About the Institute

The Hybrid Vigor Institute is dedicated to interdisciplinary and collaborative problem solving. We seek out and connect experts from a range of fields to work together toward common goals.
Principals | Advisors | What We Offer



hybridvigor.net houses the work of a growing network of researchers and practitioners who conduct cross-sector and cross-disciplinary explorations and collaborations.
Blog | Contributors | Topics



Privacy | Funding


Contact Us



Intervention by Denise Caruso Read Intervention by Denise Caruso, Executive Director of the Hybrid Vigor Silver Award Winner, 2007 Independent Publisher Book Awards; Best Business Books 2007, Strategy+Business Magazine


by Mike Neuenschwander ~ February 20, 2008.
Permalink | Filed under: Hybrid Vigor, 21st Century Risk, Social Trust Online.

Gerry Gebel of Burton Group wrote an excellent post last week called “Moving Beyond Command and Control.” It’s the kind of thing I’d like to have written. It’s the kind of post everyone who cares about Internet security should read.

Gerry’s referring to the prevailing style of computer security, in which an administrator creates IDs and manages access to the system. The phrase “command and control” comes from a militaristic style of management with centralized or hierarchical authority. There’s nothing inherently wrong with the command/control model; the issue is that it’s a horrible fit for Internet security, where authority is unavoidably distributed.

Here are some simple shibboleths to detect a person’s managerial orientation:

If you hear frequent repetition of the words identification card, identity assurance, encryption, rights, management, access control, and policy …

BINGO! This person is a command and control disciple.

If instead you hear frequent repetition of words like reputation, reciprocity, empathy, signaling, collaborative action, recognition, shared experience, social interactions, ceremony, and connection

Then they’re talking about social trust — and that person needs to SPEAK UP and start blogging about it!

Leave a Reply

To prove you're a person (not a spam script), type the security word shown in the picture. Click on the picture to hear an audio file of the word.
Click to hear an audio file of the anti-spam word