China’s Social Credit System

World Since 1920 / East Asia in the 20th century China since 1912 When America China sneezes, the whole world gets a cold. Long term, is it a good idea to take China’s money? Will China’s model for growth which extracts a heavy sacrifice and toll from its people, be sustainable? Development of republic 1912-20: old order disintegrated Interwar years 1920-37: growth of Chinese Communist Party (CCP) War against Japan 1937-45: 2nd Sino-Japanese War after 1st 1894–95 Kuomintang: anti-communism, Chinese nationalism, reunification Chinese Communist ideologies: dynamic to safeguard the party's rule Emergence of the People’s Republic of China economic reform: 60-point plan Internet  social credit: Sesame Credit > Gamification | e-Commerce: alibaba | internet sovereignty | messaging: tencent | search: Baidu orphans: Half the Sky social radar: dissent 2015 population: two-child policy | economy: market meltdown | October: Conflict in South China Sea in general: communist propaganda hip-hop…what!?: rap-aganda | food safety | buy anything: lightinthebox | consumer marketing: prcdirect      books/movies: propaganda: Propaganda Bernays | #1 movie: Monster Hunt | fragile: Red Capitalism Walter | history: In Search of History White | investing: The Chinese are coming, and they’d like to buy your house Francis

China’s social credit system (BBC)

 

Absorption of new technologies accelerates

big picture Technology Who are the world's most valuable tech companies? We wanted flying cars, instead we got 140 characters founders fund Is it evil? How fast is technology accelerating? - The Universe was created 13.8 billion years ago - Humans arrived 200,000 years ago - Machines arrived 100 years ago - What’s the next milestone? Development of Technology Elements of Technology Fields of Technology  in general: mapping the future: Metaculus > Future | early adoption: leveling the playing field | kids: uTech | news: re/code

Ponemon Research Institute

Development of Technology Trustworthiness How do you measure/validate trust in the cybersecurity of the enterprise? > Cybersecurity How can big-city police (e.g. Baltimore) and neighborhoods-at-risk rebuild trust in each other? How do you know if someone is trying to win, or lose? Parameters of trust Trust is built over a marriage, a career, a lifetime, but can be lost in a second. sp Confidence Reliability Integrity: trustworthiness over time Privacy Resiliency: Antifragile: Things That Gain from Disorder Taleb Skepticism and Conspiracy Theory Terms of Service: monitoring: docracy | ratings: crowd ratings Truth (correctness) photos: A bullet can kill a man, but a lying camera can kill a nation. lying: There is no defense against lying. sp | white lies vs black lies Technologies of trust big data: cyber-physical systems: terraechos certifications: kikscore drug testing federations: InCommon passwords: keepersecurity products & services relationship mining: intersecting people sp | Relationship Science scoring trust: TrustCloud Fields of Application human-machine relationships marketing: celebrity DBI DBI= 0.6*(Awareness) + 0.4*((Appeal+ Breakthrough+Trend-Setter +Influence + Trust + Endorsement + Aspiration)/7) Societal Risk Management (SRM): graduate program Software: Top 25 Most Dangerous Software Errors in general: advertising: evidon, doubleverify | medical devices: Open Medical Device Research Library omdrl.org | electronic voting: Do electronic voting machines improve the voting process? | Failed States Index: fundforpeace | financial institutions: credit cards, financialtrustindex | internet |sports: Lance Armstrong, research | wellness: Dr. Oz, Food Babe untrustworthy: corporations: Volkswagen | government: NSA | nonprofits: FIFA, Red Cross | politicians: Chris Christie, Hillary Clinton articles, books: ubiquitous: Trust is the glue that holds us together sp | Dare: Accepting the Challenge of Trusting Leadership Weiss | Extreme Trust: Honesty as a Competitive Advantage Peppers | Just How Fragile Are America’s Bridges? Sofge | Likeonomics Bhargava | The Fix: Soccer and Organized Crime Hill Crime

How do you validate trust in the cybersecurity of the enterprise?