38 research outputs found

    Complex Adaptive Systems in a Contentious World

    Get PDF
    This article is about developing and implementing interventions that are systemically viable in a world that is constantly evolving. Geopolitical and economic forces, environmental stressors, and the weaponization of information confront us with an unprecedented level of complexity, requiring new ways of seeing and being when intervening in conflictual situations. I draw on the Complex Adaptive Systems paradigm to explore how world order emerges from the dynamics of network relationships between the players in the cyber-social landscape. This treatment elaborates on mechanisms underpinning resilience, adaptation, and transformation of socioeconomic systems in turbulent contexts. It emphasizes a need to reconsider conventional logics and mindsets. In its final analysis the article suggests that world leaders need to choose whether to persist in defending the international rule-based order or to embrace network thinking and create conditions under which each country can find a sustainable niche in a global ecosystem

    The Art and Artifacts of Solidarity

    Get PDF
    In Complex Adaptive Systems in a Contentious World I showed how viewing social systems as Complex Adaptive Systems exposes the systemic mechanisms that underpin their resilience and sustainability. In this article I show the utility of that approach for elucidating the role of art and artists in the evolution of resilient social movements. I do this by exploring the way in which art and artifacts were implicated in the evolution of the Polish Solidarność movement

    Facing Disruption Responsive Contents and Technological Responsibility

    Get PDF
    The panel explores an alternative conceptual framework to understand and manage the implications of non-linearly structured work forms that emerge in current work environments. The framework of complexity is used for this purpose and to assess the importance of boundaries and limited perspective for systems in which technology is constructed as a ferment of change. The question of which change data are needed to face disruption in information systems is raised at a general level. The panel audience is presented with a possible framework for the discussion

    Seventeen Pieces: Displacement, Misplacement and Conservation

    Get PDF
    This article explores the systemic importance of art in the conservation of images, historical reference, and cultural meaning as displaced victims of humanitarian crises make the transition from the land of their birth to a new country with a different history and cultural landscape. In presenting the work of Kevork Mourad, an artist of Armenian descent displaced from Syria, we show the essential, layered interplay of visceral, lived individual experiences and the historic collective memory of real and imagined pasts that survive the destruction of physical artifacts

    Fitness voter model: damped oscillations and anomalous consensus

    Get PDF
    We study the dynamics of opinion formation in a heterogeneous voter model on a complete graph, in which each agent is endowed with an integer fitness parameter k ≥ 0, in addition to its + or − opinion state. The evolution of the distribution of k–values and the opinion dynamics are coupled together, so as to allow the system to dynamically develop heterogeneity and memory in a simple way. When two agents with different opinions interact, their k–values are compared and, with probability p the agent with the lower value adopts the opinion of the one with the higher value, while with probability 1 − p the opposite happens. The winning agent then increments its k–value by one. We study the dynamics of the system in the entire 0 ≤ p ≤ 1 range and compare with the case p = 1/2, in which opinions are decoupled from the k–values and the dynamics is equivalent to that of the standard voter model. When 0 ≤ p < 1/2, agents with higher k–values are less persuasive, and the system approaches exponentially fast to the consensus state of the initial majority opinion. The mean consensus time τ appears to grow logarithmically with the number of agents N , and it is greatly decreased relative to the linear behavior τ ∼ N found in the standard voter model. When 1/2 < p ≤ 1, agents with higher k–values are more persuasive, and the system initially relaxes to a state with an even coexistence of opinions, but eventually reaches consensus by finite-size fluctuations. The approach to the coexistence state is monotonic for 1/2 < p < po 0.8, while for po ≤ p ≤ 1 there are damped oscillations around the coexistence value. The final approach to coexistence is approximately a power law t −b(p) in both regimes, where the exponent b increases with p. Also, τ increases respect to the standard voter model, although it still scales linearly with N. The p = 1 case is special, with a relaxation to coexistence that scales as t −2.73 and a consensus time that scales as τ ∼ N β , with β 1.45

    Learning to improve software processes.

    Get PDF
    Software Process Improvement (SPI) programs are frequently considered to be planned in nature. However, there is recent evidence to suggest that SPI can be understood as a form of learning. Drawing on the organizational learning literature this paper proposes an active learning perspective of improvements in processes. This view recognizes the various actors in the project to be reflective in their actions, making sense of the current context and thus designing their use of the process to best suit their needs at the time. The changes in the processes emerge through ongoing adjustments, experimentation and improvisation as developers and managers seek to improve their product development

    Strategies and Effective Decision-Making against Terrorism Affecting Supply Chain Risk Management and Security

    Get PDF
    Purpose The purpose of this paper is to investigate the knowledge gaps in the published research on terrorism-related risk in supply chains, and to develop a framework of strategies and effective decision-making to enable practitioners to address terrorism-related risks in supply chain risk management (SCRM) and security.Design/methodology/approach The study adopts a novel combination of triangulated methods comprising a systematic literature review (SLR), text mining and network analysis. These methods have not been jointly utilized in past studies, and the approach constitutes a rigorous methodology that cross-validates results and ensures the reliability and validity of qualitative data.Findings The study reveals a number of key themes in the field of SCRM and security linked with terrorism. The authors identify relevant mitigation strategies and practices for effective strategic decision making. This subsequently leads us to develop a strategic framework of strategies and effective decision-making practices to address terrorism-related risk, affecting SCRM and security. The authors also identify key knowledge gaps in the literature and explore the main contributions by disciplines (e.g. business schools, engineering and maritime institutions) and countries.Practical implications The authors provide a strategic framework of strategies and effective decision-making practices that managers can use to minimize terrorism-related risk in the context of SCRM and security.Originality/value This paper introduces a novel methodological combination for improving the quality of SLRs. It uses the approach to systematically review the strategies and effective decision-making practices interlinked with terrorism risk, affecting SCRM and security. It identifies significant knowledge gaps and defines directions for future research

    Small fish in a big pond: an architectural approach to users privacy, rights and security in the age of big data

    Get PDF
    We focus on the challenges and issues associated with Big Data, and propose a novel architecture that uses the principles of Separation of Concerns and distributed computing to overcome many of the challenges associated with storage, analysis and integrity. We address the issue of asymmetrical distribution of power between the originators of data and the organizations and institutions that make use of that data by taking a systemic perspective to include both sides in our architectural design, shifting from a customer-provider relationship to a more symbiotic one in which control over access to customer data resides with the customer. We illustrate the affordances of the proposed architecture by describing its application in the domain of Social Networking Sites, where we furnish a mechanism to address problems of privacy and identity, and create the potential to open up online social networking to a richer set of possible applications

    Support and Assessment for Fall Emergency Referrals (SAFER 1) trial protocol. Computerised on-scene decision support for emergency ambulance staff to assess and plan care for older people who have fallen: evaluation of costs and benefits using a pragmatic cluster randomised trial

    Get PDF
    Background: Many emergency ambulance calls are for older people who have fallen. As half of them are left at home, a community-based response may often be more appropriate than hospital attendance. The SAFER 1 trial will assess the costs and benefits of a new healthcare technology - hand-held computers with computerised clinical decision support (CCDS) software - to help paramedics decide who needs hospital attendance, and who can be safely left at home with referral to community falls services. Methods/Design: Pragmatic cluster randomised trial with a qualitative component. We shall allocate 72 paramedics ('clusters') at random between receiving the intervention and a control group delivering care as usual, of whom we expect 60 to complete the trial. Patients are eligible if they are aged 65 or older, live in the study area but not in residential care, and are attended by a study paramedic following an emergency call for a fall. Seven to 10 days after the index fall we shall offer patients the opportunity to opt out of further follow up. Continuing participants will receive questionnaires after one and 6 months, and we shall monitor their routine clinical data for 6 months. We shall interview 20 of these patients in depth. We shall conduct focus groups or semi-structured interviews with paramedics and other stakeholders. The primary outcome is the interval to the first subsequent reported fall (or death). We shall analyse this and other measures of outcome, process and cost by 'intention to treat'. We shall analyse qualitative data thematically. Discussion: Since the SAFER 1 trial received funding in August 2006, implementation has come to terms with ambulance service reorganisation and a new national electronic patient record in England. In response to these hurdles the research team has adapted the research design, including aspects of the intervention, to meet the needs of the ambulance services. In conclusion this complex emergency care trial will provide rigorous evidence on the clinical and cost effectiveness of CCDS for paramedics in the care of older people who have fallen
    corecore