bias, not a fact
  • When communal logics are in effect, all sorts of norms of reciprocity, sacrifice, and gift-giving come into play: this is cool, this is right, this is fun
    • Kurt Laitner
       
      true, and part of our challenge then is to remove this dichotomy
  • So think about paying a kid to clean up their room, paying parishioners to go to church, paying people in a neighborhood to attend a town hall meeting, paying people to come out and vote. All these examples seem a little strange or forced. Why? Because they mix and match the communal with the market-oriented.
    • Kurt Laitner
       
      and perhaps the problem is simply the conversion to money, rather than simply tracking these activities themselves (went to church 50 times this year!, helped 50 orphans get families!) (the latter being more recognition than reward
  • Payment as disincentive. In his interesting book Freakonomics, economist Steven Levitt describes some counterintuitive facts about payment. One of the most interesting is that charging people who do the wrong thing often causes them to do it more, and paying people to do the right thing causes them to do it less.
    • Kurt Laitner
       
      and tracking them causes them to conform to cultural expectations
  • You direct people _away_ from any noble purpose you have, and instead towards grubbing for dollars
    • Kurt Laitner
       
      and we are left with the challenge, how to work to purpose but still have our scarce goods needs sufficiently provided for?  it has to be for love AND money
  • When people work for a noble purpose, they are told that their work is highly valued. When people work for $0.75/hour, they are told that their work is very low-valued
    • Kurt Laitner
       
      so pay them highly for highly valued labour, and don't forget to recognize them as well... no?
  • you're going to have to fight your way through labour laws and tax issues all the way to bankruptcy
    • Kurt Laitner
       
      this is a non argument, these are just interacting but separate problems, use ether or bitcoin, change legislation, what have you
  • Market economics. If you have open content, I can copy your content to another wiki, not pay people, and still make money. So by paying contributors, you're pricing yourself out of the market.
    • Kurt Laitner
       
      exactly, so use commonsource, they can use it all they want, but they have to flow through benefit (provide attribution, recognition, and any financial reward must be split fairly)
  • You don't have to pay people to do what they want to do anyways. The labour cost for leisure activities is $0. And nobody is going to work on a wiki doing things they don't want to do.
    • Kurt Laitner
       
      wow, exploitative in the extreme - no one can afford to do work for free, it cuts into paid work, family time etc.  if they are passionate about something they will do it for free if they cannot get permission to do it for sustenance, but they still need to sustain themselves, and they are making opportunity cost sacrifices, and if you are in turn making money off of this you are an asshole.. go ahead look in the mirror and say "I am an asshole"
  • No fair system. There's simply no fair, automated and auditable way to divvy up the money
    • Kurt Laitner
       
      this is an utter cop out - figure out what is close enough to fair and iterate forward to improve it, wow
  • too complicated to do automatically. But if you have a subjective system -- have a human being evaluate contributions to an article and portion out payments -- it will be subject to constant challenges, endless debates, and a lot of community frustration.
    • Kurt Laitner
       
      yes to the human evaluation part, but "it's too complicated" is disingenuous at the least
  • Gaming the system. People are really smart. If there's money to be made, they'll figure out how to game your payment system to get more money than they actually deserve
    • Kurt Laitner
       
      yes indeed, so get your metrics right, and be prepared to adjust them as they are gamed - and ultimately, as financial penalties are to BP, even if some people game the system, can we better the gaming of the capitalist system.. it's a low bar I know
  • They'll be trying to get as much money out of you as possible, and you'll be trying to give as little as you can to them
    • Kurt Laitner
       
      it doesn't have to be this way, unless you think that way already
  • If you can't convince people that working on your project is worth their unpaid time, then there's probably something wrong with your project.
    • Kurt Laitner
       
      wow, talk about entrepreneurial taker attitude rationalization
  • People are going to be able to sense that -- it's going to look like a cover-up, something sleazy
    • Kurt Laitner
       
      and getting paid for others free work isn't sleazy, somehow...?
  • Donate.
    • Kurt Laitner
       
      better yet, give yourself a reasonable salary, and give the rest away
  • Thank-you gifts
    • Kurt Laitner
       
      cynical.. here have a shiny bobble you idiot
  • Pay bounties
    • Kurt Laitner
       
      good way to get people to compete ineffectively instead of cooperating on a solution, the lottery mechanism is evil
  •  
    while good issue are brought up in this article, the solutions offered are myopic and the explanations of the observed effects not satisfying
Kurt Laitner

The Link Economy and Creditright - Geeks Bearing Gifts - Medium - 3 views

  • Online, content with no links has no value because it has no audience
  • News Commons used Repost as the basis of a content- and audience-sharing network among dozens of sites big and small in the state’s new ecosystem
  • Huffington Post and Twitter can get thousands of writers — including me — to make content for free because it brings us audience and attention.
  • ...25 more annotations...
  • Consider an alternative to syndication. I’ll call it reverse syndication. Instead of selling my content to you, what say I give it to you for free? Better yet, I pay you to publish it on your site. The condition: I get to put my ad on the content. I will pay you a share of what I earn from that ad based on how much audience you bring me.
  • That model values the creation of the audience
  • If content could travel with its business model attached, we could set it free to travel across the web, gathering recommendations and audience and value as it goes
  • She searched Google for “embeddable article” and up came Repost.us, already created by entrepreneur and technologist John Pettitt. Repost very cleverly allowed embeddable articles to travel with the creator’s own brand, advertising, analytics, and links.
  • First, he found that the overlap in audience between a creator’s and an embedder’s sites generally ran between 2 and 5 percent. That is to say, the embedders brought a mostly new audience to the creator’s content.
  • Instead, Pettitt found that click-through ran amazingly high: 5 to 7 percent — and these were highly qualified clicks of people who knew what they were going to get on the other side of a link
  • I call this creditright. We need a means to attach credit to content for those who contribute value to it so that each constituent has the opportunity to negotiate and extract value along the chain, so that each can gain permission to take part in the chain, and so that behaviors that benefit others in the chain can be rewarded and encouraged
    • Kurt Laitner
       
      so *net basically, or OVN contributory value accounting
  • Each creator’s ads traveled with its content — though that wasn’t necessarily optimal, because an ad for a North Jersey hairdresser wouldn’t perform terribly well with South Jersey readers brought in through embedding.
  • key factor in its failure: Repost could find many sites willing and eager to make their content embeddable. It didn’t find enough sites to embed the content.
  • But the embedders got nothing aside from the free use of content — content that was just a link away anyway
  • Our ultimate problem in media is that we do not have sufficient technical and legal frameworks for alternate business models.
  • That formula was the key insight behind Google: that links to content are a signal of its value; thus, the more links to a page from sites that themselves have more links, the more useful, relevant, or valuable that content is likely to be
  • Silicon Valley’s: Those people are your fans who are bringing value to you by sending you audiences and by contributing their creativity, and you’d be wise to build your businesses around making it easier, not harder, for them to get and share your content when and how they want it.
  • And so, we came to agree that we need new technological and legal frameworks flexible enough to enable multiple models to support creativity.
  • Hollywood’s side: People who download our content without buying it or who remix it without our permission — and the platforms that facilitate these behaviors — are stealing from us and must be stopped and punished.
  • Imagine you are a songwriter. You hear a street poet and her words inspire you to write a song about her, quoting her in the piece. You go to a crowdfunding platform — Kickstarter, Indiegogo, or Patreon — to raise money for you to go into the studio and perform and distribute your song. Another songwriter comes along and remixes it, making a new version and also sampling from others’ songs. Both end up on YouTube and Soundcloud, on iTunes and Google Play. Audience members discover and share the songs. A particularly popular artist shares the remixed version on Twitter and Facebook and it explodes. A label has one of its stars record it. The star appears on TV performing it. A movie studio includes that song in a soundtrack. There are many constituents in that process: the subject, the songwriter, the patrons, the fans, the remixer, the distributor, the label, the star, the show, the studio, and the platforms. Each contributed value.
  • Each may want to recognize value — but not all will want cash. There are other currencies in play: The poet may want credit and fame; the songwriter may want to sell concert tickets; the patrons may want social capital for discovering and supporting a new artist; the remixer may want permission to remix; the platforms may want a cut of sales or of subscription revenue; the show may want audience and advertising; the studio will want a return on its investment and risk.
  • I’ve suggested they would be wiser to seek another currency from Google: data about the users, helping build better services for readers and advertisers and thus better businesses
  • We will need a way to attach metadata to content, recording and revealing its source and the contributions of others in the chain of continuing creation and distribution.
  • We need a marketplace to measure and value their contributions and a means to negotiate rewards and permissions
  • We need payment structures to handle multiple currencies: data as well as money
  • And we need a legal framework to allow the flexible exploration of new models, some of which we cannot yet imagine.
  • It took many more years for society to develop principles of free speech to balance the economic and political interests of those who would attempt to control a new tool of speech.
  • We must reimagine the business of media and news from the first penny, asking where value is created, who contributes to it, where it resides, and how to extract it
  • Thus, we need new measures of value
Kurt Laitner

Smart Contracts - 0 views

  • Whether enforced by a government, or otherwise, the contract is the basic building block of a free market economy.
  • A smart contract is a set of promises, specified in digital form, including protocols within which the parties perform on the other promises.
  • The basic idea of smart contracts is that many kinds of contractual clauses (such as liens, bonding, delineation of property rights, etc.) can be embedded in the hardware and software we deal with, in such a way as to make breach of contract expensive (if desired, sometimes prohibitively so) for the breacher.
  • ...77 more annotations...
  • A broad statement of the key idea of smart contracts, then, is to say that contracts should be embedded in the world.
  • And where the vending machine, like electronic mail, implements an asynchronous protocol between the vending company and the customer, some smart contracts entail multiple synchronous steps between two or more parties
  • POS (Point of Sale)
  • EDI (Electronic Data Interchange
  • SWIFT
  • allocation of public network bandwidth via automated auctions
  • Smart contracts reference that property in a dynamic, proactively enforced form, and provide much better observation and verification where proactive measures must fall short.
  • The mechanisms of the world should be structured in such a way as to make the contracts (a) robust against naive vandalism, and (b) robust against sophisticated, incentive compatible (rational) breach.
  • A third category, (c) sophisticated vandalism (where the vandals can and are willing to sacrifice substantial resources), for example a military attack by third parties, is of a special and difficult kind that doesn't often arise in typical contracting, so that we can place it in a separate category and ignore it here.
  • The threat of physical force is an obvious way to embed a contract in the world -- have a judicial system decide what physical steps are to be taken out by an enforcement agency (including arrest, confiscation of property, etc.) in response to a breach of contract
  • It is what I call a reactive form of security.
  • The need to invoke reactive security can be minimized, but not eliminated, by making contractual arrangements verifiable
  • Observation of a contract in progress, in order to detect the first sign of breach and minimize losses, also is a reactive form of security
  • A proactive form of security is a physical mechanism that makes breach expensive
  • From common law, economic theory, and contractual conditions often found in practice, we can distill four basic objectives of contract design
  • observability
  • The disciplines of auditing and investigation roughly correspond with verification of contract performance
  • verifiability
  • The field of accounting is, roughly speaking, primarily concerned with making contracts an organization is involved in more observable
  • privity
  • This is a generalization of the common law principle of contract privity, which states that third parties, other than the designated arbitrators and intermediaries, should have no say in the enforcement of a contract
  • The field of security (especially, for smart contracts, computer and network security), roughly corresponds to the goal of privity.
  • enforceability
  • Reputation, built-in incentives, "self-enforcing" protocols, and verifiability can all play a strong part in meeting the fourth objective
  • Smart contracts often involve trusted third parties, exemplified by an intermediary, who is involved in the performance, and an arbitrator, who is invoked to resolve disputes arising out of performance (or lack thereof)
  • In smart contract design we want to get the most out of intermediaries and arbitrators, while minimizing exposure to them
  • Legal barriers are the most severe cost of doing business across many jurisdictions. Smart contracts can cut through this Gordian knot of jurisdictions
  • Where smart contracts can increase privity, they can decrease vulnerability to capricious jurisdictions
  • Secret sharing
  • The field of Electronic Data Interchange (EDI), in which elements of traditional business transactions (invoices, receipts, etc.) are exchanged electronically, sometimes including encryption and digital signature capabilities, can be viewed as a primitive forerunner to smart contracts
  • One important task of smart contracts, that has been largely overlooked by traditional EDI, is critical to "the meeting of the minds" that is at the heart of a contract: communicating the semantics of the protocols to the parties involved
  • There is ample opportunity in smart contracts for "smart fine print": actions taken by the software hidden from a party to the transaction.
  • Thus, via hidden action of the software, the customer is giving away information they might consider valuable or confidential, but the contract has been drafted, and transaction has been designed, in such a way as to hide those important parts of that transaction from the customer.
  • To properly communicate transaction semantics, we need good visual metaphors for the elements of the contract. These would hide the details of the protocol without surrendering control over the knowledge and execution of contract terms
  • Protocols based on mathematics, called cryptographic protocols, tre the basic building blocks that implement the improved tradeoffs between observability, verifiability, privity, and enforceability in smart contracts
  • secret key cryptography,
  • Public key cryptography
  • digital signatures
  • blind signature
  • Where smart contracts can increase observability or verifiability, they can decrease dependence on these obscure local legal codes and enforcement traditions
  • zero-knowledge interactive proof
  • digital mix
  • Keys are not necessarily tied to identities, and the task of doing such binding turns out to be more difficult than at first glance.
  • All public key operation are are done inside an unreadable hardware board on a machine with a very narrow serial-line connection (ie, it carries only a simple single-use protocol with well-verified security) to a dedicated firewall. Such a board is available, for example, from Kryptor, and I believe Viacrypt may also have a PGP-compatable board. This is economical for central sites, but may be less practical for normal users. Besides better security, it has the added advantage that hardware speeds up the public key computations.
  • If Mallet's capability is to physically sieze the machine, a weaker form of key protection will suffice. The trick is to hold the keys in volatile memory.
  • The data is still vulnerable to a "rubber hose attack" where the owner is coerced into revealing the hidden keys. Protection against rubber hose attacks might require some form of Shamir secret sharing which splits the keys between diverse phgsical sites.
  • How does Alice know she has Bob's key? Who, indeed, can be the parties to a smart contract? Can they be defined just by their keys? Do we need biometrics (such as autographs, typed-in passwords, retina scans, etc.)?
  • The public key cryptography software package "Pretty Good Privacy" (PGP) uses a model called "the web of trust". Alice chooses introducers whom she trusts to properly identify the map between other people and their public keys. PGP takes it from there, automatically validating any other keys that have been signed by Alice's designated introducers.
  • 1) Does the key actually belong to whom it appears to belong? In other words, has it been certified with a trusted signature?
  • 2) Does it belong to an introducers, someone you can trust to certify other keys?
  • 3) Does the key belong to someone you can trust to introduce other introducers? PGP confuses this with criterion (2). It is not clear that any single person has enough judgement to properly undertake task (3), nor has a reasonable institution been proposed that will do so. This is one of the unsolved problems in smart contracts.
  • PGP also can be given trust ratings and programmed to compute a weighted score of validity-- for example, two marginally trusted signatures might be considered as credible as one fully trusted signature
  • Notaries Public Two different acts are often called "notarization". The first is simply where one swears to the truth of some affidavit before a notary or some other officer entitled to take oaths. This does not require the notary to know who the affiant is. The second act is when someone "acknowledges" before a notary that he has executed a document as ``his own act and deed.'' This second act requires the notary to know the person making the acknowledgment.
  • "Identity" is hardly the only thing we might want map to a key. After all, physical keys we use for our house, car, etc. are not necessarily tied to our identity -- we can loan them to trusted friends and relatives, make copies of them, etc. Indeed, in cyberspace we might create "virtual personae" to reflect such multi-person relationships, or in contrast to reflect different parts of our personality that we do not want others to link. Here is a possible classification scheme for virtual personae, pedagogically presented:
  • A nym is an identifier that links only a small amount of related information about a person, usually that information deemed by the nym holder to be relevant to a particular organization or community
  • A nym may gain reputation within its community.
  • With Chaumian credentials, a nym can take advantage of the positive credentials of the holder's other nyms, as provably linked by the is-a-person credential
  • A true name is an identifier that links many different kinds of information about an person, such as a full birth name or social security number
  • As in magick, knowing a true name can confer tremendous power to one's enemies
  • A persona is any perstient pattern of behavior, along with consistently grouped information such as key(s), name(s), network address(es), writing style, and services provided
  • A reputable name is a nym or true name that has a good reputation, usually because it carries many positive credentials, has a good credit rating, or is otherwise highly regarded
  • Reputable names can be difficult to transfer between parties, because reputation assumes persistence of behavior, but such transfer can sometimes occur (for example, the sale of brand names between companies).
  • Blind signatures can be used to construct digital bearer instruments, objects identified by a unique key, and issued, cleared, and redeemed by a clearing agent.
  • The clearing agent prevents multiple clearing of particular objects, but can be prevented from linking particular objects one or both of the clearing nyms who transferred that object
  • These instruments come in an "online" variety, cleared during every transfer, and thus both verifiable and observable, and an "offline" variety, which can be transfered without being cleared, but is only verifiable when finally cleared, by revealing any the clearing nym of any intermediate holder who transfered the object multiple times (a breach of contract).
  • To implement a full transaction of payment for services, we need more than just the digital cash protocol; we need a protocol that guarantees that service will be rendered if payment is made, and vice versa
  • A credential is a claim made by one party about another. A positive credential is one the second party would prefer to reveal, such as a degree from a prestigious school, while that party would prefer not to reveal a negative credential such as a bad credit rating.
  • A Chaumian credential is a cryptographic protocol for proving one possesses claims made about onself by other nyms, without revealing linkages between those nyms. It's based around the is-a-person credential the true name credential, used to prove the linkage of otherwise unlinkable nyms, and to prevent the transfer of nyms between parties.
  • Another form of credential is bearer credential, a digital bearer instrument where the object is a credential. Here the second party in the claim refers to any bearer -- the claim is tied only to the reputable name of issuing organization, not to the nym or true name of the party holding the credential.
  • Smart Property We can extend the concept of smart contracts to property. Smart property might be created by embedding smart contracts in physical objects. These embedded protocols would automatically give control of the keys for operating the property to the party who rightfully owns that property, based on the terms of the contract. For example, a car might be rendered inoperable unless the proper challenge-response protocol is completed with its rightful owner, preventing theft. If a loan was taken out to buy that car, and the owner failed to make payments, the smart contract could automatically invoke a lien, which returns control of the car keys to the bank. This "smart lien" might be much cheaper and more effective than a repo man. Also needed is a protocol to provably remove the lien when the loan has been paid off, as well as hardship and operational exceptions. For example, it would be rude to revoke operation of the car while it's doing 75 down the freeway.
  • Smart property is software or physical devices with the desired characteristics of ownership embedded into them; for example devices that can be rendered of far less value to parties who lack possesion of a key, as demonstrated via a zero knowledge interactive proof
  • One method of implementing smart property is thru operation necessary data (OND): data necessary to the operation of smart property.
  • A smart lien is the sharing of a smart property between parties, usually two parties called the owner and the lienholder.
  • Many parties, especially new entrants, may lack this reputation capital, and will thus need to be able to share their property with the bank via secure liens
  • What about extending the concept of contract to cover agreement to a prearranged set of tort laws? These tort laws would be defined by contracts between private arbitration and enforcement agencies, while customers would have a choice of jurisdictions in this system of free-market "governments".
  • If these privately practiced law organizations (PPLs for short) bear ultimate responsibility for the criminal activities of their customers, or need to insure lack of defection or future payments on the part of customers, they may in turn ask for liens against their customers, either in with contractual terms allowing arrest of customers under certain conditions
  • Other important areas of liability include consumer liability and property damage (including pollution). There need to mechanisms so that, for example, pollution damage to others' persons or property can be assessed, and liens should exist so that the polluter can be properly charged and the victims paid. Where pollution is quantifiable, as with SO2 emissions, markets can be set up to trade emission rights. The PPLs would have liens in place to monitor their customer's emissions and assess fees where emission rights have been exceeded.
« First ‹ Previous 41 - 54 of 54
Showing 20 items per page