How is technology shifting authority from centralised command structures to flat forms of organisation?

Embed Size (px)

Citation preview

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    1/34

    33161982 Anca Pusca Dissertation

    How is technology shifting

    authority from centralised

    command structures to flat

    forms of organisation?

    Table of contents

    Table of contents

    Chapter 1: Introduction

    Terminology

    1

    https://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.hsafe35aekmnhttps://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.1wrrss6c3fedhttps://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.olqhhrdkidqg
  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    2/34

    33161982 Anca Pusca Dissertation

    Chapter 2: Control through technology

    Chapter 3: Networks as a means of distributing power

    Chapter 4: Distributed networks to achieve coordination

    Chapter 5: Case studies of coordination using networks

    Coordination of information products

    Real world, time sensitive coordination

    Commercial application

    Recruitment, termination and mentoring

    Leadership

    Importance of culture within an organisation

    Chapter 6: Future of a networked society & conclusion

    Bibliography

    2

    https://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.ss5ysy6dus6shttps://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.sxtrsxhp3ax2https://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.3m8bba3h462dhttps://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.b9rv2m6jcswqhttps://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.dyk6lc4k5trehttps://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.9vy06p3jytbshttps://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.yvnrchu19ts1https://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.li41e6r8arl9https://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.h2xhubj9dum3https://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.tgs9jcs2fs4ahttps://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.pdo0zhwg6mdhttps://docs.google.com/document/d/sZLfQvx-1v46Qa8B7AG_ojg/headless/print#heading=h.lilga5p4sw7s
  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    3/34

    33161982 Anca Pusca Dissertation

    Chapter 1: Introduction

    Technologies have long shaped our political world. The rise of the internet over the past few decades

    has made many opportunities technically possible, bringing with it political, cultural and social change.

    has also brought greater potential for harm, as technology can be a force that magnifies existing power

    structures. In response to the emergence of technology as an extension of centralised power, other

    technologies have been developed that reduce the possibility of concentrating power, and allow for

    power to be distributed among individuals more equally.

    While the technology itself is a phenomenon worthy of study, it can not be examined in isolation. The

    political structures that precede and are consequences of it must be included in analysis. Given that

    many prototypes in areas such as digital currency are emerging, this is an appropriate moment to analyse

    these new technologies impact on political institutions.

    The key change to be analysed is the movement and conflict between an infrastructure and power

    structure where power is centralised, to a distributed network. When power is centralised single entities

    hold authority over decision-making, and when power is distributed in a network, the same authority is

    distributed between many individuals, with no one individual having substantially more power than an

    other. The network infrastructure can be distributed over many points of control, to prevent any single

    entity from capturing it. This new architecture leads to many further opportunities for organisation, sinc

    it can make non-hierarchical organisational practices efficient enough to compete with free market or

    hierarchical forms of organisation.

    Highly optimistic analyses have been delivered by Yochai Benkler and Clay Shirky, who see entirely

    new forms of production such as mass collaboration emerging from the vastly lowered barriers to entry

    on the internet. Other authors, such as Evgeny Morozov (2012) see this optimism as misplaced, as

    whilst he acknowledges that the internet can be empowering, he argues that it also gives repressive

    regimes the capacity to stifle dissent, and that improvements in technology, such as labour saving

    3

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    4/34

    33161982 Anca Pusca Dissertation

    devices, often work to decrease political action by individuals. Malcolm Gladwell (2010) also regards

    the kind of power utilised by individuals online as shallow, describing online political action a

    slacktivism. Existing literature covers much technical and political ground, but it is often focused on

    simple increase of activity within existing structures, rather than a difference in kind. The vital aspect

    the shifting paradigm in terms of the makeup of power.

    The main objective of this dissertation is to chart the growth of distributed networks as a form of power

    competing with centralised command structures. In doing so, it will test whether distributed networks

    can resist state and corporate power, whether they provide greater personal freedom, and if they can

    support coordination of group activity in the absence of top-down control. To contrast these two forms

    of power, it is also necessary to substantially define both concepts, especially to state the negative

    aspects of centralised power. It will further seek to analyse the consequences of these changes on

    culture and attitudes towards technology.

    The main hypothesis is that distributed networks increase the power of the individual against

    concentrated power, allowing individuals to organise outside of hierarchy. The conclusion establishes

    that while distributed networks certainly reduce the power of the state and corporations in theory, the

    impact of the development of such infrastructure is dependent on its use by individuals. This uptake is

    more likely to happen when there is a direct benefit to the user, such as efficiency in the case of

    business. There are two levels of distributed networks, one of infrastructure, the second of institutions

    built on that infrastructure. The second is the more likely to emerge, since there is greater possibility fo

    profit.

    The dissertation largely draws on a literature review of secondary research. It also includes some

    original research of web platforms used for coordination, and interviews with people who have utilised

    them for organisation.

    Chapter two introduces the existing and expanding form of centralised power that is held by the state

    and corporations, discussing how the present architecture of the internet supports this structure, and the

    4

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    5/34

    33161982 Anca Pusca Dissertation

    importance of surveillance and data as forms of control over individuals.

    Chapter three defines the concept of distributed networks more clearly, describing the features that

    distinguish it from centralised power. It will discuss particular implementations of distributed network

    and their consequences for the effect of centralised power, control over data and the impact on culture

    of increased capacity for individuals. It will also include criticisms and weaknesses of distributed

    networks, and examples of their failure to deliver individual power.

    Chapter four analyses the forms of organisation that can be built on each type of infrastructure,

    comparing hierarchical management to new forms of organisation where efficiency is derived from th

    speed of communication, the amount of data available and the ability to transmit data easily and

    automatically.

    Chapter 5 builds on the previous chapter, using case studies of software development platform Github,

    video game company Valve and the Occupy political movement to examine how effective this form of

    organisation can be in practice. It begins with the production of online information-products, and the

    second part assesses the challenges of offline and time sensitive organisation. It also deals with the role

    of culture in the successful implementation of these practices.

    Chapter 6 makes predictions for the future of these trends, discussing how the conflict between

    state/corporate power and distributed networks might evolve in the coming years and what forms of

    power and organisation will emerge in society. It finishes with a summary and conclusion of the

    argument.

    Terminology

    Node - a single point in a network that can be an individual, a group of individuals or an entity

    Distributed network- a network where control is evenly divided among its members. Data is not

    5

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    6/34

    33161982 Anca Pusca Dissertation

    routed through a central point, but passed from point to point until it reaches its destination.

    Platform - a website, software or device that enables a certain type of activity such as collaborative

    editing of documents, or photo sharing

    Chapter 2: Control through technology

    This chapter concerns the way in which the existing technological infrastructure is set up in a way to

    allows large entities to concentrate power through the collection and aggregation of massive amounts of

    data. It goes on to deal with the implications of this power for control and privacy for the individual.

    Conventionally, institutions have been arranged to deliver a single item reproduced exactly from a large

    entity to many individuals, as in mass media, or mass production. Though the internet can support many

    types of connections, virtually all internet traffic is routed through ISPs, focal points where data that

    passes through can be monitored and restricted. It is also focused around hubs that store data and

    provide services.

    Foucault used Benthams panopticon prison design - a structure in which inmates must assume they are

    being observed at any moment - as a metaphor for the way in which institutions study and gather

    knowledge on individuals in order to exercise control (Foucault 1977). This metaphor is a useful way to

    see the use of the internet and how the state can leverage its architecture for the purpose of surveillance.

    Because control is granted to specific entities who oversee the management of data and provision of

    services, this allows the state to monitor traffic, making it possible to enact wide scale surveillance on

    many individuals at low cost. Although communication such as email is transmitted from one individual

    another, utilising the network, it must pass through a centralised hub. It is these hubs that make the

    infrastructure vulnerable in two ways, as exercisers of power themselves, and as a focal point for

    6

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    7/34

    33161982 Anca Pusca Dissertation

    pressure from other institutions, to extract user data for example.

    In 2004, it was revealed that AT&T had a secret area in one of its telecoms facilities in San Francisco

    that allows the National Security Agency (NSA) to intercept communications including internet traffi

    and internet phone connections. There are 15 to 20 such rooms around the U.S. (Electronic Frontier

    Foundation 2006).

    The NSA has also built a fortified $2 billion center in Utah to be completed in 2013 that will monitor

    almost all U.S. communications, including those passed on from monitoring rooms in major telecom

    facilities such as the one described above, and satellites. It will contain large warehouses containing hard

    drives for long term storage of collected data. The center will also dedicate computing power towards

    brute force attempts (testing every possible password combination) to read encrypted messages

    (Bamford 2012).

    This is not simply a straightforward increase in active surveillance by the state on individuals. Th

    implication of these activities to monitor internet traffic is a vastly increased capacity of the state

    surveillance power, but it is also becoming impossible to avoid for a variety of reasons. The surveillanc

    itself is pervasive, since the tools to do so are decreasing in cost, and can often be automated. New

    technologies such as satellite and drone imagery increase the reach of surveillance. There is also a

    greater domain available to monitor, as more activities are conducted through the internet (Schneier

    2013a). Since the internet is now wedded to our daily lives, almost every interaction involves

    transmitting data. One company is tracking employees metrics on health and mood and although the

    programme is voluntary, privacy concerns have been raised about what the company is able to do with

    the data (Finley 2013).

    Many essential services now being online creates a dependency for the citizen and this in turn makes the

    states ability to restrict access a much greater sanction. The centralisation of power in the network

    around large institutions also enhances propaganda, since it can be delivered on more channels at lower

    cost with greater personalization (Morozov 2012). The NSAs attempt to break the current strongest

    7

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    8/34

    33161982 Anca Pusca Dissertation

    encryption available also threatens the privacy of the individual, leaving a very limited ability t

    communicate without surveillance. Consequently, the existing power of the state is magnified by the

    infrastructure available to it, given that services are focused around hubs.

    While the monitoring and control of the internet by states is an important issue, it has been wel

    discussed and encounters strong opposition, such as the campaigns against the SOPA and PIPA acts in

    the U.S. (Pepitone and January 2012). The power of corporations to conduct the same data gathering

    and processing is less commonly opposed. A different bargain is struck between the state and the

    individual, and the corporation and the individual. Individuals give up some of their liberty to the state i

    exchange for security, while with corporations, privacy is exchanged for a service (Davies 1997). The

    commodification of privacy, as opposed to an intrinsic right, makes the intrusion more palatable for

    users.

    One reason for the lack of opposition to this intrusion may be the invisible way in which data is recorded

    about users. In the commercial world data is collected for the purpose of revenue. The personal

    information gathered is then used in specifically targeted advertising and to personalise the service itself.

    While some data is recorded upfront, such as details entered when signing up for an account, much data

    is clearly entered as personal communication between users. Behind these is a much larger pool of data

    that is collected automatically, including time of visits and location and especially the opaque data tha

    Google collects from search terms (Oboler 2012). Facebook and Google can be used as identity

    verification platforms for other sites, giving them access to much more data about browsing habits

    across the web.

    The state must exploit primary data sources for its information whereas corporations that operate

    service hubs can collect data from users actions in real time, increasing the accuracy and the scope of

    the data. The rise of real time, large scale and increasingly personalised information is referred to as big

    data. Collecting greater amounts of real time data is essential for companies that rely on personalisation

    to remain profitable (Manyika et al 2011). Since the profitability of the company is based on increased

    8

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    9/34

    33161982 Anca Pusca Dissertation

    collection of data, it is negatively correlated with the users desire for privacy.

    The issue at stake is not simply the amount of data being collected, or even the pervasiveness of

    surveillance, but the computation of this data. Finley comments that in an age of big data [,

    computation] can reveal things about you that you may not even know about (Finley 2013). The

    processing of various streams of data - a capacity afforded by the centralisation of data storage - allows

    analysts to find data that only emerges from long term trends or from piecing many data points together

    This differs from previous data analysis, where to interpret such a big picture, qualitative methods would

    have to be used. There is now no longer a choice to be made between data size and data depth

    (Manovich 2011).

    A notable example of the consequence of computation of data is when the U.S. store Target used

    analysis of previous purchases, associated by credit card, to determine that a woman was pregnant.

    They subsequently sent special offers for baby related items before her family were aware of the

    pregnancy (Duhigg 2012).

    Although the state and corporations collect data independently from each other, there is not necessarily

    a divide between access and analysis of the data. Government can subpoena information from

    corporations such as Facebook, who provide an extensive history of the users private communication

    on the site (Carioli 2012). Morozov (2012) comments that as well as social networks being used by

    activists, the same tools can also be used against them and to a much greater extent. The distinction

    between various stores of data melts still further when user provided data is included. For example

    Boston police aggregated photo and video from many public sources as well as CCTV cameras to

    identify suspects (Ackerman 2013).

    The internet as an infrastructure for day to day communication produces vast amounts of data. This in

    itself is not necessarily a danger, but when transmission of data involves hubs that store and analyse the

    data, it becomes a useful tool for surveillance and control, reducing the privacy of the individual. Thi

    surveillance is carried out by both state and corporations, though corporations have much greater

    9

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    10/34

    33161982 Anca Pusca Dissertation

    access, which surprisingly is less commonly opposed by users.

    10

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    11/34

    33161982 Anca Pusca Dissertation

    Chapter 3: Networks as a means of distributing power

    The previous chapter described the ways in which centralised power magnifies existing power through

    control of data and power to restrict network traffic. Using hubs to route data online is only one means

    of creating a network. Networks can also be created in a peer to peer fashion that does not require

    centralised control.

    This system, where the infrastructure itself is spread out over many nodes, is referred to as a distributed

    network. Shirky (2003) sets out two requirements that define a peer to peer network: (1) treats

    variable connectivity and temporary network addresses as the norm and (2) gives nodes on the edge

    significant autonomy. This means that any two given nodes can exchange data without the need to route

    it through a centralised server, while still being able to make use of the shared power of all the nodes in

    the network.

    Because there is no dominant node in the network, capacity is distributed among all nodes on a much

    more equal basis. This means that there is no central authority which can dictate where the power is

    directed a decision to act must be agreed on consensus with as few or as many nodes as are necessary

    for the purpose. It also reduces the power of any node to restrict traffic on the network, because it

    travels from one peer to another. The ad hoc method of network construction makes the infrastructure

    flexible and enables groups of nodes to adapt easily for the purpose of the action.

    Distributed networks have many advantages over centralised networks and so pose a direct threat to

    centralised networks when they compete. These advantages come from the lack of a single focused

    point of power, which decreases the impact of any targeted attack on the network. When any one node

    is compromised, the rest of the network can reroute around it. This principle is demonstrated by recent

    riots such as London 2011. The centralised command structure of law enforcement has an effective

    strategy against physical groups with leadership, but has difficulty preventing geographically disperse

    11

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    12/34

    33161982 Anca Pusca Dissertation

    acts of violence, coordinated through peer to peer networks (Sullivan and Elkus 2011).

    It is important to distinguish between advances in technology that empowers the individual and

    technology which simply magnify existing power structures. Technology should not be seen as a

    virtually autonomous, all-encompassing agent of change (Marx 1997 p.564).

    Much has been written about the use of social media by governments, giving them a new channel by

    which to communicate with citizens. Jared Cohen and Alec Ross are two U.S. state department

    employees that have been using twitter for public engagement, and opening up government to more

    rapid communication with citizens (Lichtenstein 2010). Although their project has been extremely

    successful, garnering many followers, there is nothing different in kind from state to citizen interaction

    has always occurred, and can in fact increase the domination of individuals by repressive governments

    who make use of new technologies (Morozov 2012).

    Anne Marie Slaughter (2009) realises to some extent the power of networks, describing the advantages

    of making connections with the public and of increasing openness. However, she does not recognise the

    substantial change in the nature of the relationship. Both of these models still see the state or other large

    institutions as continuing to exist in the same form and passing messages down to individuals in domest

    and international situations, with only the nature of communicating being altered. However, distribute

    networks vastly alter the nature of power, shifting the balance from large hierarchically structured

    groups, to nodes composed of individuals or small groups.

    The digital currency Bitcoin is an example of a value exchange system that functions on a distributed

    network without the need for centralised authority. Conventional online currency transfers are routed

    through a trusted third party, which depends on its prominence as a node for its authority, that handles

    accounts. Bitcoin reproduces the function of processing transactions in a decentralised way. When a

    transaction is made from one party to another, other nodes use cryptography to verify the transaction,

    recording it publicly to prevent respending of the transferred amount (Nakamoto 2011).

    12

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    13/34

    33161982 Anca Pusca Dissertation

    The lack of a centralised institution to store value and verify transactions deposits means that there is no

    single node in the network that can exercise power over it, and this gives Bitcoins their security. Nodes

    frequently enter and exit from the network so capturing a single one will not impact the networks abilit

    to function.

    This has made it appealing for criminal enterprise as it is very difficult for law enforcement to detect th

    identities of the parties involved. The Silk Road and The Armory (which has ceased trading) are black

    markets for drugs and weaponry respectively that use the Bitcoin currency to facilitate transactions

    (Chen 2012 Christin 2012). Users also use another form of cryptography, PGP, to conceal the address

    where they will receive the physical goods. As well as facilitating criminal trade, the anonymous natur

    of Bitcoin also assists tax evasion, since governments have no way of verifying what income has been

    received by an individual. Thus, the existence of Bitcoin is a threat to law enforcement, providing

    protection from the centralised power of the state to surveil and censor, since there are no identifiable

    records produced and users are able to remain anonymous (Reitman 2011).

    There are some flaws to the Bitcoin technology. It may not be as anonymous as commonly assumed to

    be. This presents a greater danger if users presume protection, as they may become more relaxed about

    the data they reveal about themselves than when they were aware of surveillance. Since data about

    individuals can be matched from many sources, big data style analysis may not require a centralised

    store of information, but could identify users based on correlations of other data with the public records

    of bitcoin transactions. The use of hubs that securely store Bitcoin value is also a threat to anonymity

    (Reid and Harrigan 2012).

    Wikileaks is an organisation dedicated to the publishing of secret documents leaked from governments1

    and corporations. It was launched in 2006, but did not rise to prominence until 2010 when it released a

    video of a U.S. helicopter attack in Iraq that killed two children, as well as two large sets of documents

    from the U.S. government. The source of one of the leaks, Private Bradley Manning, was arrested on

    charges of treason and is currently in custody awaiting trial. In addition to these leaks, many other

    1http://www.wikileaks.org

    13

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    14/34

    33161982 Anca Pusca Dissertation

    documents from governments around the world have also been published.

    Leaks of state secrets are not a new phenomenon, but the internet vastly lowers the costs of doing so.

    The ability to transmit data at very low cost means that an individual does not require the large resources

    of an institution to leak information. When dissemination of data is done by centralised institutions,

    means that political pressure can be applied to prevent their actions. When the dissemination is

    decentralised, there is no interest which can be leant upon to alter behaviour (Benkler 2011).

    The mass amateurisation of publishing allows for an extremely wide range of voices to be heard (Shirky

    2011). This vastly increases the number of nodes that can become publishers, rather than the small

    number of conventional media outlets, decreasing the power of centralised power to control the flow of

    information in society. Since the act of copying and disseminating information is so easy it reduces th

    power of any particular node in the network to restrict access. This prevents all the control control to

    new civil society institutions.

    The reduction in power to control sources of information, not only takes power away from centralised

    organisations, but also reduces the ability of any node to control the way in which discourse is framed.

    Traditional news media reacted to the leaks by attempting to discredit Wikileaks. They did so by

    framing Wikileaks using the rhetoric of terrorism, denying its value as a media organisation (Benkle

    2011). Because there are now so many sources of information available, such as blogs and social

    media, no single node is able to dominate the discourse.

    There are some aspects of Wikileaks that make it difficult to describe it as a distributed network.

    Despite the presence of wiki in its name, it is not publicly editable, but managed by a mostly

    anonymous group of volunteers, who verify documents before releasing them. The website is hosted

    from a single source and power is concentrated in the figure of Julian Assange, who acts as the

    organisations public face. This is Wikileaks greatest flaw, since it makes it much easier for the state to

    use informal systems of pressure and approval on market actors (Benkler 2011 p.3). For example,

    everyDNSs action to suspend wikileaks.org, making the website inaccessible (Arthur and Halliday

    14

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    15/34

    33161982 Anca Pusca Dissertation

    2010).

    While Wikileaks itself as an organisation is not a distributed network, the actions of supporters take

    advantage of the power of distribution. When access to wikileaks.org was restricted, many mirror

    websites appeared to keep the content available. WikiLeaks also released an encrypted insurance file,

    which they encouraged people to download, so that the file would be spread around, making it

    invulnerable to censorship (WikiLeaks 2010). Bitcoin was also used for donations after several credit

    card providers refused service to WikiLeaks after pressure from the U.S. government.

    Defense Distributed is a project that aims to design an open source firearm that can be 3D printed. In a2

    similar way to the way in which information from Wikileaks proliferates over many nodes, making

    impossible to recover or control, the ease of replicating the file prevents restriction by law enforcement

    Not only is the design reproduced over many nodes, the production can also be distributed, making it

    possible for individuals to manufacture their own firearm without the resources of an institution. This

    one of the few examples of the way that a distributed network can empower the individual and reduce

    the power of the state in the physical world and this is likely to expand as the costs of 3D printing fall.

    Diaspora is an open source attempt to use a distributed network to reduce the problems that come3

    with centralisation of data on social networks. On Diaspora, individuals can host their own pod, to

    store their data on their own node. This prevents any one node having control over large amounts of

    data, or over any individual user, if they choose to host their own installation (Weise 2012). However,

    Diaspora has not been successful as a competitor to services such as Facebook. As of writing there are

    405,540 users (Diaspora 2013) compared to over a billion on Facebook (Tam 2013).

    There is not a choice of whether to have an increase in the amount of available of information, since

    whether this data is transmitted through distributed networks, or through centralised hubs, the capacity

    for any node to collect data has vastly increased. The barriers to publication have fallen, and so has the

    cost of surveillance. The choices to be made concern how this data is to be stored and transmitted.

    2http://defensedistributed.com/3http://www.joindiaspora.com

    15

    http://www.google.com/url?q=http%3A%2F%2Fdefensedistributed.com%2F&sa=D&sntz=1&usg=AFQjCNHjyPFcfeMm6LF5ZxBeH8UvEg5MkQ
  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    16/34

    33161982 Anca Pusca Dissertation

    Bitcoin, Wikileaks and Diaspora can be seen as experiments in using distributed networks as an

    alternative to using centralised hubs as the infrastructure that supports online interaction and exchanges

    Whilst they suffer from various flaws, Wikileaks and Bitcoin have posed a substantial challenge to

    centralised organisations. Diaspora has not been as successful, and this may be demonstrative of the

    lack of concern that users have towards privacy when it is given up in exchange for a service and the

    illusion of control is maintained.

    16

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    17/34

    33161982 Anca Pusca Dissertation

    Chapter 4: Distributed networks to achieve coordination

    While the infrastructure of the internet is a vital component of the shift from centralised to individua

    power, technology alone is not enough to consolidate political change. Technology cannot be seen as a

    unitary force of progress that is isolated from human action (Morozov 2013). The institutions that are

    built on this framework for the organisation of collaboration are key to success.

    Conventionally, organisations are arranged hierarchically, a system in which every individual except fo

    the most senior is subordinate to someone else. The hierarchy is based on a system of privileged

    information. This allows orders to be conveyed down steps of authority in a chain of command,

    becoming more specific as they progress (Shirky 2011). This allows complex tasks to completed by

    teams of individuals who are overseen by a particular manager. There are five main functions of

    management:

    1. Allocation of tasks in the most efficient manner

    2. Aggregating completed work into a coherent whole

    3. Vertical dissemination of information

    4. Recruitment, termination and management of employees skills

    5. Providing an overall vision for the team

    As the number of individuals in a group increases, the complexity of coordinating a task rises too. The

    use of hierarchy is generally more efficient than an absence of organisational structure, such as a free

    labour market, since it lowers transaction costs (Coase 1937), but it comes with its own problems. For

    business, it is expensive to pay employees whose sole job is to coordinate activity, and when the costs

    are too high, this will prevent productive activity from taking place (Shirky 2011). The authoritarian

    structure may also cause resentment among employees, or lead to corruption within management.

    Alternatively, the functions of management can be performed using the capacity of a distributed

    network. In this organisational form, tasks are divided so that each node performs a small part of the

    17

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    18/34

    33161982 Anca Pusca Dissertation

    task in addition to their regular or specialised tasks. Technology is a vital part of this capacity, as it is the

    basis of the platforms that enable the division of the function of coordination. Each aspect of the

    management function is explained below as features that can be produced using a platform. Such

    platforms allow for rapid collaboration among geographically dispersed and loosely connected

    individuals (Benkler 2011).

    When the function of management is divided, there is no single individual who undertakes coordination

    and allocates tasks, so another method must be found of determining what should be done next.

    Stigmergy is a concept derived from biology, and refers to markers left behind by collaborating workers

    that indicate what the next necessary action is. The environmental state contains information passed on

    from peer to peer (Parunak 2006 p.2). This is a way of determining actions without requiring an overall

    plan, allowing the project to be more flexible on new directions as necessary.

    Allocation can also be determined by using a formalised reputation system, in order to ensure that the

    most appropriate individual within a group performs the task. Each individual within the group will b

    rated according to their relevant skills.

    The use of a platform is more important when it comes to automatically subdividing tasks. In order to

    make tasks completable by any individual without managerial oversight, they can be madegranularand

    modular(Benker 2006). Granularity refers to the size of the task, as smaller tasks can be completed

    more easily. Modular refers to the extent to which it can be broken down into smaller components

    (Benkler 2006 p.100).

    Platforms also lower the barriers to entry for individuals to make contributions by making the tasks easy

    to complete. This is especially relevant regarding online publishing where previously transactions cost

    would have been prohibitively high and deterring contribution. Using blogging platforms, individuals c

    publish articles with extremely low overheads in comparison to conventional media. This breaks

    professional categories, since entry to the profession is no longer limited by access to the tools of

    production (Shirky 2011 p.63).

    18

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    19/34

    33161982 Anca Pusca Dissertation

    The features that platforms provide: stigmergy, granularity, modularity and lowered barriers to entry

    make it possible to aggregate individual contributions without the need for a specific individual to

    produce a coherent whole. Platforms also enable data to be much more easily manageable, through

    search and analytics.

    The shift in organisation from hierarchical to a flat structure can be seen in the management of data as

    well. Whereas taxonomy refers to the practice of organising data in a tree structure, which requires

    absolute decisions about which category an item should be placed in, folksonomy is organisation that

    uses descriptive tags, which function like keywords, to create categories as necessary. [I]f you've got

    enough links, you don't need the hierarchy anymore (Shirky 2005). A record in a database can have an

    unlimited number of tags, that can be added by any person, removing the need for a specific individual

    to control the process of categorisation. The tags can then be voted up or down by other users, so that

    the most popular and relevant tags are most prominent. The record will be able to be found under all the

    tags that have been used to describe it, and it also forms an ad hoc category for records that share the

    same tag, without confining them to a single category.

    In the absence of a hierarchical organisational structure, it is not necessary to communicate information

    vertically but it can be organised in a manner that makes information contributable and available to al

    individuals in a group. This can be achieved through wikis, which are editable by any member of the

    group, and contributions can be made according to the principles of modularity and granularity.

    Information can also be transmitted via peer to peer networks within an organisation, passed from

    individual to individual until it reaches the appropriate destination rather than through a structure tha

    defines a single individual as a manager who is responsible for dissemination.

    The management of employees within an organisation can also be achieved using a reputation system

    Rather than employees being subject to performance reviews by managers, this function can be

    distributed among employees as a whole. Each employee rates every other employee on a variety of

    19

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    20/34

    33161982 Anca Pusca Dissertation

    metrics to produce an overall ranking system, which can then be used to identify especially valuable or

    unproductive members of the group.

    The most difficult aspect of management to reproduce is the long term leadership and vision. This

    involves setting a direction for the group, inspiring individuals to create belief in the project an

    mentoring individuals to improve weaknesses in relevant skill areas. There is no way to simply distribut

    this function, but setting direction can be achieved by giving members of a group complete freedom of

    contribution, essentially creating a market of competing projects where the most popular project will

    succeed. This might be due to its perceived value, or it might be due to the ability of the projects

    creator to inspire individuals. Although this capacity remains in one person, the structure does not

    become hierarchical, as the position is not fixed and can be undertaken by any individual. Members of a

    group are not compelled to take orders or remain in the group if they are no longer convinced of its

    value.

    The function of management (allocation, aggregation, dissemination of information, human resources an

    leadership) can be distributed by using technological platforms to divide the various functions among a

    employees. Most important is the principle of dividing tasks into granular and modular components.

    20

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    21/34

    33161982 Anca Pusca Dissertation

    Chapter 5: Case studies of coordination using networks

    The previous chapter laid out the principles of using distributed networks as the basis for coordination

    economic activity. This chapter will expand and test those principles by referring to several case studies

    of organisations that make use of them. This includes software development platform Github, video

    game developers Valve and the political movement Occupy. The chapter is organised around the

    principles, making reference to these organisations in order to demonstrate them. It will also deal with

    questions of the importance of culture and how well leadership can be produced as a collaboration.

    Software development is a useful starting point for the investigation of practical examples of distribute

    management theory. The Open Source community often makes use of many of the practices described

    so far in development. The useful point of analysis is the format of the platforms in use and the feature

    they have that facilitate coordination and collaboration in a way that replaces the functions of centralised

    management and authority either as a direct translation or wholly.

    Coordination of information products

    Github is a version control platform for software development, which allows many individual users t4

    make small contributions very easily. The useful part of this is that it allows tasks to be divided up in a

    granular and modular manner, vastly lowering the barrier to contribution, making it more likely tha

    individuals will make contributions. Each project on Github has a wiki - a collaboratively edited

    resource that serves as a repository for developers working on the project to share important

    information. Every action performed on Github, such as uploading new code creates artifacts which act

    as stigmergic indicators that help other contributors to decide what actions are appropriate and where

    they should direct their contributions (Dabbish et al 2012).

    Video game company Valve is an example of an organisation which utilises a flat structure. At Valve, no

    employee has an actual title. This is in order to remove organizational constraints (Valve Corporation

    4http://www.github.com

    21

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    22/34

    33161982 Anca Pusca Dissertation

    2012 p.36). The company allows its employees to focus their work on whatever activity they choose

    without any managerial oversight. In order to coordinate activity, Valve relies on time allocation and

    team formation as replacements for price signals. These metrics are stigmergic indicators of the

    popularity of a particular project, allowing other contributors in the group to gauge the usefulness of thei

    contributions.

    The community-operated project space, London Hackspace, utilises a wiki for dissemination of

    information and community management. The wiki is editable by any member of the group, but not

    publicly, and hosts an aggregate of information as well as an area for coordination of maintenance and

    administration tasks. Any member can add tasks to be completed, which are divided into granular and

    modular units. After completion, the task completer can update the list (W. Beaufoy. Personal

    communication. 2013, April 4).

    Both Google and Nasa have made use of the principles of granularity and modularity described by

    Benkler to do large amounts of human analysis. Nasa has created Moon Zoo , a project to create a 5

    crowdsourced map of the moon. Users of the site can easily log on and identify features of land from a

    satellite photo which shows a small area on each visit. Each task is very small and simple to complete

    and the software automatically puts each feature spotted into a database so it can be used as a larger

    map.

    Google Maps uses a similar approach with its Map Maker feature , where any user can add or edit a 6

    local feature on the online map, in order to improve its accuracy. Amazons Mechanical Turk allows 7

    anyone to create a job that can easily be divided into small simple tasks, which workers can then

    complete for a small payment.

    One issue with this method of collaborative working using very small tasks is that although it is ver

    effective when the task is simple, quality may suffer with tasks that require sustained involvement an

    5http://www.moonzoo.org6http://www.google.com/mapmaker7https://www.mturk.com/mturk/

    22

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    23/34

    33161982 Anca Pusca Dissertation

    awareness of the bigger picture to synthesise information. For example, while crowdsourced journalism

    from amateur reporters may be effective in recording the facts of a story, it might not be effective at

    providing detailed analysis that cannot be divided into component parts. However, the principles are

    scalable, so tasks do not have to be as small as the examples listed above, which often take five minutes

    or less, and results from Moon Zoo have been as good as you would get from an expert (Geere

    2012).

    Real world, time sensitive coordination

    Occupy is an anarchist political movement that was active around the world, especially in New York

    and London. The movement used existing flat organisational structures such as general assemblies and

    working groups to coordinate, but adapted them to take advantage of technological development.

    Facebook was found not to be useful for the purpose of coordination among diverse groups because of

    its insular nature. It is limited to the network of an individual, therefore not good for mass collaboration

    It was also noted for the problem of transparency of data to government agencies, as its the kind of

    thing that the CIA would have spent a lot of money and a lot of time to create (D. Hornbein. Personal

    communication. 2013, January 23).

    The disaster relief programme Occupy Sandy was more tightly organised due to its specific purpose of

    responding to the hurricane damage. It used the platform Sahana, which logs incoming requests for aid

    and allowed workers to allocate themselves to tasks (Balkind 2013). This platform allows jobs to be

    divided easily and distributes the process of coordination over all nodes in the system.

    Github has also been used for non-software projects, for example, the US city of Chicago has published

    data sets online using the platform including street locations, building footprints, bike routes, pedwayroutes and bike rack locations.

    Commercial application

    23

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    24/34

    33161982 Anca Pusca Dissertation

    BlaBlaCar is an example of the way in which the vastly lowered barriers to entry that distributed8

    coordination creates can make small transactions profitable. In this case drivers use the platform to sell

    spare seats in their car (N. Brusson. Personal communication. 2013, April 19). However, while the

    exchanges are conducted between peers, the infrastructure itself is a centralised hub that depends on

    routing transactions for profitability. Thus, it is unlikely there will ever be any commercial examples

    coordination through distributed networks.

    Recruitment, termination and mentoring

    Valve does not have a dedicated HR department, individuals in the company spontaneously organise

    committees in response to a perceived need by employees for new skills. Anybody who wants to

    participate in the process of interviewing candidates is able to, and decisions are reached by consensususing email. Employee termination is also reached by consensus, rather than delegated to a specific

    individual. (Roberts and Varoufakis 2013)

    An important aspect of how Valve operates is its peer review system, which determines the

    performance of employees, and is also a way of managing pay. It also uses another rating system,

    known as stack ranking, where each employee rates each other employee based on four qualities: skill,

    productivity, group contribution and product contribution, which are added together to produce anoverall rating. This data is then pooled and made accessible to all. (Valve Corporation 2012).

    The company handbook also describes a number of weaknesses of their form of organization. Some of

    the more personal functions of management are difficult to recreate, such as mentoring to help

    employees develop (Valve Corporation 2012).

    Leadership

    One difficulty with the practice of distributed management is the problem of recreating leadership and

    vision, the setting of an overall direction, without an individual to conduct the more subtle and huma

    parts of management, to be able to tell a story around the project. While consensus can be used for

    8http://www.blablacar.com

    24

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    25/34

    33161982 Anca Pusca Dissertation

    making decisions, the decision reached may be either simplistic and reductive to meet the lowest

    common denominator, or else it might become overly complex in an attempt to appease all parties to

    move forward. There are also efficiency issues, as the leaderlessness does come at a price, its much

    harder to organise things quickly (D. Hornbein. Personal Communication. January 24, 2013). This is

    another aspect that Valve has struggled with, stating that it is difficult making predictions longer than

    few months out (Valve Corporation 2012 p.52).

    Sometimes the culture itself may oppose leadership altogether, as is the case with online activist group

    Anonymous, as the culture will actively attack anyone that says, I speak for anonymous, anyone that

    takes on any semblance of telling people theyre a leader (D. Hornbein. Personal communication.

    January 24, 2013).

    Forking is one way of dealing with this problem, abandoning consensus allowing popular choices to

    thrive. There is some evidence to suggest that while the task of leadership is very difficult to separate

    into component parts, technology creates the possibility of making the role of leading less fixed and

    easier to take up by any individual. Evidence from Occupy shows that the attempt to find consensus can

    often be destructive to the group, especially when membership is entirely open. Drew Hornbein from

    Occupy stated that technology hasnt removed leadership, its just that technology has lowered the

    barrier of entry into leadership. So while the task of leadership cannot be divided into component

    parts, it can be distributed among many individuals over time.

    Importance of culture within an organisation

    Despite the advantages that a distributed infrastructure brings, there is no doubt that the technology

    itself, or even the principles can be entirely effective in replacing a hierarchical system of managemen

    The culture and attitudes of an organisation are also vital aspects.

    All of the above case studies present examples issues relating to the attitudes of individuals towards

    working practices. In Valve, such spontaneous order-based enterprises rely to a large extent on

    individuals that believe in the social norms that govern their existence (Roberts and Varoufakis 2012).

    25

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    26/34

    33161982 Anca Pusca Dissertation

    While these systems are often perceived to be open from the outside, it is actually more often the case

    that they employ a restrictive membership that helps them function. The general openness of politica

    group Occupy was described as a flaw, due to particular individuals or small groups exercising a

    significant amount of influence over the group, decreasing the quality of discussion and collaboration

    driving more valuable contributors away from the group, which then gave the disruptors further power

    (D. Hornbein. Personal communication. 2013, January 23).

    Without trust it is impossible for a reputation system to function. A group requires trust in its members

    for collaboration to work. While technology can facilitate organisation, something beyond merely the

    possibility of collaborating is necessary, which can be difficult to produce online. Occupy members

    commented that while online discussion was extremely useful for coordination over long distances, wha

    brought the group together and created trust was the collective purpose in sustaining the physical

    encampment (M. Bray. Personal communication. 2013, 24 January).

    The above examples show that it is possible to apply the principles of distributed networks for

    coordination in various settings, for information production, as well as in the real world. Coordination o

    activity through the principles of stigmergy and division has been demonstrated to be successful though

    Though there are some caveats as to how that organisation takes place. Trust is essential in all examples

    and to have trust the group membership must also be restricted in some sense. It may also be difficult to

    reproduce the more human aspects of leadership, which involve the setting of broad, long term goals.

    26

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    27/34

    33161982 Anca Pusca Dissertation

    Chapter 6: Future of a networked society & conclusion

    This chapter addresses the potential developments of the trends described in this dissertation, including

    the conflict between centralised forms of power and distributed networks, how the infrastructure of

    distributed networks might evolve and expand in the future and how the institutions built on thi

    infrastructure may develop. It will finish with a short conclusion of the dissertation.

    Although much of the internet involves peer to peer connections, a substantial portion of the

    infrastructure is based on hubs that collect, process and store vast amounts of data for the purposes of

    security and profit. The collection of data by both states and corporations is likely to continue. For

    states more legislation is being passed to allow greater control over data and diminishing privacy rights

    such as CISPA in the U.S. The cost of surveillance is becoming cheaper and more infrastructure is

    becoming connected to a network that has powerful nodes vulnerable to monitoring. The increasing

    amount of connection also benefits the corporations, who can collect more data on browsing behaviour,

    as the demand for personalised services rises. The power to process this data and determine trends will

    also increase.

    Given attitudes towards data, and the real time access, it is likely that corporations will secure greater

    power over data than the state. Privacy may become a commodity for exchange rather than a right as it

    is at present.

    However, there will not simply be a rise in the power of corporations. The decreasing cost of

    surveillance technology also empowers individuals and the amount of information about all parties wi

    increase and be dispersed irretrievably on many nodes.

    There is also a potential for further distributed network infrastructure to grow. Given the expected rise in

    connected devices, referred to as the internet of things, it may make more sense for connections to be

    made from peer to peer rather than to plug into an overarching system. An alternative system will

    27

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    28/34

    33161982 Anca Pusca Dissertation

    certainly develop, as Bitcoin has, but it may not be able to compete with the commercial offerings.

    Competitors to Facebook such as Diaspora have not been able to offer the same level of service and

    the absence of centralised data may indeed be its downfall. The development of distributed networks is

    partially based on how the infrastructure is used. Some features already exist, such as the ability to

    create contracts without the need for a third party to verify the event using Bitcoins. Societal acceptance

    is essential for the development of such features.

    Whether or not the basic infrastructure changes or remains corporate dominated, it is likely that

    organisational practices using distributed networks to spread the functions of management will develop

    because of the advantage in cost in comparison to hierarchies. This will occur as platforms increase in

    capacity. Occupy could become a blueprint for activism. Another possibility is the use of these

    organisational practices for mass collaboration, similar to Wikipedia. The lowered barriers to entry -

    including transaction costs - that the internet brings will certainly allow for more collaboration that coul

    not have existed otherwise.

    The greatest weakness of non-hierarchical organisation is the lack of a strong leadership which can

    articulate complex long term goals. However, this may also be their greatest asset, since the barriers to

    group creation are lowered organisations might form for specific short term purposes before dissolving

    again.

    Therefore, what is likely to emerge is a collection of peer to peer practices that are built on a

    commercial centralised structure. Commercial services that enable individuals to coordinate and

    collaborate together with reduced managerial oversight and greater efficiency are the most likely form o

    economic activity. This could create a hyper efficient free market where exchange partners can be easily

    matched with very low transaction costs, because of the amount of information available.

    However, given the vastly lowered barriers to entry for contribution, attitudes towards profit may

    change (Benkler 2006). This could mean that many products that were previously commercially

    provided can be provided in cooperative manner using Benklers notion of commons-based peer

    28

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    29/34

    33161982 Anca Pusca Dissertation

    production. Since the transaction costs are eliminated in many cases, if there is free provision, this wil

    undermine any commercial operation, as in the case of Wikipedia.

    The dissertation has charted the competing forms of power of centralised command structures and

    distributed networks. Centralised networks pose a strong threat to the privacy of the individual, and this

    threat comes both from the the state and the corporation, through the capacity to store and process

    massive amounts of data. This threat emerges from the centralised nature of the infrastructure and means

    of organisation which means that some nodes in the network store and large amounts of data making

    them both powerful and vulnerable to interference.

    This power can be combated through the creation of distributed networks as demonstrated through the

    development of Bitcoin, which removes the need for a centralised authority to verify transactions, whil

    reproducing the efficiency of a conventional currency exchange system. The production and

    dissemination of information is likely to change as the cost of gathering and analysing it decreases wit

    the development of technology.

    The development in infrastructure will not be useful unless strong political institutions are built on top

    alternatives to hierarchy. The functions of management can be reproduced through the development of

    technological and social platforms which enable many individuals to each perform small parts of thes

    tasks. The case studies analysed show that while technology does enable such behaviour, culture and

    attitudes within a group are vital components of their success. Trust among members is the most

    important aspect which determines success.

    Given the infancy of distributed networks as a technology, it is difficult to precisely determine its impac

    They are certain to pose a major threat to centralised power structures at some level.

    29

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    30/34

    33161982 Anca Pusca Dissertation

    Bibliography

    Ackerman, S. (2013, April 19). This Is the Modern Manhunt: The FBI, the Hive Mind and the Boston

    Bombers. Wired. Retrieved from http://www.wired.com/dangerroom/2013/04/boston-data-manhunt/

    Arthur, C. and Halliday, J. (2010). WikiLeaks fights to stay online after US company withdraws

    domain name. The Guardian. Retrieved from

    http://www.guardian.co.uk/media/blog/2010/dec/03/wikileaks-knocked-off-net-dns-everydns

    Atzori, L., Iera, A., & Morabito, G. (2010). The internet of things: A survey. Computer Networks,

    54(15), 2787-2805.

    Bamford, J. (2012, March 15). The NSA Is Building the Countrys Biggest Spy Center (Watch What

    You Say). Wired Magazine

    Balkind, D. (2013, January 16). Occupy Sandys FLO databases. Vitamin DWB[blog]. Retrieved

    from http://vitamindwb.com/?p=119

    Benkler, Y. (2006, December 1). The wealth of networks: How social production transforms

    markets and freedom. Yale University Press.

    Benkler, Y. (2011). Free Irresponsible Press: Wikileaks and the Battle over the Soul of the Networked

    Fourth Estate, A.Harv. CR-CLL Rev., 46, 311.

    Carioli, C. (2012). When the cops subpoena your Facebook information, heres what Facebook sends

    the cops. Boston PhoenixThe Phlog, April, 6.

    Chen, A. (2012). The underground website where you can buy any drug imaginable. Gawker.

    30

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    31/34

    33161982 Anca Pusca Dissertation

    Retreieved from

    http://gawker.com/5805928/the-underground-website-where-you-can-buy-any-drug-imaginable

    Christin, N. (2012). Traveling the Silk Road: A measurement analysis of a large anonymous online

    marketplace. arXiv preprint arXiv:1207.7139.

    Coase, R. H. (1937). The nature of the firm. economica, 4(16), 386-405.

    Dabbish, L., Stuart, C., Tsay, J., & Herbsleb, J. (2012, February). Social coding in github:

    transparency and collaboration in an open software repository. InProceedings of the ACM 2012

    conference on Computer Supported Cooperative Work(pp. 1277-1286). ACM.

    Davies, S. G. (1997, January). Re-engineering the right to privacy: how privacy has been transformed

    from a right to a commodity. In Technology and privacy (pp. 143-165). MIT Press.

    Diaspora. (2012).How many users are on Diaspora?Retrieved from https://diasp.eu/stats.html

    Duhigg, C. (2012). How companies learn your secrets. The New York Times, 2, 16.

    Electronic Frontier Foundation. (2006).EFF Sues AT&T to Stop Illegal Surveillance. Retrieved from

    https://www.eff.org/press/archives/2006/01/31

    Finley, K. (2013, April 17). What if Your Boss Tracked Your Sleep, Diet and Exercise? Wired.

    Retrieved from http://www.wired.com/wiredenterprise/2013/04/quantified-work-citizen/

    Foucault, M. (1977).Discipline & punish. Random House Digital, Inc..

    Geere, D. (2012, 24 May). Crowdsourcing a Map of the Moon. Wired.

    31

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    32/34

    33161982 Anca Pusca Dissertation

    Gladwell, M. (2010). Why the revolution will not be tweeted. The New Yorker, 20.

    Lichtenstein, J. (2010). Digital diplomacy.New York Times Magazine, 26-29.

    Lovink, G., and Patrice, R. (2010). Twelve theses on WikiLeaks.Eurozine (English version).

    Manyika, J., Chui, M., Brown, B., Bughin, J., Dobbs, R., Roxburgh, C., et al. (2011). Big data: The

    next frontier for innovation, competition, and productivity.McKinsey Global Institute, 1-137.

    Manovich, L. (2011). Trending: the promises and the challenges of big social data.Debates in the

    digital humanities, 460-75.

    Marx, L. (1997). " Technology": The Emergence of a Hazardous Concept.Social Research, 965-988.

    Morozov, E. (2012). The net delusion: The dark side of internet freedom . PublicAffairs.

    Morozov, E. (2013, April 2) What Farhad Manjoo gets wrong about my book. Slate.

    http://www.slate.com/articles/technology/technology/features/2013/to_save_everything_click_here/to_s

    ave_everything_click_here_what_farhad_manjoo_gets_wrong_about_my_book.html

    Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system. Consulted, 1, 2012.

    Oboler, A. (2012). The danger of big data: Social media as ... - First Monday. Retrieved from

    http://firstmonday.org/htbin/cgiwrap/bin/ojs/index.php/fm/article/view/3993/3269.

    Parunak, H. V. D. (2006). A survey of environments and mechanisms for human-human stigmergy. In

    Environments for Multi-Agent Systems II(pp. 163-186). Springer Berlin Heidelberg.

    Pepitone, J., and January, C. (2012). SOPA and PIPA postponed indefinitely after protests. CNN

    32

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    33/34

    33161982 Anca Pusca Dissertation

    Money, 20.

    Reid, F., and Harrigan, M. (2013). An analysis of anonymity in the bitcoin system. In Security and

    Privacy in Social Networks(pp. 197-223). Springer New York.

    Reitman, R. (2011, January 20). Bitcoin - a Step Toward Censorship-Resistant Digital Currency.

    Electronic Frontier Foundation. Retrieved from

    https://www.eff.org/deeplinks/2011/01/bitcoin-step-toward-censorship-resistant

    Roberts, R., Varoufakis, Y. (2013, Feburary 25). Varoufakis on Valve, Spontaneous Order, and the

    European Crisis.EconTalk. Podcast retrieved from

    http://www.econtalk.org/archives/2013/02/varoufakis_on_v.html

    Schneier, B. (2013a, January 31). Power and the Internet.Schneier on Security. Retrieved from

    http://www.schneier.com/blog/archives/2013/01/power_and_the_i.html

    Schneier, B. (2013b, March/April). IT for Oppression.IEE Security & Privacy. Retrieved from

    https://www.schneier.com/essay-420.html

    Sifry, M. L. (2011, February 14). WikiLeaks and the Age of Transparency. Or Books.

    Shirky, C. (2003, November 24). What is p2p... and what isnt. Retrieved from http://www.oreillynet.

    com/pub/a/p2p/2000/11/24/shirky1-what isp2p.html.

    Shirky, C. (2005). Ontology is overrated: Categories, links, and tags. Clay Shirky's Writings About

    the Internet.

    Shirky, C. (2008, February 28).Here comes everybody: The power of organizing without

    33

  • 7/22/2019 How is technology shifting authority from centralised command structures to flat forms of organisation?

    34/34

    33161982 Anca Pusca Dissertation

    organizations. Penguin books.

    Slaughter, A. (2009). America's Edge-power in the Networked Century. Foreign Aff., 88, 94.

    Rayner, T. (2012, July 4).Foucault and social media: I tweet, therefore I become. Retrieved from

    http://philosophyforchange.wordpress.com/2012/07/04/foucault-and-social-media-i-tweet-therefore-i-b

    ecome/

    Sullivan, J. and Elkus, A. (2011) The Strategic Challenge of Riots: Riot Action and Crowd Power.

    Small Wars Journal, 8(2)

    Tam, D. (2013, January 30). Facebook by the numbers: 1.06 billion monthly active users. CNET.

    Retrieved from

    http://news.cnet.com/8301-1023_3-57566550-93/facebook-by-the-numbers-1.06-billion-monthly-acti

    ve-users/

    Weise, K. (2012, May 10). On Diasporas Social Network, You Own Your Own Data. Business

    Week.Retrieved from

    http://www.businessweek.com/articles/2012-05-10/on-diasporas-social-network-you-own-your-data

    WikiLeaks (2010, October 19). Now is a good time to mirror this WikiLeaks insurance backup.

    http://bit.ly/bRaiYF [Twitter post]. Retrieved from https://twitter.com/wikileaks/status/27854791764

    Valve Corporation. (2012 March). Valve New Employee Handbook. Retrieved from:

    assets.sbnation.com/assets/1074301/Valve_Handbook_LowRes.pdf