Translation of Methodology of Technology Surveillance in the Universities and Research Centers

The Methodology of Technology Surveillance in Universities and Research Centers 

Abstract 

The technological surveillance is very important at the present time in the development and success of the processes of R&D. It is an organized, selective and permanent process, of capturing information of the exterior and of the own organization it has more than enough science and technology, to select it, to analyze it, to diffuse it and to communicate it, to transform it into knowledge for a better one taking of decisions. The existent methodologies of technological surveillance are characterized, intending a methodology for their application in one university of technical sciences, supported in a technological observatory. It is supplemented with the application of tools of discovery of knowledge based on patents for a research center. The technological surveillance in the Polytechnic Superior Institute of the Havana (CUJAE) with their technological observatory it has allowed to identify strategic programs of investigation, tendencies in the teachings of engineering and architecture, lead in technical and thematic sciences of investigation published in the Web of Science. Additionally maps of knowledge are obtained based on patents applied in the National Center for Scientific Research (CNIC). The implementation of the technological surveillance, their continuous improvement with new tools and their use for the own investigators, favorable the development and increment of programs and strategic lines of investigation (R&D) guided to a pertinent innovation in the engineering and architecture, allowing to identify the evolution in the technological development, what prepares to the university and the investigation centers for the changes in the environment with a strategic focus. 

Keywords: technological surveillance; technological observatory; programs strategic of R&D; map of knowledge of patents. 

INTRODUCTION

Technological surveillance is very important for the success of the R + D + i1 processes. It is defined as “the organized, selective and permanent process of capturing information from outside and of the organization about science and technology, selecting it, analyzing it, disseminating it and communicating it, in order to convert it into knowledge to make decisions with less risk and be able to anticipate changes “2.

The observation and analysis of the scientific and technological environment and of the present and future economic impacts for strategic decision making are part of the technological surveillance3. In the management of technological innovation4, surveillance is part of its processes, together with human resources, collaboration, project management, quality and its indicators. In the literature, different terms have also been adopted that are closely related, such as technological surveillance5,6, technological intelligence7,8,9,10, technological forecasting11,12,13 and technological evaluation11,14. In this article reference will be made to technological surveillance although other meanings are present.

The adequate identification of the source of information is vital for technological surveillance15,16, with web pages increasingly being used, which include patent databases, scientific journals and university portals. The analysis of this information allows to make better decisions and anticipate the systematic changes of the environment17. As a trend, tools appear on the basis of Information Technology and Communications Technologies (ICTs), which is why we talk more about technological intelligence. Several systems are referred to for technological surveillance with the support of ICT, such as those based on methods such as TRIZ, an acronym in Russian for the theory of solving inventive problems, such as CAI (Computer Aided Innovation), for the generation of new concepts , based on scientific and technical knowledge (patent databases, scientific and technical encyclopedias) that analyze emerging technologies for technological forecasting and others are those that are parameterized, according to areas of interest on web pages, generating automatic alerts when detecting a change in one of the indicated web pages, which include Internet search bots, crawlers, spiders or spiders18.

The objective of the article is to characterize some methodologies of technological surveillance with their processes that allow to identify and apply a methodological proposal of technological surveillance in a university of technical sciences, supported by a technological observatory. It shows the use of technological mining to detect technological opportunities in publications and the use of knowledge maps based on patents for a research center.

MATERIALS AND METHODS

As part of the materials and methods, a set of steps is shown to approach the methodological proposal for university and research centers with the identification of the processes and the application of technological surveillance tools (VT).

1. Characterization of existing technological monitoring methodologies in terms of processes and authors that use and disseminate it.

2. Creation of the technological observatory for the university environment.

3. Design, application and analysis of results of guides for technological surveillance according to the source of information and the objective of the university center or

investigation.

Several VT methodologies reported in the literature were analyzed in terms of processes used, shown in Table 1, where FCV means critical surveillance factors.

Morcillo, 200315 Mignogna, 199719 Sánchez et al, 200220 León et al, 200621 Savioz, 20048
Problem and objectives Planning and hypothesis Planning / Identification of needs, FCV Situation or problem, broken down pastedGraphic.png
Sources of Information Internal-external compilation Search and Catch / observe, discover, search, detect, collect, capture Type and source of Information Formulation of information needs
Search for information Search / Information gathering Collection of Information
Analysis of Information Evaluación – Validación 

pastedGraphic_1.png

Analysis and organization / Analyze, Treat and Store Analysis of the information Analysis of the information
Validation of Information Validation and adjustments
Intelligence report Intelligence / added value, influence strategy
Organizational  flows of  internal information, Diffusion Dissemination Communication: to managers, disseminate information, transfer knowledge Diffusion of the Information Dissemination of the Information
Decision making Decision making Decision making/ Strategies Application of the Information
(Porter, et al; 20055; 20079; 20096) Nossella A-, et al, 200822 Vázquez, L. 200923 Norma Francesa de Vigilancia, AFNOR,199824 Norma Española AENOR2
Definition of FCV Identification of resource information Definition of VT plan Identification of critical competitive and technological factors and problems Understanding of request and context. Definition / redefinition of surveillance and purpose axes Identification areas / objectives VT system, availability resources / information, Problem definition
Search and Capture Collection of Data Identification and selection of sources of relevant information. Looking for information Determination of types of information, identification / selection of information sources Identification of Sources 
Collection and selection of information Search
Treatment and Analysis Analysis of data Analysis of Information. Analysis of Results Analysis and Organization Analysis and Organization
Validation and Exploitation Organization / Purpose / implementation Competitive Intelligence Validation and adjustment / Synthesis and perspective Validation of the Information
Diffusion of information Distribution of the Results  Communication of the Results Preparation of a report

Tabla 1. Processes described in technological surveillance methodologies

The methodologies present as the most common processes the search and analysis of information. The other processes vary depending on the scope and purpose of the surveillance and the dissemination that is carried out on the results of the same, including the users, as well as the decision-making process. It is appreciated that the technological surveillance “can be understood as a process, providing information about the technology (intelligence), the prediction of the directions that technological change will take (forecast) or the evaluation and exploration potential of the technologies that an entity must adopt (evaluation) The implementation of an organized system of technological surveillance requires multidisciplinary and horizontal approaches and requires its adaptation to the company’s environment and culture, and must be integrated into its usual procedures25.

TECHNOLOGICAL OBSERVATORY OF THE UNIVERSITY CENTER OF TECHNICAL SCIENCES

The Web can be seen as a wide and searchable virtual library26,21, which is no longer an object of study, only of librarianship or documentation professionals, to become an essential component for research27,28,29,30, even with the application of methods such as Data Envelopment Analysis (DEA) for the evaluation of the efficiency of research groups based on information from the Andalusian Scientific Information System (SICA) 31 or in support of Science and Technology Systems from the use of studies on the information of publications and patents32. All this information on the web has led to the creation of technological observatories.

A Technological Observatory (OT) allows to manage the knowledge of organizations through the monitoring of the scientific and technological environment, to generate new knowledge. It allows to establish links with other organizations to share and receive information. It must be supported on a virtual platform that allows quick access to it and is aimed at the delivery of products or services resulting from the Technological Surveillance process. OT is known as a way to enhance the ability to detect changes and technological advances, with its degree of maturity and market opportunities. It employs techniques of technological surveillance33.

At the “José Antonio Echeverría” Higher Polytechnic Institute (CUJAE), the creation of the Technological Observatory in December 2006 was promoted in support of strategic planning. The OT portal of the CUJAE was designed using free software, with PHP programming language, with MySQL database manager, based on Joomla content management system (CMS) as Web applications to create and administer sites. contents quickly and easily. Among the most important objectives of the OT of the

CUJAE meet: search, analysis and dissemination about teaching, publications and research in technical universities, the monitoring and publication of bulletins related to strategic research lines, the dissemination of personalized databases and the support of strategic decision making in these areas.

EXPERIMENTATION OF TECHNOLOGICAL SURVEILLANCE IN THE CUJAE

The experimentation on technological surveillance in the CUJAE has been carried out since 2007 to the present. Some of the surveillance studies refer to:

• Analysis of international engineering and architecture trends in the top 200 universities in the ranking34.

• The identification of pure and integrated research topics in engineering and architecture.

• The identification of trends in curricula and models of educational management in the world, in particular for engineering and architecture.

• The identification of the strategic research programs of the CUJAE, among which are Information and Communication Technologies (ICT), Environment, Life Sciences and Nanotechnologies.

• The evaluation of innovation indicators of Ibero-American and European countries35. An OT analysis in 2008 with 117 universities from the world’s top 50036 regarding alignment to strategic research programs yields interesting data such as those shown in Figure 1.

Figure 2 shows another analysis performed on the presence of research in Computer Engineering with 71.4% and Chemistry with 37.1% in the first 63 universities in the world ranking, according to the country of the university of origin.

Figure 2. Representation of research in computer engineering and chemistry in the 63 first universities in the world

As an example, table 2 shows some of the research topics found in the first 63 universities in Computer Engineering.

Career Pure Theme Temática integrada
Informatic Engineering Science, engineering, computer design and strategy, software engineering, algorithms, programming languages, database management, data mining, machine learning, systems and computational architecture, information web systems, computer security, cryptography, parallel processing , distributed laboratory for digital libraries, interface analysis, integrated and operational systems, optimization systems, multimedia learning, high performance computing Computational biology, biocybernetics, bioinformatics, genome and computational neuroscience, learning systems, computational mathematics, robotics, control systems, compilers, advanced digital applications, analog-digital integrated circuits, computational dynamics of fluids, wireless systems, communications and networks wireless, computer networks, mobile computing and distributed systems, computational geology, computational dynamics, network control, digital signal processing and conduction, digital art, computer man interaction

Table 2. Some topics of pure and integrated research in Computer Engineering in the first 63 universities

ANALYSIS OF OPPORTUNITIES OF PUBLICATION AND PATENTS IN UNIVERSITY AND RESEARCH CENTERS

The extraction of publication opportunities for mainstream journals, which make available abstracts, authors, years of publication, name of the journal, using techniques of mining technology5 is an application that has begun to be carried out in the CUJAE in 2010. If a concept has decreased over time, it could suggest that it has reached its limit of development and vice versa, which would generate an opportunity for publication. In turn, we can obtain the concept in which we are working with the authors that publish the most, establish contacts with them, know the impact of the citations in the research37 or even define the R & D lines for which we have good own resources38.

The sources of external information that the observatory currently has are the publications and patent databases fundamentally. Many of these databases provide RSS content syndication channels (“Rich Site Summary” or “Really Simple Syndication”) through which you can obtain the information contained in them. They are files in XML format that contain the last elements published by a Web site in a certain subject. Publications are obtained through the ScienceDirect RSS feeds that give free access to the title, the abstract, the authors, the year of publication, the journal, the volume and the number of articles it contains. The patent channels provide metadata such as the title of the patent, the inventor, the year of publication, a summary or description of the invention and the entity where the invention is applied and the scientific news channels allow obtaining the title of the news, the author, the date and a summary. The information provided by these RSS channels are retrieved in a MySQL repository in tables to store the different types of information sources.

A first experimental approach was obtained with all the articles of the Information Systems magazine from 2005 to date, recovering a total of 220 records. Thus, the keywords are obtained from the summary of the article, to which technological mining techniques will be applied. The next minable view that has the fields of title, first author, second author, year and five words is shown in table 3.

Through this information of the minable view, it can be obtained in an initial analysis with visualization techniques: What are the most approached topics ?, What are the leading researchers in a research area ?, What are the trends in the investigation?. In this way, research opportunities are obtained for the university environment. The implementation of this guide for the identification of technological opportunities will be generalized to other impact journals and other sources of information. It is also planned to establish a database with the internal information of the researches carried out, which allows to characterize the internal strengths in terms of scientific research and to be able to focus on journals where the strengths are directly taxed. YALE RapidMiner software will be used, being one of the most used worldwide in techmining, with a very friendly graphic interface.

Other applications of knowledge discovery have been carried out with the use of the Automated System for Patent Surveillance (SiVigPat) 39, such as the study of the development of international patents (United States, Canada and Japan) related to corrosion and the protection40. Thus it was known that the largest number of patent applications are related to chemical additives with a tendency to increase the number of patents in electrochemical protection methods and monitoring from the year 1984. Figure 2 shows the result of the analysis in the fields of selected applications.

CONCLUSIONS

In universities and research centers, it is necessary to implement a technology surveillance methodology that involves as many actors as possible and the use of tools for capturing, analyzing, processing and disseminating information, as well as control indicators for this process and of the strategic research programs themselves.

The Technological Observatory at CUJAE has fostered the development of strategic research programs and lines in the environment of engineering and architecture, allowing the identification of evolution in technological development, which in turn prepares the university for changes in the environment with a strategic focus.

The channels or RSS technology becomes very efficient for obtaining external information (specifically from Science Direct), for technological surveillance in the university environment, together with the technological mining process, favoring clustering, the identification of publishing opportunities and the technological trends.

The use of tools supported in ICT for technological surveillance allows the discovery of useful and relevant knowledge in support of strategies, development and decision making in R + D + i, which was demonstrated with the use of algorithms for the detection of opportunities for publication in the university environment and the use of the SiVigPat by the CNIC for the discovery of patent knowledge, exemplified for patents related to corrosion and protection.

REFERENCIAS BIBLIOGRÁFICAS 

  1. Escorsa, P.; Maspons, R. (2001) De la vigilancia tecnológica a la inteligencia competitiva. Prentice Hall, Madrid. 
  2. UNE 166000 EX (2002). Gestión de la I+D+I: Terminología y definiciones de las actividades de I+D+I. Norma española experimental. AENOR, Madrid, abril. 
  3. Jakobiak, F. (1992). Exemples commentes de veille. Technologique, Les éditions d ́organisation. Paris.
  4. COTEC. (2004) Papel de las administraciones en la gestión empresarial de la innovación. Colección de innovación práctica. Perspectivas de futuro. Fundación COTEC para la Innovación tecnológica, Madrid. julio. 
  5. Porter, A. L. and S. W. Cunningham (2005). Tech mining. Exploiting New Technologies for Competitive Advantage. New Jersey, Wiley-Interscience. 
  6. Porter, A. L. (2009). Tech mining for future oriented technology analysis. Text Mining. A. U. M. Project. 
  7. Lichtenthaler, E. (2003). Third generation management of technology intelligence processes. R and D Management 33(4): 361-375. 
  8. Savioz, P. (2004). Technology Intelligence. Concept Design and Implementation in Technology-based SMEs. Zurich. 
  9. Watts, R. J. and A. L. Porter (2007). Mining Conference Proceedings for Corporate Technology Knowledge Management. International Journal of Innovation and Technology Management 4(2): 103-119. 
  10. Yoon, B. (2008). On the development of a technology intelligence tool for identifying technology opportunity. Expert Systems with Applications 35(2008): 11.

11.Garud, R. and D. Ahlstrom (1997). Technology assessment: a socio-cognitive perspective. Journal of Engineering and Technology Management 14(1997): 23. 

12.Anderson, T. R., T. U. Daim, et al. (2008). Technology forecasting for wireless communication. Technovation 28(9): 602-614. 

13. Zenobia, B., C. Weber, et al. (2009). Artificial markets: A review and assessment of a new venue for innovation research. Technovation 29(5): 338-350. 

14.Jolly, D. R. (2008). Chinese vs. European views regarding technology assessment: Convergent or divergent? Technovation 28(12): 818-830. 

15. Morcillo, P. (2003) Vigilancia e inteligencia competitiva: fundamentos e implicaciones. 

Revista de Investigación en Gestión de la Innovación y Tecnología. VIGILANCIA TECNOLÓGICA. Número 17, junio – julio 2003.

16.Giménez T, E., A Román (2001). Vigilancia tecnológica e inteligencia competitiva: conceptos, profesionales, servicios y fuentes de información. El profesional de la información 10 (5): 10.

17. Medina J y E Ortegón. (2006) Manual de prospectiva y decisión estratégica: bases teóricas e instrumentos para América Latina y el Caribe. Instituto Latinoamericano y del Caribe de Planificación Económica y Social y CEPAL Naciones Unidas. septiembre, Santiago de Chile. 

  1. Mir, M y M. Casadesús (2008). UNE 166002:2006: Estandarizar y sistematizar la I+D+i. La norma y la importancia de las TIC en su implementación. Revista Investigación y Desarrollo. DYNA Septiembre, Vol. 83, no 6: 325-331. 
  2. Mignogna R. P, (1997).Competitive Intelligence. http://www.chewy.gatech.edu/t2s/index/ html.
  3. Sánchez, J. Marcela y Palop, F (2002), Herramientas de Software para la práctica de la Inteligencia Competitiva en la empresa. Ed. Triz XXI. Madrid. 

21. León, A., Castellanos, O. y Vargas, F. (2006). Valoración, selección y pertinencia de herramientas de software utilizadas en vigilancia tecnológica. Revista de Ingeniería e investigación. DYNA 26(1): 92-102. 

22.Nosella Anna, Giorgio Petroni, Rossella Salandra (2008). Technological change and technology monitoring process: Evidence from four Italian case studies, Journal Engineering. Technology Management. 25 (4) 321–337 

23. Vázquez Rey, L. (2009). Informe APEI sobre vigilancia tecnológica. Informe APEI 4. APEI. Gijón, España: 64. 

  1. AFNOR, XPX50-053 (1998). Servicios de Vigilancia y Servicios de establecimiento de un Sistema de Vigilancia. Norma francesa experimental, abril,
  2. Palop, F.; Vicente, J. M. (1999) Vigilancia tecnológica e Inteligencia competitiva. Su potencial para la empresa española. Serie Estudios Cotec. Número 15. Fundación COTEC. Madrid.
  3. Yao, J. T. and Y. Y. Yao (2003). Web-based Information Retrieval Support System: building research tools for scientists in the new information age. Proceedings of the IEEE/WIC International Conference on Web Intelligence. Marzo.
  1. Cook, D. (2000). Collaboration to teach the critical thinking skills needed to become a successful Internet searcher: The planning of a WWW search engine workshop. Research Strategies 17(2-3): 195-199.
  2. O’Hanlon, N. (2002). Net knowledge: Performance of new college students on an Internet skills proficiency test. The Internet and Higher Education 5(1): 55-66. 
  3. Van Deursen, A. J. A. M. and J. A. G. M. van Dijk (2009). Using the Internet: Skill related problems in users’ online behavior. Interacting with Computers. 21(5-6): 393-402.

30.Vasileiadou, E. and R. Vliegenthart (2009). Research productivity in the era of the internet revisited. Research Policy 38(8): 1260-1268. 

31. Pino JL, Francisco C, Mercedes D, Rosario B (2010). Evaluación de la eficiencia de grupos de investigación mediante análisis envolvente de datos (DEA), El profesional de la información, v. 19, N.2, marzo-abril. 

32.Moed H, W Glänzelg, U Schmoch. (2005). Handbook of Quantitative Science and Technology Research. The use of publication and patent statistics studies on S&T Systems. Springer Science Business Media. 

33. Legite (2003). El Observatorio Tecnológico del sector Textil. Seminario, Dinamización. 23 de septiembre de 2003. Disponible en: http://www.itcl.es/ificheros. Fecha de consulta: 8 de enero de 2008. 

34.http://universidades.universia.es (2006). Ranking de universidades del mundo. Consultado el 18/04/06. 

35.Delgado Mercedes, JL Pino, Solís F, Barea R (2008). Evaluación integrada de la innovación, la tecnología y las competencias en la empresa. Revista de I+D+i, mi+d. Número 47, junio, España. 

36.Delgado M, Yoel A, Marta I, Antonio D, Beatriz G, Olga I, (2009). Observatorio tecnológico en el entorno universitario e investigativo. XIII Seminario de Gestión tecnológica de la Asociación Latino Iberomericano de gestión tecnológica. Innovación y creatividad para el desarrollo sostenible. ALTEC 2009. 25-27 Noviembre, Cartagena de Indias, Colombia. 

37. Ajiferuke Isola, Dietmar Wolfram (2009). Citer analysis as a measure of research impact: library and information science as a case study. Scientometrics, Springer, DOI 10.1007/s11192-009-0127-6, 

38.Muñoz J, M Martínez, J Vallejo (2006). La vigilancia tecnológica en la gestión de proyectos de I+D+i: recursos y herramientas. El profesional de la información. v. 15, n. 6, noviembre-diciembre. 

39. García B, F. Corvo (2007). Patent information in concrete corrosion research. Revista CENIC Ciencias Químicas, Vol 38, No 3, 410-414. 

40. García, B., Zayas, D. (2002) Manual de Usuarios del Sistema Automatizado de Vigilancia de Patentes, SiVigPat®, v. 3.0. CNIC. 

Translation of Technological Surveillance As A Tool For Information Management: A Literature Review

Technological Surveillance As A Tool For Information Management: A Literature Review

IEEE LATIN AMERICA TRANSACTIONS, VOL. 13, NO. 10, OCTOBER 2015 

L. Back, Universidade Tecnológica Federal do Paraná (UTFPR), Ponta Grossa, Paraná, Brasil, luaniback@hotmail.com 

J. L. Kovaleski, Universidade Tecnológica Federal do Paraná (UTFPR), Ponta Grossa, Paraná, Brasil, kovaleski@utfpr.edu.br 

P. P. Andrade Junior, Universidade Federal de Santa Catarina (UFSC), Ponta Grossa, Paraná, Brasil, pp.andrade@ufsc.br 

I. INTRODUCTION

In order to keep up with the rapid technological development, it is essential that organizations seek strategic partnerships to deal with information management.

In this sense, for this process to occur it is indispensable to identify possibilities and assimilate knowledge of all technological information related to the field of work, since knowledge and articulated information are one of the main means for individuals and organizations to make innovations, becoming or remaining competitive [1], [2], [3]. Among other utilities, the knowledge of the technologies present in the market allows knowing where and from whom to acquire them, in addition to their competencies [4].

In this sense, an alternative to soften the obstacles of the market is to make the organizations follow the technological advance through the dissemination of the technologies, information and means of communication [5]. However, managing information and transforming it into knowledge is a complex activity for organizations. One of the main problems concerns the excess of information, which comprises useless information with no added value and strategic for the organization for decision making. Managing information efficiently can minimize the problems related to excessive information, which makes it difficult and time-consuming to select and acquire relevant knowledge, as well as problems due to the absence of information that can lead to delays and out of date before the market.

The management of scientific and technological information may occur through the technological surveillance of the environment, since this process emphasizes the planning, direction, control and coordination of the development and implementation of information system. Thus, through the identification of events that signify potential opportunities or threats, it is possible to understand technological changes and anticipate them, obtaining competitive and comparative advantages [6]. In this sense, the adequate use of knowledge allows users, who understand the managers of the organizations, to increase their resources and productivity, how to reduce their costs in a substantial way and at the same time allow them to strategically differentiate themselves in the market.

Due to the scarce exploration of the subject of technological surveillance by systematized studies and its importance for the academic and organizational environment, it was decided to build a bibliographic portfolio in order to base and direct future studies. Given this context, this work aims to build a theoretical framework on technological surveillance, identifying its application and benefits generated by its use. In order to reach this goal, it will be necessary to select a relevant bibliographic portfolio on technology surveillance and analyze it, in order to contribute to the scientific advance of the subject and to assist the organizations in the management of their information.

II. METHODOLOGICAL PROCEDURES

This research is defined as descriptive, because it aims to identify a portfolio of articles on the topic of technological surveillance and shed light on its scope and research opportunities. The study is subdivided into three phases, namely: database selection; selection of articles; and analysis of articles.

In order to retain the maximum knowledge on the topic of technological surveillance, a systematic search was made in the literature. The research was conducted in the following databases: Web of Science, Scopus, Science Direct, IEEE Xplore, Scielo and Scholar, because they have relevant indexed journals and are multidisciplinary. The Web of Science database appends most of the most relevant journals published in the world [8].

Key words in Portuguese, English and Spanish were used to search the articles: technological monitoring, technological surveillance, technological surveillance, technological monitoring, technological watch, technological surveillance.

For the screening of articles found the title, keywords and abstract were evaluated, excluding the articles that were in disagreement with the researched topic. When the items evaluated did not contain all the required information, the articles were read completely to decide on their inclusion. The exclusion criterion used included the use of the word technology surveillance for security environment monitoring technologies. The period of analysis of the publications was not defined due to the scarcity of material.

The articles found were exported using the EndNote tool. The EndNote software is a bibliographic reference manager that facilitates the research work and allows the collection of bibliographic references of online databases, importing the metadata and grouping them, forming a virtual library [9]. From this tool it was possible to save the selected articles and filter them according to the criterion of duplicity.

The relevant scientific articles were analyzed through full reading and served as the basis for the construction of literature review.

III. TECHNOLOGICAL SURVEILLANCE

The advance of the market has driven the technological development, a factor that also results from the economic competitiveness, essential for the organizations that wish to remain in the world market in which survive the strongest competitors [10], [11], [12], [13]. Today, the main engine of growth is knowledge, and to stop it, it is necessary to follow the technological advance that happens at high speed and consequently generates a great amount of information [14], [15].

In order to develop a diversified technological portfolio and remain competitive in the market, it is necessary to construct complex competences, involving various tasks such as searching for promising new technologies, by identifying the evolution of technological factors, observing, analyzing and processing information through technological surveillance [ 16], [17], [18], [19], [20]. This practice, based on scientific and technological studies, allows us to base production processes on the intensive incorporation of knowledge, mainly involving information from articles and patents, in the development of new products and processes [13].

The process of technological surveillance focuses on the innovative behavior, products, processes and technologies of its competitors and / or employees. As well as in evaluating new technologies and their possible impacts on their organization [10], [21]. It is a selective informational / documentary process that gathers and organizes information and documents from a specific area and addressed a specific group of users or a set of users whose interests are related, but different [22]. Can be interpreted as an intelligence methodology technology, or as forecasting technology and even as a technology assessment [23].

Technological surveillance is a systematic and organized effort to observe, train, analyze, accurately disseminate and retrieve information about the achievements in the company’s economic, technological, social and commercial environment that are relevant to the organization in the sense of opportunity or threat this. To this end, surveillance should include the merging of high-level information, communications, collaborative environment, information security and data repository, to provide the necessary capacity for the domain of information, to obtain knowledge and the essential elements for decision-making [24], [25], [26], [22], [27], [10], [21].

This search for information takes place through patent documents, publications, and investigations to know structures, strategies and the importance of specific technologies, as well as the life cycle of a specific technology, using specific tools and techniques. The results should be a tool for knowledge that promotes useful and up-to-date information on different technologies, changes in products, regulations, leadership, research developments and new patents. This information should support decision making, anticipating changes in the environment in which they are inserted and minimizing risks [24], [27], [28].

To carry out coordinated actions for the search, treatment and distribution of information obtained legally, useful to several members of an organization in decision-making process and for strategic reflection, constitutes the process of technological surveillance that generates intelligence to those who use it correctly. ], [27].

Monitoring technology markets allows access to knowledge relevant to effective proposals for the solution of technological needs [29]. Another benefit of this tool is the identification of the scientific technological development, as well as the paradigms faced by the companies before the competitiveness and market demand [4], [21], [30].

From technology surveillance it is possible to obtain information to apply new technologies, create new products and evaluate the possible impacts of an event or change in the environment. Most information to get new ideas lies on the external side of the organization in a complex and abundant way, so it is necessary to organize and systematize them to add value and serve for decision making in the innovation decision-making process. Monitoring information contributes to reducing the number of wrong decisions within a process of research, development and implementation of new products / services on the market, since the information raised encourages these processes [13], [31]. Such organization and processing of information is necessary to define the innovation strategies of organizations that use technology surveillance [10], [32].

Information considered useful should be pertinent to some aspect of the organization’s activity, be absorbed in a timely manner, be accurate and relevant [33]. The dissemination process must be well specified and contribute to strategic decision making, ie it should be considered an activity inherent to the process of technological innovation [24], [ 34]. Watching technologies is not only about covering news, it must cover the whole documentary of the information process, covered with adequate preparation and presentation of all information relevant to the generation of intelligence and decisions consistent with guarantees of success [26]. Competitive intelligence, in turn, consists in using the information raised by technological surveillance, to orientate itself to the market, identifying which of them have greater importance and to reach objectives and goals of the organization [10].

Companies that take advantage of opportunities, based on the results of technological surveillance, have the capacity to understand and acquire knowledge about new technological developments and to respond to the new technologies identified. These companies see in the information collected a proactive way of responding to the technologies and diminishing the threats caused by them [20], [23], 35], [36]. The company can further progress by detecting investment and marketing opportunities so that observation can lead to increased market share [28].

Surveillance activities contribute to the innovation of processes and products since they enable the generation and detection of ideas and new solutions, as well as the application and implementation of new technology. However, this is only possible when the critical factors are dribbled and directed to the success of the technology surveillance tool. These factors are usually characteristic of the sector and the strategy of each company, which should be aligned with the benefits generated by the use of technological surveillance [28], [37], [38].

The main reasons for using a surveillance system are: anticipate changes; reduce risks by detecting threats; to progress by detecting customer dissatisfaction and their needs; innovate through new ideas; and cooperate [25]. For the results of surveillance to contribute to the technological strategy of an organization, it is necessary to identify the technologies that may represent threats; identify technological opportunities and protect the organization’s technological capabilities [21].

It must be made clear that technological surveillance is different from competitive intelligence. Surveillance is based on the ability to collect, analyze and disseminate useful information, which allows the company to predict and adapt to a constantly changing environment and the potential for exploiting technologies [39]. Competitive intelligence, however, concerns the use of this information in a decisive way in decision making, which creates a competitive advantage for the organization vis-à-vis the market [28] [40].

As a result, technology surveillance provides information about technology, predicts the directions that drive technological change, and encourages decision-making by organizations that use it in a planned way. Technological surveillance should provide information on the knowledge being investigated, the available technological solutions, the technologies being studied, identify the inefficient and obsolete technologies, as well as the technological trajectory of the main competing companies and information from the research and innovation centers which generate new technologies.

Systematizing technical information and knowing the solutions taken by other people allows starting from a non-zero basis to create mechanisms and solutions to internal problems [41].

Therefore, in order to obtain the expected results from the technological surveillance process, it is necessary to strictly comply with each stage of its development, so that all necessary information is collected and has value for decision making.

IV. DEVELOPMENT OF TECHNOLOGICAL SURVEILLANCE

The technology surveillance system consists of a set of basic functions, ie observation, analysis, and use. Initially, it focuses on the search for information, capture, calculation and dissemination of this information. Subsequently, it focuses on the treatment, study, discussion and validation of the acquired information. Finally, the third function analyzes the decision making that is usually strategic, based on all the information obtained in previous activities [28]. All these functions, when well systematized, can cover the existing information needs, foster scientific research, as well as keep its professionals up to date and help make decisions with less risk [10], [20], [21].

Within a process of technology surveillance, there are two moments: one in which it presents itself passively and the other in an active way. In the first, the internal and external information is analyzed routinely, in order to find relevant data to contribute to the development of the organization. At the second moment, monitoring takes place, that is, it focuses on the systematic search for pertinent information about aspects previously determined by the organization, so as to offer continuous knowledge about the development and emerging trends of the environment in which they are inserted.

A process of technological surveillance can be divided into 6 stages [22], [31]:

• Identify the needs: The necessary information must be identified by the organization through a self-diagnosis that must contain the current technological situation of the company, its suppliers, competitors and customers. This practice indicates which types of information to look for.

• Identify the sources: Determine which sources can provide the necessary information. They can be formal, such as patents, database or books, and informal, such as visits to fairs, conversations and conferences.

• Means of access: these means are heterogeneous and new services are continually being developed to facilitate the search for information. Among them we have the market studies, searches through the internet, through a database for patents and periodicals.

• Search: in this process it is necessary to analyze the results obtained to check if these correspond to the expected. This search only occurs in selected sources, so that the information is relevant and can be cross-checked with the

information.

• Value of information: this step depends on the volume of information to analyze, the content or nature, its format and structure. It can happen by sorting, counting and crossing information.

• Dissemination of information and results: main knowledge acquired by the organization in order to anticipate changes with less risk in decision making. The periodicity, content and presentation structure of the data should be established.

These steps can be visualized in the schematic representation of the technology surveillance process, Fig.1 

****FIGURE 1 ****

It is important to emphasize the connection between the steps, where each one is highly dependent on the results of the previous step. Developing this sequence of steps does not guarantee the success of surveillance because it is directly related to the quality and value of the information collected, as well as to the organization’s strategy. If this is not intended to include in its future the results obtained, there is no basis in performing these techniques [15].

Another way to execute technological surveillance, following the same principles, is given by UNE 166006 of 2006. This standard proposes a series of processes to identify the needs, sources and means of access to information; search, treatment and validation; information valorization, results, measurement and improvement [42].

One way to improve the techniques used for the development of technological surveillance is to make use of the benchmarking tool, that is, to compare performance, with organizations that already execute surveillance practices efficiently, favoring continuous improvement. This is even more important in areas where technological change is very rapid, such as in information technology, and there are occasional difficulties in accessing this information, either because of lack of knowledge or effective tools [27].

The technologies management tools are useful for the surveillance process, since their knowledge and management allow to optimize the effectiveness of surveillance by knowing better its context, level of development and possible evolution, that facilitate the evaluation of the meaning of any movement or technological development of competitors [28]. There are a number of techniques that are used to manage technologies and that contribute to technological surveillance, such as calibration and technological prospecting, trend analysis, and models of international participation with the scientific and technological community [43].

There is a tendency to evaluate knowledge generated by universities through the study of scientific productions, such as dissertations, theses or articles published in recognized journals [44]. As well as through patents, it is possible to monitor the technological changes and the impact and value of innovation in certain sectors, knowing statistically how much and to what extent the research object was explored [18].

In order for information classified as useful by technological surveillance to be used effectively, it needs to be disseminated in an objective and short-term manner [18]. To shorten the response time and reduce the error in the adequate disclosure of the information the analysis of the information must be performed with a high level of automation and by trained people who have a thorough knowledge of the organization’s objectives and strategies [45].

Effectively implementing technological surveillance techniques can generate numerous benefits for an organization: alerts on changes and scientific development; facilitates the updating of knowledge, pointing to market niches as well as avoiding investing economic and human resources in obsolete areas [15], [21].

The Virtual Observatory of Technology Transfer is a digital platform created in Spain by the University of Alicante. Through this, the Technological Institute of Informatics developed a Technological Surveillance system that supports the strategic decision-making of innovation of the Institute and small and medium enterprises of the Information and Communications Technology sector, which allowed to foment the processes innovations in companies. The Observatory monitors a large number of sources of information from different sources: websites, databases, newsletters, etc., selected according to quality criteria to cover the different types of documents: news, events, patents, scientific articles, regulations , legislation. [46]. 

In order to have such a tool, the observatory has a specific computer infrastructure, consisting of technological surveillance software, which facilitates the structured compilation of information, as well as its classification and indexing, and a proprietary content manager in the which is published and disseminated the information retrieved and facilitates its access and consultation through access to the observatory portal, daily news reception, and restricted access to the system by users [46]. In a study with biogeochemical cycles, the technology was applied and the authors verified that through this tool it was possible to classify any vector of data, regardless of whether the values are numerical or alphanumeric, which allows a number of possibilities such as classifying technologies, patents, companies and inventors, according to inherent characteristics determined by the user [47].

A methodology of technological surveillance requires the participation of professionals, who have knowledge about the topic to watch, validate and feed information and make use of a tool for capture, analysis and processing and dissemination of information [21].

Each stage for the development of a process of technological surveillance must be carried out with caution and fulfilling the stipulated objectives. The information needs need to be clear to all involved, as well as the sources where the search for information will be carried out, so that they are reliable and can achieve the expected results.

To process, store and distribute information, technology is used, but it is the people who interpret and classify it as valuable or not. Therefore, the human factor should be valued, considering the importance of the analysis and the selection of the information that will be disseminated for the users’ decision making [48].

V. FINAL CONSIDERATIONS

The objective of this work was to build a theoretical framework on technological surveillance, identifying its application and benefits generated by its use. For this, a systematic search of the literature was made using the following databases: Web of Science, Scopus, Science Direct, IEEE Xplore, Scielo and Scholar.

Thus, all the articles found by the systematic search were analyzed and carefully selected, according to the approach and link with the theme. By reading the acquired portfolio, it was possible to construct a theoretical reference on technological surveillance.

It is imperative that organizations retain knowledge related to technological changes and discoveries so that they can assess which technologies can be used by them in the short, medium and long term. For this, the information management tool called technological surveillance can be used, which aims to collect, analyze and disseminate information from areas determined by the user in order to assist in decision-making processes.

Technological surveillance is an indispensable tool for the competitiveness of organizations and can be adapted to any branch of work and production systems. In order to achieve the desired results, it is necessary to identify within the organizations the purpose of surveillance, its addressees, aspects to be monitored, the necessary sources, time of response and means of dissemination of results.

By virtue of this, when technological vigilance is developed correctly, with all the steps performed according to the user’s information needs, through reliable sources and by trained professionals, it allows to give an overview of the technological scenario in which the organization is located, highlighting their opportunities and threats.

References

[1] COURVISANOS, Jerry. Political aspects of innovation. Research 

Policy, v. 38, n, 7, p. 1.117-1.124, 2009.
[2] HUANG, Chi-Cheng. Knowledge sharing and group cohesiveness on performance: na empirical study of technology R&D teams in Taiwan. Technovation, v. 29, n. 11, p. 786-797, 2009.
[3] EDLER, J.; KRAHMER, F. M.; REGER, G. Changes in the strategic management of technology: results of a global benchmarking study. R&D Management, v. 32, n.2, p.149-164, 2002. 

[4] MOSSO, María J. Vigilancia tecnológica: aplicación en la seguridad y defensa. Técnica Administrativa, v. 9, n. 2, 2010.

[5] HSU, C.; SABHERWAL, R. From Intellectual Capital to Firm Performance: The Mediating Role of Knowledge Management Capabilities. IEEE Transactions On Engineering Management, v. 58, n. 4, p. 626-642, 2011. 

[6] LEÓN, Andrés M.; CASTELLANOS, Oscar F.; VARGAS, Freddy A. Valoración, selección y pertinencia de Herramientas de software utilizadas en vigilancia tecnológica. Revista Ingeniería e Investigación, v. 26, n. 1, p. 92-102, 2006. 

[7] JACOBS, Hannelizel; ZULU, Chipego. Reaping the benefits of value innovation: Lessons for small agribusinesses in Africa. African Journal of Business Management, v. 6, n. 33, p. 9510-9523, 2012.
[8] DELLA BRUNA JUNIOR, E; ENSSLIN, L; ENSSLIN, S.R. Supply chain performance evaluation: a case study in a company of equipment for refrigeration. Techonology Management Conference ( ITMC), IEEE Internation, p. 969-978, 2011. 

[9] VAZ, Caroline R.; BONILLA, Alejandra M.; SLIG, Paulo M. Análise Bibliométrica de Indicadores de Desempenho versus Gestão Ambiental e Gestão do Conhecimento. In: Congresso Internacional de Administração 2012. Anais do Congresso Internacional de Administração 2012, Gestão Estratégica: Empreendedorismo e sustentabilidade, set. 2012. 

[10] RAMIREZ, Maria I.; ESCOBAR, David.; ARAUJO, Biiana. Vigilancia tecnológica e inteligencia competitiva. Revista de Gestión de las Personas y Tecnologia, v. 5, n. 13, p. 238-249, 2012.
[11] ALLARAKHIA, M.; WALSH, S. Managing knowledge assets under conditions of radical change: the case of the pharmaceutical industry. Technovation, v. 31, n. 2-3, p. 105-117, 2011. 

[12] OLLER, Francesc M. Mirada al futuro: la vigilância del entorno. Revista Ingenieria Industrial, v. 1, n. 1, p. 39-46, 2002.
OSPINA, Carlos F. G. Vigilancia Tecnológica Cientifica de Ciclos Biogeoquímicos. Journal of Technology Management & Innovation, v. 4, n.2, p.44-53, 2009. 

[13] BUCHELI, Victor A. G.; GONZÁLEZ, Fabio A. O. Herramienta informática para vigilancia tecnológica – VIGTECH-. Revista Avances en Sistemas e Informática, v. 118 4, n. 1, p. 117-126, 2007.
[14] CANTÍN, Patricio V.; MONTENEGRO, Ivette O.; MATURANA, Victor R. Vigilancia tecnológica aplicada a nanociencia y nanotecnología en países de latinoamérica. Journal of Technology Management & Innovation, v. 1, n. 4, p. 83-94, 2006. 

[15] SANCHEZ-TORRES, Jenny M. Apoyo en la definición de políticas públicas en ciencia, tecnología e innovación a través de vigilancia tecnológica e inteligencia competitiva. Em: Estudios de vigilancia tecnológica aplicados a cadenas productivas del sector agropecuario Colombiano. Bogotá, 2008. 

[16] GARCÍA, C. Q.; VELASCO, B. C. A. Configuración del portafolio tecnológico, diversidade e Innovación: um estúdio longitudinal. Cuadernos de Economía y Dirección de la Empresa, v. 11, n. 34, p. 53-80, mar. 2008. [17] SANTAMARÍA, Luis.; NIETO, María J.; BARGE-GIL, Andrés. ¿Hay innovación más allá de la I+D+i?, El papel de otras actividades. Universia Business Review, v. 2, n. 2, p. 102-117, 2009. 

[18] LEE, Changyong; JEON, Jeonghwan; PARK, Yongtae. Monitoring trends of technological changes based on the dynamic patent lattice: A modified formal concept analysis approach. Technological Forecasting & Social Change, v. 78, n. 4, p. 690–702, 2011. 

[19] CHOI, Changwoo; PARK, Yongtae. Monitoring the organic structure of technology based on the patent development paths. Technological Forecasting and Social Change, v. 76, n. 6, p. 754–768, 2009.
[20] MACHIN, Lilian M.; REYTOR, Maikel A.; LEYVA, Linnet I. B. Propuesta de proceso de vigilancia tecnologíca para el obesrvatorio de tecnologia educativa em el centro de tecnologias para la formación. Revista Electronica de Tecnologia Educativa, n.35, p. 1-13, 2011. 

[21] ALZATE, Bibiana A.; GIRALDO, Lida T.; BARBOSA, Alejandra F. Vigilancia Tecnológica: Metodologías y Aplicaciones. Revista Gestión de las Personas y Tecnología, v. 5, n. 13, p. 250-261, 2012.
[22] FUENTES, Belén F.; ÁLVAREZ, Sara P.; GASTAMINZA, Félix V. Metodología para la implantación de sistemas de vigilancia tecnológica y documental: El caso del proyecto INREDIS*. Investigación Bibliotecológica, v. 23, n. 49, p. 149-177, 2009. 

[23] NOSELLA, Anna; PETRONI, Giorgio; ROSSELLA, Salandra. Technological change and technology monitoring process: evidence from four Italian case studies. Journal of Engineering and Technology Management, v. 25, n. 4, p. 321–337, 2008. 

[24] PÉREZ, Lizandra G. La gestión de información y sus implicaciones en los sistemas de vigilancia informacional. Revista Innovación Tecnológica, v. 16, n. 2, Jun. 2010.
[25] PALOP, F., Vicente, J. M. Vigilancia tecnológica e inteligencia competitiva, su potencial para la empresa española. COTEC Estudios, 15, 11, 1999. 

3510 

[26] TOLEDO, ELEA G.; ROMÁN, Adelaida R. Vigilancia tecnológica e inteligencia competitiva: conceptos, profesionales, servicios y fuentes de información. El profesional de la información, v. 10, n. 5, pp. 11-20, 2001. [27] FERNÁNDEZ, Mercedes. D.; AGÜERO, L. A. Diagnóstico integrado de la vigilancia tecnológica en organizaciones, Ingeniería industrial, v. 32, n. 2, p. 151-156, 2011. 

[28] SELLERO, Francisco J. S.; GONZÁLEZ, Montserrat C. Development of Technological Vigilance Systems in Spanish Aquaculture. Journal of Technology Management & Innovation, v. 7, n. 3, p. 214-226, 2012.
[29] BELTRÁN, M. E.; BOSCÁN, N. Identificación de necesidades para la adquisición de tecnología para la producción de energía eléctrica mediante el uso de sistemas fotovoltaicos en Venezuela. Télématique, v. 10, n. 2, p. 89-106, 2011. 

[30] QUIÑONES, Iber J. Vigilancia tecnológica como herramienta en los proyectos de mejoramiento de la competitividad en la industria de recubrimientos duros. Informador técnico, n. 72, p. 44-51, 2008.
[31] DURÁN, Javier M.; MARTÍNEZ, María M.; TRIANO, José V. La vigilancia tecnológica en la gestión de proyectos de I+D+i: recursos y herramientas. El profesional de la información, v. 15, n. 6, nov./dez. 2006. [32] PELLISSER, R. A conceptual framework for the alignement of innovation and technology. Journal of Technology Management & Innovation, v. 3, n.3, p.67-77, 2008. 

[33] MEGGINSON, L. C.; MOSLEY, D. C.; PIETRI JR., P. H. Fundamentos do controle e administração da informação. Administração: conceitos e aplicações. 4. ed. São Paulo: HARBRA, 1998. [34] GUIMARÃES, Thiago A.; ALVAREZ, Victor M. P. Análise do processo de difusão tecnológica de cultivares de soja da Embrapa no Paraná. Revista de Política Agrícola, Ano XX, n. 3, p. 19-34, 2011. 

[35] SRINIVASAN, R.; LILIEN, G. L.; RANGASWAMY, A. Technological opportunism and radical technology adoption: An application to e-business. Journal of Marketing, v. 66, n. 3, p. 47–60, 2002. [36] CHEN, C. W.; LIEN, N. H. Technological opportunism and firm performance: Moderating contexts. Journal of Business Research, 2012. [37] MUÑOZ, L., MARÍN, M., VALLEJO, J. La vigilancia tecnológica en la gestión de proyectos de I+D+i: Recursos y herramientas. El Profesional de la Información, v. 15, n. 6, p. 411- 412, 2006. 

[38] MARTÍN, G. C.; SALAZAR, M. A.; SÁEZ, A. L.; LÓPEZ, J. E. N. El capital relacional como fuente de innovación tecnológica. Innovar, Revista de Ciencias Administrativas y Sociales, v. 19, v. 35, p. 119-132, 2009.
[39] FERNÁNDEZ, Mercedes. D.; ABREU, Marta I.; LEE, Yoel A.; PÉREZ, Olga E.; BATISTA, Antonio D.; MORENO, Jeidys M. Vigilancia tecnológica en una universidad de ciencias técnicas. Ingeniería industrial, v. 32, n.1, p.1-7, 2011. 

[40] VEGA, Jaider J; GUTIERREZ, A. G., FERNÁNDEZ, I. L. Cómo innovan las empresas españolas? Una evidencia empírica. Journal of Technology Management & Innovation, v. 3, n. 3, p. 100-111, 2008. 

[41] Drudi , S.; Gangoso, Z. E. Representation Systems in the Evolution of Technology. IEEE LATIN America Transactions, v. 11, n. 1, 2013.
[42] AENOR, Associação Española de Normalización y Certificación. Norma Española Experimental UNE 166.006. Gestión de la I+D+i: Sistema de Vigilancia Tecnológica. Madrid, 2006. 

[43] GRIENITZ, V., LEY, S. Scenarios for the strategic planning of Technologies. Journal of Technology Management & Innovation, v. 2, n. 3, p. 21-37, 2007.
[44] MEJÍAS, José L. P.; CABRERA, Francisco M. S.; FERNADÉZ, Mercedes D.; BARRERA, Rosario B. Evaluación de la eficiencia de grupos de investigación mediante análisis envolvente de datos (DEA). El professional de la Información, v. 19, n. 2, 2010. 

[45] BATISTA, Darlin S.; SÁNCHEZ, María V. G.; CALVET, Humberto C. Establecimiento de un sistema de vigilancia científico-tecnológica. ACIMED, v.11, n.6, 2003.
[46] OVTT, Observatório Virtual de Transferência de Tecnologia. Vigilância Tecnológica aplicada ao sector TIC: o Observatório Tecnológico do ITI. 2013. Disponível em: < http://pt.ovtt.org/destacados/vigilancia- tecnologica-aplicada-ao-sector-tic-o-observatorio-tecnologico-do-iti>. Acesso em 06 Jun. 2013. 

[47] OSPINA, Carlos F. G. Vigilancia Tecnológica Cientifica de Ciclos Biogeoquímicos. Journal of Technology Management & Innovation, v. 4, n.2, p.44-53, 2009.
[48] PACHECO, F. The Need for Formal Education on Information Security. IEEE Latin America Transactions, v. 11, n. 1,2013. 

Silence of the Professors: Mark Crispin Miller

Screenshot from Abby Martin’s interview with Mark Crispin Miller, who wrote the forward to the recently republished book Propaganda by Edward Bernays.

One of Venezuela’s media assets that I’ve identified is Mark Crispin Miller.

He’s a professor of media studies at NYU and in addition to his work with TeleSUR English, he is interviewed in the documentary Orwell Rolls in his Grave.

Given this and the recurrent invocations of George Orwell throughout the literature associated with Kultural Marxism, I thought I would give a quick look through his website and see if he had anything to say that I might be able to add to my case study on Orwellian Irony. I was not disappointed!

I found this link to a re-posted article about NewsGuard, a company which is working with different news organizations to do the analytical work previously done by newspaper and magazine editors prior to the Internet Age.

What I find most ironic is that the article does not at all engage with the substance of what NewsGuard does – basically checks it’s credibility, reliability transparency by determining if the website, amongst other factors:

  1. Regularly publishes false content
  2. Gathers and presents information responsibility
  3. Regularly corrects of clarifies errors
  4. Handles the difference between news and opinion responsibly
  5. Avoids deceptive headlines
  6. Discloses ownership, financing and potential conflicts of interests
  7. Clearly labels advertising
  8. Published names of the authors

Instead of actually stating what is going on, the article Mark Crispin Miller linked to (by another “journalist” associated with the Kultural Marxism network, Whitney Webb) instead engaged in fear-mongering.

What’s even more ironic than this, in light of the fact that he’s a professor?

I left a post raising some of the issues that I see as missing from the article and pointed out a factual inconsistency.

Individuals like myself are genuinely concerned with ensuring that honesty, integrity, and professionalism are values that are upheld within the media and journalism industry and the claim of conspiracy that this is all a matter of “big Silicon Valley tech companies in league with the U.S. government” that are trying to “censor” people is absurd.

Mark Crispin Miller’s response?

Not to allow the comment to be posted.

He’s certainly welcome to make that choice as his website is his platform, but so too am I free to share a portion of my comments below to show the sweet, sweet Orwellian irony of a 9/11 Truther refusing to let counterfactual evidence onto his website.

A portion of the comment post left on Mark Crispin Miller’s website about NewsGuard.

When a YouTube Chat Turns to “Ciao!”: On the Cowardice of Caleb Maupin

Caleb Maupin is an ex-Occupy Wall Street activist, ex-Workers World Party member that previously worked for Russia’s RT news and is now an “independent socialist”.

I admit that I haven’t read much of his writing nor watched more than two of his YouTube videos as I neither felt intellectually enlargened nor amused by the. And yet I decided to jump onto his live YouTube chat when I read an announcement of it on Facebook as I wanted to, like I did with Ajamu Baraka and Abby Martin, inquire about any relationship to funding networks manag.ed by Venezuela

Amusingly enough within 3 minutes of my asking him a question about his relationship to funding and assistance networks for American aocialist activists that are connected to Venezuela’s state intelligence apparatus he ended the live broadcast. 

That right. Only 25 minutes into a live chat that was supposed to be an hour long and he cancels it!

I was a little bummed as I was hoping to get a definitive response – but also not surprised.

The only information that I got came from the one “person” that shared Caleb Maupin’s announcement of his upcoming YouTube Talk.

I put “person” in quotes as a quick look at his profile, which is public, and a number of the qualities indicating coordinated inauthentic behavior connected to the Kultural Marxism network became evident. These are:

Links to TeleSUR
Links to Black Agenda Report
Praise of Julian Assange
Links to Counterpunch
Multiple links praising China
A link to a foreign language website (in this case Chinese) website

 

 

English Translation of Jesus Santrich’s poem “Una Prosa de Amor Para Ella”

I have undertaken my last battle; the battle of dignity. I want you to know that I am a complete, integral revolutionary, I will not retreat a single step regarding the goals that we have set.

Abril 11/18

pastedGraphic.png 

A Prose of Love for Her

Havana, February 2015.
By Jesús Santrich.

*

I found you to the south of the day
As coming out of the anguish
Of the hurricanes;
you were between palms and
Taino gulls
Glowing in the coordinates of a sun;
At that moment
the sunset undressed before my eyes
and the sea welcomed me
with the abysmal embrace
of its deep salty blue
in which the moon submerges
its ardent glow
and the whispering breeze
among shipwrecked spells.

To calm the cyclone, snatched
from my desire to have you,
you gave me a piece of your dawn,
the keys of Elegguá,
the elekes of Obbatalá,
the oshé of Shangó,
the bells of Oshún,
the omieros of the pantheon,
in a polymita the rainbow,
the waters of the Almendares
and the sacred necklace of Yemayá.

With a wisp of your Siboney twilight
you have my deepest secrets of love,
and my last vision of the Castle and the Giraldilla;
then you put the strength of your cemies
in my soul
and the iridescent guanín de Hatuey
You hang on my chest …;
You gave me the amulet of Mayvona,
the patience of Anayana,
the Cross of Calatrava,
the murmur of your waves
and a song by Juan Formell
to fill the saddlebags
with my hopes.

The truth,
it was enough for me “a white rose
in June as in January”
but you gave me more,
much more,
in the unspeakable tranquility
from your sky,
in your sweetly mulatto flavored flavor,
in your damp presence
gone from the hands of Atabey,
and from the pristine tears
of Boinayel
so that you would receive the sowing
of Olofin.

So,
you made me live the anthology
of your hours
bouncing between dreams
from which I do not wake nor want…
even less when I hear
the moan and the song,
the happiness and the crying
of your waves in El Mégano,
and the rumor of the time that
spreads walking and resuming
the ancient cobbles
and the ancient walls
of your aged architecture
full of nostalgia,
made up of memories
and furtive desires
of legendary lovers.

How I love you my Havana,
because you succeed in filling my loneliness
of the port without sailboats
with that hoarse joy
that only the corals have,
and anoint it you know this patina of glory
of the Moncada,
the inks of the Escambray,
or the Sierra Maestra,
when in its summit of glory
the butterflies pose,
and your music hands, in short,
caress my dock nostalgia
my nostalgia for anchor and sad networks;
my nostalgia of night bolero
in your accomplice aged seawall.

How I love you, my Havana;
I love you so much
that I give myself to your orishas
to keep me guarded
in the depths
of your bohemian nights;
Indigena Havana,
Black Havana,
Mulatto Havana,
sacred land of Havaguanex.

And I love you in the melancholy airs
of a baroque concert,
in the smoke of your cigars,
in the setback of a son
of Manolito Simonet,
because … “I’m obsessed with you”
and the world is witness to my frenzy …, ”
that’s why my heart thunders
like a “Trebuchet once more”
or like the cannon shot at nine o’clock,
and my soul dances and runs
like everyone who is
“Crazy about my Havana”,
crazy about his salsa,
crazy about his son,
and the touch of the güiro,
and the parrandón,
and the deepest danzón,
and the notes of Chan Chan
played by Compay Segundo,
or the voice of Laritza Bacallao
intoning with Cándido Fabré
melodies that embellish the world.

How I adore you my Havana
because you are my dream,
and I do not wake up nor want to,
except when listening to
the “Black Rhapsody” of Lecuona,
the “Cuban Dances” of Cervantes,
the “Zapateo por Derecho”,
and the fulgent chords
of Frank Fernández
interpreting the candor,
the passion and the fervor,
of the loving embrace
of Manuelita and the Libertador
that Master Angulo
virtuously sculpted,
eternalizing in the rock its splendor.

How I love you my Havana,
because in the dramaturgy of Estorino
I was convinced that “Penalties can swim”;
and of the bucolic tenths
of Indio Ortatomé
the faith of observing without being able to see
“seeing, as one
dreaming in a sad night,
landscape that no longer exists
with eyes that no longer see”
but that keep the light of the soul
with which I found the blue unicorn
that took me to the arms of Yolanda
singing a Trova of Silvio Rodríguez
who told me,
that “wings are not necessary to make a dream “,
that” enough with your hands
enough with the chest is enough with the legs and with the commitment”

It was like this that I learned singing
and confirmed fighting,
that “You do not need wings
to be more beautiful
enough good sense immense love …;
you do not need wings
to take the flight”
and then I picked it up,
and I bewitched myself,
and I was charmed with your spells,
and I flew like a hummingbird
while the “Abracadabra”,
of your legend
placed before me astonished
“Apostle” by Juan Sicre,
to the Grajales de Teodoro Ramos …,
and in a certain way”
a film by Tomás Gutiérrez
in which the tenderness
of Sara Gómez
shone, only matched
by the flash of Korda
that eternalized leaves
the clean look of Che.

How I love you my Havana,
because from your hand
has seen the reviving of Gisellee
in an impossible arabesque,
in a great attitude …,
between the twists and turns,
a fouetté and the entrechatde
the dance of Alicia
que jumping, jumping,
or resting on her tips
played by God .. .

How I love you,
my brunette, Habana del songo,
of the myths and the corsairs,
of the saints and the paleros,
of the songs and the mysteries
that sings to Oloddumare
with the same fidelity
and to La Virgen de la Caridad,
either from its guanajatabey seed,
or from its genuine maker,
or from the deepest
of Yoruba goodness.

It was with the verb of “Songoro Cosongo”
and the charm of your drums
that I traveled to the sources of the Oddan
to search for the Abakuá roots,
to get drunk with the songs of Efí,
to learn about the stories of Efó,
to listen to the hides
and the African voices
that talked
about the secrets of the fish Tanze
trapped in the memory of Nasakó,
and in each mulatto accent
of that Camagueyan of
the four anguishes,
From somewhere in the spring,”
he taught me how to have
it that I had to have.

I got entangled too
in the power of your
porters
trying to cage your sun in my hands,
and I listened in the distant silence of
a dark dawn,
the overwhelming sadness of Moctezuma
in a deep concert
of the genius of Vivaldi,
when the albasus cried
their tears of rocío
that caressed the face
of a red-eyed jungle of Apapa Efik:
I saw jungle in his eyes
and found in his deep gaze
the mysteries
of mother Sikanekue,
and I found the leopard Tanze
on the tam of the Ekue
que sounds with the spirit of Sikan,
with the blood of the rooster,
with the skin of the goat,
with the magic of Calabar …,
waving in the wind
a miraculous phrase from the memory
that also spoke with timbre of conga
y of timbales, saying “abasí serí Ekue maya beki…”;

Yes, as the persistent echo of the past
revealing that “in the voice of the drum God speaks to us”,
discovering the mystery of dance, of origin … and of ritual.
Then I continued
on the path of the Zohar
and among the dust of the hours,
I saw a legion of brothers
marching next to Cespedes,
Maceo, Máximo Gómez and Mariana;
and I was no longer your Spanish owner
who with your own hand you had,
and I understood without hesitation
that, although men can fail
“Words do not fall into emptiness”
But Santiago …

Santiago, it came to my mind
like a long street turned into Aqueronte,
where Panchón walked
in his mission of Charon,
enjoying the happiness of the sunflowers
while through the mourning I felt that the lights
of the darkness of my soul were extinguished;
but no,
no,
simply not,
because the sound of the sun
was again blowing,
from the east to the west,
from Guantánamo to Pinar,
in the polyrhythm of the batá
which announced the “Feast of Fire”.

I have traveled with you
to the kingdom of Nsambia,
to the power of the 16 Mpungos,
to the very same root
sof the Manikongo kingdom
as to the magical world,
to the wonderful world
of the verb of Carpentier,
with which I took the car of time
towards the century of lights,
following the route
of your lanterns of ghostly lights;
the same ones that gave birth in the past to
the avatars of Esteban and Sofía,
caught up in the Jacobin impetus
of Víctor Hugues …,
only to know
that “words are not enough
to create better worlds”,
and that there is “no more promised land
than that which man
can find in himself…”

Or ask Mackandal then,
ask Boukman,
and drink with them
the blood of the boar,
evoking the Houngan,
so that the night of August will glow
“The night of fire”
the night of freedom,
and finally bloom
an emancipated world,
as in the Moro mambo,
as in the essential colors
of the “History of the Caribbean”,
as in the snails and the flowers
that explode from the “Interiors of the Hill”,
from the “Festines”
and the “Dream” of Portocarrero.

How I love you, my Havana,
because in you the past and the present are drawn,
because in you my entire Cuba is reflected:
because you are in the hurry of Marti
in his thunder of lightning, in his starlight,
in his myth of iodine
poured into the sand
that kisses the sea;
or because you are in the cowbells of the moruá
when they sound in Dos Ríos,
announcing the luto
por El Apóstol that rides towards eternity.

How I love you Havana,
because you are the microcosm
of real impossible stories;
because in you I found the way
to travel to the seed
doing the trade of darkness
that made me discover the secrets
of the kingdom of this world,
scourged by the wars of time
in which all history was forged;
because in you I was intimated the scenario
in which the Ekue dreams hidden in the fambá
every second
of the consecration of spring
flooding
with exuberant anti-Cuban hallucinations
that had the Taíno magic of “the real
marvelous”
that allowed me to grasp the profuse metaphors
of your perennial colonial pages
in which the Marquis of Chaplaincies
“Lay on his deathbed,
the chest armored with medals,
escorted by four candles with long beards of melted wax”
that marked the path
of the fantastic Amerindianidad
through which Melchor walked,
marking firm paths from which Sotomayor
jumped trying to reach
the flight of Arnaldo Tamayo the bird,
who knew how to find the key to play with the stars
and bring up the heavens
the sacred symbols “of the long green lizard,
with eyes of stone and water. ”

How I love you my Havana,
because of you I received the hand of Orunla
with the power of the babalawos
who gave me the spells
to walk among the hurricanes of memory
wand cross the domains of Yemayá,
and retrace the footprints of Handel and Scarlatti
entangled in the notes of Stravinski and Louis
Armstrong,
feeling the evidences
of the transience of life,
the reversed march of time,
the brevity of the instant
that usually extends in a blade of sol
against your breasts
when the tocororo flies,
when the real palm dies,
when the amber cane is born
and the children sing La Bayamesa,
with the same love
that Hemingway
put in the boat of the old man
who challenged your seas
to catch the immense fish of his upright obstinacy…,
until reaching
the port of his vanquished age
to resume life to continue dreaming
lying on a beach,
watching “a moon as bright as that
like the one that infiltrates the sweetness of the cane”,
shouting alive to Fidel” who vibrates on the mountain
“caring for the ruby, the five stripes and the star.

Notes on Implementing and Managing eGovernment: An International Text

I’ve been reading Richard Heek’s book Implementing and Managing eGovernment: An International Text as part of my doctoral thesis research and the book is, in a few words, foundational, seminal, required reading for anyone in the field of Innovation and Technology Management with a focus on eGovernment. I highly reccommend it.

Below are two organizational spreadsheets, followed by notes from the book.

Data Stakeholder Governance Considerations

Sample Item Costs for eGovernment Planning

Notes

There may be a focus on problem solving and innovation, and a focus on team-working and flexibility (Hafeez and Savani, 2003). The agencies may be characterized by what is known as a ‘task culture’. 

This hybrid management model argues first for an analysis of current public sector realities; and second for an assessment of which management and e-government system designs will best fit this reality. 

The sectors differ in many ways, including:

their espoused objectives (broader in the public sector); 

their view of ‘customers’ (more holistic in the public sector); 

their relation to ‘customers’ (mixed with roles as citizens and compliers in the public sector)

their accountabilities and perceived stakeholders (broader in the public sector)

their human and technological infra- structure (weaker in the public sector); 

the politicization of their processes (greater in the public sector); 

the scale and nature of competition (smaller and political in the public sector) 

Where decentralized information systems, manual or computerized, are already in place, barriers to centralization may be severe. In order to centralize, changes may need to be made to the organization’s whole information systems architecture: new data fields and formats, new hardware and software, new processes by which to handle data, and new processes by which to make decisions and take actions. 

Differences between the objectives and values (that is, the cultures) of particular groups in the public sector also cause a problem. 

Centralized approaches require the commitment of four key resources – money, time, people, and skills – all in short supply in the public sector. For many public organizations, a centralized approach may not be possible because of financial constraints; because staff are too busy on other things; or because no-one has the confidence or capabilities to undertake the necessary planning and coordination tasks. 

decentralized units develop different ways of working, different mindsets that create quite different views of the world between groups; different jargon used in communication; and different issues and people that are valued. 

aspects of system use such as implementation, operation, troubleshooting and maintenance are also likely to occur more quickly under a decentralized regime. 

Training, maintenance and administration costs also contribute. Large, centralized computing systems are estimated to cost something like one-third to one-half of this amount per user per year (CBR, 2001). 

A decentralized approach may be most economic for public organizations, because it saves on overt input costs. A centralized approach may be most efficient, because it avoids waste and duplication. But a successful hybrid approach may be most effective because it can simultaneously provide: 

  • the control necessary to share key resources (including data), to avoid duplication, and to achieve economies of scale; and
  • the freedom necessary to meet user needs, and to overcome blocks to IT usage and system development. 

US State Department, for example, successful progress on e-government has come from retaining computing and data management architecture under control of a central IT office, while decentralizing systems develop- ment responsibilities 

Division is compatible with – indeed, is defined as – simultaneous centralization and decentralization. It can be seen in the possible division of responsibilities described for systems development. It can also be seen in the division of responsibilities between client and server computers. 

That which we can call a managerial or information systems centralization, reflects Nolan’s (1979) well-known ‘stages of growth’. It shows the gradual increase in managerial attempts to control the information systems (which would include e-government systems) within an organization. Nolan’s model has been criticized for a lack of predictive power and a generality that fails to match individual organizational experience. However, its core sense of increasing managerial engagement with IT does appear sound. 

A decentralized approach will also help to spread IT awareness and skills, and even some understanding of the informational aspect of e-government, in a way that other approaches might not. For some public agencies, it is the lack of just such awareness, skills and under- standing that represents a key barrier to effective use of IT in government. 

there are tensions between the somewhat theoretical notions of organizational rationality, and the more real forces of politics in government. Hence, rational logic may play only a minor role in determining which approach is used. 

For example, the approach adopted will be shaped by the organization’s technology (e.g. whether the computing architecture is already centralized or decentralized); staffing and skills (e.g. what skills are avail- able); management systems and structures (e.g. whether the main organization has a centralized or decentralized structure) and other resources (e.g. the availability of finance). 

Stakeholder values will also play a role, such as their perceptions, their awareness of the costs and benefits of particular approaches, and their historical experi- ences. For instance, the recent experiences of staff with e-government systems create either a satisfaction that is inertial, or a dis- satisfaction that demands change. 

buuuut it is organizational politics and its roots in the self-interest of particular stakeholders that will help determine what management approach to e-government is selected 

Four familiar political constituencies (see Figure 2.2) can be identified, whose conflict or compromise within organizations helps to determine which approach is chosen: senior managers, politicians, IT staff, and mainstream staff. 

Broader political, pressures from the outside world – ranging from national political initiatives to dominant ideologies/philosophies – also play their part. Staff in public sector organizations are subject to continuous external pressures, that include (Barrett and Greene, 2001; Abramson and Morin, 2003): 

  • Pressure to conform to the requirements of external bodies, such as central government bodies and funding agencies. An e-government unit run by central government may, for example, be pushing a department to adopt certain centralized ‘best practices’: see, for example, Box 2.6. 
  • Pressure through (mis)perception of what other organizations are doing, which may be transmitted through informal contacts, management texts and training programs, or dealings with consultancy organizations. 
  • Pressure from private sector IT vendors to purchase particular technologies and systems. 

Chapter 3

eGovernment Strategy 

Centralized e-government strategic planning is a six-step process that, overall, asks: ‘Where
are we now?’, ‘Where do we want to get to?’, and ‘How do we get there from here?’

a successful strategy can develop senior management understanding that e-government systems are information systems not just IT, and build consensus and commitment to a strategic vision for e-government. It permits a fundamental review of the organization’s use of informa- tion and technology, leading to a comprehensive understanding of information systems requirements. 

It also provides a detailed plan of action on e-government for the organization. 

Problems of Federal eGovernment Expenditure in the US 

The 2003 US federal budget identified ‘six chronic problems that limit results from Federal IT spending: 

  • Agencies have automated existing outdated processes, instead of fixing underlying management problems or simplifying agency procedures to take advantage of new e-business and e-government capabilities. 
  • Agencies have made unnecessarily duplicative IT investments. 
  • Inadequate program management – many major IT projects have not met cost,
    schedule and performance goals. 
  • Few agencies have had plans demonstrating the linkage between IT capabilities
    and the business needs of the agency. 
  • Agencies have built individual capabilities that are not interoperable with one
    another. Few IT investments significantly improve mission performance. 
  • Poor IT security – major gaps have existed in agency and Government-wide inforsmation and IT-related security.’ 

e 2003 Federal Enterprise Architecture: A ‘business-based framework for Government-wide improvement … constructed through a collection of interrelated ‘reference models’ designed to facilitate cross-agency analysis and the identification of duplicative investments, gaps, and opportunities for collaboration within and across federal agencies.’ (FEAPMO, 2003)

The Strategic Context for Federal Public Agency eGovernment Strategy in the US 

The 2002 eGovernment Act

The 2002 Federal Information Security Management Act

The 2001 President’s Management Agenda

The 1998 Government Paperwork Elimination Act

The 1996 Clinger-Cohen Act

The 1996 Electronic Freedom of Information Act amendment:

The 1993 Government Performance Results Act:

Where are we now?

An answer would include details of the organization’s current structure and functions; key client groups; existing problems that need to be addressed; and important current and forth- coming factors – particularly policies and political priorities 

Where do we want to get to? 

An answer would include details of the organization’s objectives, and some vision of the future organization that will enable it to overcome current and forthcoming problems, and to achieve its objectives. Finally, it asks, ‘How do we get there?’ This would be achieved through a statement of management strategy about major changes to organizational structure and functions in order to reach its future vision. 

two types of organizational function are derived from the organization’s wider business strategy and prioritized for further investigation: 

  1. Existing organizational functions that are to be retained in order to meet organizational objectives 
  2. New organizational functions that need to be introduced in order to meet organizational objectives.

This is the essence of ‘portfolio’ or ‘program’ management: using criteria to align projects with agency strategy. 

Impact priorities, for example, might be: 

highest savings/financial return on investment

highest public visibility/political return on investment

highest learning/demonstrator effect

strongest focus on existing organizational deficiencies

strongest support to key external client  services (as opposed to internal administrative activities). 

Implementation priorities, for example, might be: 

lowest risk/highest feasibility

lowest cost to implement

fastest time for completion

eGovernment Systems Architecture needs three main components:

  1. A data model showing the structure of unified, organization-wide data to which the e-government systems will have access; often illustrated using an entity-relationship diagram (this and the other diagrams mentioned here are described in greater detail in Chapter 8).
  2. A process model showing the key activities of the organization that the e-government systems will either support or under- take; often illustrated using a process diagram.
  3. A data/process model showing the organization-wide connection between business processes and data entities, and the organization-wide movement of data that e-government systems will enable; often illustrated using a data flow diagram. 

Information engineering

This looks across the whole organization and focuses on two components:
business processes: the individual activities of the organization that help meet public sector objectives. 

data classes: data entities of relevance to the organization that are made up from individual data elements (or attributes). 

Data and process are principally connected, and therefore principally investigated, through the mechanism of decision making and action. 

From this investigation, the entire organization is analyzed into two long lists of business processes and data entities. These are cross-checked through a process/data matrix that shows which processes create or use which data. The data entities and processes can then be grouped together into clusters of data and processes that represent required e-government systems within the organization.

Critical success factors
it starts by asking managers to specify the factors they consider to be critical for the successful performance of particular organizational functions

It is the intention that e-government strategy be shaped by organizational objectives and process/information requirements rather than by technology: 

Determining eGovernment organizational architecture:

As part of the ITSPMO analysis, general strategic decisions may include:

  1. making sure that it is the government rather than the company that steers e-government 
  2. stating the approach to management of organizational change, including a determination of the needs for cultural change
  3. clearly allocating responsibilities for e-government systems development and management
  4. identifying major competency gaps and approaches to closing them through human resource strategies
  5. deciding how back-office procedures may be restructured to support e-government
  6. locating the e-government/IT function within the wider organizational structure
  7. demarcating which services (e.g. systems development, training and systems operation) are to be sourced in-house and outsourced
  8. identifying procedures to be used when tendering for and selecting e-government systems products and services
  9. specifying standard systems development methodologies and tools to be used 
  10. identifying financial approaches to be adopted, such as public–private partnerships.

Strategy Implementation 

Disseminate and Plan eGovernment Actions 

A typical business case for an e-government project might include a statement of project objectives; an estimation of benefits, risks and constraints; and an estimation of resource requirements covering finance, human resources (i.e. jobs and skills), technology, and timescales. Details of project deliverables (i.e. things the e-government projects should produce such as feasibility reports, specification documents, and both interim and final versions of the system) and timetables can be approved at this stage. So, too, can mechanisms for reporting back to the eGovernment Steering Group on progress. 

for personnel training and development, for finance, for technology, etc. There may also be an additional dimension to the matrix – time – showing what is to occur and be paid for within particular financial years. 

Many public organizations also find themselves in situations of constant and largely uncontrollable flux from factors such as changeover in ruling political parties; constant circulation of senior politicians and officials; emergence of new political initiatives and legislation that alter organizational activities, priorities and even structures; sudden imposition of cost- cutting measures; sudden external crises that demand a reaction; changes within the client groups the organizations serve; and changes in IT, IT standards and IT suppliers. 

The Outcome of eGovernment Strategy 

There are many ways for strategies to go wrong:

  • Lack of Strategy
  • Underused Strategy – The strategies give the impression of box-ticking – doing just enough to meet the demands of external policies and oversight agencies; and often doing that in a hurry – without true internal ownership of, or commitment to, the strategy. 
  • When strategy has been hijacked
  • When strategy is ‘strategic concrete’

Focus on process, not content

The process of trying to create a strategy may be more valuable than the formal deliverables. Value is sought from the informal process deliverables such as: making sense of the past, learning from experience, encouraging dialogue and communication, and making choices 

A hybrid approach to e-government planning will mean a balance between central and local. So, for instance, it could mean that e-government planning is seen as incremental, as participative, as limited in scope: guiding more than dictating. This approach is sometimes referred to as ‘pick- ing a course and steering it’: being adaptable to new constraints and new circumstances as they arise rather than imagining that the strategy is cast in ‘tablets of stone’. 

Sub-Strategic eGovernment Planning 

Given the many constraints to strategic plan- ning, it may be more feasible to plan at what might be termed the ‘sub-strategic’ level. This pares back what planning hopes to achieve until the intention matches what can be achieved in the organization. 

Tactical-Plus eGovernment Planning 

pushing the objectives of an individual e-government system ‘upstream’ to think how it contributes to the overall work of the organization; 

assessing the opportunity costs of going ahead with this particular e-government system rather than others; and/or 

assessing whether there should be com- patibilities between this and other exist- ing or planned systems. 

Chapter 4 Managing Public Data 

CARTA 

Completeness 

Accuracy
Relevance
Timeliness
Appropriate presentation

Prosumption – Where the consumers of public services themselves become producers of their own data often via web-based electronic forms.

What are the Positions to Consider when Managing?

Situation A: Departmental Location 

Situation B: Low-Level Independence 

Situation C: High-Level Independence 

Situation D: Outsourcing 

Outsourcing 

An equal, if not greater drive to outsourcing is to address human resource constraints by accessing staff, skills and ideas that are not available in-house. Other perceived benefits of outsourcing include the provision of a higher quality of service; greater certainty about costs; greater flexibility, especially of labor since it is easier to hire and fire external staff; access to advanced technology; and greater ability to focus management on the core deliverables of the public sector 

Cons

a clash of work cultures and understanding between the public sector client and the private sector sub-contractor; 

a loss of control over the service being provided, with the sub-contractor starting to dictate to a dependent client; 

a loss of core e-government competencies to the sub-contractor, such as controls over security. 

However, in practice, decision making about outsourcing in the public sector has only partly been driven by organizational rationality. It has also been driven by behavioral/political factors (Peled, 2000a). Managers are found to outsource e-government work because they: 

  • have been naive in their assumptions about the benefits that will ensue
  • believe association with such an initiative will be good for their careers 
  • wish to ‘clip the wings’ of the in-house IT unit
  • stand to gain financially thanks to the covert generosity of the sub-contractor

5.2 People

Competencies can be understood in relation to three domains:

Skills, Knowledge, Attitude 

Attitude is changes by appeals to the the rational mind, the political mind, and the heart. 

Greater use of case studies of e-government failure and/or best practice will likely be a move in the right direction (Parrado, 2002). Cases can persuade stake- holders, for instance, of the dangers of ignoring basic systems development prac- tice, or of the importance of understanding the organizational and human context of e-government systems. 

A good hybrid manager will recognize that psychological factors play a role: autonomy, challenge, recognition and the opportunity for career advancement. Direct work content factors are also important, such as training opportunities, flexibility of work schedule and clarity of task specification. 

On a shorter-term basis, responsibility for a personal development plan can be shifted to the employees, and used as part of the annual performance review. 

Plans must be far more than just a critical path; they must include deliverables, resource requirements, and reporting arrangements. Over time, the number of elements that must be planned has grown, typically in response to perceived problems with past projects. What was once just a ‘project plan’ has now been broken down; for example into: a scope management plan, a resource plan, a risk management plan, a procurement plan, a quality plan, a communication plan, a security plan, a change management plan, and a cost management plan.

Which standards should be followed? ISO 9001:2000 

Peer review – a hybrid rather than rational project technique – seems to have a better record, and has now been adopted by a number of governments as a best practice. 

Behavioral Approaches to Project Management 

the rational model fails to fully explain or predict what happens in the public sector. It also fails to fully guide real-world best practice, leading e-government practitioners to criticize PMMs for their inflexibility. Indeed, some who study the realities of projects see the rational approach as potentially guiding worst practice: 

“IT projects die by their own hand. The more they are bound by lists, rules, checks, restrictions, regulations, and so on, the more they drive out the human spirit of creativity, of innovation, of dealing with ambiguity, and of fun. People brought up in technical environments may not see the horror of this kind of approach.”

To plug this gap, and ensure that a more behavioral approach and more behavioral expertise are introduced, some governments are mandating the involvement of senior non-IT officials. The Canadian government, for example, defines a formal requirement on e-government projects for two things (OECD, 2001). First, a project sponsor who is responsible for the business function, and who has solely behavioral-side competencies ( judgment, leadership, communication, organizational awareness). Second, a project leader who is a senior departmental official with, again, largely behavioral-side competencies and only cursory IT management skills at best. Similarly, the UK government’s analysis of e-government project failures concluded with the requirement for projects to have a ‘senior responsible officer’ (CITU, 2000). The officer would be drawn from the business not the IT side of the organization. 

Primary Project Stakeholders

decision makers: those who make major project-related decisions, such as whether or not to proceed with the project

gatekeepers: those who control access to higher authorities

influencers: those who advise decision makers or whom decision makers take note of

end users: those who will directly use the output from the e-government system and/or from the business function it supports

champions: those who will support and muster resources for the project

Smart behavioral players work to break through the rationality barrier to get to the real objectives and values underneath. 

  • by understanding that professional relationships have different bases and require different techniques from those adopted with social relationships
  • by establishing rapport with the other person: looking for common ground 
  • developing on their areas of interest; even mirroring their speech and body language in order to ‘tune in’
  • by active listening that involves really concentrating and asking questions to get to the root of issues, beliefs, problems, needs, and so on 
  • by tailoring communication to the needs of the recipient 

Tailoring your Message 

The sociable ones: The idealistic ones:
  • Be clear and explicit, don’t just imply. 
  • Show me how people will benefit. 
  • Demonstrate immediate and
    practical results. 
  • Show me respect.
  • Engage with my personal values. 
  • Paint pictures and draw analogies
    that have meaning. 
  • Be passionate and engage my
    imagination. 
  • Show how it will contribute to
    the greater good of human kind.
The theoretical ones: The down to earth ones:
  • Show how it fits into the bigger picture. 
  • Ensure the theoretical base is sound. 
  • Appeal to my intellect and imagination. 
  • Be a credible source of information.
  • Be organized and structured. 
  • Be practical and realistic. 
  • Work logically and systematically
    through your analysis. 
  • Offer proof and evidence.

1. Preparation: Getting as much information as possible not just in relation to the topic under discussion but also in relation to the objectives and values of other parties; being clear about one’s own ‘bottom line’. 

2. Initial exchange: Drawing out other individuals and probing with questions to develop a better sense of their objectives and values; weighing up relative bargain- ing powers. 

3. Negotiation: being assertive; using and observing body language; identifying issues that can easily be agreed and issues that are low-cost to one side but high benefit to the other; being creative about what can be traded; exploring 

possible compromises. 

4. Agreement: summarizing the discussion; avoiding/dealing with last minute conditions. 

5. Implementation: setting out a clear schedule of tasks and responsibilities.

The acquisition of negotiating skills and the ability to apply the techniques just described is becoming increasingly integral to e-government project management 

Components of Massachusetts model: 

  • business problem and scope of work: the problem being addressed; the rationale for the e-government project; and the major tasks to be undertaken; 
  • workplan and time schedule: a Gantt chart ‘not intended to be a project log of each and every small detail, but rather a comprehensive plan of tasks, team resources and timelines’
  • management approach and personnel: for both the steering committee and project implementation team; 
  • acceptance criteria and deliverables: the key outputs from the project and criteria that will be used to judge whether or not that output is acceptable
  • task order budget
  • signatures: of all the key ‘business partners’.

Such structures as the above will allow 

  1. early identification of failures 
  2. mechanisms to disperse learning about both success and failure. 

Why should there be so much politicking around e-government? In short, because two pre-conditions of politicking are met. 

First, there are interdependent groups that have different objectives and values. This is clearly the case in public sector organizations. The ‘interdependent but different’ perspective applies to the formal functional divisions within public agencies. 

Second, there are important but scarce resources involved. 

e-Government brings together in large amounts both critical tangible resources – people, money and equipment – and critical intangible resources – information, power and kudos. They therefore form a key locus for organizational politics. 

Techniques of Influence 

Reason: ‘Relies on the presentation of data and information as the basis for a logical argument that supports a request.’ Reason is typically a first choice for influencing a boss or subordinate, and it often relates to a base of expert or information power. 

Friendliness: ‘Depends on the influencee thinking well of the influencer.’ It is often used with co-workers, but may also be used with subordinates and supe- riors. It often relates to a base of personal power. 

Coalition: ‘Mobilizing other people in the organization to support you, and thereby strengthening your request.’ It depends 

Bargaining: Negotiation and exchanging benefits based upon the social norms of obligation and reciprocate. The resources that are traded are very varied but can include assistance, support and information. It often relates to a base of reward power. Assertiveness: Uses continuous reminders via an insistent and forceful manner. It is often used with subordinates and relates to a base of legitimate power. 

Higher authority: ‘Uses the chain of command and outside sources of power to influence the target person.’ This can be the threat or promise of involving the influencee’s boss, or invoking that boss’ own priorities. It can also involve an appeal to higher ethical or cultural values within the organization. It may involve recourse to outside ‘experts’, such as consultants, or to the media. A variation, much found in e-government, is to blame the technology or the data, though this may fall under the heading of manipulation. Its strength relies particularly on affiliation power. 

Sanctions: Influence through the promise of reward or threat of punishments. In its negative form, this may encompass all formal disciplinary procedures up to dis- missal. It may encompass informal actions: blame, bad-mouthing, bullying. It may also encompass the removal of rewards (e.g. transfer, demotion). Sanctions often relate to a base of legitimate or coercive power. 

Manipulation: Influence by controlling the framing of discussions, or the claimed rules for discussion, or the information that is allowing into a negotiation. Part of this process will be the manipulation of the public discussions and public relations that set much of the agenda for government. This type of approach may also include undermining others involved. 

Withdrawal: Influence through disengagement or non-compliance. 

Time and again, middle managers in public sector organizations have good ideas for new or redesigned e-government systems. Yet they cannot get those ideas implemented. They blame their bosses, or the IT staff, or politicians, and so on. In many cases, though, they should blame themselves for failing to recognize their own need for better communication, negotiation and, above all, influencing skills. 

Chapter 6

Emerging Management Issues for eGovernment 

Great care must be taken that measures are valid (i.e. that they do measure what they seek to measure), relevant (i.e. that they measure something on which the employee’s actions have an effect) and valuable (i.e. that they measure what is organizationally important about the job). IT staff behavior will be skewed by performance measurement towards the measured components of the job and away from the non-measured. Only careful selection of indicators will ensure that this skewing is beneficial for the organization. 

Performance management in the public sector 

  • offer career development opportunities, or psychic pay: quasi-financial incentives such as paid time off or new equipment. In some surveys, public servants rate these above money as preferred rewards. 
  • Use group incentives since individual rewards can demotivate other team members, whereas group rewards tend to encourage collaboration.  
  • do not punish occasional mistakes, only chronic poor performance. Use progressive discipline but also use training and peer pressure. 

Three main focal points for performance indicators can be applied to the IS/IT function: 

Input- IT Measures

Output- Information Services

Outcome- Business Process

Measurement of Performance 

In most cases the measurement procedure will be clear within the indicator definition. Three main assessment indicators:

  • Internal subjective: The measures are based on the judgment of internal clients, such as customer satisfaction rating scales. 
  • Internal objective: The measures are based on objective quantification within the organization, such as the jobseeker placement measure. 
  • External: The measures are based on quantification from outside the organization. 
  • Price testing: Comparing the internal costs of a service with the estimated cost/price of external providers and benchmarking (which includes a broader set of performance measures) 

Control of Performance 

Provider management control: Managers within the IS/IT service provider are responsible for managerial rewards and remedial measures. 

Client management control: Managers within the IS/IT service client are responsible for managerial rewards and remedial measures. 

Client financial control: Managers within the IS/IT service client are responsible for financial rewards and remedial measures. 

Arbitrary basis: The sum paid does not relate to service use but to some relatively arbitrary measure such as the size of the user department. The lack of linkage creates limited financial control on performance; arguably less than that available via a managed service level agreement. 

Cost basis

Market basis 

The central thrust is that agencies must be good at writing documents and at managing projects. It would thus be possible to score a ‘green’ without producing anything that had actually made life better for citizens and other agency clients. 

The more the government charges for its data, the greater the barriers to access become. Yet the wider it allows access, the less it can earn from data sales. 

Access Policies for Freedom of Information

The enactment of FOI legislation has required the development of in-house policies by public agencies within its purview. Typical issues to be dealt with include (DOI, 2002): 

Terminology: Explicitly defining what is meant by terms such as records and requests; and classification of different types of data held by the agency.

Procedures: Clarifying how citizens/ businesses can obtain data direct without requests; how information requests are to be made; and the means by which those requests will be responded to.

Data management: Ensuring that the type of back-office, records and data manage- ment procedures described elsewhere in this chapter are followed so that data and records can be located in a timely and cost-efficient manner.

Performance measures: Setting out performance indicators (typically time taken) for the FOI response service.

Charges: Determining a reasonable level of charges to be levied for searches and copying; determining policy on any fee waivers; putting a billing and payment system in place.

Handling variations: Determining procedures in the case of various types of data/records such as those not held by the agency; those held by other public agencies; those deemed sensitive or covered by privacy legislation; those held by other non-public agencies.

Appeals: Setting in place an appeals procedure to appeal against problems with performance, charges or denial of access.

Responsibilities: Designating specific officers as responsible for FOI implementation, and for appeals. 

Update: Putting in place a mechanism for review and update of FOI procedures (e.g. in response to new technology, case law, organizational changes, new orders, or FOI response performance and feedback). 

Digital Divide

Because of those costs, there is an uneven profile of those who own and use IT: the rich not the poor; the graduate not the school leaver; the ethnic majority not the ethnic minority; the urban not the rural citizen; the young not the old; men not women. 

Pouring resources into e-government can therefore benefit the haves rather than have nots, and increase polarization within society. There are already some signs of this, with evidence that local government electronic service delivery is of poorer quality in areas with lower levels of Internet access 

Governments may set up initiatives focused on increasing access to IT that is government-or-community-owned IT. Such IT may be placed in a variety of locations: 

  • public spaces, such as common areas within shopping malls; 
  • semi-public spaces, such as libraries or sport facilities; 
  • dedicated spaces, such as community telecentres housing a room-full of Internet- linked PCs. 

The watch- word for government must therefore be ‘supplement’ not ‘supplant’. Provision of public sector data and other services electronically should be seen as an additional weapon in the armory that sits alongside traditional face-to-face and phone-based methods. It should not be seen as a way of replacing those more traditional methods. 

Reviewing Sensitive Public Information

The following questions will assist security professionals in reviewing sensitive infor- mation that has been, or could be, made publicly accessible. 

Has the information been cleared and authorized for public release?

What impact could the information have if it was inadvertently transferred to an
unintended audience?

Does the information provide details concerning enterprise security?

Does the information contain personnel information such as biographical data,
addresses, etc.?

How could someone intent on causing harm misuse the information?

What instructions should be given to legitimate custodians of sensitive information
with regard to disseminating the information to other parties such as contractors?

Could this information be dangerous if it were used in conjunction with other
publicly available information?

Could someone use the information to target personnel, facilities or operations? 

Could the same or similar information be found elsewhere?

Does the information increase the attractiveness of a target? (OCIPEP, 2002)

Policies on Disability

the law sets a clear threshold that must be achieved. However, in practice, e-government managers often seem to be ‘satisficing’ the issue: doing just enough to cover their backs but still leaving a gap between policy and practice.

Difficulties

public managers face a difficult balancing act between the requirements of central legislation and the localized needs of the public agency. These may conflict where, for example, the agency has to make the best of an outdated physical environ- ment, or where lack of money means what is ergonomically-best cannot be afforded. This balancing act can appear in the gap between policy on paper and policy in prac- tice. eGovernment managers may develop an internal policy document that fully meets all legislative requirements, but may then not fully implement the document. 

Chapter 7

Success in e-government comes from intelligent selection of individual techniques, from
‘hybrid thinking’, and from action on design–reality gaps rather than from slavish adherence to one particular methodology.

Background understanding of a proposed e-government project comes from asking five
questions: Who is involved? What is the problem? Why is the project happening? What
constraints exist? What will change in the near future?

eGovernment projects can be assessed in relation to their feasibility, priority, opportunity costs, and impact.

Four Core Stages:

1. analysis of what is currently happening, and of whether and why a new e-government system is needed
2. design of the new e-government system’s components
3. construction of the new e-government system

4. implementation of the new e-government system 

Successfully planned e-government systems will therefore be those that require a manageable degree of change. 

In order to assess this ‘degree of change’, the core of the systems development method described here will therefore consist of three activities: 

  1. mapping out the realities of the current situation
  2. designing a proposal for the new situation
  3. assessing the difference between the two, and reacting to that difference 

Systems Development Life Cycle

1. Project assessment: Identifying possible e-government projects; outlining basic project parameters; and assessing whether or not to proceed with the project. 

2. Analysis of current reality: Description and analysis of the seven ITPOSMO dimensions as they exist within the current situation of the organization. 

3. Design of the proposed new situation: Setting objectives for the proposed new e-government system, and then describing in general terms how the seven ITPOSMO dimensions should be different for the new system to meet these objectives. Different options for the new system may be evaluated at this point. 

4. System construction: Acquiring any new technology; undertaking detailed design of the new system; then building it, testing it and documenting it. 

5. Implementation and beyond: Training users to use the new system; converting data to new formats; introducing the new system; monitoring and evaluating its performance and context; then undertaking any necessary system maintenance. 

SSADM: Structured Systems Analysis and Design Methodology, 

No method is perfect but there are dangers for the public sector in adopting some of the harder methods. The public sector has had a tendency to choose such methods which then prove too old, inflexible, top-down, detailed, jargonized and time-consuming (Korac-Boisvert and Kouzmin, 1995). While these might have been appropriate to the routine clerical automations of the 1960s, they work poorly in politicized situations of change and uncertainty. 

 

Review of A World Come of Age: An Intellectual History of Liberation Theology

“Under Crushing Opposition, Love Requires Revolutionary Action”
Father Camilo Torres

Having recently read Padre Guatalupe’s autobiography, my interest was piqued in learning more about the particulars of liberation theology. This curiosity was amplified as I am now attending a Catholic University with a Bolivarian mission in Medellin – the location of conference of bishops in 1968 that would result in the drafting of a number of significant statements that would justify numerous Catholic initiative of a liberationist theme throughout Latin America. As such, I was happy to learn of the recent publication of A World Come of Age: An Intellectual History of Liberation Theology by Lillian Calles Barger. This book, along with conversations with my fellow students and a group of seminarians that I’ve befriended, have greatly helped me to comprehend the Catholic culture in which I now live.

Barger divides her book into four sections: Origins elaborates the social, political and economic factors which lead to the conditions within ecumenical circles that caused people to elaborate novel interpretations of Christian religious doctrines. Reconstructions provides an intellectual history of the philosophical currents that fed into the new method of Biblical exegesis. Elaborations provides deeper analysis of the particularities of the various liberation theology strands and provides a historical accounting of the interactions between those propounding such doctrines and the communities from which they emerged. Reverberations illustrates that while Liberation Theology as an intellectual current within the Christianity may have seen its adherents decline in numbers, nevertheless a variety of the novel perspectives that it sought to disseminate about how to interpret the world have been adopted within various religious and social justice movements. Liberation Theology, it can be rightly said, still speaks to a social, political and environmental concerns that have emerged as a result of various changed that have profoundly impacted the human world.

For those writing within this strain, the true theological task is “orthopraxis” which is “an encounter with the world, rather than tradition or revelation…” Instead of engaging just with a text disconnected from the concerns of the here and now, promising only salvation in the afterlife, Liberation Theology is concerned with bringing the divine order to earth. In Barges’ words: “Fundamentally, the idea of liberation was of a communal process rather than based on the individual, for only in solidarity with others was freedom possible. Awakening the political potential of solidarity among oppressed people called for the advocacy of the committed placing themselves at the nexus of prophetic denunciation and revolutionary change.” Biblical and sociological analysis identified the oppressed with the campesinos of Latin America – fighting the inheritors of colonial titles; with the African-American’s in the United States – fighting the descendants of slave-holders; with women across the world – still under the yoke of a sexist, misogynistic patriarchy.

James Cone’s influence is still profound within the African-American church.

The variances in how the church is viewed; what the goal of liberation is; and how to get there; how this changes given different world-historical shifts and more by different social groups – blacks, whites, Latins, men and women – is masterfully handled by Barger. By delving into the biographical details about the authors of those in this new cannon, historicizing and then unpacking the arguments in their writing one can almost feel as if a part of the intellectual debates that were motivating their religious/academic work. Barger provides a veritable lexicon for concepts that evolve due to new technological and social changes and how despite the fact that Protestants in North America and the Catholics in South America came from very distinct intellectual and historical backgrounds, they still came to similar conclusions about what it means to be a True Christian in a sinful world.

This is especially well done in the chapter entitled Vitalism of Religion. Here Barger depicts how a number of Enlightenment related arguments were related to religion, and later how the prophetic writings of Marx were adapted to a modern understanding of the bible.Towards this end a virtual pantheon of social theorists are described – from Jean-Jacques Rousseau, Ludwig Fuererbach, G.W.F. Hegel, Jose Mariategui, Georges Sorel, W.E.B. Du Bois, William James, and more – and their evidence within various key Liberation Theology texts are describe. Starting with their respective views related to religion, she shows how they are pieced together to form a unique Christian Socialist identity. More than just this, Barges shows their impact in the brief blossoming of a number of schools and political movements. From this and analysis in subsequent sections we see how “Marxist thought provided Latin American liberationists with a significant framework for analyzing inequality and responding to the charges against religion. The goal of social justice based on a structural understanding of society, rather than individual choice, appeared congruent with the prophetic tradition and served as an opening for Marxist-Christian dialogue throughout the twentieth century” (108).

Barges intellectual history also tells the often tragic stories of those that sought to operationalize this conception of Christian solidarity. In the section entitled A Salvic Social Order, chapter we learn the story of Richard Shaull – a missionary like Padre Guadalupe that came to help and then became so disillusioned with the church that he started advocating revolution. Him, like Padre Guadalupe and others such as the now sainted Oscar Romero, often met tragic ends due to the incredibly politically polarized atmosphere of the Cold War. During this time addressing the sins of empire and the sufferings of people was seen as subversive, giving shelter to the enemy of Soviet Power. With the Social Gospel viewed as an ideology aligned with the interests of a predatory foreign power, it’s little wonder that those with a more personalistic view of salvation – the traditional religious establishment – were wary of those that sought to “recover Eden” through a scientific socio-economic practice wedded with a theology of collective, social liberation. The point of division for those who sought to create Utopia versus those that were conservative and sought to maintain relations as is was their understanding of what the implications and duties connected to humanity Original Sin.

Sergio Torres’ writing presented a dialogue between Christianity and Marxism.

As Barger brings the book to a close she shows how that while there were clergy-members in the field involved with pastoral work with a Liberation Theologist orientation, a main failing of the movement was its inability to produce and thus enact specific policy applications. The 1970 conference in Detroit that included black, Latin American and women leaders is depicted in almost tragic proportion. After highlighting how this became a moment for qualitatively altering the level of collaboration and cooperation that this transnational group of religious community organizers, activists and intellectuals – they are shown instead engage in what was, essentially, and intellectual pissing contest. Rather than building a collective platform by which their struggles could synergize their efforts for liberation, they instead devolved to arguing over who faced institutional repression worse and broke.

For all of its political aspirations, the Liberation Theology movement never formed the same sort of sustainable political institutions that those within the Christian Democratic tradition were able to. This is so because of the numerous inherent limits within Liberation Theology as an eclectic philosophy.

Pope John Paul II scolding Nicaraguan liberation theologist Ernesto Cardenal.

The thinkers associated with it may have been able to inspire debate, but nothing much stuck beyond that – proposing no singular national or international program for change that could be acted up with effectiveness, founding no institution and establishing no school. Thus while Liberation Theologians never attained the key features of a recognized movement, the sensibility related to the core tenants it put forward as necessary to positively change the world continues to inspire multiple social movements and political initiatives throughout the world.

 

Potential Book Titles on Venezuela’s Intelligence Operations in America

Since I’ve decided to expand the research I’ve been building into a book, I decided to do a creative exercise as to possible titles for it. Which of the below resonates with you the most?  

*

The New Historic Block: How Hugo Chavez Used Oil Exports to Promote His Vision of Marx

Tracing 21st Century Socialism: A Political Revolution in Venezuela Meets an Epistemological Revolution via Data Science

Building The New Historic Block: How Hugo Chavez Exported Socialism to America

Marketing Marx in North America: Venezuela’s Gramscian Plan to Spread Socialism

Kultural Marxism and 21st Century Socialism’s Trajectory from Venezuela to North America

Marching South to North: How Hugo Chavez’s Specter Came to Haunt the United States  

Children of the Bolivarian Revolution: Venezuela’s PSUV and the Birth of America’s First United Socialist Party  

Towards a Multipolar World Order: How Hugo Chavez’s Multitude of Gramsican Agents Tried to Remake the World

Chavez’s Hopes and Gramsci’s Ghost: The PSUV’s Support of Socialism in America

Officer, Agent, Asset, Stooge: How Venezuela Helped Seed Revolutionary Socialism in the United States

Red Scare 3.0: The Definitive Guide as to the Who, What, Where and Why’s of Venezuela’s Attempted Socialist Infiltration of U.S. Institutions

Poets as Legislators of a New World Order: Anti-Globalization Activism, Solidarity and Why Technics Trumps Specious Ideologies

Ariel Sheen and the TeleSur Archive: How a Determined Activist for Truth Uncovered a Long-Running Violent Anti-Government Activist Network

Precursors to Transatlantic War? How CivOp and MilOp Intersect in Foreign Military Policy

How Guiado’s Superior to Gramsci: Why Pre-Information Age Radicals Add Little to Modern Politics

Illegalism as Pathology: A Longitudal, Iconographic and Textual Based Investigation Into A Foreign Communist Party’s Radicalization Efforts

PSUA: The Story of the Birth of the United Socialist Party of America

Inhibiting Agents of Multi-Polarity: How Political Cadres Funded By Russia and Venezuela Led to Legislation that Finally Addresses New Information and Communication Technologies

Venezuela’s Investments Into American Art and Culture: A Longitudinal Analysis of Systematic Negation of the American State 

Building A Dual Power From Venezuela’s Chosen People: Foreign Artists, autistics, transexuals, and political  Actors Interactions with American Law Enforcement

The Great Recategorization: How Evidence, Data Science and Rubrics Lead to an Algorithmic Shift in an Understanding of How Political Discourse Operates on Facebook

“Why having a Star by your Name on Social Media in the Colors of the Bolivarian Republic of Venezuela is not the same as the one people were forced to wear in the 1940s, you hack!” and 19 Other Disdainful Phrases of Advice for Kultural Marxism Content Creator.

Tales from TeleSUR: An Open-Source Historical Investigation Into The Roots of Phenomenon of Kultural Marxism

Thinking like the CIA: A Case Study Examining Venezuela’s Intelligence Operations in America

Categorical Faces on Names and Places: A Case Study on the Possibilities Inherent in Modern Data

Project-Mapping After Public Data Source Grabbing: Why the FBI’s Investigation into American Political Group’s Funding by Venezuela is Valid and Should Start Again in Earnest

Why Later Historians Will Say Chelsea and Julian Sitting in a Jail Was “Just The Start”: How Venezuela Sought Revancha on America it’s Trans-Atlantic Allies and Lost

Findings of the Investigation Into Whether of Not Venezuela Had A Measurable Impact On America’s 2016 Elections: An Open-Source Research Project That Makes RussiaGate Seem Cute and Quaint