j.m. díaz nafría: an informational systems approach to security

24
Informationsphilosophie. Information und urbanes Systeme 1 An Informational Systems Approach to Security Invited Lecture to Department of Computer and System Science at Stockholm University , Sept. 2013 José María Díaz Nafría Universidad de León, Spain| Munich University A.S., Germany

Upload: jose-nafria

Post on 11-May-2015

72 views

Category:

Education


1 download

DESCRIPTION

Invited lecture to the Department of of Computer and System Science at Stockholm University, September 26th 2013 Based upon the article of the same author in tripleC: http://www.triple-c.at/index.php/tripleC/article/view/199

TRANSCRIPT

Page 1: J.M. Díaz Nafría: An informational systems approach to security

Informationsphilosophie. Information und urbanes Systeme 1

An Informational Systems Approach to

Security

Invited Lecture to Department of Computer and System Science at Stockholm University , Sept. 2013

José María Díaz Nafría Universidad de León, Spain| Munich University A.S., Germany

Page 2: J.M. Díaz Nafría: An informational systems approach to security

A Systematic Approach to Security

Contents

1. Trustworthy Model vs Security

2. Trustworthiness in the Planetary System (an 18th century issue)

3. Historical Roots of the Trustworthiness and security understanding

4. Senses of security5. Towards a different sense of

security and trust (in the Information Society)

2An Informational Systems Approach to Security

Page 3: J.M. Díaz Nafría: An informational systems approach to security

• 1990s: Information Society (transparent and borderless) – September 11th (stress on security)

• Security vs. Trust (Boundary Conditions vs. Inner Conditions)

• Contradictions in the liberalist discourses with respect to protectionism and interventionism

• Pendulum with respect to the awareness of threats: from security to trust…

3A Trustworthy Information Society for All

1. Trustworthiness Model and Security

Page 4: J.M. Díaz Nafría: An informational systems approach to security

1. Trustworthiness Model and Security

4A Trustworthy Information Society for All

A trust B to do X

What is behind?

Trustworthiness Model (RISEPTIS report, EC, trustIS)

Trustworthiness vs Complexity (Luhmann)• Digital Divide• Social Divide• Ecological cleft

Page 5: J.M. Díaz Nafría: An informational systems approach to security

5

I. Newton (1642-1727) P.S. Laplace (1749-1827)

2. Trustworthiness in the planetary system: an 18th Century Issue

A Trustworthy Information Society for All

Page 6: J.M. Díaz Nafría: An informational systems approach to security

6

• Subjective vs. Objective Sense (certitude vs. Stability of the system)

Self-realisation necessity: to be useful to others without effort

Self-esteem necessity: community acknowledgment

Necessity of belonging-to: being part of a community

Security Necessity: by group validation

Functional Necessities: finding a place to eat, sleep, drink

A Trustworthy Information Society for All

2. Trustworthiness in the planetary system: an 18th Century Issue

Page 7: J.M. Díaz Nafría: An informational systems approach to security

3. Historical roots of our trustworthiness and security

understanding

“It is a very common clever device that when anyone has attained the summit of greatness, he kicks away the ladder by which he has climbed up, to deprive others of the means of climbing up after him […]Any nation which by means of protective duties and restrictions on navigation has raised her manufacturing power and her navigation to such a degree of development that no other nation can sustain free competition with her, can do nothing wiser than to throw away these ladders of her greatness, to preach to other nations the benefits of free trade”

(List 1885, pp. 295-296).7A Trustworthy Information Society for All

Page 8: J.M. Díaz Nafría: An informational systems approach to security

8

a) Beginings of freetrading | s.XXI: Famine in Ireland (1846-48) vs. Opium Wars (1842, 1858)Opium Wars (s.XIX) vs. Iraq Wars (s.XX)

i) False arguments, ii) effect of previous wariii) de facto Colonialism, iv) hindered long term development, v) Losses of historical and artistic assests, vi) separatist, ethnic and religious rebellions favored

b) Hard Power vs. Soft Power (Joseph Nye)

Global Information Dominance (Echelon, National Imagery and Mapping Agency, Future Imagery Architecture)

A Trustworthy Information Society for All

3. Historical roots of our trustworthiness and security

understanding

Page 9: J.M. Díaz Nafría: An informational systems approach to security

9

M.Foucault (The eye of the power): „Bentham was the complement to Rousseau. What in fact was the Rousseauist dream that motivated many of the revolutionaries? It was the dream of a transparent society, visible and legible in each of its parts, the dream of there no longer existing any zones of darkness [...] It was the dream that each individual, whatever portion he occupied, might be able to see the whole society…”

A Trustworthy Information Society for All

3. Historical roots of our trustworthiness and security

understanding

Page 10: J.M. Díaz Nafría: An informational systems approach to security

10

M. Foucault (The eye of the power): “[Bentham] effects the project of a universal visibility which exists to serve a rigorous, meticulous power. Thus Bentham’s obsession, the technical idea of the exercise of an ‘all-seeing’ power, is grafted on to the great Rousseauist theme which is in some sense the lyrical note of the Revolution… When the Revolution poses the question of a new justice, what does it envisage as its principle? Opinion. The new aspect of the problem of justice, for the Revolution, was not so much to punish wrongdoers as to prevent even the possibility of wrongdoing, by immersing people in a field of total visibility where the opinion, observation and discourse of others would restrain them from harmful acts”A Trustworthy Information Society for All

3. Historical roots of our trustworthiness and security

understanding

Page 11: J.M. Díaz Nafría: An informational systems approach to security

11

• G. Tarde (Sociologist and criminologist)“All the improvements of social organization… have the consequence of enabling that one meditated, coherent, individual project arrives purer, lesser polluted, deeper, and through the safer and shorter means into the minds of all the associated” (Tarde, Public opinion and the crowd. 1690, §107).

• Public Opinnion (co-opción) ~ Control Society (Deleuze) “The material and economic aspects of opinion were not acknowledged. They believed it “is fair by nature, it disseminates by itself, and it is a sort of democratic surveillance […]” (Foucault)

• Decolonization and reaction (1950-1970s)• New International Economic Order (1974), New

World Inf. and Comm. Order (1974), C. MacBride

A Trustworthy Information Society for All

3. Historical roots of our trustworthiness and security

understanding

Page 12: J.M. Díaz Nafría: An informational systems approach to security

12

• John Locke"those, who like one another so well as to join into society, cannot but be supposed to have some acquaintance and friendship together, and some trust one in another; they could not but have greater apprehensions of others, than of one another: and therefore their first care and thought cannot but be supposed to be, how to secure themselves against foreign force. It was natural for them to put themselves under a frame of government which might best serve to that end…"

(Second Treatise on Government. 1690, §107).

• Liberal Foundations (J. Locke, A. Smith, J. Bentham, Burke)

A Trustworthy Information Society for All

3. Historical roots of our trustworthiness and security

understanding

Page 13: J.M. Díaz Nafría: An informational systems approach to security

13

Differences in the target of each position:• The transparency/trustworthiness, hence the

communications without borders is at the groundings of many utopias of the Information Society (MacLuhan, Etzioni, Toffles, Barlow, etc) as well as of other technical utopias as Kropotkin’s, advocating the dissolution of (concentrated) power.

• There is a close connection with the various foundations of liberalism, in which different approaches are present:– Degree of Free-Will vs Authoritarianism (Rousseau / Bentham)– Degree of Fairness/equality vs Unfairness/Unequality

(Bentham/conservative Liberals)

A Trustworthy Information Society for All

3. Historical roots of our trustworthiness and security

understanding

Page 14: J.M. Díaz Nafría: An informational systems approach to security

14A Trustworthy Information Society for All

3. Historical roots of our trustworthiness and security

understanding

Page 15: J.M. Díaz Nafría: An informational systems approach to security

4. Senses of Security

15A Trustworthy Information Society for All

• Etymology: se + cura– Passive (secured > safety –effects)– Active (secure > security -causes)

• Values:– Subjective | Objective | Relative– Passive | Active– Gradual

• Senses: Power / Liberty warranty

Page 16: J.M. Díaz Nafría: An informational systems approach to security

16A Trustworthy Information Society for All

• Liberty warranty: – Negative (avoid dangers, risks…)– Positive (increasing space of possibilities)

4. Senses of Security

Page 17: J.M. Díaz Nafría: An informational systems approach to security

17A Trustworthy Information Society for All

Security contexts:

(s) States: (s1) national security (s2) social security system

(i) Individuals:(i1) property, privacy (i2) basic necessities, positive freedom

(i) Organisations:(o1) private goals (o2) necessities > general interest

(c) Complex Social Systems:(c1) subsistence aims (c2) global goals

(e) Ecosystems:(e1) resources availability (e2) long-term security

4. Senses of Security

Page 18: J.M. Díaz Nafría: An informational systems approach to security

5. Towards a different sense of security and trust (in the Information Society)

18

Example: Syncom Project

Sept. 11th

A Trustworthy Information Society for All

Page 19: J.M. Díaz Nafría: An informational systems approach to security

19An Informational Systems Approach to Security

5. Towards a different sense of security and trust (in the Information Society)

A Systems Approach to security (as mostly adequate for the real complexity of social systems in its long-term sustainability) embraces:

1. Systems that are open, though closed by the biosphere, and cognitive.2. System’s ontology is defined by: components, structure (relations) and

environment. 3. System’s pragmatics is defined by: function and acts within the

environment in interaction with other systems;4. System’s epistemology is defined by: complexity and state of cognitive

subsystem5. Security at any level refers to the stable attainment of a broad space of

possibilities in which the system can cope with long-term environmental dynamics and own necessities

6. The space of possibilities (freedom) is defined by: region of the system state space causing limited changes to the related systems

Page 20: J.M. Díaz Nafría: An informational systems approach to security

20An Informational Systems Approach to Security

5. Towards a different sense of security and trust (in the Information Society)

Page 21: J.M. Díaz Nafría: An informational systems approach to security

21An Informational Systems Approach to Security

5. Towards a different sense of security and trust (in the Information Society)

Previous features are not enough to cope with the complexity of the global society system closed by Earth ecosystem. We have to add:

7. Sustainability: within the space defined by the carrying capacity with respect to the natural and social environments.

8. Heterarchical organisation: “potential for being ranked in a number of different ways” System’s ontology is defined by: components, structure (relations) and environment.

9. Fuzzy system limits: essential for the emergence and dynamics of social systems (e.g. linguistic systems)

Page 22: J.M. Díaz Nafría: An informational systems approach to security

• Four Pillars of Security:

22An Informational Systems Approach to Security

5. Towards a different sense of security and trust (in the Information Society)

Page 23: J.M. Díaz Nafría: An informational systems approach to security

• The central role of information: GTI• Objective vs. Subjective values of security:

the awareness of the suitable conditions of our environment is constitutively limited and blurred (physical manifestation).

• Then assessing and foreseeing environmental conditions we must deal with:– Open character of the sensed reality– Limitation and fuzziness: 1st) of the

manifestation itself; 2nd) of our awareness of reality; 3rd) of our knowledge

23An Informational Systems Approach to Security

5. Towards a different sense of security and trust (in the Information Society)

Page 24: J.M. Díaz Nafría: An informational systems approach to security