The Democratization of Knowledge

26

September

2016

No ratings yet.

During my reading of the book “The Long Tail” by Chris Anderson I have learned much about the subject of the Long Tail and have become more aware of the enormous opportunities that lie in the long tail. The democratization of distribution and production have erupted a very large change in many industries. It is very attractive to start a business in a niche market nowadays, instead of aiming for a big ”hit”. This is an opportunity which companies could continue to explore. I find it interesting to see where the long tail will take us in the future.

I am fond of a related but different concept, which I have named the democratization of knowledge. By this I mean the spreading of knowledge, for example University courses, to more people and removing the geographical and financial barriers of the knowledge. I am of the opinion that knowledge should be spread in a way that it is accessible to everyone. A great example that comes to mind concerning accessible knowledge is the website www.seekershub.org. SeekersHub aims to provide Islamic knowledge to people around the world, and has made it very easy for students all around the world to gain knowledge. They have also made use of the pay what you want pricing concept, where students can give their own value to the delivered service. It is possible to attend the lessons for free, but one has the option to pay for them the amount the person wants. This website has also made use of the long-tail concept. The reason therefore is that they provide all sorts of lessons, and not mainly standard lessons. In-depth lessons are provided for all sorts of disciplines, thus enabling most people to find a suitable course.

Returning to the democratization of knowledge, I am of the opinion that universities like the Erasmus University of Rotterdam should also make a lot of their classes way more accessible to the rest of the world. This can happen on platforms like Coursera or edX, but they can also build their own platform to provide this service. SeekersHub has a beautiful initiative called Knowledge Without Barriers. I think universities should take note of this and also provide knowledge without barriers.

Please rate this

Infiltrating the System

19

September

2016

No ratings yet.

60% of all (cyber) attacks are carried out by insiders. This is an alarming reality that is mentioned in the article. As information technology becomes more important in the way companies do business, so do data scientists. Also, more and more employees who are responsible for the IT part of the company become important assets as well. It is no secret that the growth of information technology within companies has brought up questions about privacy. Where do we draw lines? It does not matter how good the innovation is, we should not forget the human aspects of these processes. Like the example of Airbnb, where a house can have several different occupants in the time span of just a week. On first sight, Airbnb is a great innovation. But what about the neighbors, who will have to deal with new people every other day, and might feel unsafe? These are possible privacy breaches that too often are not taken into account.

Now back to the article, since the article mentions an even bigger problem connected to the increase in the use of information technology. Namely, the infiltration of criminals in organisations, solely to breach their security and hack data. No, this is not a movie. This is reality, and a very alarming one. The question that arises is: How should companies protect themselves? The article mentions some good examples, such as focusing on the right assets, applying deep analytics, knowing your people and not forgetting the basics. However, in the end, it seems like it all comes down to taking a leap of faith. One can suggest increasing all these preventive actions, but how will this affect the employees who are honest? It is not unthinkable that their commitment will decrease, since they might have the feeling that they are neither appreciated nor trusted within the company.

As the use of big data grows, so does the possible damage that stolen data can do. Just imagine how valuable the data of customers and companies is over, for example, a time span of 10 years. The article mentions that the health care, manufacturing and financial services industries are the most attacked industries. If the increased work of data scientists of those industries gets stolen, the damage could certainly be catastrophic. Even though data-scientists are not rare, they are also not very common and widespread. Thus, when a company is hasty in acquiring their own data scientist, they might contract the wrong person, and incur a great loss. It seems like the increase of information technology is a full deal package. You receive the good, but along with it you might just get some bad…

Article: https://hbr.org/2016/09/the-biggest-cybersecurity-threats-are-inside-your-company

Please rate this