Idiosyntactix Strategic Arts and Sciences Alliance The Brand Name of the Media Revolution |
[library]
ObservationsObservations
In the search for a solution to the problem of adverse unintended consequences inherent in the adoption of information technologies, care must be taken to define an approach that is enabling rather than limiting. Some argue that the problems and risks associated with change can be addressed simply by avoiding significant changes. Others advocate that changes be introduced slowly and systematically, thoroughly testing proposed alterations until the probability of error is acceptably low. In many circum-stances, these very conservative approaches may be appropriate. In this case, they are not.
We are not in a position to take the apparently safe and comfortable road to the introduction of change. The environment in which we must operate is being transformed in a number of critical dimensions; consequently, business as usual (the default decision) carries with it significant adverse consequences of its own. Thus, "doing nothing" is neither conservative nor safe.
The low cost of obtaining information age technologies will help potential adversaries improve their military capabilities as they learn to leverage these technologies effectively. Thus, inaction will lead down a path that exposes us to new and improved adversary capabilities that we may not be able to counter effectively without change. In addition, in an era in which budgetary pressures will continue, a failure to take advantage of opportunities to improve cost effectiveness translates into less capability.
The pace of the advances in information technologies and their adoption make it imperative that our approach to change must be capable of keeping pace or it is doomed to failure from the start. Further, we must recognize that there are two kinds of risks associated with the selection of an approach to change. In addition to the widely recognized risks associated with adverse consequences, there are the risks associated with failure to recognize and capitalize on unexpected opportunities to do things more effectively and efficiently. Thus, risk management becomes the name of the game.
Since we cannot stop, slow down, or control the information explosion or totally prevent unintended consequences, we must design a strategy for introducing information technologies that a) identifies and anticipates negative repercussions and enables us to avoid those repercussions or minimize their impacts, b) recognizes and takes advantage of unexpected opportunities, and c) balances the risks associated with the failure to achieve these two objectives. This strategy must also be capable of facilitating change fast enough to keep pace with exogenous forces impacting technologies and technologies' adoption by potential adversaries.
A technology insertion strategy designed to fully leverage information technologies requires alterations in our concepts of operation, doctrine, organizations, and force structure. Associated changes in logistics, education, and training will also be required. Without these changes, we will only obtain incremental improvements in effectiveness and efficiency while foreclosing opportunities for the order of magnitude improvements necessary to maintain the winning edge.
Next Chapter
.
.
.
[library]
.
.
.
.
.
.