Showing posts with label Community. Show all posts
Showing posts with label Community. Show all posts

Saturday, February 5, 2011

Seeing the Invisible

by Jack Holt

When I was a boy, my grandfather taught me a Cherokee Proverb which I have pondered my entire life. It didn’t make much sense to me at the time, but the more I thought about it, and the more I grew, and the more I learned, and the more I did, and the more people I met, worked with, and engaged with, the more I began to see what the proverb meant.

I suppose that’s what proverbs are supposed to do. They guide you toward some universal truth that is unknowable at the time. Unknowable because you haven’t lived the time and it is time that is the critical factor.

While time is the critical factor, experience is the determining factor and thought multiplies the effect for it is what you give your thought to that determines what your experience is and the time you will give to a task and hence what you learn. This is true whether it’s cyberspace time or the “old-fashioned” variety of time! 

The proverb stated: “If you listen to whispers, you will not hear screams.” For a close-knit, tribal people this meant paying attention to those around you. Even in a hyper-connected age like the one we experience in cyberspace, it means the health of the whole is the responsibility of the individual. It means an acculturated community. It means seeing the invisible…an invisible that transcends both the tribe and the physical world, if you look and listen closely enough.

Why do we so often miss seeing the invisible? Perhaps because we are looking and listening in the wrong places.

What makes people who they are? Why do they do what they do? How can we know such things? Time, experience, thoughtfulness: just as my grandfather inferred in his proverb.

Listening to people, learning from them, learning all we can about them. What are their proverbs, their poetry, and their music? These are the tools of enculturation: how we learn and apply values of a culture.

To know a people’s language is just the beginning, to know their thoughts is to know them. This is what it means to socialize. This is how we will ultimately exploit cyberspace as a species. In the meantime, let’s listen…

Monday, January 10, 2011

Cyberspace Science and Cyberspace Security Science: Why Both?

by Carl Hunt

In an October, 2010 blog, I commented about the importance of asking “the right questions” in critical situations.  “It’s the questions, not the answers, which most guide us in strategic thinking and understanding…And equally important, it is the order in which you ask questions and experience discovery through responses to those questions that help you form strategies.” I wrote these words citing the inspiration of mentor Dr. David Schum of George Mason University.

It’s an odd if fascinating experience to quote yourself from a previous writing to make a point, but it’s also boring and probably doesn’t raise many new challenges in thinking.  So, I’ll try to springboard off that “inspirational” quote to distinguish why we need two “disciplines”: one the major and one the minor, to study cyberspace.  It may turn out we need many more, but these two will provide a great start to test the limits of human thinking about connectivity!

Why do we need both a Science of Cyberspace and a Science of Cyberspace Security, the latter of which receives significantly more emphasis?

We require them both because they are so deeply interwoven that we need both a general understanding of the environment of cyberspace and we critically need to understand how to secure it.  Science to secure cyberspace may have a shorter-term, technological focus, but together they may ultimately satisfy the requirement for prosperity in this new environment.

It will be scientific-based study, informed by the process of meaningful inquiry, that will help us see beyond a purely technological domain and restore some methodological insights into what is happening to man in the advent of the hyper-connected age of cyberspace.

You can probably tell by now that I consider a Science of Cyberspace to be the major discipline!

In considering both cyberspace in general and cyberspace security in particular, it’s about the questions we ask that drive new and hopefully relevant discovery, and that’s the construct I’ll use to discuss both efforts.  The nature of these questions will help discern the differences in our quest to understand cyberspace from these two strongly related perspectives.

I’ll start with the Science of Cyberspace Security requirement based on a recently released government-sponsored effort called “Science of Cyberspace Security” published in November, 2010 by the MITRE Corporation and the JASON group.

If one didn’t already know it before reading this report, it’s easy to see why security demands the most attention since business, academia and government (and indeed the world’s economic systems) have built a critical reliance on what cyberspace offers in terms of connectivity and access.  Cyberspace security is also a core component of the overall SENDS Project, including the SENDS modeling and simulation environment, SENDSim.  It’s a vital topic!

The JASON report provided answers, but what were the questions they addressed?

The report used nine basic questions to organize thinking within their findings, having been provided these questions by their government sponsorship (according to page 3 of the report, also where we find the start of the questions).  The reader interested in cyberspace security should refer to the JASON report to form their own conclusions, but the idea of building a strategic position around important questions is the focus here.

As Dave Schum always advised, it really helps if you’re working with “the right questions.”  All in all, it appears the government provided the JASON group with meaningful questions and they responded well within the framework of those questions.  But, were they the “right questions?”

We need to ask how suitable the questions were to guide us in strategic thinking and understanding of cyberspace.  Perhaps they were a reasonable start, yet they were narrowly focused on the “minor” discipline of the study of cyberspace: the Science of Cyberspace Security.  To really be “the” questions that guide us in better understanding cyberspace, they must be broadened to address the entirety of the environment.

The questions provided, as rooted in scientific exploration as they were, did not get at the issues we’ve raised in SENDS about people and community as the key part of the solution space.  Any line of inquiry for the study of the Science of Cyberspace will need to focus on people: people as users, people as designers, people as protectors, people as attackers and people as solutions.  The JASON study addressed the questions they were provided well enough, but again, were they “the right questions?”  Did these questions help objectively frame their responses and allow for full impartiality?  After all, that’s a significant purpose of meaningful inquiry.

While we don’t have access to the instructions provided to the JASON panel, we do have the list of the questions they were provided by the sponsor.  For those who focus on the role of people in cyberspace, it’s gratifying to see that question 5 did ask if social sciences, among others, could serve as topics that could “contribute to a science of cyber security?”

The body of the JASON study interwove important topics that are people-centric in their substance.  These topics include game theory, trust, biologically-inspired immune responses and metric collection/ assessments.  For the most part, however, the JASON group focused on technological prescriptions.  A significant Department of Energy December, 2008 report, “A Scientific Research and Development Approach To Cyber Security,” cited over-reliance on a technology focus as a chief complaint, as has SENDS since its origins.  SENDS found inspiration from the DOE work. Did the JASON line of inquiry enhance thinking in that regard?  Readers should decide for themselves.

The sponsor’s questions did lead to one critical response from the report, however:  “The most important attributes (of a Science of Cyberspace Security) would be the construction of a common language and a set of basic concepts about which the security community can develop a shared understanding.”  We have asserted the same requirement from the beginning of SENDS (here and here, for example), as did the DOE imply in its report.  It appears this principle applies to both a science of cyberspace security and a more general science of cyberspace (in fact, that’s a contributing factor to resolving wicked problems, another core component of SENDS).

But, there’s much more to understanding cyberspace and the questions we need to ask about it than cyberspace security.  That’s why we need a broader “Science of Cyberspace.”  To better secure cyberspace, it would be helpful to more fully understand what’s going on inside the environment as a whole.  Some might argue that the immune system seems to work just fine without knowing all the details about the host it’s protecting or the characteristics of the attacker.  But as the JASONs so rightly point out, an immune system is at best an inspiration for how to do better security.

In their study of systems, scientists and engineers typically try to address hard questions through broad understanding and awareness, and use an approach that provides deeper insights about the whole of a system.  While studying the immune system may help with understanding how the body defends itself, studying the immune system alone does not suffice for the study of the entire human body.  Likewise, studying the science of cyberspace security alone does not give us the broader understanding of the whole needed to study the entirety of the cyberspace system.

Since cyberspace is a socio-technological environment, built, explored and exploited by people (at least for the time being), we need to start understanding more about the ecology of the environment and how it’s changing human behavior as a whole.  We’ve seen that cyberspace as a massively interconnecting environment has already altered the nature of crime and spying (people-centric activities), and thus why there is a critical need for a science of cyberspace security.  That’s just one family of problems we face, however, because we don’t understand cyberspace holistically.

We need to ask questions about cyberspace, not just about cyberspace security.  Broadening our aperture of questions helps us accomplish the main objectives of science: explain and predict.  Many more questions need to be focused on the people part of cyberspace.  We began that process from the earliest drafts of the Science of Cyberspace White Paper (first drafted in March, 2009, by the way, and now posted in its eighth major draft, noted above) and in our earliest blogs (here and here, for example).

We also need not be put off when we find evidence or results that refute our hypotheses (another term for questions), either.  It’s just as important to publish findings that surprise us and rebut previously held notions as it is to present results that confirm our initial positions.  Science is about impartiality and repeatability of objectively derived findings.  A recent piece in the New Yorker Magazine, entitled “The Truth Wears Off: Is there something wrong with the scientific method?” bears that out.

In a sense, trying to do a science of cyberspace security without at least simultaneously doing a more general science of cyberspace may fall into the category of the cautions of the New Yorker piece…we need to ask questions about the whole environment, not just part of it.  That’s the approach SENDS and the Science of Cyberspace are taking.  Our success, however, will be in large part because of the insightful work the JASONs, the DOE and others are doing, just as they may also benefit from SENDS.

Cyberspace is immense, and it will take all we humans have to understand it, explore it, exploit it and protect it.  We’re all in this together.

Thursday, December 30, 2010

SENDS 2010: The Year in Review

by Carl Hunt, Bob Schapiro and Craig Harm

In sports, when an underdog team surprises everyone and gets into the playoffs, they can’t wait until the next game.  That’s what the SENDS team is feeling right now: the thrill of anticipation as we see our season extended and the team getting better and better when it counts.

Our goal has always been to empower the public to create the future of cyberspace and become part of the SENDS team.  A few months ago, we were in the odd position of being able to open positions on the team, but not having a lot of people to join.  Now that is changing...fast.

From the beginning, SENDS has been fortunate to enjoy the active participation of great thinkers...including some of the people who actually set the course for the future of the Internet.  Most of these people work for the government and major software firms, hired for their expertise in cyber-security.  But as scientists, they wish to transcend that role and discover what makes cyberspace tick.  They know this can only be discovered by working with the people who use the Internet every day; in short, almost everyone – it’s a big team!

That’s where SENDS comes in.

To be blunt, until a few months ago, our resources for reaching the public were not what we hoped they’d be.  But the seeds we planted started to thrive, growing stronger every day.  With this posting, we have now published 31 blogs in the 3½ months from the first entry.  We’ve been fortunate to be highlighted in several online fora, including James Fallows’ Atlantic Magazine blog, the DoD’s Armed with Science blog, and an interesting site called “OhMyGov!”  We’ve even been invited to two Highlands’ Forum meetings to talk about SENDS and participate in discussions of Design in Cyberspace.

The important thing is that you are reading this blog...and if you’re like most of the people who now read and contribute, six months ago you had no idea what SENDS was.  You joined the team!

In 2011, we look forward to empowering people in many ways, as with our initiative for you to help create the new vocabulary of cyberspace.  In fact, thanks to contributors, we have a lot to build on to strengthen and broaden the team.  As 2010 draws to a close, however, it’s worth talking about the direction the SENDS Pilot project has traveled from its inception and to try to put it into context.  That, along with new team members’ contributions, creates the synergy for 2011.

SENDS began in 2009 as a proposal to address the observations of a December, 2008 US Department of Energy White Paper entitled “A Scientific Research and Development Approach To Cyber Security.”  Thus, SENDS began as a project to address cyberspace security, expanding on several of the thoughts from that very fine DOE paper.

It became clear after a 90-day study, however, that in order for the US and indeed all users of cyberspace to explore and exploit the environment, security was necessary but not a sufficient condition to unleash the potential cyberspace has to enhance prosperity on a national and global scale.  We took this challenge to potential government sponsors and they agreed.

In a June, 2010 interagency, multidisciplinary forum in Arlington, VA, the current SENDS Pilot Project was initiated, identifying four main tasks to accomplish in the 12-month pilot.

As we embarked on the project, new ideas came to light as a result of the collaboration of the diverse SENDS participants.  The SENDS tasks were still relevant, but we found that we needed to look through the lenses of living systems and ecology to develop holistic perspectives about the greatest connecting fabric mankind has known.

Several prominent advisors told us that the ecological perspective is a valuable way to think about the challenges of cyberspace prosperity and security, particularly when considered through the standpoint of what is found in wicked problem resolution literature.  The wicked problem resolution advice is good because it also helps us think about the social context of problem definition and resolution: it’s a people challenge, just as are cyberspace prosperity and security.

We took this good advice and blended it with the thoughts of guest bloggers to produce what we think is an objective viewpoint about how cyberspace is emerging around us and how it will affect us in the future.  We looked at people, processes and technology as a convergent and emergent phenomenon (starting here).  These insights have been continuously informed by multiple perspectives, possible through the connectivity that cyberspace offers.

This holistic view is why SENDS is more than just another cyberspace security project.

Through the efforts of a variety of authors, the SENDS Blog has been fortunate to provide diverse perspectives on the SENDS tasks through several backgrounds…the SENDS wiki site has augmented and expanded these perspectives.

Broad thinking about one of the two most long-term focused SENDS tasks, Education and Academic Curricula, for example, has led to contributions from no less than four authors about this important topic.  We have had the good fortune to hear from a school teacher in Canada, an Emmy-Award winning documentary director/ producer, a director of a nationally recognized science center in Florida and a retired military officer (here and here), each sharing distinctive perceptions about how America must look at education in the connected age.

Another long-term task, a Center for Cyberspace Science, has generated equally important and diverse perspectives, ranging from the use of advanced modeling and simulation capabilities to the development of a “cyberspace laboratory.”  When put into the context of better understanding concepts like community in cyberspace and formulating meaningful inquiry about this new environment, a center for studying the remarkable power of cyberspace connectivity seems mandatory for better understanding this new world.

The task to develop relevant models and simulations (M&S) as a “laboratory” for cyberspace is indeed one of the tasks we have invested considerable resources in.  The SENDS M&S team collected data from a variety of subject matter experts, including military, law enforcement and commercial practitioners to develop SENDSim.  This M&S environment, shown in its early stages here, is one of the first products of the Center.

We are also developing SENDSim to become a useful tool to gain insights on the kind of socio-technological convergence issues we’ve been discussing above.  Speaking of understanding socio-technological convergence, the SENDS team has also been fortunate to publish the insights of a senior media analyst to help clarify challenges to look at cyberspace in this way (here and here).  We’ve even had an innovative software developer write about the development of programming languages in the context of socio-technological convergence and ecology!

Another early product of the Center is a White Paper on the Development of a Science of Cyberspace, that while in early draft form, may serve as a framework for the consideration of important topics to demonstrate how such a discipline would be studied.  We will see more similar products from the Center as the Pilot continues, and we expect to write about them here in this blog.

The first six months of the SENDS Pilot Project have been exciting, and chronicling it within the pages of the SENDS Blog has been rewarding considering the diversity of the authors who have contributed.  The remaining six months of the Pilot should be equally rewarding as we see the maturity of SENDSim emerge.

We look forward to experiencing greater government, commercial, academic and even individual relationships as we improve on the Science White Paper through more diverse input, and synergize SENDS through collaboration with other efforts.  We also look forward to formalizing relationships that move the Center for Cyberspace Science into a suitable home.

In coming weeks, we’ll port over this blog and much of the wiki material to a SENDS-dedicated site at www.sendsonline.org.  We’ll announce the movement of the site in this blog and on the wiki when we’re up and running.  Please visit us there, and continue to send your thoughts to words@sendsonline.org or through comments within this blog.

It’s been a great first six months for the rapidly growing SENDS team and we can hardly wait for the next six.  The playoffs await and the season continues!

Friday, December 17, 2010

Community in Cyberspace: Real or Imagined?

By Carl Hunt

What do the reactions to the recent WikiLeaks (also here), Facebook, and your town have in common?  Well, since you saw the title to this week’s blog already, you guessed it: community.  The line of inquiry we take up today, however, is how “real” are these communities and what do they mean to us in terms of individual and collective human behaviors?

Since we talked a bit about Facebook previously, we'll focus on real "imagined" communities.

We all experience effects of behavior and one of the very first insights we consider is the effects of behavior in cyberspace-based communities.  Regardless of nation-state ties or physical locations, the virtual communities of cyberspace can create real effects that cause challenges to the traditional structure of government or business.  The communities that formed to do “virtual combat” against those that initially cut off access to the WikiLeaks site caused real damage that can be measured in lost income or customer confidence.  While the level of damage caused is still being debated, it was indeed quantifiable.

Equally as interesting, there is no evidence that any of the groups (communities, if you will) had ever met or coordinated their attacks on each other before the recent US government-related WikiLeaks were released.  These communities may have previously existed but their objectives and capabilities remained largely unnoticed until a rationale manifested itself and these groups self-identified around a common cause.  They “imagined” a status that empowered them to act as members of a community.

So, what is an imagined community as opposed to a real community?  Is there a difference as far as cyberspace communities are concerned?

Americans, Chinese, French, and even Somali citizens understand their ties to a nation-state entity.  In some populations, the concept of nationalism creates great personal patriotism and fervor, and in some a personal identification with national spirit is less relevant.  But in all cases, according to Cornell emeritus professor, Benedict Anderson, some quality of fraternity emerges and a people develop a sufficient sense of national identity that they come to be willing to die for their identity and the national entity.

Since we have not yet fought any full-blown Cyber World War, it’s unclear yet how such a strong sense of “nationalism” will play out in cyberspace.  Anderson’s ideas about imagined communities still resonate strongly in both real and virtual life, however.  We’ll have to see how the notion of willingness “to die for their identity” as a part of a community, whether physical or virtual, will play out, but there are insights we can start to accrue, as the recent wikileaks episodes clear.

NY Times technology reporter and author Nick Bilton has begun to address the idea of imagined community as it applies to cyberspace in I Live in the Future and Here’s How it Works (Crown, 2010).  Bilton writes “…we are constantly weaving in and out of small and large, obvious and imagined communities.”  Cyberspace, or the digital realm, as Bilton further clarifies it, is an “always on, real-time, creating, consuming society,” and the media has been bringing this trend to human community for many years, perhaps centuries, as noted by both Anderson and Bilton.

Writes Bilton about Anderson’s perspectives on community and the media: “In the same way that Anderson recognized that the printing press and its ability to communicate in a person’s language could break up power structures and create meaningful and powerful nations, so too may our online communities reshape and remake both our own personal imagined nations and our traditional ways of communicating.”

The creation of new globally-connected, yet often self-detached imagined communities such as the participants in the wikispaces conflict demonstrate is important to watch.  Community may be real or virtual but it is in the mind of the beholder what role and actions the inhabitants may take, and in fact, cyberspace may amplify those roles and accelerate behaviors around the globe.  While we may never see the Cyber World War, we will likely see constant transformation of conflict as enabled by cyberspace and imagined communities.

Study and modeling of these communities is a critical objective of SENDS as we have noted here and here, for example.  Creation of common terms and concepts so that we can better understand the wicked nature of the problems we discover along the way is also a mandate.  Before we can understand communities and new forms of conflict in cyberspace, we have come to grips with the nature of cyberspace, and we need your help.  Please send us your thoughts to words@sendsonline.org and let’s move forward with this real and important community!

Wednesday, December 1, 2010

Cyberspace Community: Yours, Mine or Ours?

by Carl Hunt

Perhaps the biggest source of both gratification and aggravation in the growth of cyberspace is innovation…continuous, emergent innovation: it constantly surprises us!  What we ultimately observe in human, technological and cultural interactions often does not resemble the original purposes we had in mind when we built and deployed cyberspace realizations of our great ideas.  The communities within cyberspace just seem to take over and something new emerges.

Whose communities are these that change our intents and purposes?  Why don’t we have better control over our ideas and creations?  Just who owns cyberspace in the first place and do “they” control these communities?  Why do these emergences keep happening?

We have spoken about emergence in past blogs (here and here, for example), but we haven’t yet discussed it in terms of community, an all-important concept for cyberspace dwellers to accept and adopt.  People, interacting with other people and our technologies, show us routinely how adaptive and often unpredictable we truly are, particularly when we start forming the connected collectives we call community.

Whether these collectives and communities are in the virtual worlds of cyberspace or in the real world (whatever the differences are anymore), who owns them and who governs them?  Do we as humans own cyberspace or does it ultimately own us within the communities we build and occupy?  Could we at least suggest models of how these things work together?

One thing we have seen is that cyberspace is a breeding ground for adaptation and innovation, accelerating the processes of ecological coevolution as we have discussed in the past.  And since we can in fact begin to build models of these interactions, we can see that the outcomes of these adaptations and exchanges are truly emergences.  We can also see that these emergences apply to communities, as well.

SENDS is about leveraging these outcomes of emergence in the context of biological, sociological and technological events.  Emergent behaviors, products or processes are outcomes that are greater than the sums of their parts: the very nature and richness of the interactions that bind together to produce novelty and innovation ensure the amplification of the essential qualities of cyberspace.  Oh yes, emergence is something more than a simple sum of parts.

Cyberspace communities accommodate and reflect emergence in ways that we as humans have simply not been able to visualize before.  Technological innovations are mashed up to produce products not originally conceived, enabling new opportunities and processes for their uses and new communities to embrace and propagate them, and the cycle begins again.  New communities then form and so it goes, on and on…this is emergence in action!

Emergence is empowered by the connectivity of cyberspace in ways no other environment or domain of existence has ever done before, and we can indeed begin to model it, as we suggested (here and here).  But, communities and the dynamism they represent start to really add complexity to the models.  That’s why it’s so hard to say whose community is whose and who really occupies or controls it.

It’s worth trying to struggle with the concept of community within cyberspace, and we are going to do it in these blogs.  We’re going to leverage the insights we gain from the calls for assistance from contributor Bob Schapiro, for example, and find ways to express cyberspace as community, embracing emergence as a concept that reveals rather than obscures. 

We may not answer all the questions raised in this blog today but we’ll answer some of them.  And in keeping with good science, we’ll raise even better and more focused questions that help us explain and predict just what is happening in cyberspace and in community.  We may even reach some level of community sensibility!

Editor's Note: We want to thank Atlantic Magazine correspondent James Fallows for mentioning SENDS and the SENDS blog in a recent piece (noted in the right margin of this blog).  Jim's work in helping people understand the effects of cyberspace and the applications of modern technology have been terrific over the years.  Thanks, Jim!

Monday, September 20, 2010

Exchange and Emergence, Part 2

By Carl Hunt

What of emergence? We posit that emergence is an outcome based on processes and interactions between local nodes (particularly within a social context as it applies to cyberspace), and that this emergence can only be observed in the results of interactions. In hierarchical terms, an emergence is observed “one (approximately) level” above the interacting nodes or components. Biologist Harold Morowitz notes that emergence is manifested in “novel behaviors,” based on properties of the system or whole. “They are novelties that follow from the system rules but cannot be predicted from properties of the components that make up the system,” Morowitz writes (The Emergence of Everything, Oxford, NY, 2002).

In nature, Morowitz continues, emergence is a pruning action leading to the rise of the actual from the possible, and that these rules of nature that accommodate emergence are among the least understood of any science, but will in fact “be a major feature of the science of the future.” To reach its full potential, the Science of Cyberspace will have to make progress in helping us understand emergence and how we might better “predict” it. For that reason alone, emergence must be considered one of the two critical components to explore in this new discipline. The role that self-organizing criticality plays in these emergences is also important to consider, particularly in the massive connecting environment of cyberspace.

Individuals and collectives are connected more deeply, synchronously and asynchronously, and capable of generating more shared knowledge than at any point in the past. Consequently, the processes of exchange have evolved through the maturing of a set of rules and the interactions between “local” socio-technical “nodes” increasingly accommodated by connectivity that cyberspace now makes possible. In emergence, local nodes interact according to their own rules to create a global behavior, where such behaviors are typically very difficult to predict as explained by Morowitz.

Exchanges of information, goods and services take place more rapidly and through more connections than thought possible even a generation ago. A significant consequence of this new level of connectedness is that we lack an understanding of what this exchange-based “social” nature of cyberspace means to our recent history and all other forms of science and technology – we simply have not sufficiently studied cyberspace and the hyper-connectivity it empowers.

Connected collectivity, a concept dated to at least the early studies of physics and biology, changes things and produces cascading effects in many aspects of life we do not yet appreciate. It took decades and centuries to work out the sciences of the physical environments as we understand them today and we expect it will take many years to do the same for cyberspace.

Connected collectivity describes a characteristic of cyberspace related to shaping the environment through relevant network connections (people and organizational networks vice computer networks). As an example, cyberspace enables emergent “basins of attraction” that pull relevant thought or key people in potentially desired directions without human intent or interaction – it can be very subdued in appearance.

Stuart Kauffman described the interactive essence and outcome of this notion of collected connectivity. In Kauffman’s model, visualize randomly picking up two buttons and connecting them with a thread. Continue to randomly pick up buttons and connect them, and eventually buttons will surface that are already connected to one or more buttons. Before long, the majority of buttons are connected in one large “collective” and around the ratio of 0.5 threads to buttons, a phase transition occurs in which there is a single, very large connected collective of buttons.

Through these random processes of connecting (that could just as easily take place through exchanges), emergent structure forms through simple rules.

One of this larger collective’s dynamics is to connect and enable exchange and interactions that were not possible before the phase transition began, thus the emergent structure of the connectedness itself is a significant feature of connected collectivity. This is a powerful concept that drives much of the work in contemporary network (e.g., graph) theory (see for example, Barabasi, Linked: How Everything is Connected to Everything Else, Penguin, NY, 2003).

The study and modeling of emergence will be essential to understand connected collectivity because its structure can be so transparent as to be invisible to conventional network thinking.
If emergence can ever be controlled and thus predicted, it likely will be through better understanding and articulation of the rules of exchange and the interconnecting frameworks that empower the process of exchange and self-organizing criticality. The effects of these rules on emergence are filtered through many other factors within cyberspace that may or may not be controllable (or even knowable), but the rules we could uncover and with which we could experiment are primarily man-made or natural laws and thus potentially observable and capable of contributing to a better understanding of emergence.

The observance of emergence must be a fundamental object of study within this new science. Bak said that emergence is essentially the outcome of interactions where the results “are not observable consequences of the underlying dynamical rules.” Put another way by Morowitz: “Emergence is the opposite of reduction. The latter tries to move from the whole to the parts…The former tried to generate the properties of the whole from an understanding of parts.” Exchanges, self-organization and emergence thus offer us insightful clues as to what we should seek to explain and predict in this new science of cyberspace.

This is thus an important driving factor behind why we should do SENDS and why we so greatly need a “Science of Cyberspace.” Look for a graphic depiction of these concepts soon, right here in these blogs…