Wikileaks drags in its wake many questions and some initial lessons.
Just browse or listen to the media to get a glimpse of our collective confusion about the goals of this site, those of Julian Assange and what's about the sources of this great unpacking: who benefits from the Crime?
This illustration of the "breathing space" provided by Wikileaks in deployment (at least on paper) at great speed in the Cloud allows me to watch this "deal" from another angle also very interesting.
Boosted by information technology
We already wrote in a note published recently: The information is born of contextualization and interpretation of data. It is therefore closely linked to production systems, without which, it does not exist.
Outside the "cloud" on which the majority of solutions information management are running, it is obvious that infobesity added to the technology available, including records management, made the "explosion" of Wikileaks.
It is not surprising to see how quickly that information (probably in a paperless format original) is copied, duplicated, published and spread around the world (with the support of the traditional media interested and used in this case to echo).
Okay you say, but these are exchanges between diplomats, images flash in time of war and, although we are concerned, we must humbly admit that we are a little overwhelmed by the political and media uproar .
#informationmanagement #electronicrecordsmanagementsystems #ElectronicRecordsManagement
We also find a few people to welcome this apparent overall transparency and happy, since the last Robin Hood, to find in it a hope for justice in this global world dehumanized.
Beyond our values and our goals, we must accept the fact that this reality also applies to our profiles and to personal data that we agree to disclose for the benefit of our image in the Internet and to serve our personal branding.
Thus, the social network has complicated the situation by putting us in the same situation, regarding information and data protection, that the companies, organizations and the states in the case of Wikileaks.
Technologies 2.0 bring all stakeholders (companies, organizations, governments, citizens) on an equal footing regarding the risks they could have in case of no worrying about strategy and governance for their own information.
The Weakest Link
Back to Wikileaks, it is true that data recording (regardless of its purpose), paperless format, as well as the formidable technical facilities offered by cloud computing have largely contributed to the fact that the "bomb" has been so "efficient" but we must also keep in mind that these are only technologies!
During this last decade we have seen, through forums, "geocities" pages, blogs and MySpace, then the media and social networks, human being taking a prominent place in a universe where technology reigned supreme.
For my part, but I am delighted with this necessary rebalancing (why let the debate and the choices to only those technicians?), It is likely that many of us happen to have access to data, information which we do not see the stakes or consequences of disclosure (unless an ideological motivation, economic or personal).
With the Internet, it is never a secret whispered in the ear, the message is stored and ready for publication once it has been captured and without any limits in time or space EXCEPT those decided in advance!
We must go further and use technology in what it can bring us more in control of data and information, but to do it is necessary to implement policies dictated by the thoughtful and realistic strategies.
In private, the precautionary principle plays full to avoid mishaps and personal training should makes sense.
Indeed, why is the Model 2.0, including social media, would not need learning unlike any technology previously developed and used by mankind?