SlideShare a Scribd company logo
1 of 6
Download to read offline
Diane Coyle OBE
    Founder, Enlightenment Economics and Member, BBC Trust




    Future of Authenticity




8
The Global Challenge


Authenticity has great salience in our times because new information and communication technologies have                     The technologies
greatly expanded the scale and scope of the inauthentic. For example, they have made identity fraud possible                 which seem to
                                                                                                                             protect the bad
and also playful; many of us now have multiple personalities online. When it is easy to choose an identity, what             guys - the identity
does that imply for the underlying reality? How do I know who I am, and how do you know who I am, and how                    thieves or
does my bank know who I am?                                                                                                  spammers -
                                                                                                                             also seem able to
                                                                                                                             lead repressive
It is now so easy to make imitations that the value of    communication in the past 20-30 years, copying and                 authorities to
the authentic has been enhanced. This phenomenon          sharing information has become easier and cheaper                  clamp down on
was pointed out by the critic Walter Benjamin long ago    than anybody of an earlier generation could have                   the good guys.
                                                                                                                             This is a genuinely
(in The Work of Art in the Age of Mechanical              imagined - especially when so many goods and services              difficult dilemma.
Reproduction).   Furthermore, given the historically      are digitally delivered. Managing this explosion in
unprecedented declines in the cost of computing and       imitation is one of the real challenges of the digital age.




Options and Possibilities


People can be authentic or not.

Online identities can reflect the multiple ways we think about ourselves: A work and a home email; Several
different sign-ups for accounts; a Twitter account; perhaps Facebook profiles, or a character in World of
Warcraft. These are the benign possibilities. There are malign ones too. Thieves will seek our log-ins and
passwords to bank accounts. Malicious spirits will hide behind fake identities to spread rumours, attack other
people, incite violence even.

What are we to think about the cloak of anonymity online? It seems to encourage intemperate comments,
rudeness and viciousness in online forums. On the other hand, it is essential to protect whistleblowers, or
those who post information in a country affected by violence or a repressive regime. The technologies which
seem to protect the bad guys - the identity thieves or spammers - also seem able to lead repressive authorities
to clamp down on the good guys. This is a genuinely difficult dilemma.


Things can be authentic or not.

Fakes are proliferating in the online world. Fake         What’s more, the majority of reasonable people don’t
drugs are sold over the internet, to the great harm of    seem to believe there’s much wrong with intangible piracy
the customers. ‘Fake’ music, films, software are          - it’s a different matter in the tangible world of medicines
sold too, to the benefit of customers but not of          or aircraft parts. What is the authentic reality that the full
copyright owners. Piracy in this metaphorical sense       force of the law and the state should be protecting? After
is absolutely rampant.                                    all, an online copy of a song is no different from the original.



                                                                                                Future of Authenticity                        9
What do you think? Add your views to the global perspective on www.futureagenda.org




      The internet    Information can be authentic or not.                       Finally, experience can be authentic or not.
      and modern
 communications,      This has always been a fundamental issue in how we         Authenticity has an existential value. In rich countries,
       amplify the    navigate the world but is overwhelmingly important now     where most people have lots of stuff, experience is
      questions of
                      that so many people have access to so much                 more valuable. Activities that take time - ballooning,
      veracity and
  reliability which   information. The internet, modern communications,          cooking lessons, a holiday, book club meetings - are
      have always     amplify the questions of veracity and reliability which    considered good presents, treats. Representations of
      affected the    have always affected the mass media. Urban myths           experience have value too. Street style sells - as does
     mass media.
     Urban myths
                      move with the speed of light down fibre optic cables.      home made jam or hand-made crafts. But of course
   move with the      Rumours and incitements to violence are spread, as         being packaged and sold makes the authentic instantly
    speed of light    always, person to person - but each person can now         inauthentic.
       down fibre
                      reach many others, very quickly. A flash mob can be
     optic cables.                                                               These reflections contain an enormous range of
                      assembled either to dance in the streets of London or
                                                                                 challenges and trade-offs.
                      beat up and stab neighbours in Kenya.

                      The skill of verification has become fundamental. Can
                      you identify spam email? Can you recognise bias in
                      your source of news? Is Wikipedia a good source
                      for homework?




                      The Way Forward

                      A number of steps will have to taken so that we can establish some form of order in the digital world. These are

                      1) The establishment of credible, digital identities. This is essential for trust - and hence any economic and
                      commercial activity - online. But conversely it is equally important to protect privacy - and anonymity too where
                      it’s needed.

                      2) The protection of intellectual property in the online world while continuing to protect civic space, an
                      intellectual commons - what James Boyle has entitled The Public Domain in his recent book of this title.

                      3) The continued provision of widespread access to communications and information. This brings enormous
                      benefits especially to people largely excluded from the privileged information access of the past (libraries, print
                      media). At the same time we must build in verification mechanisms, ensuring the reliability of widely-accessed
                      online information.




10                    Future of Authenticity
The issues raised in all these different contexts are         the more so when it can be spread rapidly via the             The most effective
varied, and difficult. For some of them, it is quite likely   internet, email and mobile and potentially change             way to counteract
                                                                                                                            falsehoods in
that there will be many technology-based solutions            people’s behaviour. While SMS messages have been              future will
forthcoming in the near future.                               used to positive effect to spread correct information and     probably come
                                                              encourage positive action - as in elections from the          from the pooling
There are key areas where technology is already playing                                                                     of many
                                                              Phillipines to Zimbabwe - there were concerns that
a major role in authenticity: Digital Right Management                                                                      messages and
                                                              messages containing misinformation and lies were              reports so the
(DRM) uses technology to limit access to certain content
                                                              being used to encourage and incite the violence after         people can see
- technology having created the potential for access in                                                                     where there is a
                                                              Kenya’s December 2008 election. The most effective
the first place. Equally biometric identity uses technology                                                                 consistent story.
                                                              way to counteract falsehoods in future will probably
to limit the potential to form multiple identities. If my
                                                              come from the pooling of many messages and reports
avatar can always be traced back to the me of my DNA,
                                                              so the people can see where there is a consistent story.
is there any point in having it?
                                                              The aggregation of different sources - which can be
I predict technological ‘solutions’ will be commonplace       done using new social media applications such as
in the next few years. Sellers of content, government         Ushahidi - could be a powerful tool for verification.
agencies, airlines, and others will put up hurdles
                                                              For reasons of food safety as well as personal
designed to identify individuals. The world of ‘Minority
                                                              preferences - for organic food, or fair trade food perhaps
Report’ will lurch closer. But taken too far, this is a
                                                              - traceability has become an important issue. The
dystopia. The technologies ought to open up the world of
                                                              prototype Fair Tracing Project uses online maps to follow
information and creativity. If the full potential of the
                                                              products on their journeys from farmers to consumers.
information and communication technologies for the
                                                              Tracing will involve ‘tagging‘ individual products with
majority of people is to be recognized, technology can
                                                              information readily accessible by both producer and
not be used to build mechanisms which protect existing
                                                              consumer. The information that may be attached to
interests or structures and prevent change. ICTs are
                                                              tagged products is virtually limitless, beginning with
disruptive technologies. Printing was ultimately absolutely
                                                              details of the product’s date and cost of creation, as well
revolutionary - it’s why we all (in the rich west and many
                                                              as its individual creator and his/her working environment
other countries too) have an education and the vote. The
                                                              and pay, through the various steps of its transport
internet is revolutionary too. This is uncomfortable for
                                                              to the eventual point-of-sale to the consumer.”
those who were previously comfortable.
                                                              (http://web4.cs.ucl.ac.uk/students/v.shah/fairTracing/)
So although technology can certainly in the short or
                                                              Another example is Sourcemap, a new tool which
medium term clamp down on its own effects, it is at the
                                                              permits the researching and optimization of supply
expense of restricting some of the positive potential.
                                                              chains, using transparency to deliver sustainability.
In the longer term we need to look for better solutions.
                                                              (http://ow.ly/rgRs)
The most promising will depend on greater
                                                              Finally, online security and encryption are ways of
transparency of information and reputation. Here are
                                                              protecting personal information and safeguarding
some examples.
                                                              personal identity. That identity is created offline. The
Misinformation is dangerous in any context, including         likely next step in establishing identity is likely to be
misinformation spread via conventional media. It’s all        biometric technology which will link the physical person




                                                                                                 Future of Authenticity                    11
What do you think? Add your views to the global perspective on www.futureagenda.org




     The fact isthat   to the digital environment - a thumbprint pad on the          The fact is that virtual identity and "physical" identity
virtual identity and   computer screen, perhaps. But a person’s online,              are not the same thing, and they differ in ways that
"physical" identity
 are not the same
                       connected identity could potentially be impossible to         we    are   only    beginning     to   take    on   board.”
    thing, and they    copy when it consists, as it eventually may, of all the       (http://digitaldebateblogs.typepad.com/digital_identity
differ in ways that    accumulated patterns of their digital activities. Each        /2009/09/what-identity-is-important.html)
        we are only
                       individual’s activities and conversations and searches is
 beginning to take                                                                   Technological solutions are likely to need changes to
           on board    as unique as a fingerprint. Dave Birch, who runs the
                                                                                     social and legal institutions as well. Thus it is feasible to
                       Digital Identity Forum, says in a recent blog post: “the
                                                                                     imagine identifying a person through the pattern of their
                       "common sense" notion of identity, rooted in our pre-
                                                                                     communications and online activities, but this ability will
                       industrial social structures and pre-human cortex, is not
                                                                                     be irrelevant unless government authorities in particular
                       only not very good at dealing with the properties and
                                                                                     will accept alternatives to the present paper-based
                       implications of identity in an online world, but positively
                                                                                     proof of legal identity.
                       misleading when applied to system and service design.




12                     Future of Authenticity
Impact and Implications


The journey is unlikely to be easy. A comparison between the valuation of any company and its physical assets           There will be
shows that the vast majority of value in the economy is intangible and based on an understanding of what it             an ‘arms race’
                                                                                                                        between efforts
is - whether or not it is authentic. Intangible value can evaporate overnight - and we’ve seen many examples            to market
of that, for instance in banking recently, in the case of Enron before that. This makes reputation everything,          products or
and the only way to sustain a reputation is to live it constantly.                                                      create or shape
                                                                                                                        a reputation and
                                                                                                                        resistance to
Reputation is fragile - taking time to build but able       The triangulation of information from different sources     any message
to vanish overnight - it and will be more robust the        will become an essential skill, an aspect of ‘media         which is not
more it is the product of personal experience and           literacy’ without which consumers and citizens will be      wholly authentic.

recommendations. Personalization will, paradoxically,       unable to navigate daily life.
become     increasingly   important   even    as   new
                                                            Trusted guides will come to play an increasingly
technologies stretch the range and geographical spread
                                                            important role. These could be social networks, media
of connections between people.
                                                            organizations, certain connected and well-informed
However, there will be an ‘arms race’ between efforts       individuals, or companies or other organizations. For
to market products or create or shape a reputation and      these guides, too, reputation will be all-important and
resistance to any message which is not wholly               will require constant vigilance.
authentic. This is a pattern familiar from the world of
                                                            A long, collective conversation about authenticity, in at
fashion: the cool people move on from a certain style as
                                                            least some of its aspects, is needed. Personal identity,
soon as many others take it up because it’s cool. We
                                                            verification of information, piracy - there are huge
can already see this expansion of the dynamics of
                                                            challenges in this list. They will be best addressed by
fashion in the evolution of social networks as means of
                                                            creative thought about the potential of the technologies
word-of-mouth recommendation. Trends such as
                                                            which are amplifying the challenges of authenticity to
Facebook or Twitter are subsequently taken up by
                                                            provide solutions too.
companies and other organizations as a means of
conveying messages, but this ‘official’ and inauthentic
use of a social medium in turn leads to resistance
amongst users of networks who move on to another
online location.




                                                                                               Future of Authenticity                   13

More Related Content

What's hot

Digital media and the law
Digital media and the lawDigital media and the law
Digital media and the lawSu Little
 
ATTENTION DOMESTIC TERRORISTS-chrisrose
ATTENTION DOMESTIC TERRORISTS-chrisroseATTENTION DOMESTIC TERRORISTS-chrisrose
ATTENTION DOMESTIC TERRORISTS-chrisroseChristopher Rose
 
Infopoverty World Conference Follow-up
Infopoverty World Conference Follow-upInfopoverty World Conference Follow-up
Infopoverty World Conference Follow-upNeelley Hicks
 
Next Night 5 Rob van Kranenburg
Next Night 5 Rob van KranenburgNext Night 5 Rob van Kranenburg
Next Night 5 Rob van Kranenburggenerationnext
 
Brian pickering introduction to seserv - seserv se workshop june 2012
Brian pickering   introduction to seserv - seserv se workshop june 2012Brian pickering   introduction to seserv - seserv se workshop june 2012
Brian pickering introduction to seserv - seserv se workshop june 2012ictseserv
 
20090906 On Future Internet, Cloud Computing, and Semantics – You name it
20090906 On Future Internet, Cloud Computing, and Semantics – You name it20090906 On Future Internet, Cloud Computing, and Semantics – You name it
20090906 On Future Internet, Cloud Computing, and Semantics – You name itArian Zwegers
 
Paramount Studios Anti-Piracy Co-Op Initiative -- Strategic Document
Paramount Studios Anti-Piracy Co-Op Initiative -- Strategic DocumentParamount Studios Anti-Piracy Co-Op Initiative -- Strategic Document
Paramount Studios Anti-Piracy Co-Op Initiative -- Strategic DocumentGunther Sonnenfeld
 
The Intranets of Babel
The Intranets of BabelThe Intranets of Babel
The Intranets of BabelIqbal Mohammed
 
Comm303 50-Final
Comm303 50-FinalComm303 50-Final
Comm303 50-Finaldxg9850
 
Imbee corporate deck v3a2 marc_4.key
Imbee corporate deck v3a2 marc_4.keyImbee corporate deck v3a2 marc_4.key
Imbee corporate deck v3a2 marc_4.keymarcbrogdon
 
Cours Réseaux Sociaux Bachelor M. PILLARD
Cours Réseaux Sociaux Bachelor M. PILLARDCours Réseaux Sociaux Bachelor M. PILLARD
Cours Réseaux Sociaux Bachelor M. PILLARDMélanie Pillard
 
Legal Risks & SNS - teens
Legal Risks & SNS - teensLegal Risks & SNS - teens
Legal Risks & SNS - teensKaren Keighery
 
To be or not to be social
To be or not to be socialTo be or not to be social
To be or not to be socialyus121
 
Digital Pulse Quarter 2 Summer 2010
Digital Pulse Quarter 2 Summer 2010Digital Pulse Quarter 2 Summer 2010
Digital Pulse Quarter 2 Summer 2010Principals
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future Agenda
 
Phonebooths & Mailboxes
Phonebooths & MailboxesPhonebooths & Mailboxes
Phonebooths & Mailboxesteknionsocial
 
Z Business For Media
Z Business For MediaZ Business For Media
Z Business For MediaZuora, Inc.
 

What's hot (20)

Digital media and the law
Digital media and the lawDigital media and the law
Digital media and the law
 
BYOD eBook Part 1 DREW
BYOD eBook Part 1 DREWBYOD eBook Part 1 DREW
BYOD eBook Part 1 DREW
 
SXSW 2012 Key Notes
SXSW 2012 Key NotesSXSW 2012 Key Notes
SXSW 2012 Key Notes
 
ATTENTION DOMESTIC TERRORISTS-chrisrose
ATTENTION DOMESTIC TERRORISTS-chrisroseATTENTION DOMESTIC TERRORISTS-chrisrose
ATTENTION DOMESTIC TERRORISTS-chrisrose
 
Infopoverty World Conference Follow-up
Infopoverty World Conference Follow-upInfopoverty World Conference Follow-up
Infopoverty World Conference Follow-up
 
Next Night 5 Rob van Kranenburg
Next Night 5 Rob van KranenburgNext Night 5 Rob van Kranenburg
Next Night 5 Rob van Kranenburg
 
Brian pickering introduction to seserv - seserv se workshop june 2012
Brian pickering   introduction to seserv - seserv se workshop june 2012Brian pickering   introduction to seserv - seserv se workshop june 2012
Brian pickering introduction to seserv - seserv se workshop june 2012
 
20090906 On Future Internet, Cloud Computing, and Semantics – You name it
20090906 On Future Internet, Cloud Computing, and Semantics – You name it20090906 On Future Internet, Cloud Computing, and Semantics – You name it
20090906 On Future Internet, Cloud Computing, and Semantics – You name it
 
Paramount Studios Anti-Piracy Co-Op Initiative -- Strategic Document
Paramount Studios Anti-Piracy Co-Op Initiative -- Strategic DocumentParamount Studios Anti-Piracy Co-Op Initiative -- Strategic Document
Paramount Studios Anti-Piracy Co-Op Initiative -- Strategic Document
 
The Intranets of Babel
The Intranets of BabelThe Intranets of Babel
The Intranets of Babel
 
Comm303 50-Final
Comm303 50-FinalComm303 50-Final
Comm303 50-Final
 
Imbee corporate deck v3a2 marc_4.key
Imbee corporate deck v3a2 marc_4.keyImbee corporate deck v3a2 marc_4.key
Imbee corporate deck v3a2 marc_4.key
 
Cours Réseaux Sociaux Bachelor M. PILLARD
Cours Réseaux Sociaux Bachelor M. PILLARDCours Réseaux Sociaux Bachelor M. PILLARD
Cours Réseaux Sociaux Bachelor M. PILLARD
 
Legal Risks & SNS - teens
Legal Risks & SNS - teensLegal Risks & SNS - teens
Legal Risks & SNS - teens
 
To be or not to be social
To be or not to be socialTo be or not to be social
To be or not to be social
 
Digital Pulse Quarter 2 Summer 2010
Digital Pulse Quarter 2 Summer 2010Digital Pulse Quarter 2 Summer 2010
Digital Pulse Quarter 2 Summer 2010
 
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
Future of data - An initial perspective - Stephan Shakespeare, CEO and Co-Fou...
 
Phonebooths & Mailboxes
Phonebooths & MailboxesPhonebooths & Mailboxes
Phonebooths & Mailboxes
 
Phonebooths and Mailboxes
Phonebooths and MailboxesPhonebooths and Mailboxes
Phonebooths and Mailboxes
 
Z Business For Media
Z Business For MediaZ Business For Media
Z Business For Media
 

Viewers also liked

JOBS NUMERO 2
JOBS NUMERO 2JOBS NUMERO 2
JOBS NUMERO 2Luan Sama
 
Sowing the Seeds of a Successful Startup
Sowing the Seeds of a Successful StartupSowing the Seeds of a Successful Startup
Sowing the Seeds of a Successful Startupllumenti
 
Ace ppt for asean japan energy efficient conference-final
Ace ppt for asean japan energy efficient conference-finalAce ppt for asean japan energy efficient conference-final
Ace ppt for asean japan energy efficient conference-finalbenisuryadi
 
Evolving IGN’s New APIs with Scala
 Evolving IGN’s New APIs with Scala Evolving IGN’s New APIs with Scala
Evolving IGN’s New APIs with ScalaManish Pandit
 
第49回Php勉強会@関東 Datasource
第49回Php勉強会@関東 Datasource第49回Php勉強会@関東 Datasource
第49回Php勉強会@関東 DatasourceKaz Watanabe
 
Future Agenda Future Of Health
Future Agenda   Future Of HealthFuture Agenda   Future Of Health
Future Agenda Future Of HealthFuture Agenda
 
The Director Forum Social & Mobile Feb 2011 Hugh Griffiths
The Director Forum Social & Mobile Feb 2011 Hugh GriffithsThe Director Forum Social & Mobile Feb 2011 Hugh Griffiths
The Director Forum Social & Mobile Feb 2011 Hugh GriffithsHugh Griffiths
 
Scalabay - API Design Antipatterns
Scalabay - API Design AntipatternsScalabay - API Design Antipatterns
Scalabay - API Design AntipatternsManish Pandit
 
Future Agenda Future Of Migration
Future Agenda   Future Of MigrationFuture Agenda   Future Of Migration
Future Agenda Future Of MigrationFuture Agenda
 
Kennis van het werkveld
Kennis van het werkveldKennis van het werkveld
Kennis van het werkveldpenajamy
 
2012 0614 mobility tech focus pres (wrt)
2012 0614 mobility tech focus pres (wrt)2012 0614 mobility tech focus pres (wrt)
2012 0614 mobility tech focus pres (wrt)Bill Tomoff
 
20131029 SplashMaps at #Geomob London
20131029 SplashMaps at #Geomob London20131029 SplashMaps at #Geomob London
20131029 SplashMaps at #Geomob Londondbyhundred
 
Analysis of Advert and Digipak
Analysis of Advert and DigipakAnalysis of Advert and Digipak
Analysis of Advert and Digipak3246
 
20130904 splash maps
20130904 splash maps20130904 splash maps
20130904 splash mapsdbyhundred
 
Future Agenda Introduction And Initial Thoughts
Future Agenda   Introduction And Initial ThoughtsFuture Agenda   Introduction And Initial Thoughts
Future Agenda Introduction And Initial ThoughtsFuture Agenda
 
RiciCreo sistema per la raccolta differenziata con dinamica di gamification
RiciCreo sistema per la raccolta differenziata con dinamica di gamificationRiciCreo sistema per la raccolta differenziata con dinamica di gamification
RiciCreo sistema per la raccolta differenziata con dinamica di gamificationMichele Pierangeli
 
Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented ProgrammingManish Pandit
 

Viewers also liked (20)

JOBS NUMERO 2
JOBS NUMERO 2JOBS NUMERO 2
JOBS NUMERO 2
 
Sowing the Seeds of a Successful Startup
Sowing the Seeds of a Successful StartupSowing the Seeds of a Successful Startup
Sowing the Seeds of a Successful Startup
 
Ace ppt for asean japan energy efficient conference-final
Ace ppt for asean japan energy efficient conference-finalAce ppt for asean japan energy efficient conference-final
Ace ppt for asean japan energy efficient conference-final
 
Evolving IGN’s New APIs with Scala
 Evolving IGN’s New APIs with Scala Evolving IGN’s New APIs with Scala
Evolving IGN’s New APIs with Scala
 
第49回Php勉強会@関東 Datasource
第49回Php勉強会@関東 Datasource第49回Php勉強会@関東 Datasource
第49回Php勉強会@関東 Datasource
 
Future Agenda Future Of Health
Future Agenda   Future Of HealthFuture Agenda   Future Of Health
Future Agenda Future Of Health
 
The Director Forum Social & Mobile Feb 2011 Hugh Griffiths
The Director Forum Social & Mobile Feb 2011 Hugh GriffithsThe Director Forum Social & Mobile Feb 2011 Hugh Griffiths
The Director Forum Social & Mobile Feb 2011 Hugh Griffiths
 
Scalabay - API Design Antipatterns
Scalabay - API Design AntipatternsScalabay - API Design Antipatterns
Scalabay - API Design Antipatterns
 
Future Agenda Future Of Migration
Future Agenda   Future Of MigrationFuture Agenda   Future Of Migration
Future Agenda Future Of Migration
 
Kennis van het werkveld
Kennis van het werkveldKennis van het werkveld
Kennis van het werkveld
 
It eigo 20101029
It eigo 20101029It eigo 20101029
It eigo 20101029
 
2012 0614 mobility tech focus pres (wrt)
2012 0614 mobility tech focus pres (wrt)2012 0614 mobility tech focus pres (wrt)
2012 0614 mobility tech focus pres (wrt)
 
20131029 SplashMaps at #Geomob London
20131029 SplashMaps at #Geomob London20131029 SplashMaps at #Geomob London
20131029 SplashMaps at #Geomob London
 
Analysis of Advert and Digipak
Analysis of Advert and DigipakAnalysis of Advert and Digipak
Analysis of Advert and Digipak
 
20130904 splash maps
20130904 splash maps20130904 splash maps
20130904 splash maps
 
Future Agenda Introduction And Initial Thoughts
Future Agenda   Introduction And Initial ThoughtsFuture Agenda   Introduction And Initial Thoughts
Future Agenda Introduction And Initial Thoughts
 
IGN's V3 API
IGN's V3 APIIGN's V3 API
IGN's V3 API
 
RiciCreo sistema per la raccolta differenziata con dinamica di gamification
RiciCreo sistema per la raccolta differenziata con dinamica di gamificationRiciCreo sistema per la raccolta differenziata con dinamica di gamification
RiciCreo sistema per la raccolta differenziata con dinamica di gamification
 
Object Oriented Programming
Object Oriented ProgrammingObject Oriented Programming
Object Oriented Programming
 
Flowers in Texas
Flowers in TexasFlowers in Texas
Flowers in Texas
 

Similar to The Global Challenge of Authenticity in the Digital Age

Future Agenda Initial Perspectives Full Text
Future Agenda   Initial Perspectives Full TextFuture Agenda   Initial Perspectives Full Text
Future Agenda Initial Perspectives Full TextFuture Agenda
 
AIIA_TL_-Digital_Natives_paper_FINAL
AIIA_TL_-Digital_Natives_paper_FINALAIIA_TL_-Digital_Natives_paper_FINAL
AIIA_TL_-Digital_Natives_paper_FINALJames Bibby
 
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)Gerd Leonhard
 
The future of internet
The future of internetThe future of internet
The future of internetpsp710
 
Digital Natives & Digital Immigrants
Digital Natives & Digital ImmigrantsDigital Natives & Digital Immigrants
Digital Natives & Digital Immigrantsdolewis2004
 
Digital Communication within Crossmedia (2006)
Digital Communication within Crossmedia (2006)Digital Communication within Crossmedia (2006)
Digital Communication within Crossmedia (2006)marxerevolution
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence AnalysisAshley Thomas
 
Digital technologies and traditional Cultural Expressions: A Positive Look at...
Digital technologies and traditional Cultural Expressions: A Positive Look at...Digital technologies and traditional Cultural Expressions: A Positive Look at...
Digital technologies and traditional Cultural Expressions: A Positive Look at...Asliza Hamzah
 
025 Theme Essay Example Literary Examples Samples Writing Analys
025 Theme Essay Example Literary Examples Samples Writing Analys025 Theme Essay Example Literary Examples Samples Writing Analys
025 Theme Essay Example Literary Examples Samples Writing AnalysJasmine Dixon
 
Net governance digital natives newsletter
Net governance   digital natives newsletterNet governance   digital natives newsletter
Net governance digital natives newsletterNilofar Ansher
 
Metaverse, by Guilherme Ravache - Forum Edify 2022
Metaverse, by Guilherme Ravache - Forum Edify 2022Metaverse, by Guilherme Ravache - Forum Edify 2022
Metaverse, by Guilherme Ravache - Forum Edify 2022Gui Ravache
 
This chapter is quite a different read from the balance of the book..pdf
This chapter is quite a different read from the balance of the book..pdfThis chapter is quite a different read from the balance of the book..pdf
This chapter is quite a different read from the balance of the book..pdfjacquelynjessicap166
 
The Third Place Manifesto
The Third Place ManifestoThe Third Place Manifesto
The Third Place ManifestoStephen Johnson
 
Communication Trends Impacting All of Us
Communication Trends Impacting All of UsCommunication Trends Impacting All of Us
Communication Trends Impacting All of UsJeffrey Stewart
 
2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)Felipe Prado
 

Similar to The Global Challenge of Authenticity in the Digital Age (19)

Future Agenda Initial Perspectives Full Text
Future Agenda   Initial Perspectives Full TextFuture Agenda   Initial Perspectives Full Text
Future Agenda Initial Perspectives Full Text
 
104 190322 Bookclub-The Power of Real-Time Social Media Marketing
104 190322 Bookclub-The Power of Real-Time Social Media Marketing104 190322 Bookclub-The Power of Real-Time Social Media Marketing
104 190322 Bookclub-The Power of Real-Time Social Media Marketing
 
AIIA_TL_-Digital_Natives_paper_FINAL
AIIA_TL_-Digital_Natives_paper_FINALAIIA_TL_-Digital_Natives_paper_FINAL
AIIA_TL_-Digital_Natives_paper_FINAL
 
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
The Future of the Internet: the key trends (Futurist Speaker Gerd Leonhard)
 
The future of internet
The future of internetThe future of internet
The future of internet
 
Digital Natives & Digital Immigrants
Digital Natives & Digital ImmigrantsDigital Natives & Digital Immigrants
Digital Natives & Digital Immigrants
 
Essay On Modern Technology
Essay On Modern TechnologyEssay On Modern Technology
Essay On Modern Technology
 
Digital Communication within Crossmedia (2006)
Digital Communication within Crossmedia (2006)Digital Communication within Crossmedia (2006)
Digital Communication within Crossmedia (2006)
 
Networked Presence Analysis
Networked Presence AnalysisNetworked Presence Analysis
Networked Presence Analysis
 
Digital technologies and traditional Cultural Expressions: A Positive Look at...
Digital technologies and traditional Cultural Expressions: A Positive Look at...Digital technologies and traditional Cultural Expressions: A Positive Look at...
Digital technologies and traditional Cultural Expressions: A Positive Look at...
 
025 Theme Essay Example Literary Examples Samples Writing Analys
025 Theme Essay Example Literary Examples Samples Writing Analys025 Theme Essay Example Literary Examples Samples Writing Analys
025 Theme Essay Example Literary Examples Samples Writing Analys
 
Net governance digital natives newsletter
Net governance   digital natives newsletterNet governance   digital natives newsletter
Net governance digital natives newsletter
 
Metaverse, by Guilherme Ravache - Forum Edify 2022
Metaverse, by Guilherme Ravache - Forum Edify 2022Metaverse, by Guilherme Ravache - Forum Edify 2022
Metaverse, by Guilherme Ravache - Forum Edify 2022
 
This chapter is quite a different read from the balance of the book..pdf
This chapter is quite a different read from the balance of the book..pdfThis chapter is quite a different read from the balance of the book..pdf
This chapter is quite a different read from the balance of the book..pdf
 
The Third Place Manifesto
The Third Place ManifestoThe Third Place Manifesto
The Third Place Manifesto
 
Introduction to IA
Introduction to IAIntroduction to IA
Introduction to IA
 
Communication Trends Impacting All of Us
Communication Trends Impacting All of UsCommunication Trends Impacting All of Us
Communication Trends Impacting All of Us
 
Web2 Infection Session
Web2 Infection SessionWeb2 Infection Session
Web2 Infection Session
 
2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)2600 v24 n4 (winter 2007)
2600 v24 n4 (winter 2007)
 

More from Future Agenda

Future Agenda Key Global Insights
Future Agenda   Key Global InsightsFuture Agenda   Key Global Insights
Future Agenda Key Global InsightsFuture Agenda
 
Future Agenda 20 Insights For 2020 Final
Future Agenda   20 Insights For 2020   FinalFuture Agenda   20 Insights For 2020   Final
Future Agenda 20 Insights For 2020 FinalFuture Agenda
 
Future Agenda Future Of Identity
Future Agenda   Future Of IdentityFuture Agenda   Future Of Identity
Future Agenda Future Of IdentityFuture Agenda
 
Future Agenda Future Of Money
Future Agenda   Future Of MoneyFuture Agenda   Future Of Money
Future Agenda Future Of MoneyFuture Agenda
 
Future Agenda Future Of Transport
Future Agenda   Future Of TransportFuture Agenda   Future Of Transport
Future Agenda Future Of TransportFuture Agenda
 
Future Agenda Future Of Water
Future Agenda   Future Of WaterFuture Agenda   Future Of Water
Future Agenda Future Of WaterFuture Agenda
 
Future Agenda Future Of Waste
Future Agenda   Future Of WasteFuture Agenda   Future Of Waste
Future Agenda Future Of WasteFuture Agenda
 
Future Agenda Future Of Work
Future Agenda   Future Of WorkFuture Agenda   Future Of Work
Future Agenda Future Of WorkFuture Agenda
 
Future Agenda Future Of Food
Future Agenda   Future Of FoodFuture Agenda   Future Of Food
Future Agenda Future Of FoodFuture Agenda
 
Future Agenda Future Of Energy
Future Agenda   Future Of EnergyFuture Agenda   Future Of Energy
Future Agenda Future Of EnergyFuture Agenda
 
Future Agenda Future Of Currency
Future Agenda   Future Of CurrencyFuture Agenda   Future Of Currency
Future Agenda Future Of CurrencyFuture Agenda
 
Future Agenda Future Of Connectivity
Future Agenda   Future Of ConnectivityFuture Agenda   Future Of Connectivity
Future Agenda Future Of ConnectivityFuture Agenda
 
Future Agenda Future Of Cities
Future Agenda   Future Of CitiesFuture Agenda   Future Of Cities
Future Agenda Future Of CitiesFuture Agenda
 
Future Agenda Future Of Choice
Future Agenda   Future Of ChoiceFuture Agenda   Future Of Choice
Future Agenda Future Of ChoiceFuture Agenda
 

More from Future Agenda (15)

Future agenda final
Future agenda finalFuture agenda final
Future agenda final
 
Future Agenda Key Global Insights
Future Agenda   Key Global InsightsFuture Agenda   Key Global Insights
Future Agenda Key Global Insights
 
Future Agenda 20 Insights For 2020 Final
Future Agenda   20 Insights For 2020   FinalFuture Agenda   20 Insights For 2020   Final
Future Agenda 20 Insights For 2020 Final
 
Future Agenda Future Of Identity
Future Agenda   Future Of IdentityFuture Agenda   Future Of Identity
Future Agenda Future Of Identity
 
Future Agenda Future Of Money
Future Agenda   Future Of MoneyFuture Agenda   Future Of Money
Future Agenda Future Of Money
 
Future Agenda Future Of Transport
Future Agenda   Future Of TransportFuture Agenda   Future Of Transport
Future Agenda Future Of Transport
 
Future Agenda Future Of Water
Future Agenda   Future Of WaterFuture Agenda   Future Of Water
Future Agenda Future Of Water
 
Future Agenda Future Of Waste
Future Agenda   Future Of WasteFuture Agenda   Future Of Waste
Future Agenda Future Of Waste
 
Future Agenda Future Of Work
Future Agenda   Future Of WorkFuture Agenda   Future Of Work
Future Agenda Future Of Work
 
Future Agenda Future Of Food
Future Agenda   Future Of FoodFuture Agenda   Future Of Food
Future Agenda Future Of Food
 
Future Agenda Future Of Energy
Future Agenda   Future Of EnergyFuture Agenda   Future Of Energy
Future Agenda Future Of Energy
 
Future Agenda Future Of Currency
Future Agenda   Future Of CurrencyFuture Agenda   Future Of Currency
Future Agenda Future Of Currency
 
Future Agenda Future Of Connectivity
Future Agenda   Future Of ConnectivityFuture Agenda   Future Of Connectivity
Future Agenda Future Of Connectivity
 
Future Agenda Future Of Cities
Future Agenda   Future Of CitiesFuture Agenda   Future Of Cities
Future Agenda Future Of Cities
 
Future Agenda Future Of Choice
Future Agenda   Future Of ChoiceFuture Agenda   Future Of Choice
Future Agenda Future Of Choice
 

Recently uploaded

8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCRashishs7044
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...ssuserf63bd7
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607dollysharma2066
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Kirill Klimov
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?Olivia Kresic
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCRashishs7044
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyotictsugar
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationAnamaria Contreras
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdfShaun Heinrichs
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Doge Mining Website
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environmentelijahj01012
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMintel Group
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCRashishs7044
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdfKhaled Al Awadi
 

Recently uploaded (20)

8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
8447779800, Low rate Call girls in Uttam Nagar Delhi NCR
 
International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...International Business Environments and Operations 16th Global Edition test b...
International Business Environments and Operations 16th Global Edition test b...
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607FULL ENJOY Call girls in Paharganj Delhi | 8377087607
FULL ENJOY Call girls in Paharganj Delhi | 8377087607
 
Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024Flow Your Strategy at Flight Levels Day 2024
Flow Your Strategy at Flight Levels Day 2024
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?MAHA Global and IPR: Do Actions Speak Louder Than Words?
MAHA Global and IPR: Do Actions Speak Louder Than Words?
 
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
8447779800, Low rate Call girls in Kotla Mubarakpur Delhi NCR
 
Investment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy CheruiyotInvestment in The Coconut Industry by Nancy Cheruiyot
Investment in The Coconut Industry by Nancy Cheruiyot
 
PSCC - Capability Statement Presentation
PSCC - Capability Statement PresentationPSCC - Capability Statement Presentation
PSCC - Capability Statement Presentation
 
Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)Japan IT Week 2024 Brochure by 47Billion (English)
Japan IT Week 2024 Brochure by 47Billion (English)
 
1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf1911 Gold Corporate Presentation Apr 2024.pdf
1911 Gold Corporate Presentation Apr 2024.pdf
 
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
Unlocking the Future: Explore Web 3.0 Workshop to Start Earning Today!
 
Cyber Security Training in Office Environment
Cyber Security Training in Office EnvironmentCyber Security Training in Office Environment
Cyber Security Training in Office Environment
 
Market Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 EditionMarket Sizes Sample Report - 2024 Edition
Market Sizes Sample Report - 2024 Edition
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR8447779800, Low rate Call girls in Tughlakabad Delhi NCR
8447779800, Low rate Call girls in Tughlakabad Delhi NCR
 
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdfNewBase  19 April  2024  Energy News issue - 1717 by Khaled Al Awadi.pdf
NewBase 19 April 2024 Energy News issue - 1717 by Khaled Al Awadi.pdf
 

The Global Challenge of Authenticity in the Digital Age

  • 1. Diane Coyle OBE Founder, Enlightenment Economics and Member, BBC Trust Future of Authenticity 8
  • 2. The Global Challenge Authenticity has great salience in our times because new information and communication technologies have The technologies greatly expanded the scale and scope of the inauthentic. For example, they have made identity fraud possible which seem to protect the bad and also playful; many of us now have multiple personalities online. When it is easy to choose an identity, what guys - the identity does that imply for the underlying reality? How do I know who I am, and how do you know who I am, and how thieves or does my bank know who I am? spammers - also seem able to lead repressive It is now so easy to make imitations that the value of communication in the past 20-30 years, copying and authorities to the authentic has been enhanced. This phenomenon sharing information has become easier and cheaper clamp down on was pointed out by the critic Walter Benjamin long ago than anybody of an earlier generation could have the good guys. This is a genuinely (in The Work of Art in the Age of Mechanical imagined - especially when so many goods and services difficult dilemma. Reproduction). Furthermore, given the historically are digitally delivered. Managing this explosion in unprecedented declines in the cost of computing and imitation is one of the real challenges of the digital age. Options and Possibilities People can be authentic or not. Online identities can reflect the multiple ways we think about ourselves: A work and a home email; Several different sign-ups for accounts; a Twitter account; perhaps Facebook profiles, or a character in World of Warcraft. These are the benign possibilities. There are malign ones too. Thieves will seek our log-ins and passwords to bank accounts. Malicious spirits will hide behind fake identities to spread rumours, attack other people, incite violence even. What are we to think about the cloak of anonymity online? It seems to encourage intemperate comments, rudeness and viciousness in online forums. On the other hand, it is essential to protect whistleblowers, or those who post information in a country affected by violence or a repressive regime. The technologies which seem to protect the bad guys - the identity thieves or spammers - also seem able to lead repressive authorities to clamp down on the good guys. This is a genuinely difficult dilemma. Things can be authentic or not. Fakes are proliferating in the online world. Fake What’s more, the majority of reasonable people don’t drugs are sold over the internet, to the great harm of seem to believe there’s much wrong with intangible piracy the customers. ‘Fake’ music, films, software are - it’s a different matter in the tangible world of medicines sold too, to the benefit of customers but not of or aircraft parts. What is the authentic reality that the full copyright owners. Piracy in this metaphorical sense force of the law and the state should be protecting? After is absolutely rampant. all, an online copy of a song is no different from the original. Future of Authenticity 9
  • 3. What do you think? Add your views to the global perspective on www.futureagenda.org The internet Information can be authentic or not. Finally, experience can be authentic or not. and modern communications, This has always been a fundamental issue in how we Authenticity has an existential value. In rich countries, amplify the navigate the world but is overwhelmingly important now where most people have lots of stuff, experience is questions of that so many people have access to so much more valuable. Activities that take time - ballooning, veracity and reliability which information. The internet, modern communications, cooking lessons, a holiday, book club meetings - are have always amplify the questions of veracity and reliability which considered good presents, treats. Representations of affected the have always affected the mass media. Urban myths experience have value too. Street style sells - as does mass media. Urban myths move with the speed of light down fibre optic cables. home made jam or hand-made crafts. But of course move with the Rumours and incitements to violence are spread, as being packaged and sold makes the authentic instantly speed of light always, person to person - but each person can now inauthentic. down fibre reach many others, very quickly. A flash mob can be optic cables. These reflections contain an enormous range of assembled either to dance in the streets of London or challenges and trade-offs. beat up and stab neighbours in Kenya. The skill of verification has become fundamental. Can you identify spam email? Can you recognise bias in your source of news? Is Wikipedia a good source for homework? The Way Forward A number of steps will have to taken so that we can establish some form of order in the digital world. These are 1) The establishment of credible, digital identities. This is essential for trust - and hence any economic and commercial activity - online. But conversely it is equally important to protect privacy - and anonymity too where it’s needed. 2) The protection of intellectual property in the online world while continuing to protect civic space, an intellectual commons - what James Boyle has entitled The Public Domain in his recent book of this title. 3) The continued provision of widespread access to communications and information. This brings enormous benefits especially to people largely excluded from the privileged information access of the past (libraries, print media). At the same time we must build in verification mechanisms, ensuring the reliability of widely-accessed online information. 10 Future of Authenticity
  • 4. The issues raised in all these different contexts are the more so when it can be spread rapidly via the The most effective varied, and difficult. For some of them, it is quite likely internet, email and mobile and potentially change way to counteract falsehoods in that there will be many technology-based solutions people’s behaviour. While SMS messages have been future will forthcoming in the near future. used to positive effect to spread correct information and probably come encourage positive action - as in elections from the from the pooling There are key areas where technology is already playing of many Phillipines to Zimbabwe - there were concerns that a major role in authenticity: Digital Right Management messages and messages containing misinformation and lies were reports so the (DRM) uses technology to limit access to certain content being used to encourage and incite the violence after people can see - technology having created the potential for access in where there is a Kenya’s December 2008 election. The most effective the first place. Equally biometric identity uses technology consistent story. way to counteract falsehoods in future will probably to limit the potential to form multiple identities. If my come from the pooling of many messages and reports avatar can always be traced back to the me of my DNA, so the people can see where there is a consistent story. is there any point in having it? The aggregation of different sources - which can be I predict technological ‘solutions’ will be commonplace done using new social media applications such as in the next few years. Sellers of content, government Ushahidi - could be a powerful tool for verification. agencies, airlines, and others will put up hurdles For reasons of food safety as well as personal designed to identify individuals. The world of ‘Minority preferences - for organic food, or fair trade food perhaps Report’ will lurch closer. But taken too far, this is a - traceability has become an important issue. The dystopia. The technologies ought to open up the world of prototype Fair Tracing Project uses online maps to follow information and creativity. If the full potential of the products on their journeys from farmers to consumers. information and communication technologies for the Tracing will involve ‘tagging‘ individual products with majority of people is to be recognized, technology can information readily accessible by both producer and not be used to build mechanisms which protect existing consumer. The information that may be attached to interests or structures and prevent change. ICTs are tagged products is virtually limitless, beginning with disruptive technologies. Printing was ultimately absolutely details of the product’s date and cost of creation, as well revolutionary - it’s why we all (in the rich west and many as its individual creator and his/her working environment other countries too) have an education and the vote. The and pay, through the various steps of its transport internet is revolutionary too. This is uncomfortable for to the eventual point-of-sale to the consumer.” those who were previously comfortable. (http://web4.cs.ucl.ac.uk/students/v.shah/fairTracing/) So although technology can certainly in the short or Another example is Sourcemap, a new tool which medium term clamp down on its own effects, it is at the permits the researching and optimization of supply expense of restricting some of the positive potential. chains, using transparency to deliver sustainability. In the longer term we need to look for better solutions. (http://ow.ly/rgRs) The most promising will depend on greater Finally, online security and encryption are ways of transparency of information and reputation. Here are protecting personal information and safeguarding some examples. personal identity. That identity is created offline. The Misinformation is dangerous in any context, including likely next step in establishing identity is likely to be misinformation spread via conventional media. It’s all biometric technology which will link the physical person Future of Authenticity 11
  • 5. What do you think? Add your views to the global perspective on www.futureagenda.org The fact isthat to the digital environment - a thumbprint pad on the The fact is that virtual identity and "physical" identity virtual identity and computer screen, perhaps. But a person’s online, are not the same thing, and they differ in ways that "physical" identity are not the same connected identity could potentially be impossible to we are only beginning to take on board.” thing, and they copy when it consists, as it eventually may, of all the (http://digitaldebateblogs.typepad.com/digital_identity differ in ways that accumulated patterns of their digital activities. Each /2009/09/what-identity-is-important.html) we are only individual’s activities and conversations and searches is beginning to take Technological solutions are likely to need changes to on board as unique as a fingerprint. Dave Birch, who runs the social and legal institutions as well. Thus it is feasible to Digital Identity Forum, says in a recent blog post: “the imagine identifying a person through the pattern of their "common sense" notion of identity, rooted in our pre- communications and online activities, but this ability will industrial social structures and pre-human cortex, is not be irrelevant unless government authorities in particular only not very good at dealing with the properties and will accept alternatives to the present paper-based implications of identity in an online world, but positively proof of legal identity. misleading when applied to system and service design. 12 Future of Authenticity
  • 6. Impact and Implications The journey is unlikely to be easy. A comparison between the valuation of any company and its physical assets There will be shows that the vast majority of value in the economy is intangible and based on an understanding of what it an ‘arms race’ between efforts is - whether or not it is authentic. Intangible value can evaporate overnight - and we’ve seen many examples to market of that, for instance in banking recently, in the case of Enron before that. This makes reputation everything, products or and the only way to sustain a reputation is to live it constantly. create or shape a reputation and resistance to Reputation is fragile - taking time to build but able The triangulation of information from different sources any message to vanish overnight - it and will be more robust the will become an essential skill, an aspect of ‘media which is not more it is the product of personal experience and literacy’ without which consumers and citizens will be wholly authentic. recommendations. Personalization will, paradoxically, unable to navigate daily life. become increasingly important even as new Trusted guides will come to play an increasingly technologies stretch the range and geographical spread important role. These could be social networks, media of connections between people. organizations, certain connected and well-informed However, there will be an ‘arms race’ between efforts individuals, or companies or other organizations. For to market products or create or shape a reputation and these guides, too, reputation will be all-important and resistance to any message which is not wholly will require constant vigilance. authentic. This is a pattern familiar from the world of A long, collective conversation about authenticity, in at fashion: the cool people move on from a certain style as least some of its aspects, is needed. Personal identity, soon as many others take it up because it’s cool. We verification of information, piracy - there are huge can already see this expansion of the dynamics of challenges in this list. They will be best addressed by fashion in the evolution of social networks as means of creative thought about the potential of the technologies word-of-mouth recommendation. Trends such as which are amplifying the challenges of authenticity to Facebook or Twitter are subsequently taken up by provide solutions too. companies and other organizations as a means of conveying messages, but this ‘official’ and inauthentic use of a social medium in turn leads to resistance amongst users of networks who move on to another online location. Future of Authenticity 13