Translation of Methodology of Technology Surveillance in the Universities and Research Centers

The Methodology of Technology Surveillance in Universities and Research Centers 

Abstract 

The technological surveillance is very important at the present time in the development and success of the processes of R&D. It is an organized, selective and permanent process, of capturing information of the exterior and of the own organization it has more than enough science and technology, to select it, to analyze it, to diffuse it and to communicate it, to transform it into knowledge for a better one taking of decisions. The existent methodologies of technological surveillance are characterized, intending a methodology for their application in one university of technical sciences, supported in a technological observatory. It is supplemented with the application of tools of discovery of knowledge based on patents for a research center. The technological surveillance in the Polytechnic Superior Institute of the Havana (CUJAE) with their technological observatory it has allowed to identify strategic programs of investigation, tendencies in the teachings of engineering and architecture, lead in technical and thematic sciences of investigation published in the Web of Science. Additionally maps of knowledge are obtained based on patents applied in the National Center for Scientific Research (CNIC). The implementation of the technological surveillance, their continuous improvement with new tools and their use for the own investigators, favorable the development and increment of programs and strategic lines of investigation (R&D) guided to a pertinent innovation in the engineering and architecture, allowing to identify the evolution in the technological development, what prepares to the university and the investigation centers for the changes in the environment with a strategic focus. 

Keywords: technological surveillance; technological observatory; programs strategic of R&D; map of knowledge of patents. 

INTRODUCTION

Technological surveillance is very important for the success of the R + D + i1 processes. It is defined as “the organized, selective and permanent process of capturing information from outside and of the organization about science and technology, selecting it, analyzing it, disseminating it and communicating it, in order to convert it into knowledge to make decisions with less risk and be able to anticipate changes “2.

The observation and analysis of the scientific and technological environment and of the present and future economic impacts for strategic decision making are part of the technological surveillance3. In the management of technological innovation4, surveillance is part of its processes, together with human resources, collaboration, project management, quality and its indicators. In the literature, different terms have also been adopted that are closely related, such as technological surveillance5,6, technological intelligence7,8,9,10, technological forecasting11,12,13 and technological evaluation11,14. In this article reference will be made to technological surveillance although other meanings are present.

The adequate identification of the source of information is vital for technological surveillance15,16, with web pages increasingly being used, which include patent databases, scientific journals and university portals. The analysis of this information allows to make better decisions and anticipate the systematic changes of the environment17. As a trend, tools appear on the basis of Information Technology and Communications Technologies (ICTs), which is why we talk more about technological intelligence. Several systems are referred to for technological surveillance with the support of ICT, such as those based on methods such as TRIZ, an acronym in Russian for the theory of solving inventive problems, such as CAI (Computer Aided Innovation), for the generation of new concepts , based on scientific and technical knowledge (patent databases, scientific and technical encyclopedias) that analyze emerging technologies for technological forecasting and others are those that are parameterized, according to areas of interest on web pages, generating automatic alerts when detecting a change in one of the indicated web pages, which include Internet search bots, crawlers, spiders or spiders18.

The objective of the article is to characterize some methodologies of technological surveillance with their processes that allow to identify and apply a methodological proposal of technological surveillance in a university of technical sciences, supported by a technological observatory. It shows the use of technological mining to detect technological opportunities in publications and the use of knowledge maps based on patents for a research center.

MATERIALS AND METHODS

As part of the materials and methods, a set of steps is shown to approach the methodological proposal for university and research centers with the identification of the processes and the application of technological surveillance tools (VT).

1. Characterization of existing technological monitoring methodologies in terms of processes and authors that use and disseminate it.

2. Creation of the technological observatory for the university environment.

3. Design, application and analysis of results of guides for technological surveillance according to the source of information and the objective of the university center or

investigation.

Several VT methodologies reported in the literature were analyzed in terms of processes used, shown in Table 1, where FCV means critical surveillance factors.

Morcillo, 200315 Mignogna, 199719 Sánchez et al, 200220 León et al, 200621 Savioz, 20048
Problem and objectives Planning and hypothesis Planning / Identification of needs, FCV Situation or problem, broken down pastedGraphic.png
Sources of Information Internal-external compilation Search and Catch / observe, discover, search, detect, collect, capture Type and source of Information Formulation of information needs
Search for information Search / Information gathering Collection of Information
Analysis of Information Evaluación – Validación 

pastedGraphic_1.png

Analysis and organization / Analyze, Treat and Store Analysis of the information Analysis of the information
Validation of Information Validation and adjustments
Intelligence report Intelligence / added value, influence strategy
Organizational  flows of  internal information, Diffusion Dissemination Communication: to managers, disseminate information, transfer knowledge Diffusion of the Information Dissemination of the Information
Decision making Decision making Decision making/ Strategies Application of the Information
(Porter, et al; 20055; 20079; 20096) Nossella A-, et al, 200822 Vázquez, L. 200923 Norma Francesa de Vigilancia, AFNOR,199824 Norma Española AENOR2
Definition of FCV Identification of resource information Definition of VT plan Identification of critical competitive and technological factors and problems Understanding of request and context. Definition / redefinition of surveillance and purpose axes Identification areas / objectives VT system, availability resources / information, Problem definition
Search and Capture Collection of Data Identification and selection of sources of relevant information. Looking for information Determination of types of information, identification / selection of information sources Identification of Sources 
Collection and selection of information Search
Treatment and Analysis Analysis of data Analysis of Information. Analysis of Results Analysis and Organization Analysis and Organization
Validation and Exploitation Organization / Purpose / implementation Competitive Intelligence Validation and adjustment / Synthesis and perspective Validation of the Information
Diffusion of information Distribution of the Results  Communication of the Results Preparation of a report

Tabla 1. Processes described in technological surveillance methodologies

The methodologies present as the most common processes the search and analysis of information. The other processes vary depending on the scope and purpose of the surveillance and the dissemination that is carried out on the results of the same, including the users, as well as the decision-making process. It is appreciated that the technological surveillance “can be understood as a process, providing information about the technology (intelligence), the prediction of the directions that technological change will take (forecast) or the evaluation and exploration potential of the technologies that an entity must adopt (evaluation) The implementation of an organized system of technological surveillance requires multidisciplinary and horizontal approaches and requires its adaptation to the company’s environment and culture, and must be integrated into its usual procedures25.

TECHNOLOGICAL OBSERVATORY OF THE UNIVERSITY CENTER OF TECHNICAL SCIENCES

The Web can be seen as a wide and searchable virtual library26,21, which is no longer an object of study, only of librarianship or documentation professionals, to become an essential component for research27,28,29,30, even with the application of methods such as Data Envelopment Analysis (DEA) for the evaluation of the efficiency of research groups based on information from the Andalusian Scientific Information System (SICA) 31 or in support of Science and Technology Systems from the use of studies on the information of publications and patents32. All this information on the web has led to the creation of technological observatories.

A Technological Observatory (OT) allows to manage the knowledge of organizations through the monitoring of the scientific and technological environment, to generate new knowledge. It allows to establish links with other organizations to share and receive information. It must be supported on a virtual platform that allows quick access to it and is aimed at the delivery of products or services resulting from the Technological Surveillance process. OT is known as a way to enhance the ability to detect changes and technological advances, with its degree of maturity and market opportunities. It employs techniques of technological surveillance33.

At the “José Antonio Echeverría” Higher Polytechnic Institute (CUJAE), the creation of the Technological Observatory in December 2006 was promoted in support of strategic planning. The OT portal of the CUJAE was designed using free software, with PHP programming language, with MySQL database manager, based on Joomla content management system (CMS) as Web applications to create and administer sites. contents quickly and easily. Among the most important objectives of the OT of the

CUJAE meet: search, analysis and dissemination about teaching, publications and research in technical universities, the monitoring and publication of bulletins related to strategic research lines, the dissemination of personalized databases and the support of strategic decision making in these areas.

EXPERIMENTATION OF TECHNOLOGICAL SURVEILLANCE IN THE CUJAE

The experimentation on technological surveillance in the CUJAE has been carried out since 2007 to the present. Some of the surveillance studies refer to:

• Analysis of international engineering and architecture trends in the top 200 universities in the ranking34.

• The identification of pure and integrated research topics in engineering and architecture.

• The identification of trends in curricula and models of educational management in the world, in particular for engineering and architecture.

• The identification of the strategic research programs of the CUJAE, among which are Information and Communication Technologies (ICT), Environment, Life Sciences and Nanotechnologies.

• The evaluation of innovation indicators of Ibero-American and European countries35. An OT analysis in 2008 with 117 universities from the world’s top 50036 regarding alignment to strategic research programs yields interesting data such as those shown in Figure 1.

Figure 2 shows another analysis performed on the presence of research in Computer Engineering with 71.4% and Chemistry with 37.1% in the first 63 universities in the world ranking, according to the country of the university of origin.

Figure 2. Representation of research in computer engineering and chemistry in the 63 first universities in the world

As an example, table 2 shows some of the research topics found in the first 63 universities in Computer Engineering.

Career Pure Theme Temática integrada
Informatic Engineering Science, engineering, computer design and strategy, software engineering, algorithms, programming languages, database management, data mining, machine learning, systems and computational architecture, information web systems, computer security, cryptography, parallel processing , distributed laboratory for digital libraries, interface analysis, integrated and operational systems, optimization systems, multimedia learning, high performance computing Computational biology, biocybernetics, bioinformatics, genome and computational neuroscience, learning systems, computational mathematics, robotics, control systems, compilers, advanced digital applications, analog-digital integrated circuits, computational dynamics of fluids, wireless systems, communications and networks wireless, computer networks, mobile computing and distributed systems, computational geology, computational dynamics, network control, digital signal processing and conduction, digital art, computer man interaction

Table 2. Some topics of pure and integrated research in Computer Engineering in the first 63 universities

ANALYSIS OF OPPORTUNITIES OF PUBLICATION AND PATENTS IN UNIVERSITY AND RESEARCH CENTERS

The extraction of publication opportunities for mainstream journals, which make available abstracts, authors, years of publication, name of the journal, using techniques of mining technology5 is an application that has begun to be carried out in the CUJAE in 2010. If a concept has decreased over time, it could suggest that it has reached its limit of development and vice versa, which would generate an opportunity for publication. In turn, we can obtain the concept in which we are working with the authors that publish the most, establish contacts with them, know the impact of the citations in the research37 or even define the R & D lines for which we have good own resources38.

The sources of external information that the observatory currently has are the publications and patent databases fundamentally. Many of these databases provide RSS content syndication channels (“Rich Site Summary” or “Really Simple Syndication”) through which you can obtain the information contained in them. They are files in XML format that contain the last elements published by a Web site in a certain subject. Publications are obtained through the ScienceDirect RSS feeds that give free access to the title, the abstract, the authors, the year of publication, the journal, the volume and the number of articles it contains. The patent channels provide metadata such as the title of the patent, the inventor, the year of publication, a summary or description of the invention and the entity where the invention is applied and the scientific news channels allow obtaining the title of the news, the author, the date and a summary. The information provided by these RSS channels are retrieved in a MySQL repository in tables to store the different types of information sources.

A first experimental approach was obtained with all the articles of the Information Systems magazine from 2005 to date, recovering a total of 220 records. Thus, the keywords are obtained from the summary of the article, to which technological mining techniques will be applied. The next minable view that has the fields of title, first author, second author, year and five words is shown in table 3.

Through this information of the minable view, it can be obtained in an initial analysis with visualization techniques: What are the most approached topics ?, What are the leading researchers in a research area ?, What are the trends in the investigation?. In this way, research opportunities are obtained for the university environment. The implementation of this guide for the identification of technological opportunities will be generalized to other impact journals and other sources of information. It is also planned to establish a database with the internal information of the researches carried out, which allows to characterize the internal strengths in terms of scientific research and to be able to focus on journals where the strengths are directly taxed. YALE RapidMiner software will be used, being one of the most used worldwide in techmining, with a very friendly graphic interface.

Other applications of knowledge discovery have been carried out with the use of the Automated System for Patent Surveillance (SiVigPat) 39, such as the study of the development of international patents (United States, Canada and Japan) related to corrosion and the protection40. Thus it was known that the largest number of patent applications are related to chemical additives with a tendency to increase the number of patents in electrochemical protection methods and monitoring from the year 1984. Figure 2 shows the result of the analysis in the fields of selected applications.

CONCLUSIONS

In universities and research centers, it is necessary to implement a technology surveillance methodology that involves as many actors as possible and the use of tools for capturing, analyzing, processing and disseminating information, as well as control indicators for this process and of the strategic research programs themselves.

The Technological Observatory at CUJAE has fostered the development of strategic research programs and lines in the environment of engineering and architecture, allowing the identification of evolution in technological development, which in turn prepares the university for changes in the environment with a strategic focus.

The channels or RSS technology becomes very efficient for obtaining external information (specifically from Science Direct), for technological surveillance in the university environment, together with the technological mining process, favoring clustering, the identification of publishing opportunities and the technological trends.

The use of tools supported in ICT for technological surveillance allows the discovery of useful and relevant knowledge in support of strategies, development and decision making in R + D + i, which was demonstrated with the use of algorithms for the detection of opportunities for publication in the university environment and the use of the SiVigPat by the CNIC for the discovery of patent knowledge, exemplified for patents related to corrosion and protection.

REFERENCIAS BIBLIOGRÁFICAS 

  1. Escorsa, P.; Maspons, R. (2001) De la vigilancia tecnológica a la inteligencia competitiva. Prentice Hall, Madrid. 
  2. UNE 166000 EX (2002). Gestión de la I+D+I: Terminología y definiciones de las actividades de I+D+I. Norma española experimental. AENOR, Madrid, abril. 
  3. Jakobiak, F. (1992). Exemples commentes de veille. Technologique, Les éditions d ́organisation. Paris.
  4. COTEC. (2004) Papel de las administraciones en la gestión empresarial de la innovación. Colección de innovación práctica. Perspectivas de futuro. Fundación COTEC para la Innovación tecnológica, Madrid. julio. 
  5. Porter, A. L. and S. W. Cunningham (2005). Tech mining. Exploiting New Technologies for Competitive Advantage. New Jersey, Wiley-Interscience. 
  6. Porter, A. L. (2009). Tech mining for future oriented technology analysis. Text Mining. A. U. M. Project. 
  7. Lichtenthaler, E. (2003). Third generation management of technology intelligence processes. R and D Management 33(4): 361-375. 
  8. Savioz, P. (2004). Technology Intelligence. Concept Design and Implementation in Technology-based SMEs. Zurich. 
  9. Watts, R. J. and A. L. Porter (2007). Mining Conference Proceedings for Corporate Technology Knowledge Management. International Journal of Innovation and Technology Management 4(2): 103-119. 
  10. Yoon, B. (2008). On the development of a technology intelligence tool for identifying technology opportunity. Expert Systems with Applications 35(2008): 11.

11.Garud, R. and D. Ahlstrom (1997). Technology assessment: a socio-cognitive perspective. Journal of Engineering and Technology Management 14(1997): 23. 

12.Anderson, T. R., T. U. Daim, et al. (2008). Technology forecasting for wireless communication. Technovation 28(9): 602-614. 

13. Zenobia, B., C. Weber, et al. (2009). Artificial markets: A review and assessment of a new venue for innovation research. Technovation 29(5): 338-350. 

14.Jolly, D. R. (2008). Chinese vs. European views regarding technology assessment: Convergent or divergent? Technovation 28(12): 818-830. 

15. Morcillo, P. (2003) Vigilancia e inteligencia competitiva: fundamentos e implicaciones. 

Revista de Investigación en Gestión de la Innovación y Tecnología. VIGILANCIA TECNOLÓGICA. Número 17, junio – julio 2003.

16.Giménez T, E., A Román (2001). Vigilancia tecnológica e inteligencia competitiva: conceptos, profesionales, servicios y fuentes de información. El profesional de la información 10 (5): 10.

17. Medina J y E Ortegón. (2006) Manual de prospectiva y decisión estratégica: bases teóricas e instrumentos para América Latina y el Caribe. Instituto Latinoamericano y del Caribe de Planificación Económica y Social y CEPAL Naciones Unidas. septiembre, Santiago de Chile. 

  1. Mir, M y M. Casadesús (2008). UNE 166002:2006: Estandarizar y sistematizar la I+D+i. La norma y la importancia de las TIC en su implementación. Revista Investigación y Desarrollo. DYNA Septiembre, Vol. 83, no 6: 325-331. 
  2. Mignogna R. P, (1997).Competitive Intelligence. http://www.chewy.gatech.edu/t2s/index/ html.
  3. Sánchez, J. Marcela y Palop, F (2002), Herramientas de Software para la práctica de la Inteligencia Competitiva en la empresa. Ed. Triz XXI. Madrid. 

21. León, A., Castellanos, O. y Vargas, F. (2006). Valoración, selección y pertinencia de herramientas de software utilizadas en vigilancia tecnológica. Revista de Ingeniería e investigación. DYNA 26(1): 92-102. 

22.Nosella Anna, Giorgio Petroni, Rossella Salandra (2008). Technological change and technology monitoring process: Evidence from four Italian case studies, Journal Engineering. Technology Management. 25 (4) 321–337 

23. Vázquez Rey, L. (2009). Informe APEI sobre vigilancia tecnológica. Informe APEI 4. APEI. Gijón, España: 64. 

  1. AFNOR, XPX50-053 (1998). Servicios de Vigilancia y Servicios de establecimiento de un Sistema de Vigilancia. Norma francesa experimental, abril,
  2. Palop, F.; Vicente, J. M. (1999) Vigilancia tecnológica e Inteligencia competitiva. Su potencial para la empresa española. Serie Estudios Cotec. Número 15. Fundación COTEC. Madrid.
  3. Yao, J. T. and Y. Y. Yao (2003). Web-based Information Retrieval Support System: building research tools for scientists in the new information age. Proceedings of the IEEE/WIC International Conference on Web Intelligence. Marzo.
  1. Cook, D. (2000). Collaboration to teach the critical thinking skills needed to become a successful Internet searcher: The planning of a WWW search engine workshop. Research Strategies 17(2-3): 195-199.
  2. O’Hanlon, N. (2002). Net knowledge: Performance of new college students on an Internet skills proficiency test. The Internet and Higher Education 5(1): 55-66. 
  3. Van Deursen, A. J. A. M. and J. A. G. M. van Dijk (2009). Using the Internet: Skill related problems in users’ online behavior. Interacting with Computers. 21(5-6): 393-402.

30.Vasileiadou, E. and R. Vliegenthart (2009). Research productivity in the era of the internet revisited. Research Policy 38(8): 1260-1268. 

31. Pino JL, Francisco C, Mercedes D, Rosario B (2010). Evaluación de la eficiencia de grupos de investigación mediante análisis envolvente de datos (DEA), El profesional de la información, v. 19, N.2, marzo-abril. 

32.Moed H, W Glänzelg, U Schmoch. (2005). Handbook of Quantitative Science and Technology Research. The use of publication and patent statistics studies on S&T Systems. Springer Science Business Media. 

33. Legite (2003). El Observatorio Tecnológico del sector Textil. Seminario, Dinamización. 23 de septiembre de 2003. Disponible en: http://www.itcl.es/ificheros. Fecha de consulta: 8 de enero de 2008. 

34.http://universidades.universia.es (2006). Ranking de universidades del mundo. Consultado el 18/04/06. 

35.Delgado Mercedes, JL Pino, Solís F, Barea R (2008). Evaluación integrada de la innovación, la tecnología y las competencias en la empresa. Revista de I+D+i, mi+d. Número 47, junio, España. 

36.Delgado M, Yoel A, Marta I, Antonio D, Beatriz G, Olga I, (2009). Observatorio tecnológico en el entorno universitario e investigativo. XIII Seminario de Gestión tecnológica de la Asociación Latino Iberomericano de gestión tecnológica. Innovación y creatividad para el desarrollo sostenible. ALTEC 2009. 25-27 Noviembre, Cartagena de Indias, Colombia. 

37. Ajiferuke Isola, Dietmar Wolfram (2009). Citer analysis as a measure of research impact: library and information science as a case study. Scientometrics, Springer, DOI 10.1007/s11192-009-0127-6, 

38.Muñoz J, M Martínez, J Vallejo (2006). La vigilancia tecnológica en la gestión de proyectos de I+D+i: recursos y herramientas. El profesional de la información. v. 15, n. 6, noviembre-diciembre. 

39. García B, F. Corvo (2007). Patent information in concrete corrosion research. Revista CENIC Ciencias Químicas, Vol 38, No 3, 410-414. 

40. García, B., Zayas, D. (2002) Manual de Usuarios del Sistema Automatizado de Vigilancia de Patentes, SiVigPat®, v. 3.0. CNIC. 

Translation of Technological Surveillance As A Tool For Information Management: A Literature Review

Technological Surveillance As A Tool For Information Management: A Literature Review

IEEE LATIN AMERICA TRANSACTIONS, VOL. 13, NO. 10, OCTOBER 2015 

L. Back, Universidade Tecnológica Federal do Paraná (UTFPR), Ponta Grossa, Paraná, Brasil, luaniback@hotmail.com 

J. L. Kovaleski, Universidade Tecnológica Federal do Paraná (UTFPR), Ponta Grossa, Paraná, Brasil, kovaleski@utfpr.edu.br 

P. P. Andrade Junior, Universidade Federal de Santa Catarina (UFSC), Ponta Grossa, Paraná, Brasil, pp.andrade@ufsc.br 

I. INTRODUCTION

In order to keep up with the rapid technological development, it is essential that organizations seek strategic partnerships to deal with information management.

In this sense, for this process to occur it is indispensable to identify possibilities and assimilate knowledge of all technological information related to the field of work, since knowledge and articulated information are one of the main means for individuals and organizations to make innovations, becoming or remaining competitive [1], [2], [3]. Among other utilities, the knowledge of the technologies present in the market allows knowing where and from whom to acquire them, in addition to their competencies [4].

In this sense, an alternative to soften the obstacles of the market is to make the organizations follow the technological advance through the dissemination of the technologies, information and means of communication [5]. However, managing information and transforming it into knowledge is a complex activity for organizations. One of the main problems concerns the excess of information, which comprises useless information with no added value and strategic for the organization for decision making. Managing information efficiently can minimize the problems related to excessive information, which makes it difficult and time-consuming to select and acquire relevant knowledge, as well as problems due to the absence of information that can lead to delays and out of date before the market.

The management of scientific and technological information may occur through the technological surveillance of the environment, since this process emphasizes the planning, direction, control and coordination of the development and implementation of information system. Thus, through the identification of events that signify potential opportunities or threats, it is possible to understand technological changes and anticipate them, obtaining competitive and comparative advantages [6]. In this sense, the adequate use of knowledge allows users, who understand the managers of the organizations, to increase their resources and productivity, how to reduce their costs in a substantial way and at the same time allow them to strategically differentiate themselves in the market.

Due to the scarce exploration of the subject of technological surveillance by systematized studies and its importance for the academic and organizational environment, it was decided to build a bibliographic portfolio in order to base and direct future studies. Given this context, this work aims to build a theoretical framework on technological surveillance, identifying its application and benefits generated by its use. In order to reach this goal, it will be necessary to select a relevant bibliographic portfolio on technology surveillance and analyze it, in order to contribute to the scientific advance of the subject and to assist the organizations in the management of their information.

II. METHODOLOGICAL PROCEDURES

This research is defined as descriptive, because it aims to identify a portfolio of articles on the topic of technological surveillance and shed light on its scope and research opportunities. The study is subdivided into three phases, namely: database selection; selection of articles; and analysis of articles.

In order to retain the maximum knowledge on the topic of technological surveillance, a systematic search was made in the literature. The research was conducted in the following databases: Web of Science, Scopus, Science Direct, IEEE Xplore, Scielo and Scholar, because they have relevant indexed journals and are multidisciplinary. The Web of Science database appends most of the most relevant journals published in the world [8].

Key words in Portuguese, English and Spanish were used to search the articles: technological monitoring, technological surveillance, technological surveillance, technological monitoring, technological watch, technological surveillance.

For the screening of articles found the title, keywords and abstract were evaluated, excluding the articles that were in disagreement with the researched topic. When the items evaluated did not contain all the required information, the articles were read completely to decide on their inclusion. The exclusion criterion used included the use of the word technology surveillance for security environment monitoring technologies. The period of analysis of the publications was not defined due to the scarcity of material.

The articles found were exported using the EndNote tool. The EndNote software is a bibliographic reference manager that facilitates the research work and allows the collection of bibliographic references of online databases, importing the metadata and grouping them, forming a virtual library [9]. From this tool it was possible to save the selected articles and filter them according to the criterion of duplicity.

The relevant scientific articles were analyzed through full reading and served as the basis for the construction of literature review.

III. TECHNOLOGICAL SURVEILLANCE

The advance of the market has driven the technological development, a factor that also results from the economic competitiveness, essential for the organizations that wish to remain in the world market in which survive the strongest competitors [10], [11], [12], [13]. Today, the main engine of growth is knowledge, and to stop it, it is necessary to follow the technological advance that happens at high speed and consequently generates a great amount of information [14], [15].

In order to develop a diversified technological portfolio and remain competitive in the market, it is necessary to construct complex competences, involving various tasks such as searching for promising new technologies, by identifying the evolution of technological factors, observing, analyzing and processing information through technological surveillance [ 16], [17], [18], [19], [20]. This practice, based on scientific and technological studies, allows us to base production processes on the intensive incorporation of knowledge, mainly involving information from articles and patents, in the development of new products and processes [13].

The process of technological surveillance focuses on the innovative behavior, products, processes and technologies of its competitors and / or employees. As well as in evaluating new technologies and their possible impacts on their organization [10], [21]. It is a selective informational / documentary process that gathers and organizes information and documents from a specific area and addressed a specific group of users or a set of users whose interests are related, but different [22]. Can be interpreted as an intelligence methodology technology, or as forecasting technology and even as a technology assessment [23].

Technological surveillance is a systematic and organized effort to observe, train, analyze, accurately disseminate and retrieve information about the achievements in the company’s economic, technological, social and commercial environment that are relevant to the organization in the sense of opportunity or threat this. To this end, surveillance should include the merging of high-level information, communications, collaborative environment, information security and data repository, to provide the necessary capacity for the domain of information, to obtain knowledge and the essential elements for decision-making [24], [25], [26], [22], [27], [10], [21].

This search for information takes place through patent documents, publications, and investigations to know structures, strategies and the importance of specific technologies, as well as the life cycle of a specific technology, using specific tools and techniques. The results should be a tool for knowledge that promotes useful and up-to-date information on different technologies, changes in products, regulations, leadership, research developments and new patents. This information should support decision making, anticipating changes in the environment in which they are inserted and minimizing risks [24], [27], [28].

To carry out coordinated actions for the search, treatment and distribution of information obtained legally, useful to several members of an organization in decision-making process and for strategic reflection, constitutes the process of technological surveillance that generates intelligence to those who use it correctly. ], [27].

Monitoring technology markets allows access to knowledge relevant to effective proposals for the solution of technological needs [29]. Another benefit of this tool is the identification of the scientific technological development, as well as the paradigms faced by the companies before the competitiveness and market demand [4], [21], [30].

From technology surveillance it is possible to obtain information to apply new technologies, create new products and evaluate the possible impacts of an event or change in the environment. Most information to get new ideas lies on the external side of the organization in a complex and abundant way, so it is necessary to organize and systematize them to add value and serve for decision making in the innovation decision-making process. Monitoring information contributes to reducing the number of wrong decisions within a process of research, development and implementation of new products / services on the market, since the information raised encourages these processes [13], [31]. Such organization and processing of information is necessary to define the innovation strategies of organizations that use technology surveillance [10], [32].

Information considered useful should be pertinent to some aspect of the organization’s activity, be absorbed in a timely manner, be accurate and relevant [33]. The dissemination process must be well specified and contribute to strategic decision making, ie it should be considered an activity inherent to the process of technological innovation [24], [ 34]. Watching technologies is not only about covering news, it must cover the whole documentary of the information process, covered with adequate preparation and presentation of all information relevant to the generation of intelligence and decisions consistent with guarantees of success [26]. Competitive intelligence, in turn, consists in using the information raised by technological surveillance, to orientate itself to the market, identifying which of them have greater importance and to reach objectives and goals of the organization [10].

Companies that take advantage of opportunities, based on the results of technological surveillance, have the capacity to understand and acquire knowledge about new technological developments and to respond to the new technologies identified. These companies see in the information collected a proactive way of responding to the technologies and diminishing the threats caused by them [20], [23], 35], [36]. The company can further progress by detecting investment and marketing opportunities so that observation can lead to increased market share [28].

Surveillance activities contribute to the innovation of processes and products since they enable the generation and detection of ideas and new solutions, as well as the application and implementation of new technology. However, this is only possible when the critical factors are dribbled and directed to the success of the technology surveillance tool. These factors are usually characteristic of the sector and the strategy of each company, which should be aligned with the benefits generated by the use of technological surveillance [28], [37], [38].

The main reasons for using a surveillance system are: anticipate changes; reduce risks by detecting threats; to progress by detecting customer dissatisfaction and their needs; innovate through new ideas; and cooperate [25]. For the results of surveillance to contribute to the technological strategy of an organization, it is necessary to identify the technologies that may represent threats; identify technological opportunities and protect the organization’s technological capabilities [21].

It must be made clear that technological surveillance is different from competitive intelligence. Surveillance is based on the ability to collect, analyze and disseminate useful information, which allows the company to predict and adapt to a constantly changing environment and the potential for exploiting technologies [39]. Competitive intelligence, however, concerns the use of this information in a decisive way in decision making, which creates a competitive advantage for the organization vis-à-vis the market [28] [40].

As a result, technology surveillance provides information about technology, predicts the directions that drive technological change, and encourages decision-making by organizations that use it in a planned way. Technological surveillance should provide information on the knowledge being investigated, the available technological solutions, the technologies being studied, identify the inefficient and obsolete technologies, as well as the technological trajectory of the main competing companies and information from the research and innovation centers which generate new technologies.

Systematizing technical information and knowing the solutions taken by other people allows starting from a non-zero basis to create mechanisms and solutions to internal problems [41].

Therefore, in order to obtain the expected results from the technological surveillance process, it is necessary to strictly comply with each stage of its development, so that all necessary information is collected and has value for decision making.

IV. DEVELOPMENT OF TECHNOLOGICAL SURVEILLANCE

The technology surveillance system consists of a set of basic functions, ie observation, analysis, and use. Initially, it focuses on the search for information, capture, calculation and dissemination of this information. Subsequently, it focuses on the treatment, study, discussion and validation of the acquired information. Finally, the third function analyzes the decision making that is usually strategic, based on all the information obtained in previous activities [28]. All these functions, when well systematized, can cover the existing information needs, foster scientific research, as well as keep its professionals up to date and help make decisions with less risk [10], [20], [21].

Within a process of technology surveillance, there are two moments: one in which it presents itself passively and the other in an active way. In the first, the internal and external information is analyzed routinely, in order to find relevant data to contribute to the development of the organization. At the second moment, monitoring takes place, that is, it focuses on the systematic search for pertinent information about aspects previously determined by the organization, so as to offer continuous knowledge about the development and emerging trends of the environment in which they are inserted.

A process of technological surveillance can be divided into 6 stages [22], [31]:

• Identify the needs: The necessary information must be identified by the organization through a self-diagnosis that must contain the current technological situation of the company, its suppliers, competitors and customers. This practice indicates which types of information to look for.

• Identify the sources: Determine which sources can provide the necessary information. They can be formal, such as patents, database or books, and informal, such as visits to fairs, conversations and conferences.

• Means of access: these means are heterogeneous and new services are continually being developed to facilitate the search for information. Among them we have the market studies, searches through the internet, through a database for patents and periodicals.

• Search: in this process it is necessary to analyze the results obtained to check if these correspond to the expected. This search only occurs in selected sources, so that the information is relevant and can be cross-checked with the

information.

• Value of information: this step depends on the volume of information to analyze, the content or nature, its format and structure. It can happen by sorting, counting and crossing information.

• Dissemination of information and results: main knowledge acquired by the organization in order to anticipate changes with less risk in decision making. The periodicity, content and presentation structure of the data should be established.

These steps can be visualized in the schematic representation of the technology surveillance process, Fig.1 

****FIGURE 1 ****

It is important to emphasize the connection between the steps, where each one is highly dependent on the results of the previous step. Developing this sequence of steps does not guarantee the success of surveillance because it is directly related to the quality and value of the information collected, as well as to the organization’s strategy. If this is not intended to include in its future the results obtained, there is no basis in performing these techniques [15].

Another way to execute technological surveillance, following the same principles, is given by UNE 166006 of 2006. This standard proposes a series of processes to identify the needs, sources and means of access to information; search, treatment and validation; information valorization, results, measurement and improvement [42].

One way to improve the techniques used for the development of technological surveillance is to make use of the benchmarking tool, that is, to compare performance, with organizations that already execute surveillance practices efficiently, favoring continuous improvement. This is even more important in areas where technological change is very rapid, such as in information technology, and there are occasional difficulties in accessing this information, either because of lack of knowledge or effective tools [27].

The technologies management tools are useful for the surveillance process, since their knowledge and management allow to optimize the effectiveness of surveillance by knowing better its context, level of development and possible evolution, that facilitate the evaluation of the meaning of any movement or technological development of competitors [28]. There are a number of techniques that are used to manage technologies and that contribute to technological surveillance, such as calibration and technological prospecting, trend analysis, and models of international participation with the scientific and technological community [43].

There is a tendency to evaluate knowledge generated by universities through the study of scientific productions, such as dissertations, theses or articles published in recognized journals [44]. As well as through patents, it is possible to monitor the technological changes and the impact and value of innovation in certain sectors, knowing statistically how much and to what extent the research object was explored [18].

In order for information classified as useful by technological surveillance to be used effectively, it needs to be disseminated in an objective and short-term manner [18]. To shorten the response time and reduce the error in the adequate disclosure of the information the analysis of the information must be performed with a high level of automation and by trained people who have a thorough knowledge of the organization’s objectives and strategies [45].

Effectively implementing technological surveillance techniques can generate numerous benefits for an organization: alerts on changes and scientific development; facilitates the updating of knowledge, pointing to market niches as well as avoiding investing economic and human resources in obsolete areas [15], [21].

The Virtual Observatory of Technology Transfer is a digital platform created in Spain by the University of Alicante. Through this, the Technological Institute of Informatics developed a Technological Surveillance system that supports the strategic decision-making of innovation of the Institute and small and medium enterprises of the Information and Communications Technology sector, which allowed to foment the processes innovations in companies. The Observatory monitors a large number of sources of information from different sources: websites, databases, newsletters, etc., selected according to quality criteria to cover the different types of documents: news, events, patents, scientific articles, regulations , legislation. [46]. 

In order to have such a tool, the observatory has a specific computer infrastructure, consisting of technological surveillance software, which facilitates the structured compilation of information, as well as its classification and indexing, and a proprietary content manager in the which is published and disseminated the information retrieved and facilitates its access and consultation through access to the observatory portal, daily news reception, and restricted access to the system by users [46]. In a study with biogeochemical cycles, the technology was applied and the authors verified that through this tool it was possible to classify any vector of data, regardless of whether the values are numerical or alphanumeric, which allows a number of possibilities such as classifying technologies, patents, companies and inventors, according to inherent characteristics determined by the user [47].

A methodology of technological surveillance requires the participation of professionals, who have knowledge about the topic to watch, validate and feed information and make use of a tool for capture, analysis and processing and dissemination of information [21].

Each stage for the development of a process of technological surveillance must be carried out with caution and fulfilling the stipulated objectives. The information needs need to be clear to all involved, as well as the sources where the search for information will be carried out, so that they are reliable and can achieve the expected results.

To process, store and distribute information, technology is used, but it is the people who interpret and classify it as valuable or not. Therefore, the human factor should be valued, considering the importance of the analysis and the selection of the information that will be disseminated for the users’ decision making [48].

V. FINAL CONSIDERATIONS

The objective of this work was to build a theoretical framework on technological surveillance, identifying its application and benefits generated by its use. For this, a systematic search of the literature was made using the following databases: Web of Science, Scopus, Science Direct, IEEE Xplore, Scielo and Scholar.

Thus, all the articles found by the systematic search were analyzed and carefully selected, according to the approach and link with the theme. By reading the acquired portfolio, it was possible to construct a theoretical reference on technological surveillance.

It is imperative that organizations retain knowledge related to technological changes and discoveries so that they can assess which technologies can be used by them in the short, medium and long term. For this, the information management tool called technological surveillance can be used, which aims to collect, analyze and disseminate information from areas determined by the user in order to assist in decision-making processes.

Technological surveillance is an indispensable tool for the competitiveness of organizations and can be adapted to any branch of work and production systems. In order to achieve the desired results, it is necessary to identify within the organizations the purpose of surveillance, its addressees, aspects to be monitored, the necessary sources, time of response and means of dissemination of results.

By virtue of this, when technological vigilance is developed correctly, with all the steps performed according to the user’s information needs, through reliable sources and by trained professionals, it allows to give an overview of the technological scenario in which the organization is located, highlighting their opportunities and threats.

References

[1] COURVISANOS, Jerry. Political aspects of innovation. Research 

Policy, v. 38, n, 7, p. 1.117-1.124, 2009.
[2] HUANG, Chi-Cheng. Knowledge sharing and group cohesiveness on performance: na empirical study of technology R&D teams in Taiwan. Technovation, v. 29, n. 11, p. 786-797, 2009.
[3] EDLER, J.; KRAHMER, F. M.; REGER, G. Changes in the strategic management of technology: results of a global benchmarking study. R&D Management, v. 32, n.2, p.149-164, 2002. 

[4] MOSSO, María J. Vigilancia tecnológica: aplicación en la seguridad y defensa. Técnica Administrativa, v. 9, n. 2, 2010.

[5] HSU, C.; SABHERWAL, R. From Intellectual Capital to Firm Performance: The Mediating Role of Knowledge Management Capabilities. IEEE Transactions On Engineering Management, v. 58, n. 4, p. 626-642, 2011. 

[6] LEÓN, Andrés M.; CASTELLANOS, Oscar F.; VARGAS, Freddy A. Valoración, selección y pertinencia de Herramientas de software utilizadas en vigilancia tecnológica. Revista Ingeniería e Investigación, v. 26, n. 1, p. 92-102, 2006. 

[7] JACOBS, Hannelizel; ZULU, Chipego. Reaping the benefits of value innovation: Lessons for small agribusinesses in Africa. African Journal of Business Management, v. 6, n. 33, p. 9510-9523, 2012.
[8] DELLA BRUNA JUNIOR, E; ENSSLIN, L; ENSSLIN, S.R. Supply chain performance evaluation: a case study in a company of equipment for refrigeration. Techonology Management Conference ( ITMC), IEEE Internation, p. 969-978, 2011. 

[9] VAZ, Caroline R.; BONILLA, Alejandra M.; SLIG, Paulo M. Análise Bibliométrica de Indicadores de Desempenho versus Gestão Ambiental e Gestão do Conhecimento. In: Congresso Internacional de Administração 2012. Anais do Congresso Internacional de Administração 2012, Gestão Estratégica: Empreendedorismo e sustentabilidade, set. 2012. 

[10] RAMIREZ, Maria I.; ESCOBAR, David.; ARAUJO, Biiana. Vigilancia tecnológica e inteligencia competitiva. Revista de Gestión de las Personas y Tecnologia, v. 5, n. 13, p. 238-249, 2012.
[11] ALLARAKHIA, M.; WALSH, S. Managing knowledge assets under conditions of radical change: the case of the pharmaceutical industry. Technovation, v. 31, n. 2-3, p. 105-117, 2011. 

[12] OLLER, Francesc M. Mirada al futuro: la vigilância del entorno. Revista Ingenieria Industrial, v. 1, n. 1, p. 39-46, 2002.
OSPINA, Carlos F. G. Vigilancia Tecnológica Cientifica de Ciclos Biogeoquímicos. Journal of Technology Management & Innovation, v. 4, n.2, p.44-53, 2009. 

[13] BUCHELI, Victor A. G.; GONZÁLEZ, Fabio A. O. Herramienta informática para vigilancia tecnológica – VIGTECH-. Revista Avances en Sistemas e Informática, v. 118 4, n. 1, p. 117-126, 2007.
[14] CANTÍN, Patricio V.; MONTENEGRO, Ivette O.; MATURANA, Victor R. Vigilancia tecnológica aplicada a nanociencia y nanotecnología en países de latinoamérica. Journal of Technology Management & Innovation, v. 1, n. 4, p. 83-94, 2006. 

[15] SANCHEZ-TORRES, Jenny M. Apoyo en la definición de políticas públicas en ciencia, tecnología e innovación a través de vigilancia tecnológica e inteligencia competitiva. Em: Estudios de vigilancia tecnológica aplicados a cadenas productivas del sector agropecuario Colombiano. Bogotá, 2008. 

[16] GARCÍA, C. Q.; VELASCO, B. C. A. Configuración del portafolio tecnológico, diversidade e Innovación: um estúdio longitudinal. Cuadernos de Economía y Dirección de la Empresa, v. 11, n. 34, p. 53-80, mar. 2008. [17] SANTAMARÍA, Luis.; NIETO, María J.; BARGE-GIL, Andrés. ¿Hay innovación más allá de la I+D+i?, El papel de otras actividades. Universia Business Review, v. 2, n. 2, p. 102-117, 2009. 

[18] LEE, Changyong; JEON, Jeonghwan; PARK, Yongtae. Monitoring trends of technological changes based on the dynamic patent lattice: A modified formal concept analysis approach. Technological Forecasting & Social Change, v. 78, n. 4, p. 690–702, 2011. 

[19] CHOI, Changwoo; PARK, Yongtae. Monitoring the organic structure of technology based on the patent development paths. Technological Forecasting and Social Change, v. 76, n. 6, p. 754–768, 2009.
[20] MACHIN, Lilian M.; REYTOR, Maikel A.; LEYVA, Linnet I. B. Propuesta de proceso de vigilancia tecnologíca para el obesrvatorio de tecnologia educativa em el centro de tecnologias para la formación. Revista Electronica de Tecnologia Educativa, n.35, p. 1-13, 2011. 

[21] ALZATE, Bibiana A.; GIRALDO, Lida T.; BARBOSA, Alejandra F. Vigilancia Tecnológica: Metodologías y Aplicaciones. Revista Gestión de las Personas y Tecnología, v. 5, n. 13, p. 250-261, 2012.
[22] FUENTES, Belén F.; ÁLVAREZ, Sara P.; GASTAMINZA, Félix V. Metodología para la implantación de sistemas de vigilancia tecnológica y documental: El caso del proyecto INREDIS*. Investigación Bibliotecológica, v. 23, n. 49, p. 149-177, 2009. 

[23] NOSELLA, Anna; PETRONI, Giorgio; ROSSELLA, Salandra. Technological change and technology monitoring process: evidence from four Italian case studies. Journal of Engineering and Technology Management, v. 25, n. 4, p. 321–337, 2008. 

[24] PÉREZ, Lizandra G. La gestión de información y sus implicaciones en los sistemas de vigilancia informacional. Revista Innovación Tecnológica, v. 16, n. 2, Jun. 2010.
[25] PALOP, F., Vicente, J. M. Vigilancia tecnológica e inteligencia competitiva, su potencial para la empresa española. COTEC Estudios, 15, 11, 1999. 

3510 

[26] TOLEDO, ELEA G.; ROMÁN, Adelaida R. Vigilancia tecnológica e inteligencia competitiva: conceptos, profesionales, servicios y fuentes de información. El profesional de la información, v. 10, n. 5, pp. 11-20, 2001. [27] FERNÁNDEZ, Mercedes. D.; AGÜERO, L. A. Diagnóstico integrado de la vigilancia tecnológica en organizaciones, Ingeniería industrial, v. 32, n. 2, p. 151-156, 2011. 

[28] SELLERO, Francisco J. S.; GONZÁLEZ, Montserrat C. Development of Technological Vigilance Systems in Spanish Aquaculture. Journal of Technology Management & Innovation, v. 7, n. 3, p. 214-226, 2012.
[29] BELTRÁN, M. E.; BOSCÁN, N. Identificación de necesidades para la adquisición de tecnología para la producción de energía eléctrica mediante el uso de sistemas fotovoltaicos en Venezuela. Télématique, v. 10, n. 2, p. 89-106, 2011. 

[30] QUIÑONES, Iber J. Vigilancia tecnológica como herramienta en los proyectos de mejoramiento de la competitividad en la industria de recubrimientos duros. Informador técnico, n. 72, p. 44-51, 2008.
[31] DURÁN, Javier M.; MARTÍNEZ, María M.; TRIANO, José V. La vigilancia tecnológica en la gestión de proyectos de I+D+i: recursos y herramientas. El profesional de la información, v. 15, n. 6, nov./dez. 2006. [32] PELLISSER, R. A conceptual framework for the alignement of innovation and technology. Journal of Technology Management & Innovation, v. 3, n.3, p.67-77, 2008. 

[33] MEGGINSON, L. C.; MOSLEY, D. C.; PIETRI JR., P. H. Fundamentos do controle e administração da informação. Administração: conceitos e aplicações. 4. ed. São Paulo: HARBRA, 1998. [34] GUIMARÃES, Thiago A.; ALVAREZ, Victor M. P. Análise do processo de difusão tecnológica de cultivares de soja da Embrapa no Paraná. Revista de Política Agrícola, Ano XX, n. 3, p. 19-34, 2011. 

[35] SRINIVASAN, R.; LILIEN, G. L.; RANGASWAMY, A. Technological opportunism and radical technology adoption: An application to e-business. Journal of Marketing, v. 66, n. 3, p. 47–60, 2002. [36] CHEN, C. W.; LIEN, N. H. Technological opportunism and firm performance: Moderating contexts. Journal of Business Research, 2012. [37] MUÑOZ, L., MARÍN, M., VALLEJO, J. La vigilancia tecnológica en la gestión de proyectos de I+D+i: Recursos y herramientas. El Profesional de la Información, v. 15, n. 6, p. 411- 412, 2006. 

[38] MARTÍN, G. C.; SALAZAR, M. A.; SÁEZ, A. L.; LÓPEZ, J. E. N. El capital relacional como fuente de innovación tecnológica. Innovar, Revista de Ciencias Administrativas y Sociales, v. 19, v. 35, p. 119-132, 2009.
[39] FERNÁNDEZ, Mercedes. D.; ABREU, Marta I.; LEE, Yoel A.; PÉREZ, Olga E.; BATISTA, Antonio D.; MORENO, Jeidys M. Vigilancia tecnológica en una universidad de ciencias técnicas. Ingeniería industrial, v. 32, n.1, p.1-7, 2011. 

[40] VEGA, Jaider J; GUTIERREZ, A. G., FERNÁNDEZ, I. L. Cómo innovan las empresas españolas? Una evidencia empírica. Journal of Technology Management & Innovation, v. 3, n. 3, p. 100-111, 2008. 

[41] Drudi , S.; Gangoso, Z. E. Representation Systems in the Evolution of Technology. IEEE LATIN America Transactions, v. 11, n. 1, 2013.
[42] AENOR, Associação Española de Normalización y Certificación. Norma Española Experimental UNE 166.006. Gestión de la I+D+i: Sistema de Vigilancia Tecnológica. Madrid, 2006. 

[43] GRIENITZ, V., LEY, S. Scenarios for the strategic planning of Technologies. Journal of Technology Management & Innovation, v. 2, n. 3, p. 21-37, 2007.
[44] MEJÍAS, José L. P.; CABRERA, Francisco M. S.; FERNADÉZ, Mercedes D.; BARRERA, Rosario B. Evaluación de la eficiencia de grupos de investigación mediante análisis envolvente de datos (DEA). El professional de la Información, v. 19, n. 2, 2010. 

[45] BATISTA, Darlin S.; SÁNCHEZ, María V. G.; CALVET, Humberto C. Establecimiento de un sistema de vigilancia científico-tecnológica. ACIMED, v.11, n.6, 2003.
[46] OVTT, Observatório Virtual de Transferência de Tecnologia. Vigilância Tecnológica aplicada ao sector TIC: o Observatório Tecnológico do ITI. 2013. Disponível em: < http://pt.ovtt.org/destacados/vigilancia- tecnologica-aplicada-ao-sector-tic-o-observatorio-tecnologico-do-iti>. Acesso em 06 Jun. 2013. 

[47] OSPINA, Carlos F. G. Vigilancia Tecnológica Cientifica de Ciclos Biogeoquímicos. Journal of Technology Management & Innovation, v. 4, n.2, p.44-53, 2009.
[48] PACHECO, F. The Need for Formal Education on Information Security. IEEE Latin America Transactions, v. 11, n. 1,2013. 

Silence of the Professors: Mark Crispin Miller

Screenshot from Abby Martin’s interview with Mark Crispin Miller, who wrote the forward to the recently republished book Propaganda by Edward Bernays.

One of Venezuela’s media assets that I’ve identified is Mark Crispin Miller.

He’s a professor of media studies at NYU and in addition to his work with TeleSUR English, he is interviewed in the documentary Orwell Rolls in his Grave.

Given this and the recurrent invocations of George Orwell throughout the literature associated with Kultural Marxism, I thought I would give a quick look through his website and see if he had anything to say that I might be able to add to my case study on Orwellian Irony. I was not disappointed!

I found this link to a re-posted article about NewsGuard, a company which is working with different news organizations to do the analytical work previously done by newspaper and magazine editors prior to the Internet Age.

What I find most ironic is that the article does not at all engage with the substance of what NewsGuard does – basically checks it’s credibility, reliability transparency by determining if the website, amongst other factors:

  1. Regularly publishes false content
  2. Gathers and presents information responsibility
  3. Regularly corrects of clarifies errors
  4. Handles the difference between news and opinion responsibly
  5. Avoids deceptive headlines
  6. Discloses ownership, financing and potential conflicts of interests
  7. Clearly labels advertising
  8. Published names of the authors

Instead of actually stating what is going on, the article Mark Crispin Miller linked to (by another “journalist” associated with the Kultural Marxism network, Whitney Webb) instead engaged in fear-mongering.

What’s even more ironic than this, in light of the fact that he’s a professor?

I left a post raising some of the issues that I see as missing from the article and pointed out a factual inconsistency.

Individuals like myself are genuinely concerned with ensuring that honesty, integrity, and professionalism are values that are upheld within the media and journalism industry and the claim of conspiracy that this is all a matter of “big Silicon Valley tech companies in league with the U.S. government” that are trying to “censor” people is absurd.

Mark Crispin Miller’s response?

Not to allow the comment to be posted.

He’s certainly welcome to make that choice as his website is his platform, but so too am I free to share a portion of my comments below to show the sweet, sweet Orwellian irony of a 9/11 Truther refusing to let counterfactual evidence onto his website.

A portion of the comment post left on Mark Crispin Miller’s website about NewsGuard.

When a YouTube Chat Turns to “Ciao!”: On the Cowardice of Caleb Maupin

Caleb Maupin is an ex-Occupy Wall Street activist, ex-Workers World Party member that previously worked for Russia’s RT news and is now an “independent socialist”.

I admit that I haven’t read much of his writing nor watched more than two of his YouTube videos as I neither felt intellectually enlargened nor amused by the. And yet I decided to jump onto his live YouTube chat when I read an announcement of it on Facebook as I wanted to, like I did with Ajamu Baraka and Abby Martin, inquire about any relationship to funding networks manag.ed by Venezuela

Amusingly enough within 3 minutes of my asking him a question about his relationship to funding and assistance networks for American aocialist activists that are connected to Venezuela’s state intelligence apparatus he ended the live broadcast. 

That right. Only 25 minutes into a live chat that was supposed to be an hour long and he cancels it!

I was a little bummed as I was hoping to get a definitive response – but also not surprised.

The only information that I got came from the one “person” that shared Caleb Maupin’s announcement of his upcoming YouTube Talk.

I put “person” in quotes as a quick look at his profile, which is public, and a number of the qualities indicating coordinated inauthentic behavior connected to the Kultural Marxism network became evident. These are:

Links to TeleSUR
Links to Black Agenda Report
Praise of Julian Assange
Links to Counterpunch
Multiple links praising China
A link to a foreign language website (in this case Chinese) website

 

 

English Translation of Jesus Santrich’s poem “Una Prosa de Amor Para Ella”

I have undertaken my last battle; the battle of dignity. I want you to know that I am a complete, integral revolutionary, I will not retreat a single step regarding the goals that we have set.

Abril 11/18

pastedGraphic.png 

A Prose of Love for Her

Havana, February 2015.
By Jesús Santrich.

*

I found you to the south of the day
As coming out of the anguish
Of the hurricanes;
you were between palms and
Taino gulls
Glowing in the coordinates of a sun;
At that moment
the sunset undressed before my eyes
and the sea welcomed me
with the abysmal embrace
of its deep salty blue
in which the moon submerges
its ardent glow
and the whispering breeze
among shipwrecked spells.

To calm the cyclone, snatched
from my desire to have you,
you gave me a piece of your dawn,
the keys of Elegguá,
the elekes of Obbatalá,
the oshé of Shangó,
the bells of Oshún,
the omieros of the pantheon,
in a polymita the rainbow,
the waters of the Almendares
and the sacred necklace of Yemayá.

With a wisp of your Siboney twilight
you have my deepest secrets of love,
and my last vision of the Castle and the Giraldilla;
then you put the strength of your cemies
in my soul
and the iridescent guanín de Hatuey
You hang on my chest …;
You gave me the amulet of Mayvona,
the patience of Anayana,
the Cross of Calatrava,
the murmur of your waves
and a song by Juan Formell
to fill the saddlebags
with my hopes.

The truth,
it was enough for me “a white rose
in June as in January”
but you gave me more,
much more,
in the unspeakable tranquility
from your sky,
in your sweetly mulatto flavored flavor,
in your damp presence
gone from the hands of Atabey,
and from the pristine tears
of Boinayel
so that you would receive the sowing
of Olofin.

So,
you made me live the anthology
of your hours
bouncing between dreams
from which I do not wake nor want…
even less when I hear
the moan and the song,
the happiness and the crying
of your waves in El Mégano,
and the rumor of the time that
spreads walking and resuming
the ancient cobbles
and the ancient walls
of your aged architecture
full of nostalgia,
made up of memories
and furtive desires
of legendary lovers.

How I love you my Havana,
because you succeed in filling my loneliness
of the port without sailboats
with that hoarse joy
that only the corals have,
and anoint it you know this patina of glory
of the Moncada,
the inks of the Escambray,
or the Sierra Maestra,
when in its summit of glory
the butterflies pose,
and your music hands, in short,
caress my dock nostalgia
my nostalgia for anchor and sad networks;
my nostalgia of night bolero
in your accomplice aged seawall.

How I love you, my Havana;
I love you so much
that I give myself to your orishas
to keep me guarded
in the depths
of your bohemian nights;
Indigena Havana,
Black Havana,
Mulatto Havana,
sacred land of Havaguanex.

And I love you in the melancholy airs
of a baroque concert,
in the smoke of your cigars,
in the setback of a son
of Manolito Simonet,
because … “I’m obsessed with you”
and the world is witness to my frenzy …, ”
that’s why my heart thunders
like a “Trebuchet once more”
or like the cannon shot at nine o’clock,
and my soul dances and runs
like everyone who is
“Crazy about my Havana”,
crazy about his salsa,
crazy about his son,
and the touch of the güiro,
and the parrandón,
and the deepest danzón,
and the notes of Chan Chan
played by Compay Segundo,
or the voice of Laritza Bacallao
intoning with Cándido Fabré
melodies that embellish the world.

How I adore you my Havana
because you are my dream,
and I do not wake up nor want to,
except when listening to
the “Black Rhapsody” of Lecuona,
the “Cuban Dances” of Cervantes,
the “Zapateo por Derecho”,
and the fulgent chords
of Frank Fernández
interpreting the candor,
the passion and the fervor,
of the loving embrace
of Manuelita and the Libertador
that Master Angulo
virtuously sculpted,
eternalizing in the rock its splendor.

How I love you my Havana,
because in the dramaturgy of Estorino
I was convinced that “Penalties can swim”;
and of the bucolic tenths
of Indio Ortatomé
the faith of observing without being able to see
“seeing, as one
dreaming in a sad night,
landscape that no longer exists
with eyes that no longer see”
but that keep the light of the soul
with which I found the blue unicorn
that took me to the arms of Yolanda
singing a Trova of Silvio Rodríguez
who told me,
that “wings are not necessary to make a dream “,
that” enough with your hands
enough with the chest is enough with the legs and with the commitment”

It was like this that I learned singing
and confirmed fighting,
that “You do not need wings
to be more beautiful
enough good sense immense love …;
you do not need wings
to take the flight”
and then I picked it up,
and I bewitched myself,
and I was charmed with your spells,
and I flew like a hummingbird
while the “Abracadabra”,
of your legend
placed before me astonished
“Apostle” by Juan Sicre,
to the Grajales de Teodoro Ramos …,
and in a certain way”
a film by Tomás Gutiérrez
in which the tenderness
of Sara Gómez
shone, only matched
by the flash of Korda
that eternalized leaves
the clean look of Che.

How I love you my Havana,
because from your hand
has seen the reviving of Gisellee
in an impossible arabesque,
in a great attitude …,
between the twists and turns,
a fouetté and the entrechatde
the dance of Alicia
que jumping, jumping,
or resting on her tips
played by God .. .

How I love you,
my brunette, Habana del songo,
of the myths and the corsairs,
of the saints and the paleros,
of the songs and the mysteries
that sings to Oloddumare
with the same fidelity
and to La Virgen de la Caridad,
either from its guanajatabey seed,
or from its genuine maker,
or from the deepest
of Yoruba goodness.

It was with the verb of “Songoro Cosongo”
and the charm of your drums
that I traveled to the sources of the Oddan
to search for the Abakuá roots,
to get drunk with the songs of Efí,
to learn about the stories of Efó,
to listen to the hides
and the African voices
that talked
about the secrets of the fish Tanze
trapped in the memory of Nasakó,
and in each mulatto accent
of that Camagueyan of
the four anguishes,
From somewhere in the spring,”
he taught me how to have
it that I had to have.

I got entangled too
in the power of your
porters
trying to cage your sun in my hands,
and I listened in the distant silence of
a dark dawn,
the overwhelming sadness of Moctezuma
in a deep concert
of the genius of Vivaldi,
when the albasus cried
their tears of rocío
that caressed the face
of a red-eyed jungle of Apapa Efik:
I saw jungle in his eyes
and found in his deep gaze
the mysteries
of mother Sikanekue,
and I found the leopard Tanze
on the tam of the Ekue
que sounds with the spirit of Sikan,
with the blood of the rooster,
with the skin of the goat,
with the magic of Calabar …,
waving in the wind
a miraculous phrase from the memory
that also spoke with timbre of conga
y of timbales, saying “abasí serí Ekue maya beki…”;

Yes, as the persistent echo of the past
revealing that “in the voice of the drum God speaks to us”,
discovering the mystery of dance, of origin … and of ritual.
Then I continued
on the path of the Zohar
and among the dust of the hours,
I saw a legion of brothers
marching next to Cespedes,
Maceo, Máximo Gómez and Mariana;
and I was no longer your Spanish owner
who with your own hand you had,
and I understood without hesitation
that, although men can fail
“Words do not fall into emptiness”
But Santiago …

Santiago, it came to my mind
like a long street turned into Aqueronte,
where Panchón walked
in his mission of Charon,
enjoying the happiness of the sunflowers
while through the mourning I felt that the lights
of the darkness of my soul were extinguished;
but no,
no,
simply not,
because the sound of the sun
was again blowing,
from the east to the west,
from Guantánamo to Pinar,
in the polyrhythm of the batá
which announced the “Feast of Fire”.

I have traveled with you
to the kingdom of Nsambia,
to the power of the 16 Mpungos,
to the very same root
sof the Manikongo kingdom
as to the magical world,
to the wonderful world
of the verb of Carpentier,
with which I took the car of time
towards the century of lights,
following the route
of your lanterns of ghostly lights;
the same ones that gave birth in the past to
the avatars of Esteban and Sofía,
caught up in the Jacobin impetus
of Víctor Hugues …,
only to know
that “words are not enough
to create better worlds”,
and that there is “no more promised land
than that which man
can find in himself…”

Or ask Mackandal then,
ask Boukman,
and drink with them
the blood of the boar,
evoking the Houngan,
so that the night of August will glow
“The night of fire”
the night of freedom,
and finally bloom
an emancipated world,
as in the Moro mambo,
as in the essential colors
of the “History of the Caribbean”,
as in the snails and the flowers
that explode from the “Interiors of the Hill”,
from the “Festines”
and the “Dream” of Portocarrero.

How I love you, my Havana,
because in you the past and the present are drawn,
because in you my entire Cuba is reflected:
because you are in the hurry of Marti
in his thunder of lightning, in his starlight,
in his myth of iodine
poured into the sand
that kisses the sea;
or because you are in the cowbells of the moruá
when they sound in Dos Ríos,
announcing the luto
por El Apóstol that rides towards eternity.

How I love you Havana,
because you are the microcosm
of real impossible stories;
because in you I found the way
to travel to the seed
doing the trade of darkness
that made me discover the secrets
of the kingdom of this world,
scourged by the wars of time
in which all history was forged;
because in you I was intimated the scenario
in which the Ekue dreams hidden in the fambá
every second
of the consecration of spring
flooding
with exuberant anti-Cuban hallucinations
that had the Taíno magic of “the real
marvelous”
that allowed me to grasp the profuse metaphors
of your perennial colonial pages
in which the Marquis of Chaplaincies
“Lay on his deathbed,
the chest armored with medals,
escorted by four candles with long beards of melted wax”
that marked the path
of the fantastic Amerindianidad
through which Melchor walked,
marking firm paths from which Sotomayor
jumped trying to reach
the flight of Arnaldo Tamayo the bird,
who knew how to find the key to play with the stars
and bring up the heavens
the sacred symbols “of the long green lizard,
with eyes of stone and water. ”

How I love you my Havana,
because of you I received the hand of Orunla
with the power of the babalawos
who gave me the spells
to walk among the hurricanes of memory
wand cross the domains of Yemayá,
and retrace the footprints of Handel and Scarlatti
entangled in the notes of Stravinski and Louis
Armstrong,
feeling the evidences
of the transience of life,
the reversed march of time,
the brevity of the instant
that usually extends in a blade of sol
against your breasts
when the tocororo flies,
when the real palm dies,
when the amber cane is born
and the children sing La Bayamesa,
with the same love
that Hemingway
put in the boat of the old man
who challenged your seas
to catch the immense fish of his upright obstinacy…,
until reaching
the port of his vanquished age
to resume life to continue dreaming
lying on a beach,
watching “a moon as bright as that
like the one that infiltrates the sweetness of the cane”,
shouting alive to Fidel” who vibrates on the mountain
“caring for the ruby, the five stripes and the star.

Notes on Implementing and Managing eGovernment: An International Text

I’ve been reading Richard Heek’s book Implementing and Managing eGovernment: An International Text as part of my doctoral thesis research and the book is, in a few words, foundational, seminal, required reading for anyone in the field of Innovation and Technology Management with a focus on eGovernment. I highly reccommend it.

Below are two organizational spreadsheets, followed by notes from the book.

Data Stakeholder Governance Considerations

Sample Item Costs for eGovernment Planning

Notes

There may be a focus on problem solving and innovation, and a focus on team-working and flexibility (Hafeez and Savani, 2003). The agencies may be characterized by what is known as a ‘task culture’. 

This hybrid management model argues first for an analysis of current public sector realities; and second for an assessment of which management and e-government system designs will best fit this reality. 

The sectors differ in many ways, including:

their espoused objectives (broader in the public sector); 

their view of ‘customers’ (more holistic in the public sector); 

their relation to ‘customers’ (mixed with roles as citizens and compliers in the public sector)

their accountabilities and perceived stakeholders (broader in the public sector)

their human and technological infra- structure (weaker in the public sector); 

the politicization of their processes (greater in the public sector); 

the scale and nature of competition (smaller and political in the public sector) 

Where decentralized information systems, manual or computerized, are already in place, barriers to centralization may be severe. In order to centralize, changes may need to be made to the organization’s whole information systems architecture: new data fields and formats, new hardware and software, new processes by which to handle data, and new processes by which to make decisions and take actions. 

Differences between the objectives and values (that is, the cultures) of particular groups in the public sector also cause a problem. 

Centralized approaches require the commitment of four key resources – money, time, people, and skills – all in short supply in the public sector. For many public organizations, a centralized approach may not be possible because of financial constraints; because staff are too busy on other things; or because no-one has the confidence or capabilities to undertake the necessary planning and coordination tasks. 

decentralized units develop different ways of working, different mindsets that create quite different views of the world between groups; different jargon used in communication; and different issues and people that are valued. 

aspects of system use such as implementation, operation, troubleshooting and maintenance are also likely to occur more quickly under a decentralized regime. 

Training, maintenance and administration costs also contribute. Large, centralized computing systems are estimated to cost something like one-third to one-half of this amount per user per year (CBR, 2001). 

A decentralized approach may be most economic for public organizations, because it saves on overt input costs. A centralized approach may be most efficient, because it avoids waste and duplication. But a successful hybrid approach may be most effective because it can simultaneously provide: 

  • the control necessary to share key resources (including data), to avoid duplication, and to achieve economies of scale; and
  • the freedom necessary to meet user needs, and to overcome blocks to IT usage and system development. 

US State Department, for example, successful progress on e-government has come from retaining computing and data management architecture under control of a central IT office, while decentralizing systems develop- ment responsibilities 

Division is compatible with – indeed, is defined as – simultaneous centralization and decentralization. It can be seen in the possible division of responsibilities described for systems development. It can also be seen in the division of responsibilities between client and server computers. 

That which we can call a managerial or information systems centralization, reflects Nolan’s (1979) well-known ‘stages of growth’. It shows the gradual increase in managerial attempts to control the information systems (which would include e-government systems) within an organization. Nolan’s model has been criticized for a lack of predictive power and a generality that fails to match individual organizational experience. However, its core sense of increasing managerial engagement with IT does appear sound. 

A decentralized approach will also help to spread IT awareness and skills, and even some understanding of the informational aspect of e-government, in a way that other approaches might not. For some public agencies, it is the lack of just such awareness, skills and under- standing that represents a key barrier to effective use of IT in government. 

there are tensions between the somewhat theoretical notions of organizational rationality, and the more real forces of politics in government. Hence, rational logic may play only a minor role in determining which approach is used. 

For example, the approach adopted will be shaped by the organization’s technology (e.g. whether the computing architecture is already centralized or decentralized); staffing and skills (e.g. what skills are avail- able); management systems and structures (e.g. whether the main organization has a centralized or decentralized structure) and other resources (e.g. the availability of finance). 

Stakeholder values will also play a role, such as their perceptions, their awareness of the costs and benefits of particular approaches, and their historical experi- ences. For instance, the recent experiences of staff with e-government systems create either a satisfaction that is inertial, or a dis- satisfaction that demands change. 

buuuut it is organizational politics and its roots in the self-interest of particular stakeholders that will help determine what management approach to e-government is selected 

Four familiar political constituencies (see Figure 2.2) can be identified, whose conflict or compromise within organizations helps to determine which approach is chosen: senior managers, politicians, IT staff, and mainstream staff. 

Broader political, pressures from the outside world – ranging from national political initiatives to dominant ideologies/philosophies – also play their part. Staff in public sector organizations are subject to continuous external pressures, that include (Barrett and Greene, 2001; Abramson and Morin, 2003): 

  • Pressure to conform to the requirements of external bodies, such as central government bodies and funding agencies. An e-government unit run by central government may, for example, be pushing a department to adopt certain centralized ‘best practices’: see, for example, Box 2.6. 
  • Pressure through (mis)perception of what other organizations are doing, which may be transmitted through informal contacts, management texts and training programs, or dealings with consultancy organizations. 
  • Pressure from private sector IT vendors to purchase particular technologies and systems. 

Chapter 3

eGovernment Strategy 

Centralized e-government strategic planning is a six-step process that, overall, asks: ‘Where
are we now?’, ‘Where do we want to get to?’, and ‘How do we get there from here?’

a successful strategy can develop senior management understanding that e-government systems are information systems not just IT, and build consensus and commitment to a strategic vision for e-government. It permits a fundamental review of the organization’s use of informa- tion and technology, leading to a comprehensive understanding of information systems requirements. 

It also provides a detailed plan of action on e-government for the organization. 

Problems of Federal eGovernment Expenditure in the US 

The 2003 US federal budget identified ‘six chronic problems that limit results from Federal IT spending: 

  • Agencies have automated existing outdated processes, instead of fixing underlying management problems or simplifying agency procedures to take advantage of new e-business and e-government capabilities. 
  • Agencies have made unnecessarily duplicative IT investments. 
  • Inadequate program management – many major IT projects have not met cost,
    schedule and performance goals. 
  • Few agencies have had plans demonstrating the linkage between IT capabilities
    and the business needs of the agency. 
  • Agencies have built individual capabilities that are not interoperable with one
    another. Few IT investments significantly improve mission performance. 
  • Poor IT security – major gaps have existed in agency and Government-wide inforsmation and IT-related security.’ 

e 2003 Federal Enterprise Architecture: A ‘business-based framework for Government-wide improvement … constructed through a collection of interrelated ‘reference models’ designed to facilitate cross-agency analysis and the identification of duplicative investments, gaps, and opportunities for collaboration within and across federal agencies.’ (FEAPMO, 2003)

The Strategic Context for Federal Public Agency eGovernment Strategy in the US 

The 2002 eGovernment Act

The 2002 Federal Information Security Management Act

The 2001 President’s Management Agenda

The 1998 Government Paperwork Elimination Act

The 1996 Clinger-Cohen Act

The 1996 Electronic Freedom of Information Act amendment:

The 1993 Government Performance Results Act:

Where are we now?

An answer would include details of the organization’s current structure and functions; key client groups; existing problems that need to be addressed; and important current and forth- coming factors – particularly policies and political priorities 

Where do we want to get to? 

An answer would include details of the organization’s objectives, and some vision of the future organization that will enable it to overcome current and forthcoming problems, and to achieve its objectives. Finally, it asks, ‘How do we get there?’ This would be achieved through a statement of management strategy about major changes to organizational structure and functions in order to reach its future vision. 

two types of organizational function are derived from the organization’s wider business strategy and prioritized for further investigation: 

  1. Existing organizational functions that are to be retained in order to meet organizational objectives 
  2. New organizational functions that need to be introduced in order to meet organizational objectives.

This is the essence of ‘portfolio’ or ‘program’ management: using criteria to align projects with agency strategy. 

Impact priorities, for example, might be: 

highest savings/financial return on investment

highest public visibility/political return on investment

highest learning/demonstrator effect

strongest focus on existing organizational deficiencies

strongest support to key external client  services (as opposed to internal administrative activities). 

Implementation priorities, for example, might be: 

lowest risk/highest feasibility

lowest cost to implement

fastest time for completion

eGovernment Systems Architecture needs three main components:

  1. A data model showing the structure of unified, organization-wide data to which the e-government systems will have access; often illustrated using an entity-relationship diagram (this and the other diagrams mentioned here are described in greater detail in Chapter 8).
  2. A process model showing the key activities of the organization that the e-government systems will either support or under- take; often illustrated using a process diagram.
  3. A data/process model showing the organization-wide connection between business processes and data entities, and the organization-wide movement of data that e-government systems will enable; often illustrated using a data flow diagram. 

Information engineering

This looks across the whole organization and focuses on two components:
business processes: the individual activities of the organization that help meet public sector objectives. 

data classes: data entities of relevance to the organization that are made up from individual data elements (or attributes). 

Data and process are principally connected, and therefore principally investigated, through the mechanism of decision making and action. 

From this investigation, the entire organization is analyzed into two long lists of business processes and data entities. These are cross-checked through a process/data matrix that shows which processes create or use which data. The data entities and processes can then be grouped together into clusters of data and processes that represent required e-government systems within the organization.

Critical success factors
it starts by asking managers to specify the factors they consider to be critical for the successful performance of particular organizational functions

It is the intention that e-government strategy be shaped by organizational objectives and process/information requirements rather than by technology: 

Determining eGovernment organizational architecture:

As part of the ITSPMO analysis, general strategic decisions may include:

  1. making sure that it is the government rather than the company that steers e-government 
  2. stating the approach to management of organizational change, including a determination of the needs for cultural change
  3. clearly allocating responsibilities for e-government systems development and management
  4. identifying major competency gaps and approaches to closing them through human resource strategies
  5. deciding how back-office procedures may be restructured to support e-government
  6. locating the e-government/IT function within the wider organizational structure
  7. demarcating which services (e.g. systems development, training and systems operation) are to be sourced in-house and outsourced
  8. identifying procedures to be used when tendering for and selecting e-government systems products and services
  9. specifying standard systems development methodologies and tools to be used 
  10. identifying financial approaches to be adopted, such as public–private partnerships.

Strategy Implementation 

Disseminate and Plan eGovernment Actions 

A typical business case for an e-government project might include a statement of project objectives; an estimation of benefits, risks and constraints; and an estimation of resource requirements covering finance, human resources (i.e. jobs and skills), technology, and timescales. Details of project deliverables (i.e. things the e-government projects should produce such as feasibility reports, specification documents, and both interim and final versions of the system) and timetables can be approved at this stage. So, too, can mechanisms for reporting back to the eGovernment Steering Group on progress. 

for personnel training and development, for finance, for technology, etc. There may also be an additional dimension to the matrix – time – showing what is to occur and be paid for within particular financial years. 

Many public organizations also find themselves in situations of constant and largely uncontrollable flux from factors such as changeover in ruling political parties; constant circulation of senior politicians and officials; emergence of new political initiatives and legislation that alter organizational activities, priorities and even structures; sudden imposition of cost- cutting measures; sudden external crises that demand a reaction; changes within the client groups the organizations serve; and changes in IT, IT standards and IT suppliers. 

The Outcome of eGovernment Strategy 

There are many ways for strategies to go wrong:

  • Lack of Strategy
  • Underused Strategy – The strategies give the impression of box-ticking – doing just enough to meet the demands of external policies and oversight agencies; and often doing that in a hurry – without true internal ownership of, or commitment to, the strategy. 
  • When strategy has been hijacked
  • When strategy is ‘strategic concrete’

Focus on process, not content

The process of trying to create a strategy may be more valuable than the formal deliverables. Value is sought from the informal process deliverables such as: making sense of the past, learning from experience, encouraging dialogue and communication, and making choices 

A hybrid approach to e-government planning will mean a balance between central and local. So, for instance, it could mean that e-government planning is seen as incremental, as participative, as limited in scope: guiding more than dictating. This approach is sometimes referred to as ‘pick- ing a course and steering it’: being adaptable to new constraints and new circumstances as they arise rather than imagining that the strategy is cast in ‘tablets of stone’. 

Sub-Strategic eGovernment Planning 

Given the many constraints to strategic plan- ning, it may be more feasible to plan at what might be termed the ‘sub-strategic’ level. This pares back what planning hopes to achieve until the intention matches what can be achieved in the organization. 

Tactical-Plus eGovernment Planning 

pushing the objectives of an individual e-government system ‘upstream’ to think how it contributes to the overall work of the organization; 

assessing the opportunity costs of going ahead with this particular e-government system rather than others; and/or 

assessing whether there should be com- patibilities between this and other exist- ing or planned systems. 

Chapter 4 Managing Public Data 

CARTA 

Completeness 

Accuracy
Relevance
Timeliness
Appropriate presentation

Prosumption – Where the consumers of public services themselves become producers of their own data often via web-based electronic forms.

What are the Positions to Consider when Managing?

Situation A: Departmental Location 

Situation B: Low-Level Independence 

Situation C: High-Level Independence 

Situation D: Outsourcing 

Outsourcing 

An equal, if not greater drive to outsourcing is to address human resource constraints by accessing staff, skills and ideas that are not available in-house. Other perceived benefits of outsourcing include the provision of a higher quality of service; greater certainty about costs; greater flexibility, especially of labor since it is easier to hire and fire external staff; access to advanced technology; and greater ability to focus management on the core deliverables of the public sector 

Cons

a clash of work cultures and understanding between the public sector client and the private sector sub-contractor; 

a loss of control over the service being provided, with the sub-contractor starting to dictate to a dependent client; 

a loss of core e-government competencies to the sub-contractor, such as controls over security. 

However, in practice, decision making about outsourcing in the public sector has only partly been driven by organizational rationality. It has also been driven by behavioral/political factors (Peled, 2000a). Managers are found to outsource e-government work because they: 

  • have been naive in their assumptions about the benefits that will ensue
  • believe association with such an initiative will be good for their careers 
  • wish to ‘clip the wings’ of the in-house IT unit
  • stand to gain financially thanks to the covert generosity of the sub-contractor

5.2 People

Competencies can be understood in relation to three domains:

Skills, Knowledge, Attitude 

Attitude is changes by appeals to the the rational mind, the political mind, and the heart. 

Greater use of case studies of e-government failure and/or best practice will likely be a move in the right direction (Parrado, 2002). Cases can persuade stake- holders, for instance, of the dangers of ignoring basic systems development prac- tice, or of the importance of understanding the organizational and human context of e-government systems. 

A good hybrid manager will recognize that psychological factors play a role: autonomy, challenge, recognition and the opportunity for career advancement. Direct work content factors are also important, such as training opportunities, flexibility of work schedule and clarity of task specification. 

On a shorter-term basis, responsibility for a personal development plan can be shifted to the employees, and used as part of the annual performance review. 

Plans must be far more than just a critical path; they must include deliverables, resource requirements, and reporting arrangements. Over time, the number of elements that must be planned has grown, typically in response to perceived problems with past projects. What was once just a ‘project plan’ has now been broken down; for example into: a scope management plan, a resource plan, a risk management plan, a procurement plan, a quality plan, a communication plan, a security plan, a change management plan, and a cost management plan.

Which standards should be followed? ISO 9001:2000 

Peer review – a hybrid rather than rational project technique – seems to have a better record, and has now been adopted by a number of governments as a best practice. 

Behavioral Approaches to Project Management 

the rational model fails to fully explain or predict what happens in the public sector. It also fails to fully guide real-world best practice, leading e-government practitioners to criticize PMMs for their inflexibility. Indeed, some who study the realities of projects see the rational approach as potentially guiding worst practice: 

“IT projects die by their own hand. The more they are bound by lists, rules, checks, restrictions, regulations, and so on, the more they drive out the human spirit of creativity, of innovation, of dealing with ambiguity, and of fun. People brought up in technical environments may not see the horror of this kind of approach.”

To plug this gap, and ensure that a more behavioral approach and more behavioral expertise are introduced, some governments are mandating the involvement of senior non-IT officials. The Canadian government, for example, defines a formal requirement on e-government projects for two things (OECD, 2001). First, a project sponsor who is responsible for the business function, and who has solely behavioral-side competencies ( judgment, leadership, communication, organizational awareness). Second, a project leader who is a senior departmental official with, again, largely behavioral-side competencies and only cursory IT management skills at best. Similarly, the UK government’s analysis of e-government project failures concluded with the requirement for projects to have a ‘senior responsible officer’ (CITU, 2000). The officer would be drawn from the business not the IT side of the organization. 

Primary Project Stakeholders

decision makers: those who make major project-related decisions, such as whether or not to proceed with the project

gatekeepers: those who control access to higher authorities

influencers: those who advise decision makers or whom decision makers take note of

end users: those who will directly use the output from the e-government system and/or from the business function it supports

champions: those who will support and muster resources for the project

Smart behavioral players work to break through the rationality barrier to get to the real objectives and values underneath. 

  • by understanding that professional relationships have different bases and require different techniques from those adopted with social relationships
  • by establishing rapport with the other person: looking for common ground 
  • developing on their areas of interest; even mirroring their speech and body language in order to ‘tune in’
  • by active listening that involves really concentrating and asking questions to get to the root of issues, beliefs, problems, needs, and so on 
  • by tailoring communication to the needs of the recipient 

Tailoring your Message 

The sociable ones: The idealistic ones:
  • Be clear and explicit, don’t just imply. 
  • Show me how people will benefit. 
  • Demonstrate immediate and
    practical results. 
  • Show me respect.
  • Engage with my personal values. 
  • Paint pictures and draw analogies
    that have meaning. 
  • Be passionate and engage my
    imagination. 
  • Show how it will contribute to
    the greater good of human kind.
The theoretical ones: The down to earth ones:
  • Show how it fits into the bigger picture. 
  • Ensure the theoretical base is sound. 
  • Appeal to my intellect and imagination. 
  • Be a credible source of information.
  • Be organized and structured. 
  • Be practical and realistic. 
  • Work logically and systematically
    through your analysis. 
  • Offer proof and evidence.

1. Preparation: Getting as much information as possible not just in relation to the topic under discussion but also in relation to the objectives and values of other parties; being clear about one’s own ‘bottom line’. 

2. Initial exchange: Drawing out other individuals and probing with questions to develop a better sense of their objectives and values; weighing up relative bargain- ing powers. 

3. Negotiation: being assertive; using and observing body language; identifying issues that can easily be agreed and issues that are low-cost to one side but high benefit to the other; being creative about what can be traded; exploring 

possible compromises. 

4. Agreement: summarizing the discussion; avoiding/dealing with last minute conditions. 

5. Implementation: setting out a clear schedule of tasks and responsibilities.

The acquisition of negotiating skills and the ability to apply the techniques just described is becoming increasingly integral to e-government project management 

Components of Massachusetts model: 

  • business problem and scope of work: the problem being addressed; the rationale for the e-government project; and the major tasks to be undertaken; 
  • workplan and time schedule: a Gantt chart ‘not intended to be a project log of each and every small detail, but rather a comprehensive plan of tasks, team resources and timelines’
  • management approach and personnel: for both the steering committee and project implementation team; 
  • acceptance criteria and deliverables: the key outputs from the project and criteria that will be used to judge whether or not that output is acceptable
  • task order budget
  • signatures: of all the key ‘business partners’.

Such structures as the above will allow 

  1. early identification of failures 
  2. mechanisms to disperse learning about both success and failure. 

Why should there be so much politicking around e-government? In short, because two pre-conditions of politicking are met. 

First, there are interdependent groups that have different objectives and values. This is clearly the case in public sector organizations. The ‘interdependent but different’ perspective applies to the formal functional divisions within public agencies. 

Second, there are important but scarce resources involved. 

e-Government brings together in large amounts both critical tangible resources – people, money and equipment – and critical intangible resources – information, power and kudos. They therefore form a key locus for organizational politics. 

Techniques of Influence 

Reason: ‘Relies on the presentation of data and information as the basis for a logical argument that supports a request.’ Reason is typically a first choice for influencing a boss or subordinate, and it often relates to a base of expert or information power. 

Friendliness: ‘Depends on the influencee thinking well of the influencer.’ It is often used with co-workers, but may also be used with subordinates and supe- riors. It often relates to a base of personal power. 

Coalition: ‘Mobilizing other people in the organization to support you, and thereby strengthening your request.’ It depends 

Bargaining: Negotiation and exchanging benefits based upon the social norms of obligation and reciprocate. The resources that are traded are very varied but can include assistance, support and information. It often relates to a base of reward power. Assertiveness: Uses continuous reminders via an insistent and forceful manner. It is often used with subordinates and relates to a base of legitimate power. 

Higher authority: ‘Uses the chain of command and outside sources of power to influence the target person.’ This can be the threat or promise of involving the influencee’s boss, or invoking that boss’ own priorities. It can also involve an appeal to higher ethical or cultural values within the organization. It may involve recourse to outside ‘experts’, such as consultants, or to the media. A variation, much found in e-government, is to blame the technology or the data, though this may fall under the heading of manipulation. Its strength relies particularly on affiliation power. 

Sanctions: Influence through the promise of reward or threat of punishments. In its negative form, this may encompass all formal disciplinary procedures up to dis- missal. It may encompass informal actions: blame, bad-mouthing, bullying. It may also encompass the removal of rewards (e.g. transfer, demotion). Sanctions often relate to a base of legitimate or coercive power. 

Manipulation: Influence by controlling the framing of discussions, or the claimed rules for discussion, or the information that is allowing into a negotiation. Part of this process will be the manipulation of the public discussions and public relations that set much of the agenda for government. This type of approach may also include undermining others involved. 

Withdrawal: Influence through disengagement or non-compliance. 

Time and again, middle managers in public sector organizations have good ideas for new or redesigned e-government systems. Yet they cannot get those ideas implemented. They blame their bosses, or the IT staff, or politicians, and so on. In many cases, though, they should blame themselves for failing to recognize their own need for better communication, negotiation and, above all, influencing skills. 

Chapter 6

Emerging Management Issues for eGovernment 

Great care must be taken that measures are valid (i.e. that they do measure what they seek to measure), relevant (i.e. that they measure something on which the employee’s actions have an effect) and valuable (i.e. that they measure what is organizationally important about the job). IT staff behavior will be skewed by performance measurement towards the measured components of the job and away from the non-measured. Only careful selection of indicators will ensure that this skewing is beneficial for the organization. 

Performance management in the public sector 

  • offer career development opportunities, or psychic pay: quasi-financial incentives such as paid time off or new equipment. In some surveys, public servants rate these above money as preferred rewards. 
  • Use group incentives since individual rewards can demotivate other team members, whereas group rewards tend to encourage collaboration.  
  • do not punish occasional mistakes, only chronic poor performance. Use progressive discipline but also use training and peer pressure. 

Three main focal points for performance indicators can be applied to the IS/IT function: 

Input- IT Measures

Output- Information Services

Outcome- Business Process

Measurement of Performance 

In most cases the measurement procedure will be clear within the indicator definition. Three main assessment indicators:

  • Internal subjective: The measures are based on the judgment of internal clients, such as customer satisfaction rating scales. 
  • Internal objective: The measures are based on objective quantification within the organization, such as the jobseeker placement measure. 
  • External: The measures are based on quantification from outside the organization. 
  • Price testing: Comparing the internal costs of a service with the estimated cost/price of external providers and benchmarking (which includes a broader set of performance measures) 

Control of Performance 

Provider management control: Managers within the IS/IT service provider are responsible for managerial rewards and remedial measures. 

Client management control: Managers within the IS/IT service client are responsible for managerial rewards and remedial measures. 

Client financial control: Managers within the IS/IT service client are responsible for financial rewards and remedial measures. 

Arbitrary basis: The sum paid does not relate to service use but to some relatively arbitrary measure such as the size of the user department. The lack of linkage creates limited financial control on performance; arguably less than that available via a managed service level agreement. 

Cost basis

Market basis 

The central thrust is that agencies must be good at writing documents and at managing projects. It would thus be possible to score a ‘green’ without producing anything that had actually made life better for citizens and other agency clients. 

The more the government charges for its data, the greater the barriers to access become. Yet the wider it allows access, the less it can earn from data sales. 

Access Policies for Freedom of Information

The enactment of FOI legislation has required the development of in-house policies by public agencies within its purview. Typical issues to be dealt with include (DOI, 2002): 

Terminology: Explicitly defining what is meant by terms such as records and requests; and classification of different types of data held by the agency.

Procedures: Clarifying how citizens/ businesses can obtain data direct without requests; how information requests are to be made; and the means by which those requests will be responded to.

Data management: Ensuring that the type of back-office, records and data manage- ment procedures described elsewhere in this chapter are followed so that data and records can be located in a timely and cost-efficient manner.

Performance measures: Setting out performance indicators (typically time taken) for the FOI response service.

Charges: Determining a reasonable level of charges to be levied for searches and copying; determining policy on any fee waivers; putting a billing and payment system in place.

Handling variations: Determining procedures in the case of various types of data/records such as those not held by the agency; those held by other public agencies; those deemed sensitive or covered by privacy legislation; those held by other non-public agencies.

Appeals: Setting in place an appeals procedure to appeal against problems with performance, charges or denial of access.

Responsibilities: Designating specific officers as responsible for FOI implementation, and for appeals. 

Update: Putting in place a mechanism for review and update of FOI procedures (e.g. in response to new technology, case law, organizational changes, new orders, or FOI response performance and feedback). 

Digital Divide

Because of those costs, there is an uneven profile of those who own and use IT: the rich not the poor; the graduate not the school leaver; the ethnic majority not the ethnic minority; the urban not the rural citizen; the young not the old; men not women. 

Pouring resources into e-government can therefore benefit the haves rather than have nots, and increase polarization within society. There are already some signs of this, with evidence that local government electronic service delivery is of poorer quality in areas with lower levels of Internet access 

Governments may set up initiatives focused on increasing access to IT that is government-or-community-owned IT. Such IT may be placed in a variety of locations: 

  • public spaces, such as common areas within shopping malls; 
  • semi-public spaces, such as libraries or sport facilities; 
  • dedicated spaces, such as community telecentres housing a room-full of Internet- linked PCs. 

The watch- word for government must therefore be ‘supplement’ not ‘supplant’. Provision of public sector data and other services electronically should be seen as an additional weapon in the armory that sits alongside traditional face-to-face and phone-based methods. It should not be seen as a way of replacing those more traditional methods. 

Reviewing Sensitive Public Information

The following questions will assist security professionals in reviewing sensitive infor- mation that has been, or could be, made publicly accessible. 

Has the information been cleared and authorized for public release?

What impact could the information have if it was inadvertently transferred to an
unintended audience?

Does the information provide details concerning enterprise security?

Does the information contain personnel information such as biographical data,
addresses, etc.?

How could someone intent on causing harm misuse the information?

What instructions should be given to legitimate custodians of sensitive information
with regard to disseminating the information to other parties such as contractors?

Could this information be dangerous if it were used in conjunction with other
publicly available information?

Could someone use the information to target personnel, facilities or operations? 

Could the same or similar information be found elsewhere?

Does the information increase the attractiveness of a target? (OCIPEP, 2002)

Policies on Disability

the law sets a clear threshold that must be achieved. However, in practice, e-government managers often seem to be ‘satisficing’ the issue: doing just enough to cover their backs but still leaving a gap between policy and practice.

Difficulties

public managers face a difficult balancing act between the requirements of central legislation and the localized needs of the public agency. These may conflict where, for example, the agency has to make the best of an outdated physical environ- ment, or where lack of money means what is ergonomically-best cannot be afforded. This balancing act can appear in the gap between policy on paper and policy in prac- tice. eGovernment managers may develop an internal policy document that fully meets all legislative requirements, but may then not fully implement the document. 

Chapter 7

Success in e-government comes from intelligent selection of individual techniques, from
‘hybrid thinking’, and from action on design–reality gaps rather than from slavish adherence to one particular methodology.

Background understanding of a proposed e-government project comes from asking five
questions: Who is involved? What is the problem? Why is the project happening? What
constraints exist? What will change in the near future?

eGovernment projects can be assessed in relation to their feasibility, priority, opportunity costs, and impact.

Four Core Stages:

1. analysis of what is currently happening, and of whether and why a new e-government system is needed
2. design of the new e-government system’s components
3. construction of the new e-government system

4. implementation of the new e-government system 

Successfully planned e-government systems will therefore be those that require a manageable degree of change. 

In order to assess this ‘degree of change’, the core of the systems development method described here will therefore consist of three activities: 

  1. mapping out the realities of the current situation
  2. designing a proposal for the new situation
  3. assessing the difference between the two, and reacting to that difference 

Systems Development Life Cycle

1. Project assessment: Identifying possible e-government projects; outlining basic project parameters; and assessing whether or not to proceed with the project. 

2. Analysis of current reality: Description and analysis of the seven ITPOSMO dimensions as they exist within the current situation of the organization. 

3. Design of the proposed new situation: Setting objectives for the proposed new e-government system, and then describing in general terms how the seven ITPOSMO dimensions should be different for the new system to meet these objectives. Different options for the new system may be evaluated at this point. 

4. System construction: Acquiring any new technology; undertaking detailed design of the new system; then building it, testing it and documenting it. 

5. Implementation and beyond: Training users to use the new system; converting data to new formats; introducing the new system; monitoring and evaluating its performance and context; then undertaking any necessary system maintenance. 

SSADM: Structured Systems Analysis and Design Methodology, 

No method is perfect but there are dangers for the public sector in adopting some of the harder methods. The public sector has had a tendency to choose such methods which then prove too old, inflexible, top-down, detailed, jargonized and time-consuming (Korac-Boisvert and Kouzmin, 1995). While these might have been appropriate to the routine clerical automations of the 1960s, they work poorly in politicized situations of change and uncertainty. 

 

Review of A World Come of Age: An Intellectual History of Liberation Theology

“Under Crushing Opposition, Love Requires Revolutionary Action”
Father Camilo Torres

Having recently read Padre Guatalupe’s autobiography, my interest was piqued in learning more about the particulars of liberation theology. This curiosity was amplified as I am now attending a Catholic University with a Bolivarian mission in Medellin – the location of conference of bishops in 1968 that would result in the drafting of a number of significant statements that would justify numerous Catholic initiative of a liberationist theme throughout Latin America. As such, I was happy to learn of the recent publication of A World Come of Age: An Intellectual History of Liberation Theology by Lillian Calles Barger. This book, along with conversations with my fellow students and a group of seminarians that I’ve befriended, have greatly helped me to comprehend the Catholic culture in which I now live.

Barger divides her book into four sections: Origins elaborates the social, political and economic factors which lead to the conditions within ecumenical circles that caused people to elaborate novel interpretations of Christian religious doctrines. Reconstructions provides an intellectual history of the philosophical currents that fed into the new method of Biblical exegesis. Elaborations provides deeper analysis of the particularities of the various liberation theology strands and provides a historical accounting of the interactions between those propounding such doctrines and the communities from which they emerged. Reverberations illustrates that while Liberation Theology as an intellectual current within the Christianity may have seen its adherents decline in numbers, nevertheless a variety of the novel perspectives that it sought to disseminate about how to interpret the world have been adopted within various religious and social justice movements. Liberation Theology, it can be rightly said, still speaks to a social, political and environmental concerns that have emerged as a result of various changed that have profoundly impacted the human world.

For those writing within this strain, the true theological task is “orthopraxis” which is “an encounter with the world, rather than tradition or revelation…” Instead of engaging just with a text disconnected from the concerns of the here and now, promising only salvation in the afterlife, Liberation Theology is concerned with bringing the divine order to earth. In Barges’ words: “Fundamentally, the idea of liberation was of a communal process rather than based on the individual, for only in solidarity with others was freedom possible. Awakening the political potential of solidarity among oppressed people called for the advocacy of the committed placing themselves at the nexus of prophetic denunciation and revolutionary change.” Biblical and sociological analysis identified the oppressed with the campesinos of Latin America – fighting the inheritors of colonial titles; with the African-American’s in the United States – fighting the descendants of slave-holders; with women across the world – still under the yoke of a sexist, misogynistic patriarchy.

James Cone’s influence is still profound within the African-American church.

The variances in how the church is viewed; what the goal of liberation is; and how to get there; how this changes given different world-historical shifts and more by different social groups – blacks, whites, Latins, men and women – is masterfully handled by Barger. By delving into the biographical details about the authors of those in this new cannon, historicizing and then unpacking the arguments in their writing one can almost feel as if a part of the intellectual debates that were motivating their religious/academic work. Barger provides a veritable lexicon for concepts that evolve due to new technological and social changes and how despite the fact that Protestants in North America and the Catholics in South America came from very distinct intellectual and historical backgrounds, they still came to similar conclusions about what it means to be a True Christian in a sinful world.

This is especially well done in the chapter entitled Vitalism of Religion. Here Barger depicts how a number of Enlightenment related arguments were related to religion, and later how the prophetic writings of Marx were adapted to a modern understanding of the bible.Towards this end a virtual pantheon of social theorists are described – from Jean-Jacques Rousseau, Ludwig Fuererbach, G.W.F. Hegel, Jose Mariategui, Georges Sorel, W.E.B. Du Bois, William James, and more – and their evidence within various key Liberation Theology texts are describe. Starting with their respective views related to religion, she shows how they are pieced together to form a unique Christian Socialist identity. More than just this, Barges shows their impact in the brief blossoming of a number of schools and political movements. From this and analysis in subsequent sections we see how “Marxist thought provided Latin American liberationists with a significant framework for analyzing inequality and responding to the charges against religion. The goal of social justice based on a structural understanding of society, rather than individual choice, appeared congruent with the prophetic tradition and served as an opening for Marxist-Christian dialogue throughout the twentieth century” (108).

Barges intellectual history also tells the often tragic stories of those that sought to operationalize this conception of Christian solidarity. In the section entitled A Salvic Social Order, chapter we learn the story of Richard Shaull – a missionary like Padre Guadalupe that came to help and then became so disillusioned with the church that he started advocating revolution. Him, like Padre Guadalupe and others such as the now sainted Oscar Romero, often met tragic ends due to the incredibly politically polarized atmosphere of the Cold War. During this time addressing the sins of empire and the sufferings of people was seen as subversive, giving shelter to the enemy of Soviet Power. With the Social Gospel viewed as an ideology aligned with the interests of a predatory foreign power, it’s little wonder that those with a more personalistic view of salvation – the traditional religious establishment – were wary of those that sought to “recover Eden” through a scientific socio-economic practice wedded with a theology of collective, social liberation. The point of division for those who sought to create Utopia versus those that were conservative and sought to maintain relations as is was their understanding of what the implications and duties connected to humanity Original Sin.

Sergio Torres’ writing presented a dialogue between Christianity and Marxism.

As Barger brings the book to a close she shows how that while there were clergy-members in the field involved with pastoral work with a Liberation Theologist orientation, a main failing of the movement was its inability to produce and thus enact specific policy applications. The 1970 conference in Detroit that included black, Latin American and women leaders is depicted in almost tragic proportion. After highlighting how this became a moment for qualitatively altering the level of collaboration and cooperation that this transnational group of religious community organizers, activists and intellectuals – they are shown instead engage in what was, essentially, and intellectual pissing contest. Rather than building a collective platform by which their struggles could synergize their efforts for liberation, they instead devolved to arguing over who faced institutional repression worse and broke.

For all of its political aspirations, the Liberation Theology movement never formed the same sort of sustainable political institutions that those within the Christian Democratic tradition were able to. This is so because of the numerous inherent limits within Liberation Theology as an eclectic philosophy.

Pope John Paul II scolding Nicaraguan liberation theologist Ernesto Cardenal.

The thinkers associated with it may have been able to inspire debate, but nothing much stuck beyond that – proposing no singular national or international program for change that could be acted up with effectiveness, founding no institution and establishing no school. Thus while Liberation Theologians never attained the key features of a recognized movement, the sensibility related to the core tenants it put forward as necessary to positively change the world continues to inspire multiple social movements and political initiatives throughout the world.

 

Potential Book Titles on Venezuela’s Intelligence Operations in America

Since I’ve decided to expand the research I’ve been building into a book, I decided to do a creative exercise as to possible titles for it. Which of the below resonates with you the most?  

*

The New Historic Block: How Hugo Chavez Used Oil Exports to Promote His Vision of Marx

Tracing 21st Century Socialism: A Political Revolution in Venezuela Meets an Epistemological Revolution via Data Science

Building The New Historic Block: How Hugo Chavez Exported Socialism to America

Marketing Marx in North America: Venezuela’s Gramscian Plan to Spread Socialism

Kultural Marxism and 21st Century Socialism’s Trajectory from Venezuela to North America

Marching South to North: How Hugo Chavez’s Specter Came to Haunt the United States  

Children of the Bolivarian Revolution: Venezuela’s PSUV and the Birth of America’s First United Socialist Party  

Towards a Multipolar World Order: How Hugo Chavez’s Multitude of Gramsican Agents Tried to Remake the World

Chavez’s Hopes and Gramsci’s Ghost: The PSUV’s Support of Socialism in America

Officer, Agent, Asset, Stooge: How Venezuela Helped Seed Revolutionary Socialism in the United States

Red Scare 3.0: The Definitive Guide as to the Who, What, Where and Why’s of Venezuela’s Attempted Socialist Infiltration of U.S. Institutions

Poets as Legislators of a New World Order: Anti-Globalization Activism, Solidarity and Why Technics Trumps Specious Ideologies

Ariel Sheen and the TeleSur Archive: How a Determined Activist for Truth Uncovered a Long-Running Violent Anti-Government Activist Network

Precursors to Transatlantic War? How CivOp and MilOp Intersect in Foreign Military Policy

How Guiado’s Superior to Gramsci: Why Pre-Information Age Radicals Add Little to Modern Politics

Illegalism as Pathology: A Longitudal, Iconographic and Textual Based Investigation Into A Foreign Communist Party’s Radicalization Efforts

PSUA: The Story of the Birth of the United Socialist Party of America

Inhibiting Agents of Multi-Polarity: How Political Cadres Funded By Russia and Venezuela Led to Legislation that Finally Addresses New Information and Communication Technologies

Venezuela’s Investments Into American Art and Culture: A Longitudinal Analysis of Systematic Negation of the American State 

Building A Dual Power From Venezuela’s Chosen People: Foreign Artists, autistics, transexuals, and political  Actors Interactions with American Law Enforcement

The Great Recategorization: How Evidence, Data Science and Rubrics Lead to an Algorithmic Shift in an Understanding of How Political Discourse Operates on Facebook

“Why having a Star by your Name on Social Media in the Colors of the Bolivarian Republic of Venezuela is not the same as the one people were forced to wear in the 1940s, you hack!” and 19 Other Disdainful Phrases of Advice for Kultural Marxism Content Creator.

Tales from TeleSUR: An Open-Source Historical Investigation Into The Roots of Phenomenon of Kultural Marxism

Thinking like the CIA: A Case Study Examining Venezuela’s Intelligence Operations in America

Categorical Faces on Names and Places: A Case Study on the Possibilities Inherent in Modern Data

Project-Mapping After Public Data Source Grabbing: Why the FBI’s Investigation into American Political Group’s Funding by Venezuela is Valid and Should Start Again in Earnest

Why Later Historians Will Say Chelsea and Julian Sitting in a Jail Was “Just The Start”: How Venezuela Sought Revancha on America it’s Trans-Atlantic Allies and Lost

Findings of the Investigation Into Whether of Not Venezuela Had A Measurable Impact On America’s 2016 Elections: An Open-Source Research Project That Makes RussiaGate Seem Cute and Quaint

 

While Russia’s SciHub Subliminally Spreads Socialism, GrayZone Spreads Stupidity

The above image is proof that Sci-Hub is covertly trying to encourage students, researchers, academics – anyone who uses their services, really – to embrace communism!

Not only does Sci-Hub have a photo of Lenin pinned on their Twitter page, but they ask you to input text like pinkos, which is a reference to someone that is sympathetic to Communism, and clasts, which auto-corrects to class – a key concept in Marxist philosophy in order to download an article.

Considering that Sci-Hub is hosted in Russia, this must be another example of the Russian government attempting – subliminally – to sow discord around the world!

The below screenshot that I took from a National Bolshevik propagandist’s account provides further proof that what I claim is a 100% incontrovertible fact!

Or maybe not.

Now, to be clear, I don’t *really* think what I wrote above is true at all.

I made this false claim both as I think it’s funny, and as it’s a good manner to highlight the absurdity of this video by Max Blumenthal and Ben Norton from The Grayzone about the relationship between video games, the military and American citizen’s attitudes towards Venezuela.

In the video, Max Blumenthal and Ben Norton make the ludicrous claim that videogames have been “weaponized” into “regime change propaganda”.

And how do they operationalize this claim? They don’t!

Rather than make any sort of effort to justify their claim, they merely state that this is true, thus repeating a variation of long-debunked claims such as “heavy metal music leads listeners to Satan worship and human sacrifice” and “playing violent video games makes one violent”.

I’m not going to make the effort to structure a scientific case that proves them wrong, but I did Google some counterfactual indicators that would provide such evidence of the idiocy of their claims at the bottom.

But first, let me quickly share one more amusing aspect of all this – tracing the story’s origin.

The short path from Venezuela’s state-media company, TeleSUR, to The Grayzone.

The first iteration of paranoia about the 2013 iteration of Call of Duty originated from TeleSUR, which then gets shared by George-Ciccariello-Maher.

Despite the fact that the game scene is exposed selectively contextualized and edited to fit TeleSUR’s paranoid narrative by Charles Murphy, it still gets translated into English and then spit-polished by GrayZone.

Video Game, Violence, Venezuela and Military Indicators Without Any Real Order Below

It’s not propaganda when someone claims that Venezuela’s been deteriorating such that many people want to leave.

English Translation of Towards an Ethics for the Technological World

Towards an Ethics for the Technological World
by Jorge Linares
Universidad Nacional Autónoma de México lisjor@unam.mx
Download original PDF here.

Abstract

This article synthesizes and updates, in part, what I have developed in the book Ethics and the Technological World (2008). The central thesis is that the current technological world has become a global system of dominance over nature and society; It is a network of technical systems that interact by increasing the complexity of interrelations and their temporal and geographical effects, because it is governed by a uniform techno-scientific reason, based on the new “force majeure”. Therefore, it is necessary to analyze and rethink the conditions and structures of the technological world in which we live, as well as to question its rationality and technological imperative of transformation and domination of all natural or technical objects. Technological projects can be reoriented or modified if they involve greater risks to nature and human life. To do this, it is necessary and achievable to rebuild an ethics for the technological world. The four fundamental principles of that ethics that assesses the effects of technological power are briefly exposed: (1) social responsibility, (2) precaution, (3) distributive justice and (4) individual and communitarian autonomy.

Keywords: Ethics; Technological World; Technoscience; Techno-Scientific Reason; Technological Risks.

Introduction

What follows is a synthesis and update, in part, of what I have shared in my book Ethics and the Technological World (Linares, 2008). Contemporary technology has become the determining factor of social praxis, and in the horizon of cognitive and pragmatic relationships between the human being and his world, because it is much more than a set of instruments and technical systems; it is rather a global system in expansion, a network of technical systems (operating through computer mediations and a telecommunications and transport network) that interact increasing the complexity of technological interrelations and the global reach of their effects on the nature and society. The next level of interaction between artifacts, technical systems and human agents anticipates a fourth industrial revolution that will interconnect with the exchange of information, action and knowledge, through artificial intelligence, to artifacts and human agents (Schwab, 2016 ). Therefore, the extension of technological power has also transformed the self-understanding of the human being (both of its own nature and its relations with the natural world), making it the main object of this great project of ontological transformation of the world.

We do not, however, currently have adequate categories to carry out an exhaustive ethical evaluation of the technological world. A discrepancy has arisen between technological power and our ethical conscience, because that power has exceeded our capacity for control – and even understanding – of what we are now capable of producing. Therefore, it is necessary to reflect on the ends, means and circumstances that must guide the transforming capacity that humanity has displayed in this new era, as well as its interactions with the artifactual world.
The intrinsic purposes of the technological system are not an inexorable necessity. Technological projects and systems can be reoriented or modified if they involve greater risks for nature and for human life. Therefore, it is necessary to discuss the need and the possibility of an ethics for the technological world. And for this, I have proposed in Ethics and Technological World (Linares, 2008) four fundamental principles of an ethics that guides individuals and social institutions to analyze and evaluate the effects of technological power: social responsibility, precaution, distributive justice and individual and community autonomy.

2. The announcers of the greatest danger

During the twentieth century, the ends of technological development became a crucial issue of ethical and ontological reflection, even though technology was not one of the topics that most worried philosophers. Among diverse conceptions, a philosophical current emerged that questioned the course of technological progress. Some of the thinkers of this current undertook critical diagnoses very similar to the modern project that advocated a total control of the human being over nature. They also warned of the beginning of a historical crisis that shrouded the foundations of the contemporary world, jeopardizing the viability of many ecosystems, the sources of natural resources, as well as the fragile environmental balances between humanity and the entire planet. This skeptical reflection of different thinkers in the face of technological progress was motivated by a common feeling of fear about the possibility of a major disaster, which could be a direct consequence of the disproportionate and accelerated expansion of technological power, because it would endanger the permanence of the essential features of the human condition, and even the very survival of our species.

Among these thinkers I chose the five who represent in the most complete way a philosophy of “suspicion” about technological progress: Martin Heidegger, Jacques Ellul, Günther Anders, Hans Jonas and Eduardo Nicol1. They read the signs of the Apocalypse in the achievements of the techno-scientific reason, because they warned that the realization of the technological utopia implied the danger of a radical and irreparable deformation of the human condition: the human being would cease to be an agent of his own destiny, because of the imposition of a technological reason that constrains him to a single end. The loss of its diversity of life forms and self-projection capacity would be linked to the destruction of its environment and the imbalance between ethical reason and technological reason. Consequently, these thinkers argued the need to generate a moral reaction that criticized the foundations of the technological world, and that revealed the blindness and unconsciousness with which human beings had given themselves to the imperative of technological reason, without noticing that perhaps they were going towards the dissolution of his own historical being (“being a protean”, Nicol called him), of his inherent freedom to be, instead of heading towards a state of full well-being and overcoming all the restrictions and sufferings imposed on us by nature from our origins.

However, the diagnoses of these five thinkers lead to paradoxical conclusions and place us before the imminence of an inevitable future from which we can not escape, either due to environmental destruction and the depletion of vital resources for our survival, either because of the new technological wars that loom over a humanity that has overpopulated the planet, or because of the radical and irreversible transformation of human nature, the dissolution of its self-conscious reason, the irreparable alteration of the genome or of the human brain, and therefore, of our moral and self-reflective capacities. The analyzes of the five mentioned thinkers lead us to a final observation: our final hour is approaching.

So, I have called those five thinkers the announcers of the greatest danger. They raised their voices in the desert of a society that has been blinded by technological achievements (many of them beneficial and indispensable, without a doubt, but also irrevocable), and that has been blinded by the dangers caused by the expansive human domain over the nature and on its own natural condition. Now we even begin to think (with a certain naive enthusiasm) that the Anthropocene Era has begun, and that terrestrial nature will never be again like before: we have altered and transformed practically all its ecosystems (Mckibben, 2003). Other contemporary thinkers already announce the integration and fusion of the world of natural objects, artifacts and humans in a new “infosphere” in which all objects are integrated through the exchange and processing of digital information (Floridi, 2014).

The characteristic of the diagnoses of the advertisers of the danger inserted in the technological world consists in the anticipation and forecast of catastrophes that are beginning to take shape in the present. The catastrophes that these five thinkers announce are ecological, historical, political-social and even reach an ontological dimension; but, above all, man himself would be in danger as being free and self-conscious, capable of self-containment and of taking responsibility for the entire planet. But his warning calls are like voices of prophets in the desert. Few believe that they were right, few are affected by the “heuristic fear” advocated by Hans Jonas, because most of us remain prisoners of what Anders called the “Promethean mismatch”: we are no longer able to imagine what “We” are provoking. We have lost the moral sensitivity to become aware and responsible for many of the effects of the technological world. Therefore, the philosophical discourse of these announcers is not exempt from an apocalyptic tone and from a pessimistic view of the human condition.

However, behind this pessimism, a firm hope is revealed in the human capacity to recover and preserve the ethical sense of its existence2, while it is still possible.

In a more calm perspective, the central problem for the ethics of the technological world consists in preserving, on the one hand, the civilizing force of social emancipation and individual autonomy that technological systems still entail; but, on the other hand, it implies generating a new sense of collective responsibility (extended planetarily and with scope for the future) that reorients and restrains the negative excesses of technological power, both on the nature and on human life. We need to generate a new sense of collective prudence that is far-sighted and anticipatory, and for this it is possible to have the expanded cognitive capacities of the computer technologies themselves and of the systemic interrelation between artifacts and human agents. At the same time, we will have to distribute in a fairer manner both the benefits and the risks of the technological world, and that distributive justice must include many other living beings that we have affected.

But why? And why put limits to technological power, if it has reported such great general benefits? Is not its course inexorable, impassable? It is precisely the ontological features of the technological world and the particular form of rationality that governs it that denote the source of the greatest danger that advertisers envisioned: its accelerated expansion and its disproportion, its lack of limits, its hubris.

3. The technological world as a primary environment

The technique in its current state stopped being mere instrumentum to become a horizon of possibilities that shapes our primary environment. For the first time, we inhabit an environment of bio-artefactual and industrialized nature, which is full of artifactual objects, separate and -in part- confronted with the environment in which we evolved. Thus, contemporary technology has become a technological world. The return to a natural world would only be possible after a catastrophic destruction of technological civilization. Many of the negative utopias, Mad Max style, have anticipated this in literature and film. The radical transformation of our environment, which goes from the natural environment to the bio-artifactual, does not imply a simple transposition or a conversion in an artificial world that we can lead and govern fully. The technological world subsumes, of course, parts of an untransformed nature, living organisms and natural forces that we can not control or drive because we do not understand them at all.

The technological world is a more complex and entangled hybrid, a hybrid of physis and techne, which is being developed in a systemic and almost organic way, independently of our own designs. We do not yet know how the causes that produce many of the effects of the natural world that remain and articulate with the artifactual systems and the technical socio-systems act. Our current artifactual world is of greater complexity and has become so immediate and, at the same time, inaccessible.

As the authors of Next Nature (Van Mensvoort, 2011), coordinated by Koert Van Mensvoort and Hendrik-Jan Grievink point out, in our time we should reconsider the usual conceptual difference between nature and culture, or between born and grown naturally and what is produced or done technically; since, on the one hand, human intervention has managed to transform many natural entities and, on the other hand, the systems created by humans have become so autonomous that they seem to assimilate to the things that naturally arise without our intervention. Instead of continuing to think about the classical Aristotelian division between things produced by nature and those made by technique (Aristotle, 2001), the Next Nature authors propose to think now of the distinction between what we can dominate or control (technique) and what is not yet, or that is beyond the possibility of being controlled (the truly other). In this way, it should no longer be relevant, if living organisms (micro or macroscopic) are “natural” or have been bio-technologically intervened, but if we can control their design, production and operations, as we can do, to a certain extent, with conventional devices such as telephones, machines or robots3.

We have been able to achieve technical mastery of living beings through a long process of domestication that began thousands of years ago, which now reaches a new level thanks to genetic engineering and synthetic biology. We can extract and modify natural entities such as oil and many minerals; In a certain way we could say that we can “control” the nuclear energy coming from fission; but we can not yet technically control many viruses, microorganisms, climatic phenomena such as hurricanes or tornadoes, or anomalous biological processes such as cancer and other genetic mutations. In the same way, we can not fully anticipate the behavior of systems and things created by human technology: computer viruses, vehicle traffic in cities, or information traffic on the Internet. Thus, our notion of the “natural” must evolve to account for the multiple ways in which we now intervene and modify natural entities and create cultural hybrids, naturoids (Negrotti, 2012) and bioartefacts (Linares & Arriaga, 2016) that are of a different nature from the contemporary technological world. The distinction between what is controllable and what is not will change our old notions (of Aristotelian heritage) about physis and techne: a genetically modified tomato is part of the cultural field of what can be controlled by technology (at least that is what biotechnologists assume), whereas computer viruses or vehicular traffic in large cities would belong to the scope of a new modality of the “natural” or uncontrollable by technology, although its origin may be artifactual or cultural. So the essential distinction between the technical (artifactual or artificial) and the natural would slide towards what can be intervened and controlled and what is not, no matter what its origin. In this way, a new modality of nature is being developed, a next nature; and for that reason Mensvoort maintains that now “real nature is not green”.

Virtually no nature exists that has not been affected or touched by human technical action. Nature in its natural state is fading due to the expansive effect of intervention and technical mastery over all the entities and ecosystems of the Earth (Mckibben, 2003, Purdy, 2015). This implies that, from the epistemic and aesthetic point of view, the differences, previously ostensible, between the natural and the technical, also fade. This process is due to the growing capacity of biotechnologies to modify, alter, (re) design and control the operations of living organisms, tissues, microorganisms, biological molecules, but also all the technologies that have altered the chemical components and equilibria and physical ecosystems, for more than a century. This is due to the advancement of biotechnologies in their capacity to intervene in living matter, and to abiotic technologies, in their ability to transform matter and energy in general. The digital and computerized convergence seen now will be between abiotic artifacts, bioartefacts and human subjects, exchanging digital information and genetic information, combining their materials and structures through nanotechnologies and info-bio-technologies. Thus, in the technological world, the onto-technological transformation of matter, both inert and alive, in new forms of objects, materials and living organisms unprecedented in natural nature will most likely occur.

The underlying process, in any case, for this radical mutation in the contemporary world is the development of technoscience and technologies since the 20th century, as the last manifestation of the modern project of technical domination of the whole natural reality. The main objective of this global civilizatory project is the domain and technological intervention in nature, both biotic and abiotic. It has consisted in a colossal project of technical colonization of nature to adapt forces, entities and natural processes to human ends, to provide sufficient means for the material well-being of humanity, as pointed out by Ortega y Gasset in his Meditation on Technique (Ortega y Gasset, 2015). From the modern view of technoscience, every natural entity and, in general, nature as a whole system are shown as available to be raw material of very different kinds of productions; to be transformed, altered and adapted to the forms and functions that humans need, imagine or desire. This universal device of technical modification that compels all current societies is what Heidegger called the “essence of technique,” or Gestell (Heidegger, 1995).

Thus, every natural entity acquires only an instrumental value, while its inherent value is irrelevant to the techno-scientific vision. In this dichotomy between the instrumental and the natural, the onto-technical distinction between the natural and the artefactual emerges4. Following the classical Aristotelian conception between what is generated by physis and what is produced by techne, the natural is that which has not been intervened by the human agency in none of its four causes (material, formal, efficient and final). The artifact necessarily implies that something, however natural it may be, has been intentionally intervened in at least one of its causes. The artifactual only exists and remains because of the purposes, purposes and human designs, while the natural remains totally apart from these. The artefactual must contain an extrinsic purpose, assigned by human agents (in the future they could be IA agents); while natural entities (living organisms, typically) have intrinsic or immanent purposes (hence their “inherent value”, in addition to being manifestations of an evolutionary chain). However, as Keekok Lee points out:

The most radical and powerful technologies of the late twentieth and twenty-first century are able to produce artifacts with an increasing level of art-facticity. The challenge posed by the modern homo faber is the systematic elimination of nature, both on the empirical and the ontological levels, and in this way, generating a narcissistic civilization (Lee, 1999, 2).

Consequently, the project of the techno-scientific civilization intends to convert everything that exists in nature into an artifactual product; Within this purpose, radical transformation is included, in ontological, axiological and aesthetic terms of all living organism in an artefactual living organism, that is, in a bioartect, with different degrees of artifactuality or artifact, depending on the degree of scientific knowledge and technical control that has been achieved.
This is the work plan of biotechnologies, nanobiotechnology, genetic engineering and synthetic biology. Nature thus becomes, through these powerful biotechniques, a bio-artefactual hybrid, acquires a cultural, flexible, plastic form and evolves along with our cultural representations, ends, ideals or debates and social controversies. In this way, the philosophical challenge that disturbs and causes astonishment is whether this advancement of the technosciences can lead us to a situation in which the difference between the natural and the artefactual is completely diluted, that is, in which the artifactual replace everything natural irreversibly. This is the ultimate purpose in the Age of the Anthropocene. In this way, we would have a completely manufactured nature, nothing would be left of nature in its natural state. This is what we can call a bioartefactual revolution in progress.

The worrying thing about long-term modern technology might not be that it threatens life on Earth as we know, because of its polluting effects, but it could ultimately be the humanization of all nature. Nature, as “the Other”, would be eliminated (Lee, 1999, 4).

4. The Rationality of the Technological World

The rationality that governs this technological world is a new and powerful modality of pragmatic instrumentality whose goal is the achievement of maximum efficiency in the control and domination of natural entities and social systems. This rationality is characterized by its ability to reduce the entirety of nature – not just the human being itself- to act as a reserve available for manipulation or technical transformation. The danger to man’s being (which the five announcers envisioned) resides precisely in the illusion that everything that comes our way exists only insofar as it can be used or technically transformed. To this end, the technological reason has managed to subordinate scientific reason and has been able to displace the theoretical reason (scientific or philosophical) of the central position it occupied in the history of Western civilization.

Technology has become the necessary and indispensable environment for the pragmatic ends of human beings because they have become primary goals, displacing the theoretical and contemplative, the aesthetic or religious and any other modality that does not respond directly to the pressure of the need. The new technological reason is, as Nicol thought, a force majeure that predominates in all areas of social activity. The technological reason now configures the conditions of human experience: the way in which we represent the world, the way in which we act in it and the criteria we use to value it. It is no coincidence that we are obsessed with measuring, calculating, transforming, instrumentalizing, reifying, converting everything we find in the world into an object, commodity and economic value.

Now the technological rationality (uniform and universal pragmatic rationality) has become predominant and threatens to extinguish the theoretical rationality and all disinterested forms of relating to things. This is the phenomenon that Eduardo Nicol calls force majeure: it consists in the emergence of a unilateral reason that is imposed by necessity on free actions (hence its greater force), which does not run dialogically, which does not give reasons, that it is indifferent to the truth, that it is violent because it is based on force, that it subordinates individuals and institutions to a new form of unnatural necessity in a totally artifactual world. The two forms of reason are now confronted, theoretical reflection, detached from pragmatic and productive needs, struggles to survive, bearing witness to the emergence of reason of force majeure. If the theoretical reason declines until eclipsing itself (Nicol, 1972), the independence of human reason and the possibility of a free connection with the totality of being would be lost through the search for truth, beauty or simple shared reality. It is no coincidence that in the technological world of instantaneous communication networks, truth is no longer a social reference. In the technological world of digital virtuality, anything can seem true, real or current. Only the dialogical logos of reason that gives reasons is capable of recovering the world of objectivity and reality, both natural and social.

Technological rationality is imposed as a kind of imperative that places the human being to transform and exploit the natural reality. This “technological imperative” implies that everything that can be done technically is morally justified and that, at least, everything technically possible is in the process of being realized and must materialize. There again appears the greatest force of technological reason: our destiny is already defined by it. Of course, technology is conditioned by a series of social, economic and political factors, but the idea of ​​the “technological imperative” points to the foundation of technological rationality: a relentless collective will of power over all the objects that are or should arise in the world. The increase of power (maximum effectiveness and efficiency to convert every object into a commodity, and all value in exchange value for the world market) is the ultimate goal to which all other conditions and all the ends of human agents are subordinated.

5. Artifacts, Systems and Technological World

We usually think of technology only as an object or instrument “at-hand”6 that we can use and control at will. That was the general condition of the technique in past history, but it is not now. Until the beginnings of modernity, the technical world was composed of instruments, tools and simple systems. The present is a technological and techno-scientific world that concatenates multiple technical systems, artifacts, natural systems and human agents, and that gives them more and more agency to all artifacts and technical systems. The medium that has been developed to interconnect them is digitalization and computer systems, but this was only possible on the basis of a material interrelation of the industrial and productive systems that transformed matter and energy as a global base of new technological systems. The most serious problems in the technological world derive from this extractive and productive material base: they are still based on the extraction and exploitation of land and sea resources, the combustion of fossil energy and its transformation into materials of different nature, as well as in their conversion by combustion in electrical energy. This material world of high extraction is the base of the technological world of telecommunications networks and digitalization of all information.

Now, the concrete artifact is not, in general, the nucleus in which the problem of the ends and values ​​that determine the actions of the contemporary technological world is revealed, but precisely the place in which they are hidden. Before the instruments and devices of the technological world, the ends seem clear and explicit in the immediacy of the actions. The whole problem would be reduced to choosing between an appropriate use and an inappropriate use of the artifacts. It would seem that the relationship of ends and means is transparent and that it is easy to evaluate technologies and anticipate or prevent risks. This has been the thesis of the anthropological-instrumental conception -as Heidegger called it- that still predominates in our common sense. This conception supposes that the subject can always manage the instrument at will and determine its purpose, and that the technique is no more than an inert medium and without its own agency to do something, which is under our control, which is left to use as soon as you want and that has no own purposes or complexity. But it’s not like that. To a large extent, one of the primary objectives of an ethics for the technological world is to deconstruct this instrumental representation of technology and show its limitations. Artifacts and devices only exist, have function and agency in a network of multiagency interactions in the technological world. This is a “hyperobject” that does not already have an encompassable and manipulable dimension (neither fully comprehensible) as a thing or a conventional object and spatially and temporally delimited7 (Morton, 2013). But it is the most concrete, and in it unfold ends and causes that are not visible, nor easily predictable, nor do they depend on the intentionality and will of the human subjects. The system of the technological world has not come alive by itself, like a huge Frankenstein, but has reached a level of complexity and almost organic systematics that works by its own logic and impulse compelling human subjects to subordinate themselves to the technological world.

As we pointed out, the interconnection and communication between abiotic artefacts and human agents through computer technologies is already being seen as the next necessary step (Schwab, 2016), which will accelerate the systematic and organic action of the technological world. Therefore, contemporary technology is much more than a set of instruments and technical objects, it is rather a global system in expansion (as Ellul thought); it is a network of technical systems8 that interact by increasing the complexity of the interrelationships and the global reach of their effects on nature and society, both in the geographical space and in physical and historical time. Its effects and consequences are cumulative and entropic, some irreversible, but many of them practically unpredictable. For this reason, the epistemic complexity to understand, evaluate and calculate or measure the causes and effects of the technological world has increased beyond our natural cognitive capacities.

Much help is now required by the systems and computing devices that already carry out the massive data mining (big data) that generates and drives the technological systems. But that world that we have built with our actions and decisions is no longer within reach, neither in cognitive terms nor in practical terms. An ethics of the technological world must understand how technology acts in both the hyper-objective and the world-system, through an action imperative manifested in large technological systems, for example, in the telecommunications and information technology network, or in the industrial production chains, their distribution and global commercialization and their environmental waste or their incorporation into the human body.

Faced with this systemic dimension (not instrumental) of the technological world, which is not evident in the immediate technical objects, the philosophy of our time faces the challenge of discerning what is the meaning and ultimate goal of the technological world; that is, to clarify the purpose of the deployment of a will to power that compels the human being to carry out and develop everything technically possible, transcending the limits of culture, society and nature itself.9

The properties of the technological world that impel ethical limits

An ontological conception of the technological world must delimit what are the essential features and emergent properties of our current world, because these concepts constitute the basis for a more effective ethical inquiry that is not reduced to a personal or local dilemma, but that includes the planetary dimensions of what is at stake.

1. Artifactuality and artificiality. The technological world is not natural; nature has been subsumed, transformed into the technological environment and converted or subsumed into artifactual and artificial systems.10

2. Pragmatic and economic rationality. In the technological world any natural object can be converted into an artifact and any artifact into a commodity or object with exchange value, enhancing its use value. Its ultimate purpose is the search for maximum efficiency and operational efficiency in all orders of human praxis. However, in the technological world, values ​​and technical goals are often in conflict with the economic ones of the capitalist world. We must point out that the current technological world is completely subordinated to the world of globalized capitalism.

3. Artifactual location of nature and living beings (bioartefactuality). The technological world is based on a universal availability of every entity to be reduced to the object of transformation and technological manipulation, to convert all nature, in its parts and in its systems, to living organisms and their biochemical and cellular components, genetic and genomic, in an artifact or technological product, patentable and marketable, before being used effectively.

4. Progressive self-growth and global dimension of its scope, both in space and time. This self-growth entails a relative form of autonomy with respect to social systems (economic, political, ethical). Self-growth is the basis of the ideology of technological progress and the imperative of artifactual innovation. This imperative of innovation arises not only from social needs, but from the needs of growth of capital and markets. One consequence of this geographical expansion is the uniformity of values, ways of life and cultural criteria. The technological world is a homogenized and normalized world.

5. Complex, organic and systemic interconnection. The technological world is a system of increasing complexity due to the intentional or accidental interconnection between the different and different technological subsystems. The interconnection has advanced in two dimensions. First, by interconnecting abiotic devices with each other through computer devices; then to these with the human agents. A third level will be the computer interconnection between artifacts, humans and computerized bio-devices. In a first dimension, it is physical information, through electronic supports, what is communicated and processed. The second dimension is the exchange of genetic and biological information between living organisms (including, of course, humans). The third dimension of interconnection could be the combination of physical and biological information at a molecular or atomic level, at a bio-nanotechnological level. The interconnections build new technological systems of greater reach and penetration, both in the material structures of objects or organisms and in the global networks of interaction of the systems.

6. Generalized but diffuse risk and danger of systemic collapse. We now live in a “risk society” as characterized by Ulrich Beck (1998), because technological power can cause irreversible damage to nature, to living organisms and to human life. The systems can collapse and, nevertheless, remain functional, as long as the sources of energy or matter are not exhausted, this is already the case with ecosystems or urban systems. Risks increase, and are complicated by the effects of global climate change and biodiversity loss, but their social perception becomes diffuse and this is derived from the characters I mentioned previously -centralization and increasing dependence, self-growth, systemic interdependence. The possibility of catastrophic accidents occurring in technological systems is increasing due to interdependence, the global dimension, centralization and progressive chain-linking. Chernobyl was just one example of the major technological risk in the contemporary world. If technological catastrophes are possible (although they seem unlikely), this rationally obliges us to anticipate and foresee the worst. The risk has increased, in addition, to the extent that techno-political decisions are concentrated in a few people,11 because the technological systems are centralized and depend on artifactual monitoring systems and still on human agents who must make crucial decisions.

7. Relative autonomy of technological systems. The technological world seems to progress and grow in an autonomous way. Therefore, the challenge for the ethics and politics of our time is to establish bases for the control and social evaluation of technologies, through a new culture of ethical values ​​and co-responsible actions among scientists, technologists and the rest of the society. Technology and technoscience can not equip them themselves with ethical ends and criteria. It is the entire society that must evaluate, conduct and guide them according to principles and rules based on the vital interests of humanity, and through more open deliberation and decision processes involving all users and possible affected.

The autonomy of technological systems is not only ethical and political, it is in itself an epistemic challenge. As the power of intervention and action in the technological world grows, the effects and consequences (both planned and unforeseen) have spread geographically to the entire planet and temporarily to the remote future.

A new social power, arising from the ethical awareness of the traits that characterize the technological world, is necessary and possible to face the negative consequences of technological power, without having to renounce its undeniable achievements and without restricting the freedom of techno-scientific research.

7. The Principles of Ethics for the Technological World

Based on an ontological conception of the technological world, we can formulate a series of basic principles for an ethic that faces its consequences, unprecedented challenges and risks that are difficult to predict. But this implies the need to question and surpass certain limits of the western ethical tradition. According to Hans Jonas (1995), ethics hitherto were based on two premises that prevent fully face the new conditions of globalized technological action:

the human condition is fixed and immutable
b) the scope of the human action and, consequently, responsibility has short reach in space and time.

From my point of view, anthropocentrism, ethnocentrism and limited spatio-temporal scope12 are the three features that have aggravated the “Promethean mismatch” (Anders, 2011) that occurs between a technological power that expands in an unlimited way and our conceptions and institutions, as well as ethical and political decisions, which are disjointed and do not respond to new historical conditions. In particular we can point out:

Anthropocentrism. Our ethical tradition has not incorporated as objects of moral consideration other living beings, as well as the natural environment as a whole as “moral patients” that receive the effects of human action. In the purest Kantian tradition, only the human remains a source of moral duty for the majority. At the same time, we continue to think that human “nature” is fixed and invulnerable, that human beings can not be the object of radical technological transformation. However, one of the most challenging technological goals is the overcoming of the human condition, technological transhumanism.

Ethnocentrism. The Western ethical tradition has given priority in its moral consideration only to a cultural group that is supposed to be homogenous (the Western, Christian, “white” world, which uses technological reason and believes blindly in the benefits of the world capitalist market and in representative democracies, now tele-governed by technocratic elites). In this way, the illustrated project of technological reason has also involved the project of dominating one culture over the others, trying to impose “their” universal values. The result has been a violent and, at times, genocidal and ecocidal domain. Technological ethnocentrism – which has been fundamentally Eurocentric and Occidentalist – clad in techno-idolatry and blind faith in technological progress – has prevented humankind from reaching a truly universal vision of the elementary ethical principles that will be necessary to face the new global challenges.

Ethnocentric prejudices have been analogous and joint to the prejudices of “species” (which justified anthropocentric domination over other animals): racism, slavery, anti-Semitism, etc. Ethics for the technological world must be affirmed in a paradigm that recognizes the community (biocultural, genetic) and, at the same time, the diversity (historical and cultural) of the human condition. It must rescue and protect traditional knowledge and avoid the biopiracy of the technical and bio-cultural goods of many communities; it must avoid environmental destruction and the excessive extraction of natural resources or the plundering of territories where the ancestral communities live or that predate the technological modernity.13

The limited vision of the spatio-temporal reaches of human actions. Western ethical tradition has functioned as an ethic of proximity, both spatial and temporal. Hans Jonas (1995) points out that this conception can continue to apply to the sphere of interpersonal relationships, but not to the technological world in which human actions are integrated into a complex system and, therefore, have remote reaches, affecting the future generations of human beings and the entire biosphere. For the first time in history, the humans of the future must count on their survival interests, as well as those of the present. At the same time, “an ethic for the future” implies building an ethic that enforces the inheritance that our ancestors left us and that repairs the damages to those who have already been victims of the technological world. These victims have not been only human, thousands of species have become extinct or are seriously threatened by the relentless development of technological power.

Based on the thesis of the announcers of the greatest danger, ethics for the technological world can argue that signs already exist in the current situation that would imply the possibility of different catastrophic scenarios. If there is the possibility of this greater danger, then the new moral imperatives will enunciate the basic principles to ensure the continuity of the existence of a humanity capable of responsibility, a humanity that preserves its essential ethical condition. But this is only possible if what is left of the natural world is protected and preserved. The technological world can not end up engulfing all ecosystems or continue to deplete natural resources or accelerate the extinction of species and the loss of biodiversity. Water, land, sky, living organisms are the new objects of protection of collective responsibility, a precautionary responsibility and that is capable of acting with justice among humans, as well as between humans and the rest of living beings.

In particular, a task of ethics for the technological world focuses on the critique of the ontological and moral anthropocentrism of the Western tradition: the limits of the moral community are not identical with the limits of the human species. All the individual living beings and the collectives formed by them deserve moral consideration because they possess an intrinsic value (not instrumental, not technical), and are in charge of our responsibility precisely because our technological actions can endanger their existence. The critique of technological anthropocentrism does not imply denying the uniqueness and ethical irreducibility of our species: only human beings are moral agents, capable of obligation and ethical responsibility. On the contrary, it emphasizes our ontological singularity: as long as the technological reason of force majeure does not obliterate our ethical reason and our capacity for awareness and empathy with all that is alive, we are obliged to respond and react to save what remains of the natural world.

However, our ethical tradition requires a radical transformation that must go in the sense of extending the field of moral consideration beyond human beings, but without betting on a superficial and egalitarian biocentrism that advocates an identical value for all forms of life. It would be, rather, to look for an intermediate and perhaps provisional position (a moderate anthropocentrism and a hierarchical biocentrism), since it must be constantly revised by a global and intercultural dialogue. Among the most complicated decisions are how to intervene or act to protect other living beings and whole ecosystems, because any technical intervention will have effects. Furthermore, for living organisms that have been transformed into bioartefacts, different obligations are imposed than for living organisms (especially plants and animals) that have not been transformed, dominated or incorporated into the technological world, since they must be preserved in natural reserves. These are basic principles of environmental justice between living beings that must put ethics into practice for the technological world. As an ethic of self-containment of technological power (Riechmann, 2004), the enormous challenge in the technological world will be to limit the excesses of that power and to deactivate the rhythm of production, extraction, exploitation and destruction of nature. Much more problematic will be the necessary actions of remediation and ecological recovery of the ecosystems. In these actions, a technical intervention is necessary that must be prudential and with very limited objectives.14

The principles of an ethics for the technological world must be in correlation and in constant confrontation, but on the condition that they do not eliminate each other, maintaining a minimum level of individual and collective action. These principles will aim to revitalize a set of universalizable values ​​to reinforce the ethical links of humanity with its world, both natural and artifactual. The technological rationality can be contained and reoriented taking its own criteria of operational efficiency, as well as its resources and computing and cognitive, productive and reconstructive devices of the natural and social world.

My hypothesis is that it is possible to achieve the formulation of global and transcultural principles that support criteria of technoscientific action valid for all humanity, recognizing and respecting the historical-cultural plurality of existing moral conceptions and practices, as well as traditional knowledge and values local. And this is possible if the global, systematic and extended scope of actions and interconnections of the technological world are taken advantage of. The negative features that the critics of the technological world pointed out could be reversed, because they contain the potential to support a set of universal and differentiable values ​​that have practical efficacy, as long as it is possible to establish social and international agreements for the evaluation and effective regulation of technological systems.

8. Conclusion

To conclude this synthesis, I will comment on the principles of an ethics for a technological world.

A) Principle of responsibility that determines what we are obliged to care for and preserve the integrity and dignity of human life in the first place; that is, the primordial object of responsibility is a human life that preserves its characters of ethical conscience and free action, of finitude (birth-mortality), vulnerability, unity and biological-genetic community. The first moral obligation is, then, to ensure the existence of moral beings with responsibility. Therefore, the analysis and evaluation of eugenic or transhumanist anthropotechnologies is problematic.

Responsibility implies the development of scientific knowledge to prevent and anticipate the negative effects of technological intervention, as well as the widest possible dissemination of what is known about risks and harms, so that society can make decisions through democratic procedures that involve those directly affected. The principle of responsibility implies a profound questioning of our democratic institutions and practices, as well as the individualism and fragmentation of social life. If the danger that lurks is common (the global ecological crisis), the ethical response must be coordinated and the risks must be shared equally. If the technological world is systemic and global, the ethical-political response must also be systemic and globalized.

B) Principle of precaution that indicates that, in the event of a danger based on reasonable forecasts, although there is no conclusive scientific evidence, and if the possible damage is incalculable or greater than the expected benefit, it is necessary to review the technological action planned, stop it, modify it or inhibit it. The precautionary principle does not reject every risk and every type of damage that is the effect of a technological action, first of all, because many of the effects are unpredictable; but it indicates that the damage or badly expected, with well-founded reasons, can not be incalculable or ostensibly greater than the projected benefit. The damages and risks must be maintained at a rationally acceptable level, as long as they do not imply an unfair distribution among society.

C) Principle of protection of individual and community autonomy. Technological actions must protect, favor and strengthen individual autonomy so that each subject can decide in a responsible way about their body and their own life, without affecting or restricting the autonomy and freedom of others. Individual autonomy can collide against the principle of responsibility. The biotechnological possibilities of transformation of corporality would be an exemplary case. The biotechnological modification of the body would be an individual right, but at the same time, it could put at risk some trait of the human condition. Therefore, this technological intervention on the human body and mind must be very prudent, and advance first in negative eugenics actions to cure diseases and disabilities and equalize development opportunities. Likewise, the principle of community autonomy implies recognizing the right of different communities to use other means or to reject, with well-founded reasons, technological systems and innovations that affect their territories, natural resources or material cultures. The loss of bio-cultural diversity (such as sowing and cultivation methods or therapeutic and medicinal techniques that use natural resources) is also a serious decrease in natural and biological heritage.

D) Principle of distributive justice of technological benefits, but also of risks. Not only does it mean that more and more people benefit from technological development and that the gap in living standards between rich and poor countries is narrowing, but also that the risks are reasonable and socially and internationally shared. Ecological problems affect everyone, but the risks and harms increase for the most vulnerable in the socioeconomic scale.

The ethical principles indicated are only the axiological bases for ensuring the continuity of a humanity capable of being responsible for the effects of its techno-scientific power, a humanity that preserves its essential ethical condition, that is capable of being responsible for the natural environment on which it depends. to survive, as well as the bio-cultural and techno-scientific heritage that will bequeath to future generations.

Footnotes

1 Main works in chronological order: M. Heidegger, The question by technique (1949); J. Ellul, The technique or the bet of the century (1954); G. Anders, The Obsolescence of Man (1956); E. Ni-col, El pro-venir de la filosofía (1972), and H. Jonas, The principle of responsibility (1979). In Ethics and technological world, I dedicate separate chapters to each one to analyze and evaluate their diagnoses.

2 The ethics of anticipation of catastrophes reveals that it is precisely the indeterminacy of the historical events that we are witnessing (techno-scientific innovations and their repercussions in the world) that allows us (and does not oblige) to think about the possibility of a scenario. negative, result of present actions. Posing the possibility of catastrophe does not imply a deterministic conception of history and a denial of human freedom, but quite the opposite. It is the call to collective responsibility to preserve the limits of the human condition. The greater evil is possible as a consequence of our own actions; Our responsibility is to anticipate, anticipate and avoid it at all costs.

3 The concept of technical control is fundamental in current technological operations. Control involves a wide range of cognitive and practical actions. It includes the actions of inspecting, monitoring, checking, supervising, as well as intervening, regulating, moderating, limiting, governing and, finally, the highest degree of control is the domination of an object or system of objects.

4 We will always refer to the relationship and dichotomy between natural / artefactual and not between natural / artificial, as they say. The artificial can come to replicate the natural, at least in its forms and functions; while the artifactual can also be natural, at least in its intrinsic materiality and ends, but it will always contain a degree of artificiality, since human work inserts functions or purposes that are not natural in the bioartefacts, but simulate or imitate processes natural, as is the case of transgenesis or genetic horizontal transfer between species, which is produced technically in GMOs replicating what, rarely, happens in the biological interaction between natural species.

5 Keekok Lee uses the term artefacticity, “artifact”. I have preferred to use artifactuality and bioartefactuality. Both terms are adjectives that indicate the quality of being products of the technique (art) and not only of nature. Thus, the terms I use are the following: a) artifact or abiotic artifact, which is done by technique and is not a living organism in and of itself; b) bioartefact, the biotic artifact that is the result of technically modifying a living organism, but as such it subsists by itself and in itself as a “natural entity” linked to other living organisms and linked, in principle, to evolution; d) bioartefactual, quality that is predicated of a living being after having been modified by technique; e) bioartefactuality, a substance that indicates the scope in which and for what occurs the bioartefactual; f) bioartificial, a quality that is predicated on an artificial biotic artifact or without natural biotic material that imitates or replicates in its basic operations a natural entity, with different biochemical components and structures (another form of genetic code or chemical compounds), but which it would not be by itself a living natural organism evolutionarily linked to others; g) bioartificiality, a noun that indicates the sphere in which bioartificial events take place. This last modality of artificial bio-artifacts has not yet been produced.

6 This is the usual conception of the technique that Heidegger called “anthropological-instrumental” in his famous The Question for Technique (1949).

7 According to Timothy Morton (2013), “hyperobjects” are characterized by their viscosity or elasticity, their non-locality or spatial dispersion, their “temporal undulation” or diffuse persistence, their discontinuity in phases, and their interobjectivity or interaction with many other objects. Hyperobjects can be natural phenomena, social or artifactual systems.

8 The concept of “technical system” has been coined by Miguel Ángel Quintanilla in Technology: a philosophical approach, Fundesco, Madrid, 1989. (2nd ed. In Fondo de Cultura Económica, México, 2017). A technical system comprises artifacts, materials, energy, human agents (operators, designers, users, etc.), specialized knowledge, techniques, actions and operative processes, values, purposes and specific purposes.

9 The rationality that dominates in the technological world supposes that the natural reality (including human reality) is modifiable in accordance with the goals that we propose, because nature can be reconfigured at our whim. The technological world has no limits, both in the sense of its geographical expansion and in that of its action capabilities, since everything is in an evolutionary flow, nothing has a fixed structure and structure, nature and man himself can be reconfigured and rebuilt, everything is technically possible. The liquidity of technological ontology is a principle of neutralization of the value of all entities, natural or artifactual, equating them as objects-instruments-goods. For this reason, Anders commented that in the technological world a new form of axiological “nihilism” predominated: everything is equal or not valid if it can not be transformed, used and converted into a technical object with value in the world market.

10 It is convenient to distinguish between artifactuality and artificiality. The first expresses the transformation of any object, matter or process into an artifact or technical object, a transformation that implies, at least, the modification of some of its causes and the introduction of a purpose or function assigned by humans. In contrast, artificiality involves the construction of artifacts that simulate, imitate, replicate or substitute natural objects, processes and systems, but which are made of non-biotic materials, such as artificial hearts, artificial legs or arms, artificial pearls, artificial textiles, artificial teeth, artificial intelligence, artificial respirator, artificial flavors, etc. The artificial is also called synthetic and normally the prostheses are artificial artifacts. The next step posed by synthetic biology is the construction of artificial bioartefacts, made of materials, components and biochemical (genetic, cellular and molecular) structures that are not natural or unprecedented in nature, but that replicate or imitate the way they work, The living organisms develop and reproduce.

11 The great imminent risks in fossil, nuclear, chemical, informatics, genetic and biochemical, neurological or nanotechnological technologies now have a potential global reach that would extend over time, which is why they are not compensable in economic terms. There would be no insurance premium to cover the destruction that these technologies would cause, if they were to fail (Beck, 1998).

12 We can also add androcentrism, since it has become more evident in our time than in many of the debates and technological controversies there is a problem of gender equity. Currently, both the development of technosciences and the crucial decisions on technological innovation and regulation remain in the hands of men. The lack of prudence and the overvaluation of risk-opportunity for techno-scientific development are usually identified as more masculine than feminine values. What would happen to a more feminized technoscience, more empathetic with nature and living organisms, more prudent and balanced, with less effort to dominate and exponential growth in the production and extraction of natural resources?

13 There have been many problems and debates about technological projects that, backed by governments, expropriate or allow the exploitation of natural resources in places where traditional communities live. This was the case in Mexico with the case of Wirikuta, sacred site of the Huicholes Indians (in Nayarit, northwestern Mexico), which was granted to foreign companies for the massive extraction of minerals. See: https://es.wikipedia.org/wiki/Wirikuta

14 For example, it would make sense to revive biologically extinct species if their ecosystem functions are essential, but not to try to revive species that went extinct millions of years ago or viruses and bacteria that have been eradicated due to their dangerous and lethal effect on human health.

Bibliography
Anders, Günther (2011). La obsolescencia del hombre, vol I. Valencia: Pre-textos.

Aristóteles (2001). Física. México: UNAM.

Beck, Ulrich (1998). La sociedad del riesgo. Barcelona: Paidós.

Ellul, Jacques (1954). La Technique ou l’enjeu du siècle. París: Armand Colin.

Floridi, Luciano (2014). The 4th Revolution: How the Infosphere is Reshaping Hu- man Reality. Oxford: Oxford University Press.

Heidegger, Martin (1995). La pregunta por la técnica. En Conferencias y artículos. Barcelona: Ediciones del Serbal.

Jonas, Hans (1995). El principio de responsabilidad. Barcelona: Herder.

Lee, Keekok (1999). The Natural and the Artefactual. The Implications of Deep Science and Deep Technology for Environmental Philosophy. Maryland: Le- xington Books.
Linares, Jorge E. (2008). Ética y mundo tecnológico. México: FCE/UNAM. Linares, Jorge E. y Arriaga, Eelena (eds.) (2016). Aproximaciones interdisciplinarias a la bioartefactualidad. México: UNAM.

Mckibben, Bill (2003). The End of Nature. Humanity, Climate Change and Natural World. London: Bloomsbury.

Morton, Timothy (2013). Hyperobjects: Philosophy and Ecology after the End of
the World. Minneapolis: University of Minnesota Press.

Negrotti, Massimo (2012). The Reality of the Artificial. Nature, Technology and
Naturoids. Berlin: Springer.

Nicol, Eduardo (1972). El porvenir de la filosofía. México: Fondo de Cultura Económica.

Ortega y Gasset, José (2015). Meditación de la Técnica. Madrid: Biblioteca nueva.

Purdy, Jedediah (2015). After Nature: A Politics for the Anthropocene. Cambridge, MA: Harvard University Press.

Riechmann, Jorge (2004). Gente que no quiere viajar a Marte. Ensayos sobre ecolo- gía, ética y autolimitación. Madrid: Libros de la Catarata.

Schwab, Klaus (2016). The Fourth Industrial Revolution. Geneva: World Econo- mic Forum.
Van Mensvoort, Koert (ed.) (2011). Next Nature. Amsterdam-Barcelona: Actar.