Cyberocracy

Last updated

In futurology, cyberocracy describes a hypothetical form of government that rules by the effective use of information. The exact nature of a cyberocracy is largely speculative as currently there have been no cybercratic governments; however, a growing number of cybercratic elements can be found in many developed nations. Cyberocracy theory is largely the work of David Ronfeldt, who published several papers on the theory. [1] [2] [3] Some sources equate cyberocracy with algorithmic governance, although algorithms are not the only means of processing information. [4] [5]

Contents

Overview

Cyberocracy, from the roots 'cyber-' and '-cracy' signifies rule by way of information, especially when using interconnected computer networks. [6] The concept involves information and its control as the source of power and is viewed as the next stage of the political evolution. [6]

The fundamental feature of a cyberocracy would be the rapid transmission of relevant information from the source of a problem to the people in a position able to fix said problem, most likely via a system of interconnected computer networks and automated information sorting software, with human decision makers only being called into use in the case of unusual problems, problem trends, or through an appeal process pursued by an individual. Cyberocracy is the functional antithesis of traditional bureaucracies which sometimes notoriously suffer from fiefdom, slowness, and a list of other unfortunate qualities. A bureaucracy forces and limits the flow of information through defined channels that connect discrete points while cyberocracy transmits volumes of information accessible to many different parties. [7] In addition, bureaucracy deploys brittle practices such as programs and budgets whereas cyberocracy is more adaptive with its focus on management and cultural contexts. [8] Ultimately a cyberocracy may use administrative AIs if not an AI as head of state forming a machine rule government.

According to Ronfeldt and Valda, it is still too early to determine the exact form of cyberocracy but that it could lead to new forms of the traditional systems of governance such as democracy, totalitarianism, and hybrid governments. [3] Some noted that cyberocracy is still speculative since there is currently no existing cybercratic government, although it is acknowledged that some of its components are already adopted by governments in a number of developed countries. [9]

Examples

While the outcome or the results of cyberocracy is still challenging to identify, there are those who cite that it will lead to new forms of governmental and political systems, particularly amid the emergence of new sensory apparatuses, networked society, and modes of networked governance. [10] There are, however, specific examples that could demonstrate this futuristic government. The Stasi of East Germany could be considered a prototype cybercratic organization. The Stasi collected files on six million people, or a little over a third of East Germany's total population, but their lack of computers to sort through the files was causing them to choke on their own file system, thus reducing their effective use of information. A cybercratic government would need to quickly and effectively manage the file of the entirety of the nation's people, as well as any relevant foreigners.

The no fly list is an example of a prototype cybercratic element. Its substantial false positive ratio is its primary failure of effectiveness. The Internet Relay Chat (IRC) and Internet forums are also examples of cybercratic society.

Related Research Articles

Computer vision tasks include methods for acquiring, processing, analyzing and understanding digital images, and extraction of high-dimensional data from the real world in order to produce numerical or symbolic information, e.g. in the forms of decisions. Understanding in this context means the transformation of visual images into descriptions of the world that make sense to thought processes and can elicit appropriate action. This image understanding can be seen as the disentangling of symbolic information from image data using models constructed with the aid of geometry, physics, statistics, and learning theory.

A distributed system is a system whose components are located on different networked computers, which communicate and coordinate their actions by passing messages to one another. Distributed computing is a field of computer science that studies distributed systems.

<span class="mw-page-title-main">Internet</span> Global system of connected computer networks

The Internet is the global system of interconnected computer networks that uses the Internet protocol suite (TCP/IP) to communicate between networks and devices. It is a network of networks that consists of private, public, academic, business, and government networks of local to global scope, linked by a broad array of electronic, wireless, and optical networking technologies. The Internet carries a vast range of information resources and services, such as the interlinked hypertext documents and applications of the World Wide Web (WWW), electronic mail, telephony, and file sharing.

<span class="mw-page-title-main">One-time pad</span> Encryption technique

In cryptography, the one-time pad (OTP) is an encryption technique that cannot be cracked, but requires the use of a single-use pre-shared key that is larger than or equal to the size of the message being sent. In this technique, a plaintext is paired with a random secret key. Then, each bit or character of the plaintext is encrypted by combining it with the corresponding bit or character from the pad using modular addition.

<span class="mw-page-title-main">Quantum computing</span> Technology that uses quantum mechanics

A quantum computer is a computer that takes advantage of quantum mechanical phenomena.

<span class="mw-page-title-main">Information warfare</span> Battlespace use and management of information and communication technology

Information warfare (IW) is the battlespace use and management of information and communication technology (ICT) in pursuit of a competitive advantage over an opponent. It is different from cyberwarfare that attacks computers, software, and command control systems. Information warfare is the manipulation of information trusted by a target without the target's awareness so that the target will make decisions against their interest but in the interest of the one conducting information warfare. As a result, it is not clear when information warfare begins, ends, and how strong or destructive it is.

<span class="mw-page-title-main">Theoretical computer science</span> Subfield of computer science and mathematics

Theoretical computer science (TCS) is a subset of general computer science and mathematics that focuses on mathematical aspects of computer science such as the theory of computation, formal language theory, the lambda calculus and type theory.

An electronic document is any electronic media content that is intended to be used in either an electronic form or as printed output. Originally, any computer data were considered as something internal — the final data output was always on paper. However, the development of computer networks has made it so that in most cases it is much more convenient to distribute electronic documents than printed ones. The improvements in electronic visual display technologies made it possible to view documents on a screen instead of printing them.

Technocracy is a form of government in which the decision-makers are selected based on their expertise in a given area of responsibility, particularly with regard to scientific or technical knowledge. Technocracy follows largely in the tradition of other meritocracy theories and assumes full state control over political and economic issues.

System Development Corporation (SDC) was a computer software company based in Santa Monica, California. Founded in 1955, it is considered the first company of its kind.

Network-centric warfare, also called network-centric operations or net-centric warfare, is a military doctrine or theory of war that aims to translate an information advantage, enabled partly by information technology, into a competitive advantage through the computer networking of dispersed forces. It was pioneered by the United States Department of Defense in the 1990s.

<span class="mw-page-title-main">Naval Tactical Data System</span>

Naval Tactical Data System (NTDS) was a computerized information processing system developed by the United States Navy in the 1950s and first deployed in the early 1960s for use in combat ships. It took reports from multiple sensors on different ships and collated it to produce a single unified map of the battlespace. This information could then be relayed back to the ships and to the weapons operators.

<span class="mw-page-title-main">Intelligence amplification</span> Use of information technology to augment human intelligence

Intelligence amplification (IA) refers to the effective use of information technology in augmenting human intelligence. The idea was first proposed in the 1950s and 1960s by cybernetics and early computer pioneers.

The first idea of a digital administrative law was born in Italy in 1978 by Giovanni Duni and was developed in 1991 with the name teleadministration.

Proactive cyber defense, means acting in anticipation to oppose an attack through cyber and cognitive domains. Proactive cyber defense can be understood as options between offensive and defensive measures. It includes interdicting, disrupting or deterring an attack or a threat's preparation to attack, either pre-emptively or in self-defence.

Forest informatics is the combined science of forestry and informatics, with a special emphasis on collection, management, and processing of data, information and knowledge, and the incorporation of informatic concepts and theories specific to enrich forest management and forest science; it has a similar relationship to library science and information science.

<span class="mw-page-title-main">Project Cybersyn</span> Chilean economic project

Project Cybersyn was a Chilean project from 1971 to 1973 during the presidency of Salvador Allende aimed at constructing a distributed decision support system to aid in the management of the national economy. The project consisted of four modules: an economic simulator, custom software to check factory performance, an operations room, and a national network of telex machines that were linked to one mainframe computer.

This glossary of computer science is a list of definitions of terms and concepts used in computer science, its sub-disciplines, and related fields, including terms relevant to software, data science, and computer programming.

Government by algorithm is an alternative form of government or social ordering where the usage of computer algorithms is applied to regulations, law enforcement, and generally any aspect of everyday life such as transportation or land registration. The term "government by algorithm" has appeared in academic literature as an alternative for "algorithmic governance" in 2013. A related term, algorithmic regulation, is defined as setting the standard, monitoring and modifying behaviour by means of computational algorithms – automation of judiciary is in its scope. In the context of blockchain, it is also known as blockchain governance.

David Ronfeldt is an American researcher known for his work on information-centric and network-centric warfare. He holds a doctoral degree from Stanford University and has been a prominent figure at the RAND Corporation.

References

  1. David Ronfeldt (1991). "Cyberocracy, Cyberspace, and Cyberology:Political Effects of the Information Revolution" (PDF). RAND Corporation. Retrieved 12 Dec 2014.
  2. David Ronfeldt (1992). "Cyberocracy is Coming" (PDF). RAND Corporation. Retrieved 12 Dec 2014.
  3. 1 2 Ronfeldt, David; Varda, Danielle (1 December 2008). "The Prospects for Cyberocracy (Revisited)". Social Science Research Network. SSRN   1325809.{{cite journal}}: Cite journal requires |journal= (help)
  4. "Opinion | Transparency in governance, through cyberocracy". kathmandupost.com. Retrieved 25 April 2020.
  5. Hudson, Alex (28 August 2019). "'Far more than surveillance' is happening and could change how government is run". Metro. Retrieved 25 April 2020.
  6. 1 2 Walch, James; Walch, Jim (1999). In the Net: A Guide for Activists. London: Zed Books Ltd. p. 48. ISBN   1856497585.
  7. Neilson, Robert E. (1997). Sun Tzu and Information Warfare: A Collection of Winning Papers from the Sun Tzu Art of War in Information Warfare Competition. Washington, D.C.: National Defense University Press. p. 18. ISBN   1579060374.
  8. Bachman, Leonard R. (2012-06-14). Two Spheres: Physical and Strategic Design in Architecture. Routledge. ISBN   9781136319044.
  9. Kariye, Dr Badal W. (2010). The Political Sociology of Security, Politics, Economics & Diplomacy: Quicker Academic Path for Good Governance. Bloomington, IN: AuthorHouse. p. 98. ISBN   9781452085463.
  10. Horowitz, Irving (2018-02-06). Culture and Civilization: Volume 2, Beyond Positivism and Historicism. Routledge. ISBN   9781351524407.

Further reading