We think you have liked this presentation. If you wish to download it, please recommend it to your friends in any social system. Share buttons are a little bit lower. Thank you!
Presentation is loading. Please wait.
Published bySibyl McCoy
Modified about 1 year ago
The War on Terrorism versus The Free and Open Exchange of Scientific and Technical Information Michael J. Hopmeier Chief, Innovative and Unconventional Concepts Unconventional Concepts, Inc. 426 E. Hollywood Blvd, Suite A Mary Esther, FL 32569 (850) 243-4411, Fax (850) 243-5279 firstname.lastname@example.org 2 April 2003 © 2003 unconventional concepts inc
Turning Point in Science Publication On September 19, 1918, a 21-year-old Army private reported to the Camp Jackson, S.C., base hospital feeling ill. Within a week he was one of 21 million fatalities attributed to the influenza pandemic of 1918. On March 21, 1997, almost exactly 80 years later, a team from AFIP published details of the disease genetic code in the journal Science and rekindled a debate on the freedom of scientific and technical information. © 2003 unconventional concepts inc 2
In March 1989, 8 years before the AFIP article, Fleishman and Ponds of the University of Utah published their findings on cold fusion. Their results were immediately applauded, and derided, by numerous respected, and not so respected, researchers worldwide. In November 1989, the Energy Research Advisory Board of the DOE was convened to review the issue. They found that “…experimental results of excess heat from calorimetric cells reported to date do not present convincing evidence that useful sources of energy will result from phenomena attributed to cold fusion.” Cold Fusion © 2003 unconventional concepts inc 3
Cold Fusion (cont’d) The board continued to discuss a variety of experiments and their equivocal results. Key, however, is that there were other experiments, by other agencies, trying to duplicate the effort and either verify or repudiate the results. © 2003 unconventional concepts inc 4
“Science” As defined in Hypertext Webster Gateway at UCSD Accumulated and established knowledge, which has been systematized and formulated with reference to the discovery of general truths or the operation of general laws; knowledge classified and made available in work, life, or the search for truth; comprehensive, profound or philosophical knowledge © 2003 unconventional concepts inc 5
Science and Technical Information Not used just to inform and educate Used to support or repudiate research The Energy Research and Advisory Board was not convened to evaluate cold fusion, but instead to consider whether to alter funding profiles to support cold fusion research! Used to coordinate and focus research into areas of interest or value © 2003 unconventional concepts inc 6
“Power corrupts…” “…And Absolute Knowledge can be a two-edged sword.” Unquestionably, too much information can be dangerous......BUT SO CAN TOO LITTLE! © 2003 unconventional concepts inc 7
To Publish or Not To Publish…? Themis, the Greek Goddess of Justice, was said to be blindfolded to better objectively evaluate the evidence placed before her. We have the same responsibility in assessing the value of information. © 2003 unconventional concepts inc 8
A Simple Decision: Release or Not Release? 4 Right Wrong Release Withhold 1 2 3 Let us consider the immediate effects on the decision maker. © 2003 unconventional concepts inc 9
Immediate Effects Release Correct Part of SOP No specific impact Everyone does his job © 2003 unconventional concepts inc 10
Immediate Effects (cont’d) Withhold Correct Perhaps minor complaints from those who wish to release No public disclosure Information not available © 2003 unconventional concepts inc 11
Immediate Effects (cont’d) Withhold Wrong Possible ineffectiveness of research Limitations on further research Possible limited damage to researcher’s career, but hard to determine Overall, no clear or immediate negative impact © 2003 unconventional concepts inc 12
Immediate Effects (cont’d) Release Wrong Potential immediate adverse effects (attacks, assistance to adversaries) Probable negative publicity Necessity to immediately defend decision Potential damage to decision maker’s career © 2003 unconventional concepts inc 13
Not Purely Self-Interest! These decisions are generally made on the basis of the best information possible. They are well thought-out and well considered. But weighting is on the conservative—i.e., “don’t release.” © 2003 unconventional concepts inc 14
Issues Are Larger Than STI The 1997 DSB Transnational Threats Study noted information dissemination problems: “Users” lacked critical data when and as needed. Classification impeded the flow of critical information, the value of which may have outweighed the damage that release could cause. Then, as now, there is no process by which these relative values can be assessed. © 2003 unconventional concepts inc 15
Solution Develop a process whereby we can assess and measure the impact of information, as it is both withheld and released. © 2003 unconventional concepts inc 16
Risk There is unquestionably a risk associated with releasing “sensitive” data. We have all been trained to be aware and wary of this. The effects are often obvious, immediate, and highly detrimental. © 2003 unconventional concepts inc 17
Risk (cont’d) There is an equally great—and possibly greater—risk in not releasing some information SARS HIV/AIDS Combined research on strategic issues © 2003 unconventional concepts inc 18
Education To release or not release is neither a purely policy nor a purely scientific decision. Scientific and technical personnel do not always have sufficient knowledge of the ramifications of their information release and can be short-sighted. Policy personnel seldom have the background to grasp the significance if the information is related to science. Both sides must be educated as to the impact of their decisions. © 2003 unconventional concepts inc 19
One Possible Answer Create a joint high-level committee to consist of senior science and policy makers; focus on creating guidelines and policies, not on evaluating particular technologies or research areas; and provide guidance on creating and disseminating education and policy, not just dogma. © 2003 unconventional concepts inc 20
Final Analysis Risk There is if we release information There is if we don’t Balance Is the only answer Educate our people, at all levels, to be able to effectively weigh the risks Make the best use of the resources we have, and accept that there will always be a threat — we just have to minimize it © 2003 unconventional concepts inc 21
Information Sharing Challenges, Trends and Opportunities Norm Beasley Maricopa County Sheriff’s Office Joe Arpaio Sheriff USDOJ/BJA Regional Information.
Jeff Morris Associate Director for Science Office of Science Policy Symposium on Peer Review of Risk Assessments and Related Activities September 30, 2003.
The Value/Criterion Debate and Voters. Aaron Overheim.
The IARC Monographs: Volume 112, Glyphosate Evaluation Kate Z. Guyton PhD DABT Senior Toxicologist Responsible Officer, Volume 112 Monographs Programme.
Research Methods in Psychology Introduction to Psychology.
Recall The Team Skills 1. Analyzing the Problem (with 5 steps) 2. Understanding User and Stakeholder Needs 3. Defining the System A Use Case Primer Organizing.
Principles of Information Security, Fourth Edition Chapter 1 Introduction to Information Security Part II.
International Standards for the Professional Practice of Internal Auditing.
Chapter 18 Internal Auditing and Outsourcing. Define Internal Auditing Internal auditing is an independent and objective assurance and consulting activity.
The word science comes from the Latin "scientia," meaning knowledge. Scientific Theories are not "tentative ideas" or "hunches". The word "theory" is often.
ICS 417: The ethics of ICT 4.2 The Ethics of Information and Communication Technologies (ICT) in Business by Simon Rogerson IMIS Journal May 1998.
Research !!. Philosophy The foundation of human knowledge A search for a general understanding of values and reality by chiefly speculative rather thanobservational.
Copyright Course Technology Topic 2 How to Give a Great Presentation Using PowerPoint for Presentations Discuss group projects, form teams Team.
The CRM Textbook: customer relationship training Terry James © 2006 Chapter 11: Management.
Working Together for Change: Building Bridges from Service to Justice Arthur Turovh Himmelman Himmelman Consulting Minneapolis, Minnesota
Animal, Plant & Soil Science Lesson A1-2 Designing and Conducting Agricultural Research.
Chapter 10 Schedule Your Schedule. Copyright 2004 by Pearson Education, Inc. Identifying And Scheduling Tasks The schedule from the Software Development.
Halton Inspection Planning - Journey of the Child Unannounced Ofsted Inspection Mark Grady Principal Policy Officer, Children & Enterprise.
1 Chapter 4: Project Integration Management. 2 Learning Objectives Describe an overall framework for project integration management as it relates to the.
Chapter 13 The Incident Command System. Introduction Incidents come in all types and sizes As you become more skilled in size-up and applying strategic.
Strengthening Health Research Capacity of Nurses – The Need for Evidence Based Practice Dr. Shareen Swastika Ali ( BDS,PGDETT,MPH) Health Research Officer.
1IT Project Management, Third Edition Chapter 4 Chapter 4: Project Integration Management.
Developing a Framework In Support of a Community of Practice in ABI Jason Newberry, Research Director Tanya Darisi, Senior Researcher
DOE Data Management Plan Requirements Carly Robinson, PhD Senior Science Advisor Office of Scientific and Technical Information U.S. Department of Energy.
4th Module: Information Systems Development and Implementation: Structure: 1.Management Control of IS Development 2.Management Characteristics of Projects.
RISK MANAGEMENT FOR COMMUNITY EVENTS. Today’s Session Risk Management – why is it important? Risk Management and Risk Assessment concepts Steps in the.
Course Technology Chapter 3: Project Integration Management.
The Seminar is being held 11am to 12.30pm in Room 104 upstairs.
Classification Appeal Process First, get your PD Second, look at the Commerce Web site to determine a PD or possible PDs in the same job group or job family.
Appraisal Types. APPRAISAL METHODS NARRATIVES ESSAYS – CRITICAL INCIDENTS RANKING COMPARISONS ALTERNATION – PAIRED COMPARISONS CHECKLISTS SIMPLE – WEIGHTED.
Integrating the gender aspects in research and promoting the participation of women in Life Sciences, Genomics and Biotechnology for Health.
We Complete Your Success MANAGING RISK Governance for SMEs Nigeria.
Know How To Make Best Of The Flute Lesions A True Fact, Taking Flute Lessons Is All About Making A Big Commitment That Takes A Fairly Long Time To Master.
Information Assurance The Coordinated Approach To Improving Enterprise Data Quality.
National Institute of Standards and Technology U.S. Department of Commerce Technology Program Evaluation: Methodologies from the Advanced Technology Program.
By Bankole Ebisemiju At an Intensive & Interactive workshop on Techniques for Effective & Result Oriented Annual Operation Plan November 23 rd 2010 Developing.
Information leadership VSP Vision, strategy, position.
VIRTUAL HEALTH LIBRARY JAMAICA PROJECT Presented by Swarna Bandara VHL Coordinator At the 4th VHL Meeting in Bahia, Salvador Sept. 2005
Session 6: Summary of Discussion A. Institutional Barriers and Potential Solutions 1. Natural environment does not have national or institutional boundaries,
Part Two Audit objectives, Planning The Audit ＆ Materiality.
Teamwork 101. How would you describe teamwork? What is teamwork? Teamwork is defined in Webster's New World Dictionary as "a joint action by a group.
29e CONFÉRENCE INTERNATIONALE DES COMMISSAIRES À LA PROTECTION DES DONNÉES ET DE LA VIE PRIVÉE 29 th INTERNATIONAL DATA PROTECTION AND PRIVACY COMMISSIONERS.
This presentation is part of a larger program that includes hand outs with checks lists and user instruction tips. If you do not have these materials they.
Slide 1 Replacing a Lessons Learned Database with a Visible Learning Process Session #1203 Steven Wieneke Technical Fellow Global Technical Memory Global.
Training II: Software, Publications, IP, and Export Control Issues L. Meixler Many researchers tend not to regard software as IP. They often share software.
Governor’s Taskforce for Pandemic Influenza Preparedness Issue Paper Credible and Effective Decision-making Workgroup Members Robert Rolfs, State Epidemiologist,
Copyright 2012 Delmar, a part of Cengage Learning. All Rights Reserved. Chapter 9 Improving Quality in Health Care Organizations.
© Grant Thornton | | | | | Guidance on Monitoring Internal Control Systems COSO Monitoring Project Update FEI - CFIT Meeting September 25, 2008.
Work Programme for the specific programme for research, technological development and demonstration "Integrating and strengthening the European Research.
Dstl is part of the Ministry of Defence © Crown Copyright Dstl 2012 Anticipating the Insurgent Response Fiona Browning Land Battlespace Systems Department.
© 2017 SlidePlayer.com Inc. All rights reserved.