CHOKE POINT ANALYSIS
REVOLUTION SUBMISSION | CONFLUENCIA 2020 | TEAM: ERA
CASE OVERVIEW
 What are Choke Points?
 Economic networks being turned into tools of domination
 Use of economic networks to achieve national objectives
 MNC exposure to network choke points – teaming up to mitigate risk
WHAT ARE CHOKE POINTS?
 Choke Points  Single Points of Failure
 Concentration and centralization of certain functions at various layers  New
Choke Points
 Increases vulnerability
DATALINK
 Eavesdropping on
communication
 Point of high
concentration data flows
 High volume of data and
high number of users
 Applications attract
substantial
concentrations of
internet users
 High concentration of
users transactions
related to preferences
and metadata
 Rerouting specific data
flows
 Intentional
concentration of traffic
flow to a single node
IP APPLICATION
TRADE-OFFS
 Anonymity vs.Authentication
 Encryption vs. Enforcement
 Privacy vs. Functionality
 Security vs. Usability
GLOBAL ORGANIZATION FOR DATA (GOD)
 Laws to prevent nations/governments from strong-arming various companies
 Installation of heavily monitored data centres at 7 prominent nations to prevent
monopolization of data
 Create protocol and set standards to be maintained at various data storage facilities
around the world
CONCENTRATION OF POWER
 United States  Utilization of SWIFT Codes and Sanctions against Iran and China
 No immediate solution for the concentration of power i.e. information/data
 Will solve itself over time with an equilibrium of power across countries
DRIVING FORCES FOR CHANGE
 Users: Willing to use enhanced security options
 ISPs: Introduce changes to infrastructure and incur additional costs
 Content Providers: Beef up infrastructure and security
 Governments: Support open, transparent, inter-operable privacy solutions
EFFORTS
 Fix weaknesses in current specifications
 Investigate users’ minimum needs for usability and focus development towards
security and privacy
 Provide incentives for development
 Education of users to increase trust
THANKYOU
TEAM: ERA

Chokepoint Analysis - HBR Case Study

  • 1.
    CHOKE POINT ANALYSIS REVOLUTIONSUBMISSION | CONFLUENCIA 2020 | TEAM: ERA
  • 2.
    CASE OVERVIEW  Whatare Choke Points?  Economic networks being turned into tools of domination  Use of economic networks to achieve national objectives  MNC exposure to network choke points – teaming up to mitigate risk
  • 3.
    WHAT ARE CHOKEPOINTS?  Choke Points  Single Points of Failure  Concentration and centralization of certain functions at various layers  New Choke Points  Increases vulnerability
  • 4.
    DATALINK  Eavesdropping on communication Point of high concentration data flows  High volume of data and high number of users  Applications attract substantial concentrations of internet users  High concentration of users transactions related to preferences and metadata  Rerouting specific data flows  Intentional concentration of traffic flow to a single node IP APPLICATION
  • 5.
    TRADE-OFFS  Anonymity vs.Authentication Encryption vs. Enforcement  Privacy vs. Functionality  Security vs. Usability
  • 6.
    GLOBAL ORGANIZATION FORDATA (GOD)  Laws to prevent nations/governments from strong-arming various companies  Installation of heavily monitored data centres at 7 prominent nations to prevent monopolization of data  Create protocol and set standards to be maintained at various data storage facilities around the world
  • 7.
    CONCENTRATION OF POWER United States  Utilization of SWIFT Codes and Sanctions against Iran and China  No immediate solution for the concentration of power i.e. information/data  Will solve itself over time with an equilibrium of power across countries
  • 8.
    DRIVING FORCES FORCHANGE  Users: Willing to use enhanced security options  ISPs: Introduce changes to infrastructure and incur additional costs  Content Providers: Beef up infrastructure and security  Governments: Support open, transparent, inter-operable privacy solutions
  • 9.
    EFFORTS  Fix weaknessesin current specifications  Investigate users’ minimum needs for usability and focus development towards security and privacy  Provide incentives for development  Education of users to increase trust
  • 10.