Professional Documents
Culture Documents
OF COOPERATION
About the …
Acknowledgments
Production and
Graphic Design: Robin Bogott
© 2005 Institute for the Future. All rights reserved. Reproduction is prohibited without written permission.
Contents
Executive Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
Introduction . . . . 3
5 | Group-Forming Networks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20
6 | Social Software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22
7 | Social Accounting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24
8 | Knowledge Collectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 26
Emerging digital technologies present new opportunities for developing complex cooperative strate-
gies that change the way people work together to solve problems and generate wealth. Central to
this class of cooperation-amplifying technologies are eight key clusters, each with distinctive contri-
butions to cooperative strategy:
• Self-organizing mesh networks define archi- • Social software makes explicit, amplifies, and
tectural principles for building both tools and extends many of the informal cooperative struc-
processes that grow from the edges without tures and processes that have evolved as part of
obvious limits, that distribute the burden of the human culture, providing the tools and aware-
infrastructure throughout the population of par- ness to guide people in intelligently constructing
ticipants, and that establish the foundation for and managing these processes to specific ends.
the emergence of swarm intelligence in systems
• Social accounting tools suggest methods and
of people and devices.
structures to measure social connectedness and
• Community computing grids provide models establish trust among large communities of
for recovering currently squandered resources strangers, building reputation along dimensions
from distributed sources and for providing that are appropriate to a specific context and
mutual security within a network of people and/ creating a visible history of individual behavior
or devices, supported by explicit choices about within a community.
when and how to foster cooperation versus
• Knowledge collectives model the structures,
competition.
rules, and practices for managing a constantly
• Peer production networks create a frame- changing resource as a commons, for securing
work for volunteer communities to accomplish it against deliberate or accidental destruction
productive work. These potentially unbounded and degradation, multiplying its productivity,
communities create new value by rapidly solv- and for making it easily accessible for wide-
ing problems that would tax or stymie smaller ranging uses.
workgroups.
Each of these technology clusters can be viewed not
• Social mobile computing includes a cluster of only as a template for design of cooperative systems,
technologies and principles that allow large or but also as tools people can use to tune organiza-
small groups of people—even if they are strang- tions, projects, processes, and markets for increased
ers—to act in a coherent and coordinated fash- cooperation. Specifically, each can be used in distinc-
ion in place and space, supported by information tive ways to alter the key dimensions of cooperative
accessed in real time and real space. systems—structure, rules, resources, thresholds, feed-
back, memory, and identity.
• Group-forming networks represent ways to
support the emergence of self-organized sub-
groups within a large-scale network, creating
exponential growth of the network and shorten-
ing the social distance among members of the
network.
1
Executive Summary
2
Introduction
When social communication media grow in capability, pace, scope, or scale, people use these
media to construct more complex social arrangements—that is, they use communication tools and
techniques to increase their capacity to cooperate at larger and larger scales. Human history is a
story of the co-evolution of tools and social practices to support ever more complex forms of
cooperative society.
Extended Thought:
The Power of Literacy
Alphabetic writing was the exclusive tool of the administrators of
empires for thousands of years. An elite group of priests and civil
administrators were taught the secret of encoding and decoding
knowledge and transmitting it across time and space. Then the print-
ing press enabled populations of millions to amplify their thinking by
becoming literate.
Extended Tools:
Societies of Technologies
What we are witnessing today is thus the acceleration of a trend that
has been building for thousands of years. When technologies like
alphabets and Internets amplify the right cognitive or social capabili-
ties, old trends take new twists and people build things that never
could be built before.
For example, the Internet protocols and WWW protocols were tech-
nical specifications that were deliberately designed to decentralize
innovation, but eBay and virtual communities were emergent social
phenomena that grew out of the technological network enabled by
those protocols. The architectural freedom was built into the Internet
because the protocol designers suspected people would think of uses
that they couldnʼt imagine for an interconnected web of computers. A
physicist in Switzerland created the Web by giving it away to a few
friends; a few years later, that enabled students who started Yahoo!
and Google on their college computers; these platforms, in turn,
enabled the creation of complex online marketplaces for goods and
services.
5
Introduction
6
A Strategic Map of
Cooperative Technologies
In Toward a New Literacy of Cooperation in Business (IFTF SR-851 A, 2004), we identified seven
dimensions of cooperative strategy, along which we can slide a metaphorical lever to increase or
decrease cooperative behavior in all kinds of systems, from teams to entire societies. These are:
• Structure: from static to dynamic By applying each of the levers to each of the eight
technology clusters, we can begin to build a map of
• Rules: from external to internal the options for cooperative strategy that are emerg-
• Resources: from private to public ing as part of the digital revolution (see page 9). This
map includes several features:
• Thresholds: from high to low
• A list of early technologies that are part of each
• Feedback: from local to systemic cluster (some of which belong to more than one
cluster)
• Memory: from ephemeral to persistent
• A characteristic shift that each technology clus-
• Identity: from individual to group
ter produces for a particular strategic lever (for
In this report, we want to look at how these tuning example, in self-organizing mesh networks,
levers work in eight clusters of cooperative technology: identity tends to shift from “user versus pro-
vider” to “user as provider”); these shifts can
• Self-organizing mesh networks that create be used both to understand the tendency of the
societies of cognitively cooperating devices technology and the strategic intervention the
technology can aid
• Community computing grids that support
emergent swarms of supercomputing power • A range of key concepts and phenomena that
define the intersection of strategic levers and
• Peer production networks that build a con-
technology clusters
stantly expanding commons for innovation
Please note that this map represents an early interpre-
• Social mobile networks that foster the collec-
tation of the literature of cooperation and the evolu-
tive action of “smart mobs”
tion of technology. Think of it as version 1.0 of the
• Group-forming networks that integrate social strategy map for technologies of cooperation.
and technical networks
7
Chapter title goes here
A September 2002
Newsweek article estimated
the total number of blogs at
around 500,000; three months
later, Blogger acquired its
millionth subscriber.
8
SELF-ORGANIZING MESH NETWORKS COMMUNITY COMPUTING GRIDS PEER PRODUCTION NETWORKS SOCIAL MOBILE COMPUTING GROUP-FORMING NETWORKS SOCIAL SOFTWARE SOCIAL ACCOUNTING KNOWLEDGE COLLECTIVES
������������
XML COMPUTING LISTSERVS GROUP-VISUALIZATION
SMS HYPERMEDIA
SELF-ORGANIZING APPLETS DEVICES PERSONAL RSS TOOLS LIST-CREATION
SENSOR NETWORKS COMPUTATION MESSAGE MEDIA METAMEDIA
SMART COMMUNICATING FRIEND-OF-A-FRIEND TOOLS
BOARDS
� � � � � � � � � �� � � � ROUTERS PEER-TO-PEER SMART CLIENT–SERVER NATIONS
GNU: GENERAL OPEN BROADBAND
SENSORS
MASSIVELY
MULTIPLAYER
(FOAF) NETWORK
FEEDBACK-CONTINGENT ONLINE KNOWL-
SOFTWARE COMPUTER SOFTWARE OPEN CODE AUCTION SHARED ONLINE
NETWORKS PUBLIC LICENSE STANDARDS WIRELESS RFID ONLINE GAMES RATING SYSTEMS FEE SYSTEMS EDGE MARKETS BLOGS
RADIO VIRUSES UBIQUITOUS MIPS WEARABLES MARKETS BLOGS BUDDY LISTS WORKSPACES
From central, dedicated processor From scheduled proprietary projects From random crowds From one-to-one or one-to-many networks From limited informal networks From proprietary IP management
STRUCTURE From centrally planned relays to self-creating relays
to distributed, ad hoc processing to continuously evolving small-scale components to self-organizing info-driven crowds to facilitated subgroups within a network to facilitated scale-free networks
From branded transactions to rated interactions
to collective IP maintenance
Technical rationality and economies of time and effort A RT I F I C I A L L I F E THE RULE OF DIVERSITY
C O DE I N T E G R I T Y ISSUE: FAQ s A S R U L E S E T S SUCCESSIVE A D H O C C U LT U R E S SOCIAL NETWORK DESIGN MUTUAL MONITORING
tend to take the place of moral precepts in the rules Programming rules based M U T UA L S E C U R I T Y • More extreme groups
• Parts of code may be pro- Who has • Ownership customs “LET THE A P P R OX I M AT I O N S • Task-specific instructions DOMAINS OF COOPERATION • Sign-up procedures PRIVACY VS. TRANSPARENCY • Doing one’s own work requires
of cooperative technology systems—with visible on social behaviors: • Mutual assistance • More extreme rules of
mechanisms for monitoring. prietary to prevent reverse the right to • Cultural procedures CODE DECIDE” • To time • Simple ways to recognize members • Cooperate locally, compete globally vs. • Mediated access • Transparency shifts emphasis from checking another’s work
• Flocks of birds improves individual volunteer the engagement within groups
engineering and contami- • Technical operations • To place • How-to behaviors • Compete locally, cooperate globally • Statistical referrals punishment to prevention • Ease of repairing and updating
• Beehives security resource? • Multiple personal codes of
nation of results • To task • Rapid sharing of adaptations • Emergent linking the commons
• Anthills behavior
From limited bandwidth From individually untapped processing cycles From individually untapped time From scattered political and economic power From value of content or transactions From untapped personal relationships From scarce knowledge
RESOURCES to self-generating bandwidth to economical aggregate cycles to aggregate productivity to collective power to value of the joint resource construction to personal capital
From advertising dollars to trusted ratings
to knowledge as a common-pool resource
to degrees of separation
Small network: Random network: to context-specific risk thresholds thresholds for repairing damage to known stores
dirrect connections to a few long-range points connected
COST TO REPAIR
nearest neighbors only connections haphazardly
VALUE
Thresholds signal a significant change of behavior—a EMERGENT SYNC MANY-TO-MANY COMMUNICATION
low high
COST TO DISRUPT
high low
ENSEMBLE FORECASTING U N I N T E N D E D C O L L E C T I V E AC T I O N ADAPTIVE RISK MANAGEMENT SOFT SECURITY
kind of phase shift—and cooperative technologies Synchronization creates
high
What are the information thresholds that separate Network communities: market
low
CERTAINTY
have the potential to redefine key thresholds for group emergent phenomena: • Multiple models “Many eyeballs make price
blind mobs from smart mobs: • 1-to-many grow at 1N SIGNAL-TO-NOISE RATIO
RAT IO • Everyone is responsible for accuracy
participation, value creation, problem solving, meaning all bugs shallow” DEGREES OF SEPARATION
Increasing randomness
low
• Other? Six Degrees of Kevin Bacon system
filtering
From centrally monitored traffic From peer-reviewed publishing From monetary feedback From time-delayed remote feedback From post hoc legal proceedings From centrally maintained indexes
FEEDBACK to locally responsive nodes to real-time iterative problem solving to community recognition and use as feedback to instant local feedback
From mass trends to fragmented affinities From breadth of influence to depth of influence
to a priori aggregate ratings to distributed, real-time filters
New forms of feedback emerge from cooperative tech- C O M P E T I T I V E C O O P E R AT I O N QU O R U M S E N S I N G GROUP PROFILING THE SHADOW OF THE FUTURE
MIRRORS & SOCIAL METADATA AD HOC TAXONOMIES
nologies; these forms can influence both cooperative S WA R M I N T E L L I G E N C E Crowds acquire tools for sensing: PRESENCE MANAGEMENT Alternatives to traditional segmentation:
T H E R M O S TAT S • Teams of donors R A P I D I T E R AT I O N USERS AS REVIEWERS • Social network graphs Extending the “shadow of the future” enhances Who else is thinking about
behavior and resolve social dilemmas, providing both • Signal strength R AT I O N A L • Size thresholds • Media choice • Context
• Local feedback • Deadlines • Testing cycles • Hit counting on personal Web sites cooperation—aggregate rating and reputation what I’m thinking about?
rewards and sanctions in ways that might have been • Fading signals R I T UA L S • Proximity thresholds • Buddy preferences • Social networks
produces stable • Real-time donor statistics • Bug reports • Blog statistics systems make each interaction count • Collaborative keywords
inefficient or impossible in the past. • Alternate routes • Information thresholds • Multiple avatars • Experience Imagination is a note space that has
large-scale systems • Real-time problem-solving statistics • Trackbacks private, shared, and public spaces • Shared note spaces
• Reputation thresholds • Swarms
From proprietary system performance histories From proprietary process notes From cultural memory embedded in ritual From curated cultural repositories From static personal archives From archive as back-up
MEMORY to publicly aggregated node histories to public progress records
From official documentation to communities of advice
to local memory embedded in place to jointly maintained environments to self-generating social archives
From historical highlights to aggregate reputations
to archive as self-healing system
Today’s technologies of cooperation are practical tools for organizing people and solving problems
that we face right now. But they are also harbingers of new forms of social and economic organiza-
tion—forms that may help resolve some of the complex social dilemmas that confront the world.
So each example of a cooperative technology is also a model for thinking about future social forms
as well as future tools; each example embodies principles that can help us think more strategically
about cooperation.
In this chapter, we examine eight categories or clus- Like any taxonomy, our eight categories are neces-
ters of cooperative technologies—calling out key sarily a bit arbitrary, and the boundaries between cat-
examples, identifying the distinctive ways in which egories are sometimes blurred. And as tools evolve,
they are shaping innovative cooperative strategies, the categories may shift in the future. In fact, as the
and then extracting key principles that seem to derive “cooperation commons” grows and we apply some
from these examples. of these very tools to our analysis, we expect a much
more robust “folksonomy” of cooperative technolo-
gies to emerge. For now, however, this analysis pro-
vides a way to think systematically about the tools
and their strategic implications.
11
SELF-ORGANIZING MESH NETWORKS:
1
S O C I E T I E S O F C O G N I T I V E LY C O O P E R AT I N G D E V I C E S
12
Technologies of Cooperation INSTITUTE FOR THE FUTURE
Rules | Mutual assistance improves individual security, if you con- to be used as temporary
sume, you also provide. repositories for files that anyone
Resources | Users share the burden of the infrastructure and in the network can access. They
resources grow as the number of users grows.
may also be required as part of
Thresholds | Redundancy increases the thresholds for disruption and
lowers the cost to repair. the social protocol to contribute
Feedback | Local feedback makes it possible to grow stable large- some of their own files to
scale systems from the bottom–up.
the commons.
Memory | Local nodes hold the relevant local knowledge.
13
COMMUNITY COMPUTING GRIDS:
2
S WA R M S O F S U P E R C O M P U T I N G P OW E R
Third parties are beginning to serve as catalysts in aggregating com- processing for solving
munity computing grids and supplying processing power for profit complex analytical problems.
(such as United Devices) or philanthropically (such as Intel who spon- Evolution@home (http://www.
sors a philanthropic peer-to-peer program). evolutionary-research.org)
searches for genetic causes
When Social Swarms Meet Computing Swarms
for extinction of species.
Community computing ultimately amplifies the power of both people Distributed.net (http://www.
and machines. Peer-to-peer swarming, pervasive computing, social
distributed.net) solves
networks, and mobile communications multiply each otherʼs effects.
cryptographic challenges.
Not only can millions of people link their social networks through
mobile communication devices, but the computing chips inside those SaferMarkets (http://www.
mobile devices will soon be capable of communicating with radio- safermarkets.org) seeks to
linked chips embedded in the environment. Expect startling social understand the causes of
effects after mobile P2P achieves critical mass—when the 1,500 peo- stock market volatility.
ple who walk across Tokyoʼs Shibuya Crossing at every light change
can become a temporary cloud of distributed computing power. Ensemble forecasting uses
“fuzzy prediction” based on
multiple models rather than a
STRATEGIC PRINCIPLES
single “best guess” forecast.
Structure | Peer-to-peer structures among participants enable social
network effects among large numbers of small contributions and For example, climate change
aggregate computing power. forecasts use hundreds of
Rules | Social arrangements among voluntary contributors (when thousands of state-of-the-art
your CPU is idle; work on shared problem) enable sharing of excess,
distributed processing. climate models, each with
Resources | Community computing generates new computational slightly different physics
resources from those that would have been squandered, creating
to represent uncertainties.
increasing returns from what appeared to be finite resources.
Distributed processing is a
Thresholds | Community computing lowers the threshold of compu-
tational complexity by amassing analytical power practical strategy for this kind
Feedback | Swarm computing can efficiently provide quick feedback of forecasting.
to complex situations and conditions.
15
PEER PRODUCTION NETWORKS:
3
BEYOND THE FIRM AND THE MARKET
Feedback | Open participation increases network size and increases new downloader not only uses up
local feedback. bandwidth but also contributes
Memory | The resource commons provides a systemic memory of bandwidth back to the swarm.
value created.
17
SOCIAL MOBILE COMPUTING:
4
SMART MOBS
social-networking applications Smart mobs will usher in a new form of mobile social computing.
and processes, and aware physi- Weʼre only seeing the first-order ripple effects of mobile-phone
behavior now—the legions of the oblivious, blabbing into their hands
cal environments that are embed-
or the air as they walk, drive, or sit in a concert, or the electronic
ded with communicating sensors,
tethers that turn everywhere into the workplace and all the time into
RFID tags and other devices. working time. It is likely that these early instances of collective
This convergence represents action are signs of a larger future social and organizational upheaval.
the emergence of aware, social Considering the powerful effects of group-forming networks, the sec-
environments that will serve as ond-order effects of mobile telecommunications of all kinds—cellular
a new platform for human coop- phones, SMS, location-sensing wireless organizers, electronic wallets,
and wireless networks are likely to bring a social resolution. An unan-
erative and collective activities.
ticipated convergence of technologies is suggesting new responses
EXAMPLES to civilizationʼs founding question—how can competing individuals
learn to work cooperatively?
Smart mobs have been one of the
first pieces of evidence of social
mobile computing in action, par-
ticularly those with political action
as their purpose. Examples from
around the world demonstrate
how mobile communications and
social networks with a shared
interest can catalyze effective
political action. The Internet’s
capability of connecting people
who share an interest, combined
with the mobile telephone’s
ability to access resources
from anywhere, helped elect a
President in Korea, rocket a U.S.
Presidential candidate from
18
Technologies of Cooperation INSTITUTE FOR THE FUTURE
Cooperation Amplified
Social mobile computing is poised to become an important organiza-
EXAMPLES (CONT.)
tional strategy for communities, governments, and businesses alike. A
new literacy of cooperation—a skill set for how to leverage the power
obscurity to front-runner status,
of socio-technical group-forming networks and catalyze action—will
and organize demonstrations at
become an important competency in the next decades. From daily
the 1999 WTO meetings in Seattle.
activities as mundane as shopping and as important as obtaining
health care and participating in civic life, smart-mob skills will play Elections in Kenya, Manila, and
an important role in how people interact on a daily basis. Those who Spain have been similarly
are not equipped to manage this sort of group action will be at a dis- influenced.
advantage—a new class of digital have-nots.
Mobile gaming In the summer
of 2003, “flash mobs” broke out
all over the world: groups of
people used e-mail, Web sites,
and mobile phones to self-orga-
nize urban performance art. Ad
hoc groups of young gamers in
Scandinavia and Singapore use
cellular phones equipped with
GPS functionality to play urban
adventure and superhero games
like Bot Fighter and Street Fighter.
19
GROUP-FORMING NETWORKS:
5
I N T E G R AT I N G T H E S O C I A L A N D T H E T E C H N I C A L
20
Technologies of Cooperation INSTITUTE FOR THE FUTURE
STRATEGIC PRINCIPLES
Rules | Social capital builds and grows from ties that form GFNs.
21
S O C I A L S O F T WA R E :
6
T H E M E A S U R E O F S O C I A L C A P I TA L
22
Technologies of Cooperation INSTITUTE FOR THE FUTURE
23
SOCIAL ACCOUNTING SYSTEMS:
7
MECHANISMS FOR BUILDING TRUST
24
Technologies of Cooperation INSTITUTE FOR THE FUTURE
Thus, as the currency of social accounting changes from knowledge systems use statistical
or social recognition to money, the technology forks into two lineages analyses to provide “best
of systems: those that deal with recommendations or other forms of fit”—for example, Google’s
knowledge and those that deal with markets. search engine lists first those
Web sites with the most links
pointing to them.
�����������
������� ���������
���������� ����
�������
STRATEGIC PRINCIPLES
26
Technologies of Cooperation INSTITUTE FOR THE FUTURE
27
Learning from Cooperative Technologies:
Seven Guidelines
Every technology of cooperation holds a lesson for those who would like to experiment with coopera-
tive strategies. Taken together, they suggest some basic guidelines for these experiments:
1 | Shift Focus from Designing Systems to ingful they are bound to create friction, erode trust,
Providing Platforms and lead to possible defections. As Elinor Ostrom
Technologies of cooperation each reflect an impor- suggests, rules need to be flexible and adaptable,
tant shift in the structural qualities of cooperative allowing the possibility of the creation of new rules
organizations—a shift from explicit design of sys- if necessary—and local communities are more likely
tems to providing platforms for tool creation and to observe peer-agreed contracts than coercive laws
system emergence. Wikipedia, eBay, FreeCycle, enforced by distant authorities. When individuals are
Open Source, synchronous swarms, and smart mobs able to engage in the creation and enforcement of
were not designed, but rather they emerged from the rules, such as mutual monitoring, peer-level security
intentional creation of tools and platforms for inter- mechanisms, and contribution to FAQs and other
action and value exchange. This is an important dis- visible documentation of rules, the system of rules
tinction because it also shifts the role of leadership become more internalized within a group.
and management from an authority who explicitly
shapes direction to a catalyst and periodic intervener 3 | Learn How to Recognize Untapped or
who sets conditions and frameworks for interac- Invisible Resources
tions. Two key structural issues are scalability and A key attribute of cooperative systems is how they
modularity. Cooperative technologies tend to create manage and value resources. Often assets may seem
modules (discrete pieces/kernels of code, sub-group too small to be worth anything or too distributed
social networks, geospatial focal points, and multiple to be harnessed, yet cooperative practices are quite
identities) that can be combined to create larger scale effective at aggregating small contributions into larg-
social, transactional, and networked systems. er, highly valuable resources. They also are capable
of converting or translating private resources into
2 | Engage the Community in Designing public ones that provide broader wealth. Sometimes
Rules to Match Their Culture, resources may not be visible or may not appear to
Objectives, and Tools have clearly measurable value. Through group-form-
Rules are an important way of framing the interac- ing social networks and social-accounting systems,
tions and scope of behaviors in a cooperative system, such resources are able to find measurable value in
and the community should be engaged in this kind of meaningful group contexts.
rule making. Rules originate from the communityʼs
own context, and should serve a specific purpose. 4 | Identify Key Thresholds for Achieving
In open source, the value of technical rationality, for “Phase Shifts” in Behavior or Performance
example, frames the rule, “let the code decide” in Developing a competency for identifying, track-
matters of forking and code design. This is in keep- ing, and monitoring various threshold points will be
ing with the objectives of the open source communi- particularly important for managing cooperative sys-
ty, whose goal is to create the best and most elegant tems. The technologies of cooperation exhibit spe-
software possible. If rules are not contextually mean-
28
Technologies of Cooperation INSTITUTE FOR THE FUTURE
cific kinds of thresholds that seem to be important in 6 | Look for Ways to Convert Present
creating qualitative shifts in performance or behavior: Knowledge into Deep Memory
ease of participation; scale of participation and reach Historical record and memory help to create a foun-
of networks; degrees of separation within networks; dation for learning and future action. Memory is
costs of disruption and repair; signal-to-noise ratios; really at the core of becoming adaptive and flex-
granularity of analysis and sense making, and the ible to the external environment, even as it rapidly
range of risk and uncertainty. Often standard thresh- changes. Cooperative tools such as auto archiving of
olds—such as system capacity and bandwidth—are the Wikipedida, social records symbolized in power
transformed by technologies of cooperation into seller icons in eBay, and visible histories of interac-
something else. These are particularly important tions all help create deep memory that members of
threshold shifts to track because they point to the an organization or system can rely on to guide future
emergence of new value and wealth in the system. actions (establishing the “shadow of the future,” as
Robert Axelrod suggests) and to increase the opportu-
5 | Track and Foster Diverse and Emergent nities for cooperation and the likelihood of a positive
Feedback Loops outcome.
Feedback loops help create the deep memory needed
for adaptive learning. Regular communication allows 7 | Support Participatory Identity
for actors to share information and adjust behaviors. A key word related to identity in cooperative systems
Cooperative technologies tend to be open and peer- is participatory. The various technologies of coop-
to-peer, allowing for feedback loops from all types eration all leverage and support different ways for
of actors and layers in an organizational system. individuals to express themselves through participa-
Feedback loops can be as simple as establishing fre- tion and contribution. As Steven Weber remarked (in
quent e-mail communications or setting up team or a personal interview November 2004) about diverse
enterprise wikis and blogs. They can be more com- motivations for participating in open source style
plex and involve setting up automated, real-time data efforts, “People actually want to be productive in the
gathering across organizational systems like work Freudian sense, in the erotic sense that Freud under-
flows and production processes. As with thresholds, stood. Human beings like to leave their impression on
developing a competency in detecting diverse feed- the world and create things.” Cooperative endeavors
back loops and their relative value to the system will provide individuals that opportunity to satisfy their
help increase the level of cooperation. Together with deep human need for productivity through participa-
thresholds, feedback loops can provide important trig- tion and the creation of resources, artifacts, and value.
gers to help moderate conditions in an organizational Tools that help assess, track, make visible, and man-
system, reducing defection or increasing the likeli- age multiple identities related to production and par-
hood of cooperation. Often individuals themselves ticipation will help stimulate cooperative systems.
are an important source of feedback, as in the user
producers of peer production systems. Metadata cre-
ated by social software tools or tags and taxonomies
created by users of knowledge collectives are other
examples of feedback that provides a picture of the
status and quality of cooperation in an organization
and the resources being created.
29
Learning from Cooperative Technologies: Seven Guidelines
A Final Note
Throughout this report we have been discussing how a range of tech-
nologies can shape cooperative strategy and lead to new social forms
that will introduce a new set of strategic choices. A key point that
shouldnʼt be omitted here is the role of competition. One clear les-
son from this research is that cooperative strategy does not replace
competitive strategy; the two are inter-related and co-evolve. A key
challenge is learning to understand the dance between the two strate-
gies, their respective range of choices, and the conditions that urge an
organization to follow one or the other at a particular time period and
environmental context.
30
Endnotes
31