Volodymyr V. Lysenko and I have authored paper that explores the possibilities of the Internet as a tool for supplying information necessary for the organization and mobilization of successful opposition movements, especially under non-democratic regimes. Examples of the roles the Internet plays in the political processes in Russia are discussed in detail. In particular, the recent cyberprotest cases of the Ingushetiya.ru website and the movement to release political prisoner Svetlana Bakhmina are investigated. Besides showing the Internet’s significant role in organizing modern protests, these cases also demonstrate that in environments where practically all traditional mass-media are under the authorities’ control, the Internet becomes the major source of alternative information. Our paper offers a look at how deploying technologies can bring about social change, even in some of the most difficult political environments.
The paper will appear in Technology Forecasting and Social Change. Volodymyr and I will present the paper at the Harriman Institute for the Etiology and Ecology of Post-Soviet Media Conference at Columbia University on May 7-9, 2010.
Yuan Lin, Sumit Roy, and I have authored a paper that examines the use of network entropy and mutual information to measure the agility of networked organizational structures. The paper will appear in Applied Mathematics and Computation.
While the agility of networked organizational structures is important for organizational performance, studies on how to evaluate it remain scant, probably because the difficulty in measuring network evolution. In this conceptual paper, we propose two measures – network entropy and mutual information – to characterize the agility of networked organizational structure. Rooted in graph theory and information theory, these two measures capture network evolution in a comprehensive and parsimonious way. They indicate the uncertainty (or disorder) at the network level as well as the degree distribution at the individual level. We also propose an algorithm for applying them in the scenario of adding links to a network while holding the number of nodes fixed. Both simulated and real networks are used for demonstration. Implications and areas for future research are discussed in the end.
Lin, Y., Desouza, K.C., and Roy, S. “Measuring Agility of Networked Organizational structures via Network Entropy and Mutual Information,” Applied Mathematics and Computation, Forthcoming.
I will be presenting a paper at the Harriman Institute at Columbia University. The paper, Political Cyberprotest in Contemporary Russia, co-authored with Volodymyr Lysenko, a doctoral student of mine at the University of Washington Information School, was accepted for the Etiology and Ecology of Post-Soviet Media Conference (May 7-9, 2010).
Technologies may be intertwined with politics. In particular, the Internet has the potential to cause enormous social and political changes in today’s society. In this research we discuss possibilities of the Internet as a tool for supplying information necessary for organization and mobilization of the successful oppositional movements, especially under the non-democratic regimes. We pay special attention to: in-built capabilities of the Internet to promote active popular involvement in the political process; possibilities of the Internet for democratization of authoritarian regimes; attempts at Internet censorship and possibilities to counteract them; the roles that the new Internet-based media are playing in the power shift in society; the roles that the Internet played in the success of the color revolutions in former Soviet countries; and the roles that new information elites play in social change. We discuss in detail recent examples of the roles the Internet plays in the political processes in Russia.
While in free societies opposing political forces have practically unlimited access to mass media, in Russia the authorities control almost all traditional means of mass information. Only the Internet retains the possibility of limiting control by the Russian authorities. Thus the purpose of our research is to establish whether the Internet in Russia can fulfill the function of ensuring the flow of information necessary for successful dissident activity. Accordingly, we seek to answer the following research question: Does the Internet provide an effective tool for politically-interested people in Russia to conduct dissident activities under the authoritarian regime?
Besides showing the Internet’s leading role in organizing modern protests, our research also prove that in the information environment where practically all traditional mass-media are under the authorities’ control, the Internet becomes the only powerful and effective source of alternative information about the real situation on the repressed territory.
About the Harriman Institute: Founded in 1946, the Harriman Institute housed at Columbia University is the oldest academic institution in the United States devoted to the study of the countries of the former Soviet Union, East Central Europe and the Balkans. (For more details: http://www.harrimaninstitute.org/)
About Columbia University: Columbia University, a member of the Ivy League, was founded in 1754. It is the oldest institution of higher learning in the state of New York and the fifth oldest in the United States. (For more details: http://www.columbia.edu)
Nicholas D. Sweers II and I have authored a case study on the complexities of change management when underground resistance is present. The case study will appear in the Journal of Business Strategy.
This case study highlights the challenge of dealing with underground resistance when leading organizational change. Underground resistance has deterred many change management efforts. Moreover, strategies to address underground resistance are still at a nascent stage of development in management practice and literature. The case tells the story of Sam Bridgeport, a Senior Partner at a major consulting firm in Seattle, who has been charged with leading a restructuring effort that will significantly affect the everyday operations of the organization. Unlike past change management initiatives, which often failed, Sam was wise to encourage employee participation from the start. As a result, Sam was able to mitigate most of the opposition against his plan, but he soon finds out that he gravely underestimated the natural human tendency to resist change. Sam discovers a covert, underground resistance effort is quickly gaining steam, and he must put a stop to it before it’s too late.
Executive responses to the case study from Mark R. Jones, CEO, The Sunyata Group and George Head, Senior Vice President Broadband Services for Stratos Global will also be published.
Jared Keller, Yuan Lin, and I authored a paper that describes how agent-based modeling can be used to consider policy options for dismantling terrorist networks. The paper will appear in Technology Forecasting and Social Change.
Dismantling Terrorist Networks: Evaluating Strategic Options Using Agent-Based Modeling
Dismantling dark networks remains a critical goal for the peace and security of our society. Terrorist networks are the most prominent instantiation of dark networks, and they are alive and well. Attempts to preemptively disrupt these networks and their activities have met with both success and failure. In this paper, we examine the impacts of four common strategies for dismantling terrorist networks. The four strategies are: leader-focused, grassroots, geographic, and random. Each of these strategies has associated pros and cons, and each has different impacts on the structure and capabilities of a terrorist network. Employing a computational experimentation methodology, we simulate a terrorist network and test the effects of each strategy on the resiliency of that network. In addition, we test scenarios in which the terrorist network has (or does not have) information about an impending attack. Our work takes a structural perspective to the challenge of addressing terrorist networks. Specifically, we show how various strategies impact the structure of the network in terms of its resiliency and capacity to carry out future attacks. This paper also provides a valuable overview of how to use agent-based modeling for the study of complex problems in the terrorism, conflict studies, and security studies domains.
Abstract: The prominence of business process outsourcing (BPO) continues to intensify in today’s hyper-competitive marketplace. Engaging in BPO can help an organization focus on its core competencies, while gaining specialized knowledge, skills, and processes in auxiliary spaces. The literature is laden with evidence that engaging in a BPO will help organizations secure financial, operational, and even strategic advantages. While there is little doubt that organizations can attain these benefits, few BPO arrangements work out as planned. Managing risks in BPO arrangements is paramount. In this case analysis, we describe a significant failure through chronological description of scandals that took place at one of India’s largest outsourcing vendors, Satyam Computer Services. In describing the study, we draw attention to the fact that organizations need to (1) improve their sensing capabilities and keep abreast of strategic transformations at their outsourcing vendors, (2) be able to plan for and execute contingency plans, and (3) balance the risks and rewards of BPOs in terms of knowledge and capabilities dependencies.
Thomas H. Davenport wrote a nice post on the Harvard Business Review blog on why the US Intel. Community failed to stop the Christmas Day Bomber from boarding a flight to the US. Tom highlights my paper published in the International Journal of Public Administration that examined information and knowledge management in the US Intel Community.
To access Tom’s Harvard Business Review blog, please click here [LINK]
To access my paper, Information and Knowledge Management in Public Sector Networks: The Case of the US Intelligence Community, International Journal of Public Administration, 32 (14), 2009, 1219–1267, please click here [LINK]
To read a short blurb on the University of Washington Information School website, please click here [LINK]
Peter C. Ellis and I have a paper published in the current issue of Business Information Review.
Abstract: Attempting to merge the topics of environmental sustainability and information management, this article works towards defining both fields and constructing a viable framework that creates a strong relationship between the two topics. Reviewing literature on information management and environmental sustainability, the authors argue that the two topics must become inseparable — the work in one discipline must inform and advance the other. The need to do so is further underscored by the evolving nature of both disciplines.
To access the article, please click here [LINK]
Reference: Ellis, P.C., and Desouza, K.C. “On Information Management, Environmental Sustainability, and Cradle to Cradle Mentalities: A Relationship Framework,” Business Information Review, 26 (4), 2009, 257-264.
Here is a simple exercise: Find 20 people in your organization. Ideally, choose people across the various hierarchical levels and functional departments of your organization. Ask each person two questions: How would you define a good idea? How do you recognize a good idea? Chances are high that if you work in a typical organization, you will arrive at 20 different answers! Some individuals may not even be able to articulate what is a good idea or to clearly describe how to recognize good ideas. Is this a problem? You bet it is! One of the major challenges faced by organizations as they try to come up with good ideas is the lack of a definition of what constitutes a good idea. It is common to find organizations that take the stance that a good idea is in the eye of the beholder, or in contrast, that a good idea is like pornography, you will recognize it when you see it. Similarly, most organizations lack a clearly defined process on how to recognize good ideas. As one manager put it, “employees may not recognize a good idea if it smacked them right on their faces.”
The organization that wants to foster a spirit of intrapreneurship must: 1) clearly define what is, and what is not, an idea, 2) arrive at a typology for the various types of ideas, 3) articulate a process for refining thoughts into ideas and then into ‘good’ ideas, 4) reward employees for sharing ‘good’ ideas, and 5) reward employees who serve as brokers (or intermediaries) for mobilizing ideas from one corner of the organization to the next.
What are some practices that your organization has in place to address these issues?
For more details, please stay tuned for my new book on intrapreneurship…or drop me an email!