2019 Trend Report for Journalism, Media & Technology

Total Page:16

File Type:pdf, Size:1020Kb

2019 Trend Report for Journalism, Media & Technology 2019 Trend Report For Journalism, Media & Technology Using and Sharing The Material In This Report We invite you to use, share You are free to: You are prohibited from: and build upon the material Share Commercial Sharing in this report. This work is Copy and redistribute the material in Don’t copy and redistribute this mate- any medium or format, including in rial in any medium or format for com- licensed under a Creative your organizations and classrooms. mercial purposes, including marketing and client services. Commons Attribution- Adapt NonCommercial-ShareAlike Remix, transform, and build upon the Representing This Work As Your Own 4.0 International License. material for your own research, work Do not represent any part of this and teaching. material as your own without giving credit to the Future Today Institute. Under the following terms: Additional Restrictions Attribution You may not apply legal terms or You must give appropriate credit to technological measures that legally the Future Today Institute, provide a restrict others from doing anything link to this Creative Commons license, this license permits. and indicate if any changes were made. You may do so in any reason- able manner, but not in any way that suggests that the Future Today Insti- tute endorses you or your use. NonCommercial You may not use the material for commercial purposes. ShareAlike If you remix, transform, or build upon the material, you must distribute your contributions under the same license as you see here. © 2018-2019 FUTURE TODAY INSTITUTE 002 Welcome It’s been a difficult year for journalism, engaged in bad behavior.” are thousands of incredibly bright, As of the publication date, The media and technology. talented, conscientious people Future Today Institute’s annual trend Meanwhile, it appears as though working hard in our newsrooms, reports have garnered more than 7.5 A sitting United States president has the platforms distributing news within corporate media, and inside million cumulative views. We’re glad repeatedly called media “the enemy content are reluctant to address the tech companies, big and small. I’m to see so many leadership teams of the people” who publish only “fake problem head-on. Facebook, Twitter also energized by the incredible all around the world using these news” to confuse and mislead voters. and Google have each made some technology on the horizon—it will trends as part of a formal, ongoing On the same day that more than 350 efforts to confront the spread of not only help combat the spread of process to reduce risk, harness new newspapers ran thoughtful editorials misinformation, however in the digital misinformation, it will offer creative opportunities and drive change within explaining that journalists are not the realm attention is currency—and we solutions to funding quality news. their fields. enemy, that the president repeatedly keep proving the value of political assaulted the free press on Twitter, vitriol, trolling and salacious content. I’m reminded of something Helen Regardless of what the next news arguing that “THE FAKE NEWS Keller once said. “Optimism is the cycle brings, always remember that At the same time, we’ve seen MEDIA IS THE OPPOSITION PARTY. faith that leads to achievement. the future is not yet written. It really the closure of even more news It is very bad for our Great Country…. Nothing can be done without hope is up to you and your organization. organizations in the past year, from BUT WE ARE WINNING!” followed and confidence.” I look at the horizon, You have the power to create your the Village Voice, to a number of by “There is nothing that I would and at the people working within our preferred future, today. regional GateHouse newspapers, to want more for our Country than true newsrooms, and I feel optimistic—but Interview Magazine. There have been FREEDOM OF THE PRESS. The fact I know there’s hard work ahead. layoffs everywhere. Tronc cut the is that the Press is FREE to write and Sincerely, Daily News staff in half, for example— That’s the reason we’ve put together say anything it wants, but much of and this time around, new digital this industry-specific report. I hope what it says is FAKE NEWS, pushing upstarts including Buzzfeed, Gizmodo it will help your organization see a political agenda or just plain trying Media Group, the Outline, Vice and opportunity as you plan for the to hurt people. HONESTY WINS!” A Upworthy have also been forced to future. Factor these trends into your week earlier, a stunning Ipsos poll Amy Webb reorganize. strategic thinking for the coming year, showed that 43% of Republicans and adjust your planning, operations Founder say that the president “should have And yet, I feel hopeful about the and business models accordingly. The Future Today Institute the authority to close news outlets year ahead. That’s because there © 2018-2019 FUTURE TODAY INSTITUTE 003 This is a robust, detailed report with 108 trends that cover many different themes and areas. The sprawling nature of this annual report was inten- tional. That’s because the future of journalism, media and technology is influenced by myriad dependencies. You cannot know the future of your field without looking broadly. To meaningfully plan for the future, organizations must listen for signals actively rather than reflex- ively. It is important to view your field through different lenses, considering adjacent sources of disruption. In the coming months, we hope that you’ll spend time with all of the analysis in our 2019 Journalism, Media and Technology Industry Trends Report. © 2018-2019 FUTURE TODAY INSTITUTE 004 Table of Contents 03 Welcome Letter 26 Real-Time Context in Machine 33 Proprietary, Homegrown 62 Distributed Computing For Learning AI Languages a Cause 07 Executive Summary 26 Generative Algorithms For 33 AI Chipsets 66 Decentralized Curation 08 Key Takeaways Voice, Sound and Video 34 Marketplaces For AI Algorithms 68 Interfaces 09 Methodology 27 Image Completion 34 More Consolidation in AI 69 Voice Interfaces 10 How To Monitor Trends and 27 AI For Seeing Through Walls Signals In Your Organization 34 AI For Deep Linking Everywhere 71 Monetizing Chat-Based 27 Predictive Machine Vision Journalism 12 How Your Organization Can 35 Making AI Explain Itself Take Action On Emerging 27 New Generative Modeling 74 New Video and Audio Story Trends Techniques 35 Accountability and Trust Formats 13 How To Use Our Report 27 Much Faster Deep Learning 36 China’s AI Boom 76 Teaching and Newsroom Training 14 Why We Include Scenarios 27 Reinforcement Learning and 37 I-Teams For Algorithms and Data With Trends Hierarchical RL 77 Adaptive Learning For 38 Computational Journalism Newsrooms 15 When, Exactly, To Take Action 28 Continuous Learning 39 Computational Photography On Tech Trends 78 Nanodegrees For Journalists 28 Multitask Learning 40 Computational Journalism 16 Our Trends Aren’t Trendy 79 Publishing and Distribution 28 Adversarial Machine Learning 41 Faceprints 17 The 10 Sources of All 80 Web 3.0 29 A Bigger Role For Ambient Future Change 43 Voiceprints Interfaces 82 Proximity News and Information 19 Artificial Intelligence 44 Blockchain Technologies 29 Digital Assistants Become 83 Digital Frailty 22 Natural Language Generation Ubiquitous 53 Tokenomics 85 The Case For Radical 25 Natural Language 30 AI For the Creative Process 55 Tokens For Smart Royalties Transparency Understanding (NLU) and Freelancers 31 Bots 86 Pop-Up Newsrooms and Limited- 25 Machine Reading 58 Immutable Journalism Edition News Products Comprehension (MRC) 33 Ongoing Bias In AI 60 Self-Sovereign Identity 87 One-To-Few Publishing 25 Real-Time Machine Learning 33 The AI Cloud © 2018-2019 FUTURE TODAY INSTITUTE 005 Table of Contents 88 Abusing The Notification Laye 107 Wearables 119 Faster Connectivity With 5G 139 The Right To Eavesdrop/ Be Eavesdropped On 89 Journalism as a Service (JaaS) 109 Smart Glasses 120 The Media Business 139 Anonymity 90 Transparency in Metrics 109 Hearables / Earables 121 Media Consolidation 139 Trolls 91 Real-Time Fact Checking 109 Head Mounted Displays 126 Ad Blockers 140 Authenticity 92 Offline Connections 109 Haptics 129 Policy and Regulation 140 Data Retention 93 Audio Search Engines 109 Thinkables 130 Splinternets 140 Ownership 94 Mixed Reality and Video 110 Embedables 131 Leaking 140 Encryption Management 95 Streamers 110 Smartwatches 133 The First Amendment in a Digital Age 141 Constant Audio Surveillance 95 Connected TVs 112 Hardware 135 Security and Privacy 141 Leaky Data 96 WebRTC 113 CubeSats 137 Compliance Challenges and 146 About the Authors 96 Streaming Social Video 115 Drone Delivery Unrealistic Budgets 147 About the Future Today Institute 96 360-Degree Video 115 Increasing Patents and Calls 137 Differential Privacy For New Regulation 148 Disclaimer 98 Holograms 137 Ransomware As A Service 115 Drone Lanes 149 The Signals Are Talking 99 Virtual Reality 137 Hacktivism On The Rise 116 Sense And Avoid Technology 150 Companies, Organizations, 101 Augmented Reality 138 Targeted Attacks on Digital Universities and Government 116 Microdrones and Drones Used Assistants Agencies Mentioned In Our 103 AR Face Filters to Protect In Dangerous/ Hard-To-Reach 2019 Journalism, Media and Individual’s identity Areas 138 Strange Computer Glitches Will Technology Industry Trends Keep Happening Report. 103 AR as a Tool to Enhance Print 116 Drone Swarms 138 Proliferation of Darknets, Aided 104 Mixed Reality Arcades 155 Contact Information 117 Searching The Internet of By Cryptocurrencies Physical Things 106 VR For Marketing 139 New Open Source App 118 Intelligent Cameras Vulnerabilities © 2018-2019 FUTURE TODAY INSTITUTE 006 Executive Summary This is the second annual edition of FTI’s 2019 Journalism, Media and Industry Trends Report. It follows the same approach as our popular FTI Annual Trend Report, now in its 11th year.
Recommended publications
  • Landscrapers Vs. Skyscrapers
    Debating Tall Landscrapers vs. Skyscrapers What does the office of the future look like? The leading tech industry giants all seem to agree the main goal is “connectivity” that forges collaboration and ideation. But there are significant differences in how this manifests in the built environment. Recently, Facebook and Google have proposed or built “landscrapers” – large, elongated buildings, in both low- (Menlo Park, California) and high-density (London) cities. Others, such as Salesforce (San Francisco) and Tencent (Shenzhen) (see Case Study, page 12), have chosen skyscrapers. We asked, “Are ‘landscrapers’ a more plausible form of office building than skyscrapers for low- to mid-density cities?” YES density within a smaller geographic space? So entails being in a tall building. Silicon Amy Webb far, we’ve seen an inverse correlation between Valley is an obvious exception. Apart from Professor, Stern School of Business, New York density and quality of life. That brings us to projecting unprecedented power and University/Founder, Future Today Institute architectural design. New buildings in prestige, these magnificent and highly densely-populated urban centers have no bespoke horizontal office monuments In the near future, landscapers will create way to go but up. In our new economic have been created to attract high-caliber entirely new urban footprints in emerging centers, architects will be freed to develop employees. Complete with their very own low-density economic centers. There are a new models for working and living. Recent utopian visions with physical number of factors conspiring to push innovations in elevator technologies, such as manifestations so remote from their what was once a concept from the fringe the ropeless elevator, will make it easier to surroundings, these physically isolated into the mainstream.
    [Show full text]
  • Business Analytics
    SPRING 2017 Business Analytics Meeting the need for talent. PAGE 4 VIRGINIA TECH BUSINESS is published twice a year by: RANKINGS Pamplin College of Business, Virginia Tech No. 2 1030 Pamplin Hall (0209) U.S. 880 West Campus Drive Blacksburg, VA 24061 540-231-6601 No. 2 No. 7 No. 6 World www.pamplin.vt.edu Master of Evening Hospitality and Address changes: [email protected] Information Technology MBA Tourism Management Editorial inquiries and story suggestions: [email protected] U.S. News & World Report QS Top Universities In this magazine, alumni, with some exceptions, are DONNIE GRAY identified by degree and the year it was received. VIRGINIA TECH’S EVENING MBA ranking in U.S. News & World Report has improved DEAN to No. 7 among the nation’s part-time Robert T. Sumichrast MBA programs, according to the 2018 EDITOR survey released in March. It was ranked Sookhan Ho No. 16 for the previous two years. Offered DESIGN by the Pamplin College of Business, the Uncork-it, Inc. Evening MBA program serves aspiring FEATURE WRITERS business leaders in the Washington, D.C., Sookhan Ho, Dan Radmacher area with classes taught at the Northern PHOTOGRAPHERS Virginia Center, and has seen significant STUDENTS such as Mala Lal balance work, Christina O’Connor, Jim Stroup, Logan Wallace, growth in recent years. study, and family in the highly ranked Evening Oliver Meredith MBA program. ALUMNI INFORMATION Gina French, Bonnie Gilbert DISTRIBUTION MANAGER Jodi Jennings Charles Schwab Financial Planning Suite ABOUT enhances learning for business students Virginia Tech’s nationally ranked Pamplin College of JIM STROUP Business offers undergraduate and graduate programs in accounting and information systems, business information technology, economics, finance, hospitality and tourism management, management, and market- ing.
    [Show full text]
  • Technical Education Landscape in the UAE: Qualifications & Opportunities
    Technical Education Landscape in the UAE: Qualifications & Opportunities GLOBAL INNOVATIONS 2013 – DOHA, QATAR Sajida H. Shroff, April 2013 Agenda • Executive Summary • UAE Parameters for Technical Education • Current Status of TECH Education in the UAE • Enrollment Growth in Vocational/Technical/Career Track Education in the UAE • UAE’s Regulatory Landscape • Proposed and (sample) Private Qualifications Frameworks in the UAE • Current Career Track Training Options in the UAE • Public and Private Providers • Gaps and Potential Programmes • Next Steps • Potential Impact • Appendices: Sources Technical Education Landscape in the UAE- updated 04Apr13 2 Executive Summary The Technical (TECH) Landscape Study identifies the current status, prospects and challenges related to the expansion of TECH offerings in Dubai • There is a need for expanded Vocational/Technical Educational Programmes in Dubai to serve the UAE and the Region • Programmes would primarily serve the Expatriate population as there is sufficient capacity for the National population • The key target market is high school graduates from the UAE and the Region who DON’T/CAN’T go to university • To mitigate the identified skills gap, the focus of VTECH Education in the UAE needs to be on ‘white collar’ “career track opportunities” • In order for these career track programmes to have credibility, a qualifications framework aligned with global best practices and enabling transferability of qualifications is necessary • Due to the negative perception surrounding Vocational/Technical Education in this region as well as current labor market practices (i.e. importing blue collar workers) – VTECH Education needs to be repositioned in the UAE Technical Education Landscape in the UAE- updated 04Apr13 3 UAE’s parameters for Technical Education & Training (TECH) have to take into account regional nuances so they should be different from the global understanding; i.e.
    [Show full text]
  • The Deloitte Global 2021 Millennial and Gen Z Survey
    A call for accountability and action T HE D ELO IT T E GLOB A L 2021 M IL LE N N IA L AND GEN Z SUR V E Y 1 Contents 01 06 11 INTRODUCTION CHAPTER 1 CHAPTER 2 Impact of the COVID-19 The effect on mental health pandemic on daily life 15 27 33 CHAPTER 3 CHAPTER 4 CONCLUSION How the past year influenced Driven to act millennials’ and Gen Zs’ world outlooks 2 Introduction Millennials and Generation Zs came of age at the same time that online platforms and social media gave them the ability and power to share their opinions, influence distant people and institutions, and question authority in new ways. These forces have shaped their worldviews, values, and behaviors. Digital natives’ ability to connect, convene, and create disruption via their keyboards and smartphones has had global impact. From #MeToo to Black Lives Matter, from convening marches on climate change to the Arab Spring, from demanding eco-friendly products to challenging stakeholder capitalism, these generations are compelling real change in society and business. The lockdowns resulting from the COVID-19 pandemic curtailed millennials’ and Gen Zs’ activities but not their drive or their desire to be heard. In fact, the 2021 Deloitte Global Millennial Survey suggests that the pandemic, extreme climate events, and a charged sociopolitical atmosphere may have reinforced people’s passions and given them oxygen. 01 Urging accountability Last year’s report1 reflected the results of two Of course, that’s a generality—no group of people is surveys—one taken just before the pandemic and a homogeneous.
    [Show full text]
  • Section 2: Emerging Technologies and Military-Civil Fusion: Artificial Intelli
    SECTION 2: EMERGING TECHNOLOGIES AND MILITARY-CIVIL FUSION: ARTIFICIAL INTELLI- GENCE, NEW MATERIALS, AND NEW ENERGY Key Findings • China’s government has implemented a whole-of-society strat- egy to attain leadership in artificial intelligence (AI), new and advanced materials, and new energy technologies (e.g., energy storage and nuclear power). It is prioritizing these areas be- cause they underpin advances in many other technologies and could lead to substantial scientific breakthroughs, economic dis- ruption, enduring economic benefits, and rapid changes in mili- tary capabilities and tactics. • The Chinese government’s military-civil fusion policy aims to spur innovation and economic growth through an array of pol- icies and other government-supported mechanisms, including venture capital (VC) funds, while leveraging the fruits of civil- ian innovation for China’s defense sector. The breadth and opac- ity of military-civil fusion increase the chances civilian academ- ic collaboration and business partnerships between the United States and China could aid China’s military development. • China’s robust manufacturing base and government support for translating research breakthroughs into applications allow it to commercialize new technologies more quickly than the Unit- ed States and at a fraction of the cost. These advantages may enable China to outpace the United States in commercializing discoveries initially made in U.S. labs and funded by U.S. insti- tutions for both mass market and military use. • Artificial intelligence: Chinese firms and research institutes are advancing uses of AI that could undermine U.S. economic lead- ership and provide an asymmetrical advantage in warfare. Chi- nese military strategists see AI as a breakout technology that could enable China to rapidly modernize its military, surpassing overall U.S.
    [Show full text]
  • Episode 230: Click Here to Kill Everybody
    Episode 230: Click Here to Kill Everybody Stewart Baker: [00:00:03] Welcome to Episode 230 of The Cyberlaw Podcast brought to you by Steptoe & Johnson. We are back and full of energy. Thank you for joining us. We're lawyers talking about technology, security, privacy, and government. And if you want me to talk about hiking through the rain forest of Costa Rica and just how tough my six-year-old granddaughter is, I'm glad to do that too. But today I'm joined by our guest interviewee Bruce Schneier, an internationally renowned technologist, privacy and security guru, and the author of the new book, Click Here to Kill Everybody: Security and Survival in a Hyper-Connected World. We'll be talking to him shortly. For the News Roundup, we have Jamil Jaffer, who's the founder of the estimable and ever-growing National Security Institute. He's also an adjunct professor at George Mason University. Welcome, Jamil. Jamil Jaffer: [00:00:57] Thanks, Stewart. Good to be here. Stewart Baker: [00:00:58] And David Kris, formerly the assistant attorney general in charge of the Justice Department's National Security Division. David, welcome. David Kris: [00:01:07] Thank, you. Good to be here. Stewart Baker: [00:01:08] And he is with his partner in their latest venture, Nate Jones, veteran of the Justice Department, the National Security Council, and Microsoft where he was an assistant general counsel. Nate, welcome. Nate Jones: [00:01:23] Thank you. Stewart Baker: [00:01:25] I'm Stewart Baker, formerly with the NSA and DHS and the host of today's program.
    [Show full text]
  • Improving PKI Solution Analysis in Case of CA Compromisation
    Master Game and Media Technology Improving PKI Solution analysis in case of CA compromisation Samira Zaker Soltani January 2013 Utrecht University Faculty Computer Science Deloitte Nederland Deloitte Risk Services Supervisors: Gerard Tel - Univeristy Utrecht Henk Marsman - Deloitte Nederland To my mother, for she is the reason. Abstract Creating a secure connection on the Internet is made possible through the usage of certificates, binding an entity to its public key. These certificates can be issued by any of the Certificate Authorities (CA), where each CA has the same privileges. During the last year, we have seen many CA compromises, resulting into the issuance of fraudulent certificates. Fraudulent certificates can be used, in combination with the man-in-the-middle attack, to eavesdrop the communications of Internet users. This research focuses on solutions that can remove or limit the impact of a CA com- promisation and provides a description and analysis of each solution. The solutions have been chosen through interviews and literature. Among the discussed solutions are Public Key Pinning, Sovereign Keys, Certificate Transparency, Perspectives & Convergence, DANE, and MCS. In order to identify each solution’s advantages and disadvantages, we have created a metric of aspects. The aspects have been categorized into security, usability, and costs. The focus of this research has been on security, since that is the aspect in Public Key Infrastructure we are trying to solve. The results indicate that Certificate Transparency and DANE are the most promis- ing solutions for limiting the risks of a compromised CA. Further research will be needed to complete each solution, since both solutions are not yet ready for deploy- ment.
    [Show full text]
  • It Takes a Journalist
    IT TAKES A JOURNALIST ® 2019 ANNUAL REVIEW IT TAKES A OUR MISSION LETTER FROM OUR PRESIDENT JOURNALIST ® ICFJ empowers a global network of Dear Friend, 2 OUR MISSION journalists to produce news coverage Across the globe, our unparalleled network of journalists produces news stories 3 LETTER FROM OUR PRESIDENT that have tremendous impact. With our training and support, these journalists: 4 BLAZING THE TRAIL that leads to better governments, Hold the powerful to account even in the darkest corners of the world 6 OUR NETWORK stronger economies, vibrant societies where autocratic forces threaten their safety. 8 OUR IMPACT and healthier lives. Combat disinformation as fake news spreads across every platform — 12 AWARDS DINNER from local radio in the smallest village to the social media giants. 15 FINANCIALS 16 OUR DONORS Give voice to the forgotten, such as poor children denied an ICFJ HAS WORKED WITH education or women deformed in vicious acid attacks. 19 BOARD OF DIRECTORS 140,000+ JOURNALISTS On our 35th anniversary, we are committed to expanding our vast network of journalists, who are pursuing the truth despite the risks. FROM 180 COUNTRIES Join our efforts to support the truth tellers in these perilous times. To ensure free and vibrant societies, it takes a journalist. OVER 35 YEARS Joyce Barnathan, President, ICFJ ICFJ 2019 ANNUAL REVIEW 3 BLAZING THE TRAIL ICFJ has stayed ahead of the trends to ensure that journalists can provide the highest quality content. 1984 1989 1994 2001 2007 2009 2010 2014 2016 2017 2018 2018 2019 Founded by Led the rise of Trained a new Helped U.S.
    [Show full text]
  • Core Renaissance: Revitalising the Heart of IT
    ChapterUK extractEdition Core renaissance Revitalising the heart of IT Tech Trends 2015: The fusion of business and IT B Core renaissance Core renaissance Revitalising the heart of IT Organisations have significant investments in their core systems, both built and bought. Beyond running the heart of the business, these assets can form the foundation for growth and new service development – building upon standardised data and automated business processes. To this end, many organisations are modernising systems to pay down technical debt, replatforming solutions to remove barriers to scale and performance, and extending their legacy infrastructures to fuel innovative new services and offerings. NVESTING in technologies that support Leading organisations are building a Ithe heart of the business has been IT’s roadmap for a renaissance of their core – emphasis since its earliest days – policy focussed not on painting their legacy as the administration, claims management, and “dark ages,” but on revitalising the heart of billing in insurance; order management, their IT and business footprint. resource planning and manufacturing for consumer and industrial products; Business first inventory management, pricing and Amid continuously evolving business distribution for retail; and universal needs pressures and technology trends, several such as finance and human resources. questions arise: How will the core hold up? Core systems drive process and data (Consider, first, the business angle.) How automation, standardisation and intelligence well do existing solutions meet today’s – and represent decades of investment needs? (Consider not just functional in buying packages, building custom completeness, but increasingly relevant solutions and integrating an increasingly dimensions like usability, analytics insights hybrid environment.
    [Show full text]
  • A Roadmap to Initial Public Offerings
    A Roadmap to Initial Public Offerings 2019 The FASB Accounting Standards Codification® material is copyrighted by the Financial Accounting Foundation, 401 Merritt 7, PO Box 5116, Norwalk, CT 06856-5116, and is reproduced with permission. This publication contains general information only and Deloitte is not, by means of this publication, rendering accounting, business, financial, investment, legal, tax, or other professional advice or services. This publication is not a substitute for such professional advice or services, nor should it be used as a basis for any decision or action that may affect your business. Before making any decision or taking any action that may affect your business, you should consult a qualified professional advisor. Deloitte shall not be responsible for any loss sustained by any person who relies on this publication. As used in this document, “Deloitte” means Deloitte & Touche LLP, Deloitte Consulting LLP, Deloitte Tax LLP, and Deloitte Financial Advisory Services LLP, which are separate subsidiaries of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of our legal structure. Certain services may not be available to attest clients under the rules and regulations of public accounting. Copyright © 2019 Deloitte Development LLC. All rights reserved. Other Publications in Deloitte’s Roadmap Series Business Combinations Business Combinations — SEC Reporting Considerations Carve-Out Transactions Consolidation — Identifying a Controlling Financial Interest Contracts on an Entity’s Own Equity
    [Show full text]
  • 858003 Getting Unstuck Working As One in Government
    Getting Unstuck How to work As One in government A GovLab study About GovLab Deloitte’s GovLab works closely with senior government executives and thought leaders from across the globe. As GovLab Fellows, we conduct research into key issues and emerging ideas shaping the public, private and non-profit sectors. Through exploration and analysis of government’s most pressing challenges, we seek to develop innovative yet practical ways that governments can transform the way they deliver their services and prepare for the challenges ahead. As used in this document, “Deloitte” means Deloitte Consulting LLP, a subsidiary of Deloitte LLP. Please see www.deloitte.com/us/about for a detailed description of the legal structure of Deloitte LLP and its subsidiaries. Certain services may not be available to attest clients under the rules and regulations of public accounting. Contents 1 Executive summary 2 Why does government need As One thinking? 4 A new approach 8 Getting unstuck: Seeing through the As One lens 21 Putting As One to work: Interventions 23 Broaden perspectives with social media monitoring 24 Conclusion Executive summary Why do some transformative government initiatives tools at their disposal to answer those questions, they can succeed on a grand scale while others fail? The answer antici pate challenges and address them before they grow lies in the abilities of agencies to translate individual into crippling obstacles. actions into collective power. Getting big things done in government requires employees and organizational The identity of a government organization, its commitment partners to commit to a single set of objectives. Working to an initiative’s objectives, and the way its employees cultures should match what needs to be done.
    [Show full text]
  • The Changing Face of Cyber-Attacks: Understanding and Preventing Both External and Insider Security Breaches
    WHITE PAPER | June 2013 The Changing Face of Cyber-Attacks: Understanding and preventing both external and insider security breaches Russell Miller CA Security Management PROTECT AGAINST INSIDER THREATS AND EXTERNAL ATTACKS Table of Contents Executive Summary 3 Section 1: Challenge 4 External Cyber-Threats are Changing Rapidly Section 2: Opportunity 7 Where Organizations Fall Short Section 3: 12 Conclusions Section 4: 12 Refernces Section 5: 13 About the Author 2 PROTECT AGAINST INSIDER THREATS AND EXTERNAL ATTACKS Executive Summary Total number of records containing Challenge sensitive personal Techniques to attack computer networks are never static. Methods and tools evolve, as do the information attackers themselves. The attacker landscape from a few years ago—where individuals or small involved in groups attacked organizations for fun and profit—no longer exists. The environment is much more security breaches complex today. Semi-organized “Hacktivist” groups, such as Anonymous and LulzSec, attempt to in the U.S. is cause damage for causes they find worthwhile. Even state-sponsored actors are becoming prominent, 607,611,003 bringing dramatically expanded resources to bear. Advanced Persistent Threats (APTs) are perhaps not in 3,716 data new, but have come to the forefront of cyber-security awareness as a result of these changes. Insider breaches between threats are also ever more complex, with the potential for damage increasing due to rapidly January 2005 expanding stores of sensitive information and highly-dynamic and virtualized IT environments. and April 2013. – A Chronology of Data Breaches, Privacy Rights Clearinghouse Opportunity Fortunately, an organization’s toolbox to defend against security breaches is more complete than ever.
    [Show full text]