Difference between revisions of "The Booklet"

From PKC
Jump to navigation Jump to search
Line 11: Line 11:


=Tools: [[Personal Knowledge Container]] ([[PKC]])=
=Tools: [[Personal Knowledge Container]] ([[PKC]])=
The following Logic Model is the [[SoG]]-based approach to create the Personal Knowledge Container.
{{LogicModel
|name=PKC
}}
==Tech for Trust: A Data Infrastructure for Trust Building==
==Tech for Trust: A Data Infrastructure for Trust Building==
{{:SoG_Tech for Trust}}
{{:SoG_Tech for Trust}}

Revision as of 10:02, 9 December 2022

The Science of Governance Booklet

Theory: the Science of Governance (SoG)

Context:Digital Transformation challenges Social Stability

Time is a universal medium to connect events; knowing when events happen is integral in our conception of everything. This is shown through sequencing and recording information, hence why both “time is money” and “knowledge is power.” Everyday, people around the world are persuaded by others who simply have more information. This is known as information asymmetry, where one entity has better access to knowledge while the other entity does not. Examples of this phenomenon range from car salespeople selling bad cars to unwary buyers, to developing countries getting overly high interest rates from lenders, crippling their economy. Information asymmetry can be used with good intentions, and could also lead to exploitation.

Currently, data processing technologies are increasing information asymmetry in ways that are becoming a major problem in public administration. Malicious and systematic data technology exploitation can be conducted by individuals or public institutions that have more access to data or data processing technologies. To ensure sustained justice in modern societies, the notion of governance must be grounded to the power of persuasion’s root: information asymmetry. We call this scientific endeavor the Science of Governance (SoG). SoG focuses on the fundamental properties of information asymmetry: the timeliness, accountability, and observability of public data.


ThreeAspectsOfTrustworthiness.png

Power structures always needed tools and methods in guiding timely actions, creating accountability for policy outcomes, and observing progress. Models of thought were utilized to create and execute policies shaped by power structures. These include: “Objective and key results (OKR);” used to define measurable goals and measure outcomes, “Management by objectives (MBO);“ defining specific objectives and sequentially how to achieve each objective, and “logic models,” describing the chain of causes and effects leading to an outcome. Without adopting secure and field-tested information systems, political structures are still mostly functioning through verbal debates, creating their offline codes in human-readable texts only, and storing information on mediums that cannot be automatically checked and retrieved by relevant parties. A hyperlinked logic model is shown below:


Logic Model (Science of Governance) Template:LogicModel 12 9, 2022
Abstract Specification
Context The Committee for Science of Governance is created in Indonesia for the preparation of the G20 Summit during November 2022.
Goal Create a consensus-reaching process to resolve potential conflicts caused by interdisciplinary/cross-domain concerns.
Success Criteria
  1. Operating the governing board of SoG using a trustworthy content versioning/publishing system
  2. Improve the content of SoG using Smart Contract specified workflows
  3. Having two/thirds() of active participants sign off on each of the proposed resolutions/propositions.
Concrete Implementation
Given Inputs When Process is executed... Then, we get Outputs
  1. Initial suggested topics of discussion.
  2. A number of experts and volunteer participants initially provided by the committee.
  3. Travel and Online meeting arrangements
  4. Funding and logicstic supports for traveling experts
  1. Define topics of discussion
  2. Invite experts to participate in discussions.
  3. Online and In-Person participation of Discussion, including email and other forms of content exchanges
  4. Refine discussion content and topics
  5. Decide on final topics and publishable content
  1. Digital recordings of discussion content and textual-based exchanges (email, etc...)
  2. A signed publication of participants on topics that they agreed on.
  3. A number of sub-committees focused on selected topics
  4. Publications submitted and signed by sub-committee members
Boundary/Safety Conditions of Science of Governance
Due to reasons that certain protocol breach or total number of participants of the governing board of SoG goes below three persons. Then the program will be considered as a personal project, instead of a collective project.


Large-scale digital technology uses these logic models; even modern information technology like smartphones and blockchains were built on a foundation of prior inventions and systems using similarly formatted models. A logic model is a domain-independent specification format allowing any self-governing body to utilize contemporary technologies to represent the timeliness of information distribution, accountability of data changes, and observability of policy outcomes. To start, existing governance tools such as the OKR/MBO models can be integrated with hyperlinked documents to help keep policies and execution results timely, accountable, and observable. To do this with a formalized framework, we name this new field, SoG.

Goal:Ensure Governance Correctness by Logic

SoG functions through establishing a fair and just political process in a world overwhelmed by the asymmetric distribution of data governance technologies. It provides a trustworthy foundation to help governing bodies allocate resources to execute policies efficiently, utilizing different aspects of established governance theories and creating new governance theories, while employing readily available technologies to deploy solutions in the real world. In other words, an End-to-End solution for governance must have a scientific basis that can be scaled up in applications through technology and have a unifying policy decision frame that can be applied to all application domains. This requires the Science of Governance to be abstract, so that it does not associate itself with a specific application context. It also needs to be concrete, so that all policy decisions are observable and accountable in terms of socially and physically meaningful data. The only medium to deal with this dualism is nothing but logic, more precisely, the logic of Correct by Design (CbD).

The Science of Policy Correctness

Before CbD is explained, one must understand the term “correctness.” There is a logical way to express correctness that is scale-free and domain-independent: the Venn Diagram representation of correctness in the diagram on the next page. It shows that correctness is the logical intersection of safety and liveness conditions. From a scientific viewpoint, correctness should be objectively determined according to explicitly encoded safety and liveness “social contracts”.

Safety means nothing bad happens: a system or policy is considered safe if nothing bad happens from its execution. If one plays a football game, and throughout the game, the player is not injured, the game is considered to be safe.

Liveness means something good happens during the execution of a system or policy. An example of this in a football game would be the player scoring a goal. That would be a liveness condition. The intersection between safety and liveness is clear in this example, a person is uninjured and scores a goal in the game. This is “correctness.”


Error creating thumbnail: Unable to save thumbnail to destination

This generic, domain-independent statement of correctness is not only applicable to computer science, but to governments as well. It allows policy designers to separately list the conditions of what are considered to be bad, and then list the conditions that are considered to be good. This logical decomposition of correctness is a powerful intellectual construct that enabled system engineers and computer scientists to build systems as complex as the Internet. Whether a governing body can consistently apply this construct in policy framing decides how well an organization may be governed by explicit rules. With an increasing amount of conditions, however, organizations need an additional way to ensure correctness, particularly in contracts. This is where Hoare Logic, Hoare triplets, and CbD comes in.


Correct by Design and Hoare Triple.png

In 1969, when more possible conditions were being created in computer programming, Tony Hoare created a logic system to rigorously clarify system correctness. Key to this system was the Hoare Triple, expressed as {P} C {Q}. {P} is the precondition, what caused the command. C is the command, the action that takes place. {Q} is the postcondition, what happened due to the command’s occurrence. In terms of System Correctness, safety would be the precondition, the event occurring due to satisfying safeness would be the command, and liveness would be the postcondition. When C satisfied both {P} and {Q}, the system worked as planned, as in, it was Correct by Design.

In our football game example, {P} would be a person who is physically fit to play and that person does not have an intention/history to hurt other players. C would be playing the game, and {Q} would be the player scoring goals and playing at least 90 minutes. We know this example is Correct by Design if these parameters occurred accordingly. But if {Q} was the game only being played for 10 minutes and fog stopping the game, then we know the system did not attain correctness in terms of Correct by Design! CbD provides logical symmetry to all systems of any kind by using a consistent set of rules to classify the safety and liveness conditions of the system. This naming convention allows any system to identify errors (safety) and recognize accomplishment (liveness). As Henry Poicare once said: ”Mathematics is the art of giving the same name to different things.” CbD assigns consistent naming schemes (safety, liveness, and correctness) to all governance structures in casual categories.

Hoare Triples can go beyond computer programming, however, because every action made by every individual, group, government, etc. can be turned into a Hoare Triple. This includes something as simple as eating food. “Hunger” would be the pre-condition, “eating digestible food” would be the command, and “increased energy” would be the post-condition. Governance concepts like Rousseau’s Social Contract can be turned into a triplet as well. People giving power to a government would be the pre-condition, the creation of a Social Contract would be the Command, while the government receiving power would be the post-condition. These triplets can be simple or detailed, and one can even form a chain of triplets using the post-condition as the new pre-condition for a new triplet. One can easily imagine these Hoare Triples to be linked/composed to express more complex policies or programs. It is the complexity of these composable arrows/Hoare Triples that make it a domain-independent way to organize correctness in a formalized data structure. This logic system is instrumental in guiding people in a world of increasingly complex contracts.


Mutli-level HoareTriples with LogicModel.png

Writing down satisfactory conditions in contracts is not new. What is new are the many possible conditions in this already highly interconnected world. Yet all these possibilities can be symmetrically dealt with through Hoare logic and concepts that formally frame correctness like CbD. Due to its composability, Hoare Triples may serve as the universal data primitive to encode arbitrary large-scale social and industrial governance challenges. Due to its simplicity, they can scaffold application scenarios that deal with the complex interactions of many knowledge domains. The Hoare Triple is a Universal Construct: It is everywhere and has been already adopted by many popular governance tools, such as the Logic Model (see Appendix on Logic Model as Multi-Level Hoare Triples).

Success Criteria:Associate social and physical meaning to Data

Only after recognizing that a unifying logical primitive, a Hoare Triple, is a grounding representation of scientific judgment can one see policy framing and governance practice as not just an art form, but also a scientific endeavor. It also marks a new era of Digital Transformation by actively applying Correct by Design methodology to not just engineer inanimate objects, but also use the same principles and tools to logically reason on ethical integrity. In a highly connected world, we should be allowed to adopt technologically sophisticated thinking tools to tackle the complexity created through systems driven by Big Data. However the data or causal relations of information must be associated with physical and social meaning, so that data could be relevant to governance.

As an emerging field of science SoG needs to be grounded and validated in the physical world and must be socially meaningful to people willing to use this theory. Data may be associated with physically observable parameters, such as timestamps and spatial markings, such as addresses and relative locations. To associate social meaning to data, one must engage with many socially relevant participants to agree on certain pieces of data. These are often called signed contracts. A signed contract often is dated and the integral date value is a timestamp. These increase the trustworthiness of the contract.


Error creating thumbnail: Unable to save thumbnail to destination

Symmetry breaking: Time flies like an arrow

It is time, the phenomenon that captures the unifying direction of causal relations, which breaks symmetry in our physical world. It breaks directional symmetry by forcing us into the future, never the past. Similarly, governance is about capturing opportunities in time and must use past data to inform future actions. The source of governing power comes from the advantages of having access to more relational data than the subjects being governed. Therefore, governance can be considered as a way of conscientiously exploiting information asymmetry. Without losing generality, it is defined in theoretical computing science as all data types are representable in ordered pairs[1], including “faulty” data or “failed experiments” are nothing but ordered pairs of data points, representable as Hoare Triples. According to Luo[2], computationally generated data could create novel and useful features in potential design spaces with high payoffs. Governments should innovate to explore policies in the most comprehensive design space that are practically reachable, to benefit the people, and therefore using a generic data representation such as Hoare Triple as the universal building block provides the efficacy of the design space representation.


Error creating thumbnail: Unable to save thumbnail to destination

For governmental purposes, one can see these basic data types as Logic Models that keep policy execution on track. Framing correct governance practices needs only one data type: the “ordered” relation. This singular data structure, graphically represented as arrows, an ordered pair of key-value data points, is a way to use discrete symbols to denote causal relations, a fundamental reason for the inevitable Digital Transformation. Arrows, ordered relations, and Hoare Triples are all scaffolded data structures that help humans and machines perceive time in logically computable terms. Only after causal hypotheses are given finite symbolic names in these logically represented formats, can correctness of prescribed policies become accountable, observable, and terminable in finite time. Governance is an intentional act, it must be encoded in data. There is an often ignored universal truth: all data encoding schemes can be absorbed into a set of ordering relations, as shown in diagrams composed of connected arrows. Executable programs of any kind, especially programs designed for public policy, are all made of nothing but arrows, because they are just causally bounded events over time.

Timestamping Hoare Triples with Blockchain

Time penetrates everywhere. Once a reliable time source is approved by many participants, complex workflow amongst these parties carries them across vast space. Blockchain should be used as the medium because it is an immutable ledger, being a permanent, indelible, and unalterable history of transactions. Since all blockchains must regularly package a “block” of mutual agreements in a fixed time interval, the process of packaging agreements makes blockchain both socially (many social agreements) and physically meaningful (each block denotes an increment of time).


Error creating thumbnail: Unable to save thumbnail to destination

Using Blockchain as a common ledger to share actionable code, often called a Smart Contract, both pre and postconditions of a Hoare Triple can be bound to socially agreeable physical time. In other words, a trusted timestamp system defines the temporal ordering of events. It allows “commands” or “contractualized action ” to be executed in a sequence that fulfills the functions of an arbitrary and complex workflow that must be met for agreements, all denoted by Blockchain. In the physical world, the sequential order to contract execution can be easily encoded in logical assertions bound in Pre-Conditions of other Commands. The required time to fulfill the command execution, such as payment due dates after product delivery, can be encoded in Post-Conditions. These time-bound logical statements are the essential programming constructs that make up the composition of modern workflow systems, often called the Enterprise Resource Planning (ERP) system. ERP’s most essential function is to ensure all enterprise actions across highly dispersed geographical locations follow programmatically-defined temporal ordering sequences. With Blockchains and Smart Contracts providing a trustworthy global clock (via timestamps and hashes) and custom-defined action-triggering conditions, many expensive ERP software solutions could be replaced by public computing services, sometimes referred to as the Web3 movement. Hoare Triple as the Open Format Governmental policies are codes, and codes should be represented in domain-independent and scale-free data structures such as Hoare Triples. The domain-independent and scale-free nature of the Hoare Triple provides a unifying data primitive to express and examine the process of policy construction and deconstruction, hence it is not fixated in narrow fields or physical scales. The same reasoning applies to business operations and even personal event management. Coupled with a trustworthy timestamping system, a time-bound Hoare Triple is an Open Format that constructs workflow for any application, regardless of domain and scale. Open Format is an important concept in the global Digital Transformation. The integrity of digitized governmental policies must be united in a logically invariant data type, allowing any policy to be computationally examined with computable correctness. Correct by Design provides a logical framework to connect causal structures and policy statements in a common data type that is not tied to any specific interest parties. This openness in format enables a unifying semantic realm to reason about policy consequences in one logical universe. We also encourage governmental agencies to contribute their practice in a scientific community by promoting the creation of an Open Format Repository across many government agencies, so that their governance experience can be shared and reused. This repository will catalog existing security-aware communication formats, curate these designed artifacts as Ricardian Contracts, and manage the evolutionary history of the curated content as Non-Fungible Tokens (NFT). This blockchain-validated (timestamped) repository of data content composed of executable source code with textual descriptions would elevate public accessibility to the highest level possible, making Open Format knowledge reusable across application domains and shareable by various sovereignties and cultures.

Open Format for Everyone

Correct by Design enables the broadest and deepest possible interpretation of a common data format that synthesizes abstract rules with concrete results in world events administered by digitized government policies. This format should be accessible to every literate person, not just highly trained programmers. The combination of human-readable text with a specific set of executable contracts needs to have some form of technical certainty, which a Ricardian Contract fulfills. The Ricardian Contract was invented by Ian Grigg in 1996, which proposed generating a fixed-length number, called a hash code, to represent the unique composition of human readable text and machine executable contract by securing this contractual package with a hash code generating algorithm. Bitcoin uses these cryptographic codes to secure money transfer between users. Due to the uniqueness of the cryptographic key, hashes have multiple resistances to hacking, increasing the safety of the data format. The Ricardian Contract is also known as the Bowtie model because the diagram of the proposed data format looks like a bowtie.


RicardianContract as a Bowtie.png

Trustworthy and Economical Data Storage

Blockchain, as an immutable database, can be expensive to operate. It is particularly expensive to store and synchronize a large amount of data across many computers. It can serve as an economically viable notary service if it is coupled with local storage systems. As proposed in the following diagram, blockchain only needs to store the hash code of a Valid Contract, while the detailed data content of the Valid Contract can be stored in local file systems of participating parties. As long as the presented data content generates the same hash code, it can be considered valid. If any modification is made to the contact package, running through the same secure hash generating algorithm again, it will guarantee to generate a different number, notifying users that the data package has been tampered.


Error creating thumbnail: Unable to save thumbnail to destination

This public infrastructure, coupled with data and computing service packaging tools like microservices and microservice orchestration, provides a new breed of data services that allow citizens to own and operate data centers like large organizations. This creates a form of scale-free data sovereignty that originally was impossible. Tools such as the Personal Knowledge Container, created in Indonesia, were designed to demonstrate the feasibility of such an egalitarian data instrument.

Summary: An End-to-End Argument on SoG

It is popularly known that large-scale internet engineering follows a so-called Hourglass Model. To allow any organization to conduct self-governance in the Internet of Everything era, it is inevitable to ask what End-to-End argument can scale to cover everything. This is reflected in multiple concepts, workflow cycles, and operational models. The answer is an Hourglass Model with a common point of control. The causal cone of Past→Present→Future and the Ricardian Contract, being visually presented as a so-called Bowtie Model, both are presented in diagrams shaped like hourglasses. Also, the DevOps cycle is often drawn in the shape of a Möbius Strip, which also looks like an hourglass. These recurrences of hourglasses are not coincidences.


Error creating thumbnail: Unable to save thumbnail to destination

There is a reason that all these concepts, cycles, and models must have a common point of control. The action of control may only happen at “the present (time).” One does not “live in the past,” after all. “The present” is often short and locally small, dealing with a very large world of possibilities. Therefore, all decisions that have big impacts must condense from a significant amount of past events and expand to a wide range of future possibilities. That is why all system design patterns are eventually shaped like hourglasses. Some of them are oriented in different directions (horizontal vs. vertical), the general shape being wide on both ends and skinny in the middle. The widening and narrowing structure of an hourglass shows that data can be compressed and shaped asymmetrically. It is this asymmetry that gives utility to practical applications, and the practicality of data manipulation introduces accountable ways to deal with governance issues. It is also why the hourglass has been recognized as a geometrical pattern to show controllability in various literature. Interestingly enough, this shape also is a device that measures time.


DevOpsCyclesWith Learnable data.png

Leverage Information Asymmetry for Self-Governance

We argue that information asymmetry exists in nature and cannot be avoided. But they can be technologically distributed by allowing more people a monopoly on their own information. By utilizing computing resources that many people of the world already privately own, individuals can obtain information in timely, accountable, and observable manners according to their interests. Alternatively, people could create information asymmetry based on their private data assets, thereby creating mutual dependency that reduces systems favoring people with more money or more computational knowledge. The people who can use the SoG are not just ones with powerful computers or high bandwidth network connections. SoG changes the power structure by helping more people know how data and causal structures can be used to create information asymmetry in their subjects of interest. Moreover, the successful ones must have timely, accountable, and observable instruments to process application specific data to adequately govern their own organizations. This is where a free and unbiased technical instrument must be created and adopted to enable correctness in governance. The creation of such a technical instrument is about pragmatic data engineering, not just theoretical science, which will not be discussed here.

SoG evolves with the technology of data manipulation

An automated process to identify causal entanglement of data over spacetime would be the ultimate crystal ball for governed outcomes. According to Han Feng, physicists such as Kofler and Zeilinger already explained the boundary of predictive powers in quantum physical terms. With new waves of the Internet of Things technologies and higher bandwidth communication infrastructures, the casual entanglement of data over spacetime still has many surprises. Because the Science of Governance is scale-free and domain-independent, abstract structures like the Logic Model, Ricardian Contract, and the Hoare Triple will continue to be employed in future scientific endeavors. Independent of the size of the organization, ordered pairs of instructions (Logic Model/Hoare Triple) are the necessary knowledge to enable self-governance that should be treasured by anyone who possesses private valuable data.


Tools: Personal Knowledge Container (PKC)

The following Logic Model is the SoG-based approach to create the Personal Knowledge Container.

Logic Model (PKC) Template:LogicModel 12 9, 2022
Abstract Specification
Context Given the impacts of Moore's Law, by year 2020, most Internet-connected data can be universally abstracted as a set of services, files, and page data assets, individuals can manage a scalable collection of data assets on privately owned computing resources and connect their resources to the public Internet at will. At the same time, software tools created under the Free Software movement, such as MediaWiki, Semantic MediaWiki[3],[4], Solid, Docker, Kubernetes, and Ansible[5] have matured to a point that allows for individual persons to own personally controlled data centers. This created a new asset class that can have significant technological and societal implications.
Goal To offer personal data asset management at scale PKC aims at minimizing the operational complexity of data backup, verification, and restore process as a sound data validation workflow, while using public-key infrastructure and networked timestamps to ensure the trust-worthiness of PKC contained data.
Success Criteria
  1. Allow Individual users to install an instance of MediaWiki service by reading this PKC/Readme.md file.
  2. Make all textual content, executable software images, installation scripts in the public domain, so that everyone can share and use them at will.
  3. Provide instructions to learn about how to use PKC in the initial MediaWiki's database, so that people can start learning to use PKC through their own instance of MediaWiki.
Concrete Implementation
Given Inputs When Process is executed... Then, we get Outputs
  1. A computer that you have access to its "root" or "administrator" previledge.
  2. A host machine that runs an Operatng System that supports Docker:
    1. Windows 10
    2. Mac OS X
    3. Linux
  3. Access to the Internet during intallation time. Try to perform the installation on a network with 10Mbps+ to the Internet.
    1. After installation, this system can operated without access to the Internet.
    2. References to MediaWiki's software installation practices[6].


Go to Main Text
  1. Install Git
  2. Install Docker Runtime
  3. Install PKC
  4. (optional) Install Reverse Proxy
  5. (Optional) Example of Source Code
  1. A localized instance of Personal Knowledge Container, which can be accessed on localhost.
  2. Given a configurable regular interval, all the changes you made to your local instance of MediaWiki will be automatically backed up to the directory's "backup/" sub-directory.
  3. The textual content stored in MediaWiki's database can will be stored in an XML file: XLPLATEST.xml
  4. All the uploaded files, assuming the file names are accepted by the host operating system, will be dumped to the "backup/MediaFile/" sub-directory.
  5. New applications and data processing patterns can be defined by Data Flow
  6. Please carefully read Explaining LocalSettings.php to see how the MediaWiki is being set up.
Boundary/Safety Conditions of PKC
  1. PKC have only been tested on a small number of machines and configurations, your mileage may vary.
    1. Compared to Unix-derivatives such as Mac OSX and Linux operating systems, installing PKC on Windows operating system can be a challenge, therefore, please refer to PKC on Windows Platform.
  2. We can not warrant any reliability, completeness, and accuracy of this installation procedure. Any action you take upon this information and execute this script is at your own risk, the software developers for PKC have no way to be liable for any losses and damages in connection to the use of the actions and software prescribed here.
  3. Do not remove any of the files in the directory with backup/, such as docker-compose.yml and the LocalSettings.php. These files are the configuration files for Docker and MediaWiki respectively. Missing them, this system will cease to work.


Tech for Trust: A Data Infrastructure for Trust Building

The Personal Knowledge Container (PKC) is both a scalable personal library and a data wallet, a self-administered knowledge management solution that addresses the problems caused by information asymmetry as defined by the Science of Governance (SoG). PKC is a Domain-Driven Microservice to avoid a monolith application, reducing unnecessary entanglement of functionality in a modular way. It can transfer a large amount of digital rights at little cost. PKC was created to show how technically feasible and economically viable it is to enable individuals and small organizations to process data in a timely, accountable, and observable manner in ways that are similar or equivalent to systems only affordable by large-scale organizations. This means that individuals can process a potentially infinite amount of data. Large-scale organizations would also benefit from PKC as they would save large costs of transferring terabytes of data by simply using the tool. It can be trusted as it is open, transparent, and most importantly, operated and owned by people who generated the data from the source. PKC chooses currently known technologies that allow data providers to contain the right to govern at the origin of data, so that its technical architecture is trustworthy.

PKC is a technical solution that addresses the political problem of data ownership. By making data processing technologies available to the masses through Open-sourced and freely distributed PKCs, this instrument should help reduce technologically and economically induced information asymmetry, and therefore build trust amongst society participants.

As Blockchain and Smart Contract related data infrastructures become increasingly mature, the features of a geographically-dispersed collaborative workflow as promised by the “Web3.0” programming model has already been incorporated into PKC.

The increasing adoption of digital payment systems and publicly registered Data Assets, commonly known as Non-Fungible Tokens (NFTs), shows that Internet-scaled marketplaces could be designed and deployed by grassroot startups. Since the public deployment of Ethereum in 2015 as a “programmable blockchain,” many of the highly publicized online economic events have been conducted by rules encoded in machine executable contracts. This also gave birth to the field of Cryptoeconomics, an area of digitally transformed economic activities that are usually associated with Decentralized Finance (DeFi) applications. The lack of an Internet-scale regulatory framework to govern these economic activities is another kind of information asymmetry that favors communities with better access to data processing technologies. By bundling Blockchain-compatible services and Smart Contract deployment capabilities in PKCs, the container reduces this unfair advantage. PKC as a general-purpose data and computing service container also allows more people to participate in these online marketplaces with a wider range of asset classes. To contextualize the design intent, it is not just a specific data manipulation tool designed for Information Technology professionals, it is a stack of governance technology that addresses the evolving needs of large-scale online interactions.

Processes and Resources: Manipulate data assets in Open Formats

To ensure trustworthiness, the source code of PKC should not only be Open-sourced; it is even more important to be compliant to open and exchangeable formats. Open-source technology is usually created by other entities, so when mistakes in the software happen, the person would have a harder time identifying what exactly to fix. Open-format solves this issue as one can directly see the codes themselves. The following diagram shows the Open-source solutions adopted as the key functional elements of PKC.

A format is open if the encoding structure and the metadata regarding the structure is transparent and well-documented. One such technical effort to ensure openness is called Open API, originally the Swagger API project. It forces all computing services to produce results in JSON formats (human readable), offering a set of web-based graphical user interfaces to expose the metadata and allow data extraction and data submission to be operable through standard network requests. PKC adopts Open API protocol by exposing data content in the MediaWiki database. The other services such as Keycloak and QuantUX already have native implementations of Open API.

Connect Web3 into the Cloud Native Industry

Distributing these technology building blocks is not a new idea. It has been a massive social and economic movement in the making for at least 30+ years. The most relevant technologies include software container technologies such as Docker, container orchestration technologies such as Kubernetes, and OpenShift Framework for a standardized Continuous Integration and Continuous Delivery (CI/CD) tool chain. These software integration efforts are not only free, but they have abundant tutorials and community practitioners that can help create fully functional distributed data centers with near-zero software development cost. In terms of hardware infrastructure, PKC is designed to reduce the cost of data ownership by using commodity hardware solutions to enable remote and low-cost communication services, such as Wifi Mesh, and 3~5G access points. By localizing personal data storage, one may choose to only store the hash code of a large data set to Blockchain. This “layered” solution of data storage would retain a mechanism to verify data content that must be tamper-free, while not having to incur massive costs of data storage on public blockchain.


LocalAcrhivesWithTimestamps.png

PKC can also locally serve computing services with containerized microservices, therefore reducing large amounts of unnecessary network traffic across the Internet and network operations costs. Docker containerization technology and virtualization enable us to see software package functionality as an instrument, rather than a bunch of code, thus enabling us to achieve our goals more concisely and consistently, allowing us to see the full scalability of the instrument.

It is the collection of all these existing Open-source technologies and commoditized hardware solutions that enabled the possible mass adoption of PKC. This container is a technology stack for trust-building that empowers individuals and agencies to exercise data sovereignty in affordable ways. For example, when one needs to share a file with many potential downloaders, a solution is to store it in the IPFS format and naming scheme, so that it can be addressed across the Internet based on its digital content. PKC can include an IPFS service node as one of its Dockerized services.

NFT: Transferring Governance Rights

Data formats also need to support exchangeability. A piece of data should be exchangeable in the marketplace by having a common set of annotation to denote its ownership and protect its content to only be editable by its owner. This can be accomplished by publishing/minting data assets as Non-Fungible Tokens (NFTs). Without going into the technical details of minting NFTs, the main obstacle of minting them is that public NFT minting services all require upfront cryptocurrency payments. The good news is that there are public minting and publishing services that require extremely low fees. NFTs, as a special kind of securely protected data content, allows for many kinds of workflow security programming that was not feasible before. For example, one may transfer the ownership of certain rights, which serves as the condition to modify or authorize information in a workflow, so that decision-making accountability can be programmatically controlled using an NFT ownership transfer. This is a critical feature in managing the governance of many organizations.

Content filtering independent of outside influence

An important feature of PKC is the ability to filter data content based on self-operated content filters. Controlling the filters is not only useful for preventing children from seeing age-inappropriate content, it can also be used to actively filter and prioritize content beneficial to social, intellectual, and economic activities. Running a privately owned knowledge container such as PKC will enable individuals to search, organize, and store data content in ways that can be isolated from data surveillance technologies. Without a self-administered knowledge container, online content consumption is inevitably influenced by external parties, which is not desirable: the ability to independently configure data filtering options with minimal external influence is an aspect of freedom to modern citizens. PKC serving the data filtering functions based on privately controlled computing services also enables a type of law enforcement possibility that does not intrude on individual privacy.

Desirable Outcome: Egalitarian access to Data Processing Technologies

PKC implementation can be successful when it satisfies the following conditions: It enables owners of PKC to collect, catalog, navigate, search, and process data assets using computing technologies that have been released to the general public as Open-source and Open Format solutions. All chosen technical solutions should be affordable to everyone. It must store the change history of data assets by registering changes using various levels of technically secured (cryptographically verifiable) procedures, so that data assets can be traced to know at what time and by whom did the collection of data change. Therefore, it becomes technically possible to assign accountability, observe, and change outcomes with timely remedies. It must encode knowledge in a Correct by Design (CbD) format, which should fit in logic models composed of human-readable text and relevant executable code. The operational experience accumulated from the execution of each logic model should also be recorded by PKC to provide feedback for future refinement of the logic model.

It is only after a wide enough population started to have egalitarian access to data processing technology similar to large tech companies can the societal issue of information asymmetry be systematically addressed. PKC is a technical solution to address this concern as prescribed by the Science of Governance.

Applications: Concrete SoG Examples

The essence of governance is to provide traceable instructions to make participants accountable for their contributions to changes. This can be accomplished by writing governing instructions in the form of Logic Model. There are seven fields of information content that one needs to provide in completing a logic model. The seven fields of information content can be isolated into three Hoare Triples:

Logic Model (Logic Model Explained) Template:LogicModel 12 9, 2022
Abstract Specification
Context The temporal and spatial environment of the operational system of interest. The spatial and temporal information can also be recursively encoded by hyperlinks or hash codes.
Goal An imperative statement to "break symmetry" in showing what action must be executed in the context presented above.
Success Criteria A collection of conditional statements, both pre and post-conditions of the execution process, to define the safe and liveness conditions that form the correct/successful criteria.
Concrete Implementation
Given Inputs When Process is executed... Then, we get Outputs
A collection of resources that are required to kick off an implementation process for the execution of the goal statement. A specification of the implementation process that takes the inputs to generate prescribed outputs. A collection of observable states or resources that are derived from the prescribed process mentioned in the same logic model.
Boundary/Safety Conditions of Logic Model Explained
Information that is related to the execution of this logic model that is not captured by the previous six fields.

Without using MediaWiki templates to organize, edit, and display logic models, each logic model must be manually written and organized as an independent data entry. Using the hyperlink and transclusion features of MediaWiki, it becomes possible to share and reuse information content across a wide range of projects. For example, the input and output prescriptions can be composed of pages that comes from different projects, even from different fields. One obvious example is that many of the projects could share a common PKC data storage service, as a common input resource.

The following examples are real-world projects that may use logic model as an instrument of governance to practice the Science of Governance on PKC.

Selected Applications: Trans-disciplined SoG Examples

SoG provides a scientific basis for policy correctness, so that tedious and complex entanglement of interacting policies and anecdotal events can be verified with the help of automatically executed algorithms and pre/post condition verifiable data. In other words, making policy changes learnable and accountable requires a PKC-based version control and content comparison/verification framework that analyzes government policies against a significant amount of real world events.

However, keeping event data in ways that both uphold the sovereignty of a government, while protecting privacy concerns of individuals, is a technical dilemma. For instance, health data can still be accessed by savvy tech specialists if the raw data is stored only in blockchain. This dilemma can be incrementally resolved with improved and well-engineered data security solutions, such as creating a unique hash code for the data and assigning them a Smart Contract. Operationally effective and legally accountable data management systems require continuous improvements in the technological infrastructure of the governed geographical regions, as well as the technical literacy of local citizens. To ensure educational equality, data-intensive literacy and technical knowledge, such as skills and awareness of Continuous Integration and Continuous Deployment (CI/CD), should be embedded in the educational curriculum for all citizens under the movement of Digital Transformation. Based on this observation, we have the following propositions:


Disseminating SoG-based Body of Knowledge

The basic assumption of SoG is that every project or governed program should be summarized in a Logic Model. If one think of how to disseminate SoG-based Body of Knowledge, it should also be presented in a Logic Model as shown below:

Logic Model (Disseminating SoG-based Body of Knowledge) Template:LogicModel 12 9, 2022
Abstract Specification
Context Learning activities in this data-intensive era must make use of the data manipulation technologies that is available to the masses. As of 2022, most of the students and existing curriculums are not adequately oriented toward the use of modern data manipulation technologies. The ideology behind foundational curriculums are also not organized to serve the purpose of gaining literacy in using data-intensive learning experiences.
Goal Leverage Gasing Method, a scale-free and domain-independent pedagogical method to propagate the scientific approach of modern interactive learning.
Success Criteria The successful dissemination of SoG-based Body of knowledge must include the following three criteria:
  1. Gampang:timely knowledge acquisition
  2. Asyik:observably attractive to potential participants
  3. menyenangkan:accountability for individual and group-wise experiential encouragement
Concrete Implementation
Given Inputs When Process is executed... Then, we get Outputs
  1. A school or institution that is willing to practice SoG-based knowledge management
  2. Governing principles from the Science of Governance.
  3. The Gasing Method pedagogical approach
  4. Personal Knowledge Container
  5. Access to local or global Internet using Smart Phones and Laptops
  6. Time allocated for students and teachers to practice Gasing Method
  1. Executing Gasing Method specified online Games
  1. Formative Data of students' individual and group-wise activities
  2. Summative Data of students' individual and group-wise performace
  3. Cross referenced data between groups of students over school districts and over the semensters
Boundary/Safety Conditions of Disseminating SoG-based Body of Knowledge
  1. PKC operation not sufficiently covering all learning activity needs
  2. Data collected doesn't sufficiently match the understanding of actual events
  3. Data content and the actual body of knowledge are insufficient to promote continuous learning activities.

Pre-Condition(s):

To create public awareness of SoG, the professional user needs both the body of knowledge (the curriculum) and a publicly accessible data infrastructure. PKC is to be adopted by individuals and/or organizations. In parallel, educational institutions must have evolving pedagogic approaches to operationalize the learning of self-governance, particularly in multiliteracy. The GASING method is a pedagogical approach, compounded of three words in Bahasa Indonesian, roughly abbreviated from “Gampang” (timely knowledge acquisition), “Asyik” (observably attractive to potential participants), and “menyenangkan” (accountability for individual and group-wise experiential encouragement). It is enjoyable, interesting, and informative. This approach uses both physically meaningful and social data, like representing numbers in different forms using fingers and asking students to exchange content knowledge in symmetric formats. It employs multiliteracy methods including singing and dancing that prioritizes a computation approach instead of calculation. This method is very easy for anyone to learn and replicate. It is not only applicable to arithmetic, but also to high-level mathematics, physics, and other subjects.


Error creating thumbnail: Unable to save thumbnail to destination

3/2/2022 - President of Indonesia, Joko Widodo, visited children in Humbang Hasundutan Regent's Office area (North Sumatra Province), who were studying mathematics with Professor Yohanes Surya using the GASING method. Source: Liputan6 News.

Command(s):

To spread the knowledge of SoG, relevant books, papers, and online articles will be continuously refined, compiled, and annotated under the direction of the G20 Professorship Program. The data infrastructure allows for scalable distribution of content through network channels using the most widely accessible data formats and data presentation terminals, such as HTML5, Web3D and Smart/Ricardian Contracts. The interactive data content should be displayable on portable computing devices. Student’s learning performance should also be recorded, analyzed, and protected for their personal growth purposes.

A collection of interactive models and executable specifications should be assembled in order to facilitate the learning of Open Formats. Online virtual 3D laboratories connected with remote laboratories and data from physical laboratories can play a big role in federated online research11. That way it will be a domain-independent research center for anyone who wants to contribute. The data will be secured through the blockchain. Pedagogically, the GASING method has been applied to experiment, summarize, and integrate the SoG body of knowledge and data infrastructure, so that it can be orchestrated within school environments and create a self-reflexive (CI/CD aware) curriculum based on data-intensive evolving evidence from the real world.

Post-Condition(s):

Successful execution will lead to the reduction of public data entry barriers to all of society. By creating a strong, symmetrical, educational pedagogy, student learning will increase. Because more resources are opened up due to a strong educational infrastructure, more resources can be devoted into alternative learning for students with alternative literacies. Using novel approaches like the GASING method leads to students enjoying learning, so that within two weeks those who previously could not count would be able to master addition, multiplication, subtraction and division quickly. The purpose of GASING is helping students understand and practice self-governance through the most basic/fundamental primitives that can be composed as logically consistent arithmetic expressions, so they can experience meaningful correctness in their lives. The end goal is to practice the use of individually-operable data instruments and self-administered knowledge content to enable everyone to own their personal data assets. Pedagogical methods like GASING illustrates timeliness, accountability, and observability, reflecting the values of the Science of Governance.


JokowiInteractingWithStudents.png
Gloria, a 5th grader, felt the effectiveness of the GASING method to learn mathematics. For her, the GASING method makes mathematics fun instead of complex formulas.

Source: Indotren.com

Social Governance Applications

Logic Model (LKPP Blockchain Proof of Concept) Template:LogicModel 12 9, 2022
Abstract Specification
Context In May of 2022, Minister Luhut and the director of LKPP had a meeting, and decided to create a Proof-of-Concept project to utilize blockchain technology to reduce data error and potential data corruption in the national procurement process.
Goal Demonstrate that public blockchain can serve as an infrastructure to reduce software implementation complexity, yet maintain a reasonable degree of security and privacy-protection for LKPP's inter-departmental workflows.
Success Criteria
  1. Demonstrate that LKPP's e-Catalogue data content can be stored on Blockchain.
  2. Show that off-the-shelf and open source tools can be used to implement Blockchain(Web3) features.
  3. Conduct the proof-of-concept project within a few months time with minimal amount of programming labor.
Concrete Implementation
Given Inputs When Process is executed... Then, we get Outputs
  1. Existing PKC code base
  2. Open source Web3 Programming tools
  3. Science of Governance guiding principles
  4. Official project funding
  5. A team composed of software architects, programmers, and designers
  1. Project initiation by meeting with sponsors and LKPP personnel.
  2. Observing the functional requirements of LKPP e-Catalog
  3. Meeting and discussion with LKPP personnel
  4. Project design and implementation
  5. Demonstration of Proof-of-Concept
  6. Project documentation
  1. An implementation of Blockchain-enabled PKC infrastructure
  2. An OPEN-API endpoint to read from and write Blockchain(Ethereum Goeli Network) databases
  3. Quant UX implementation of e-Catalog UI/UX
Boundary/Safety Conditions of LKPP Blockchain Proof of Concept
  1. Not running on the Main Network of Ethereum (due to high transaction fee)
  2. Software is implemented as a Proof-of-Concept system, not a system with adequate stress-test features.

Pre-Condition(s):

Government agencies should systematically identify areas of applications to apply SoG by enhancing data transparency while protecting natural security and privacy rights of its citizens.

Command(s):

Currently, Indonesia’s LKPP (National Procurement Agency) and Digital Nomad Visa Programs are just two examples. The Sovereign Union is establishing E-Identities to secure individual privacy. Fab City is attempting a revolutionary paradigm shift to incorporate digital infrastructure solutions around the world. Fab City’s values of open source, data self-sovereignty and trustworthy data exchange signify a paradigm shift not only for increased regional supply chain resilience and independence, but also for an in-depth global transition to a greener, more circular economy. The Fab City Operating System is one such set of standards-based, networked tools that enshrine these principles in code.

In a neighboring country, the Australian Digital Transformation Agency (DTA) is trying to deliver strategic outcomes with more human-centric, sustainable, and easily accessible digital government services for the people, businesses, and the government, addressing the issues of data security, privacy, trust, transparency, and governance. A cross-ministerial platform such as myGov is an excellent example of similar efforts. Indonesia will seek to collaborate with the Australian government to refine the practice of SoG.

25/5/2022 - Indonesian National Public Procurement Agency (LKPP) will utilize blockchain technology to create a transparent and accountable government spending system. LKPP Head, Abdullah Azwar Anas said the use of this technology would be the first in government procurement of goods or services.


Error creating thumbnail: Unable to save thumbnail to destination
Source: CNN Indonesia

Post-Condition(s):

Changes to LKPP hosted price listings and immigration offices will be tracked using immutable and transparent databases. This will assign timestamps, track user accounts that changed relevant public/policy related information, and make the effects of changes observable. The initial Proof of Concept is already demonstrated to function as a replacement of LKPP’s existing e-Catalog using PKC with Ethereum-compatible blockchain’s Smart Contracts’ infrastructures. Inter-departmental authorization of product specification changes are encoded as Non-Fungible Tokens (NFTs) to ensure future transfer of administrative rights are controlled by a public defined Open Data Format. New features of e-Catalog will also be Continuously Integrated and Continuously Deployed (CI/CD) using web-based interfaces that are compatible with Hoare Triples as an Open Format to control the stage gate of integration and deployment actions. This Hoare Triple-based format will standardize the data formats to document and encode conditional statements, reducing entry barriers for involving new vendors and new government agencies that do not have the budget to hire professional software development teams to integrate their subsystems to this national-scale governmental workflow.

Age-Appropriate Design Code

Logic Model (Age-Appropriate Design Code) Template:LogicModel 12 9, 2022
Abstract Specification
Context Citizens in the digital era are constantly under attacks from the cyberspace. Young users of the Internet are particularly vulnerable to inappropriate content. Therefore, data exposed to users must be regulated based on users' age distinctions.
Goal Protect user privacy and content exposure based on users' age groups with law and enforceable technical instrumentation.
Success Criteria
  1. Be able to tell user's real age with technical means.
  2. Allow continuous evolution of content filtering policies and implementations.
  3. Allow children's guardians to configure their content filtering preference based on law and personal preference.
Concrete Implementation
Given Inputs When Process is executed... Then, we get Outputs
  1. An instance of PKC with content filtering proxy service
  2. A configurable interface to enable AADC-compatible content filtering option settings.
  3. A catalog of available content-filters that allows various users to select content filtering options.
  1. Continuous evolution of AADC code as the legislation body changes its laws.
  2. Continuous evolution of PKC defined content filtering Smart Contract to implement the AADC policies.
  3. Deployment of verified Smart Contracts to a data filtering option bulletin board.
  4. Subscription and execution of content cacheing, filtering, and publishing through PKC.
  1. Children receiving data content that are appropriate for their age groups.
Boundary/Safety Conditions of Age-Appropriate Design Code
  1. The written laws may not be technically implementable given existing IT infrastructure.
  2. The coverage of PKC installation maybe a critical factor to judge the measure of success.

Pre-Condition(s):

Children are vulnerable to threats to their privacy, safety, and security, which can lead to negative impacts on their safety, including their mental and physical well-being, as well as lowering their agency over their lives, disrespecting their childhood. Major internet platforms, meanwhile, have allegedly violated children’s privacy laws and boasted to advertising customers about their algorithmic systems’ capabilities to manipulate and target children to maximize their time spent on-screen where said threats exist. Children are suffering due to these platforms. The United Nations’ (UN) 1989 Convention on the Rights of the Child laid the groundwork for protecting the rights of children. The UN’s 2021 General comment No. 25 on children’s rights in relation to the digital environment “emphasized” or “reinforced the fact” that children’s rights apply to the digital world.

The United Kingdom provides an example on protecting children’s rights in digital spaces. After the 2018 Data Protection Act was passed, the UK’s Information Commissioner Office (ICO) developed guidance that provides “age-appropriate design of relevant information society services which are likely to be accessed by children.” This resulted in the Age-Appropriate Design Code (AADC; also known as the Children’s Code), which came into effect in September 2021. In California, legislators passed the California Age-Appropriate Design Code Act (AB 2273), which contains provisions inspired by the UK’s AADC, including the age threshold defining childhood.

The Indonesian government has been considering similar policies like AADC, and is currently planning to engage with AADC creators to learn more from its operational experience and policy design wisdom to create a system to protect Indonesian citizens. The key contributing element of the Indonesian government is using personalized content filtering technologies similar to PKC that allows for individuals to subscribe to published content filter algorithms as Smart Contracts (which guarantee their transparency and accountability) to best protect the safety and liveness of online data consumption experience.

Command(s):

Creation of an Age-Appropriate Design Code in Indonesia through PKC. PKC practices a content distribution model based on content-filtering Smart Contracts. It is Open-source and allows individuals and nations to practice data sovereignty. This scale-free “personal data store” allows children’s guardians, school administrators, and regional education ministries to have the same technology and data governance capabilities that were only available to large tech companies. It filters out content and helps ensure the safety and agency of children.

Post-Condition(s):

In countries that do not have AADC protection, children will be exposed to data exploitation by various means.

In countries that have AADC laws passed, childrens’ data access will be based on the compliance of data vendors. The law enforcement will have to be done passively, after the laws are broken.

Indonesia, with the intent to implement AADC to protect children, will use self-administered data filtering technologies, such as PKC, to actively protect data exposure online and configure an individual person’s desire and need according to transparent Smart Contracts and NFTs that is legible, allowing for comments by anyone with or without information technology skills.

Actions in progress before G20 in 2022

To launch the SoG as a governance policy initiative during the 2022 G20 meeting, we must: Engage global opinion leaders in creating an SoG Proclamation, which will define the goals and direction of the initiative. This document will be minted as an NFT and will allow programmable transfer of governance ownership. Work with the next G20 host country, India, to announce an ongoing G20 Professorship office, which will serve as the office to provide the stewardship of the Intellectual and operational efforts. Create a sample knowledge sharing website to share data and content knowledge with all interested parties of SoG. It should also provide reference material to existing and similar efforts that have been created in related fields.

Proposed Actions after G20 in 2022

To operationalize the SoG, we need to enable the following actions and associated resources: Creating an institution, initially called the G20 Professorship Program, which will invite world leading experts in various fields to collaborate and formulate the foundational scientific questions and solutions of SoG.

  1. Working with educational institutions (universities, educational ministries), to develop strategies and programs in disseminating knowledge of SoG. This would include political and scientific literacy for the young. It would also provide a trans-disciplinary body of knowledge for transfer agencies to educate government officers and educational institution administrators.
  2. Working with regulatory bodies, global technology standard institutions and data instrument (semiconductor) manufacturers, to organize standards/formats setting consortiums, and set up ethically aware and interest-neutral standards.
  3. Assembling early technology contributors, to build Proof of Concept prototypes to demonstrate the feasibility of SoG solutions.
  4. Mobilizing Indonesian government agencies (e.g. LKPP and Immigration Office) to plan for their internal digital transformation activities. Provide training courses and present data-intensive solutions to leaders of these agencies to become aware of possible options in improving their internal operational and governance efficiency.
  5. Work with talented people (including digital nomads) and opinion leaders to create broadcast quality media content (video and websites), endorsed and spoken by leading government officers (ideally, the President and the Coordinating Minister) to articulate the strategic value and long term impact of SoG to Indonesia and to the world.

Scientific Governance in Action

The success criteria must make SoG not only scientifically sound, but also practically operable. To satisfy these two potentially contentious criteria, we need to inclusively consider competing scientific methodologies, identify the converging ideas and rules and compile them into shared knowledge bases (PKCs) as symmetrical data content. It is also necessary to identify diverging ideas and rules, and make sure different opinions can easily branch out to isolated knowledge bases to avoid unnecessary entanglement of operational data. This is often known as the practice of version control, but the adequate adoption of version control data in different application domains can be costly and requires a lot of Information Technology support in an organization. That is why a general purpose data management platform that is not designed to maximize commercial interest is a precondition of data ownership/data sovereignty. Most of the organizations are still debating their internal differences using traditional means of verbal interactions. In many cases, a well-managed set of historical records, such as a transparent, accountable action log will resolve a lot of managerial issues. In other words, Scientific Governance requires a scientific instrument, and that instrument is PKC.

As mentioned earlier, data becomes more trustworthy if the ordering sequences of potentially interactive events do not violate the temporal logic in the physical world. It is time and pre/post conditions that helps organizations to filter operational data to an actionable body of knowledge. That is why the Science of Governance can only be exercised operationally with a symmetrical format represented in Hoare Triples.

Conclusion

The Science of Governance (SoG) is our answer to the growing problems of information asymmetry and technological complexity caused by the accelerating Digital Transformation. These problems plague social justice and destabilize political structures. Due to its abstract nature, SoG is a neutral theoretical foundation to help innovate and improve global governance while employing Tech for Trust (TfT) to solve the world’s problems and serving as a concrete global “clock.” The success of SoG depends on the following aspects: assessing governmental practice via time-stamped data, using an open-format, domain-independent, and scale-free methodology, providing a trustworthy and inclusive data infrastructure, as well as ensuring and utilizing secure data protection protocols to protect privacy. Key to SoG is the wide distribution of the Personal Knowledge Container (PKC).

PKC is a tool that gives agency to every agent to create and store knowledge and values with little entanglement. Through adopting the Correct by Design (CbD) notion using Hoare Logic, PKC can facilitate secure knowledge storing through treating all data as NFTs and through the execution of Smart Contracts, which are transparent by their technical nature. PKC is designed to make high-powered data security instruments free to independent agencies; it can be independently configured to filter data and security breaches, reducing potential safety hazards. It can utilize publicized knowledge through Smart Contracts or NFT exchanges. It will provide feedback and operational experience to improve Smart Contracts, cataloging data assets, implement software, and instill CbD knowledge content through hyperlinked Logic Models.

SoG needs to be applied through creating a SoG-based curriculum and dissemination, applying SoG through social governance and educational governance, and must be created as a governance policy initiative during the 2022 G20 meeting. To operationalize the SoG, a G20 Professorship Program has been created, and this document is its first public offering. Education bodies should also develop strategies and programs in disseminating knowledge of SoG. Training courses and data-intensive solutions on the subject are given to leaders of government agencies to improve their operational and governance efficiency. Policies like an Age-Appropriate Design Code should also rely on SoG’s PKC to ensure its successful implementation. SoG shall also work with regulatory bodies, global technology standard institutions and data instrument (semiconductor) manufacturers to organize ethically aware and interest-neutral standards. SoG also needs to assemble early technology contributors to build Proof of Concept prototypes to demonstrate the feasibility of SoG solutions. Finally, SoG should be articulated through widespread websites and videos around the world.

As shown in Sanskrit on page 3, the notion of time is embedded in changes or differences. The differences can be captured as chained or partially ordered Hoare Triples. These triplets capture the rules and sometimes the actual content of changes, so that they form an immutable historical thread that can be used to make decisions across space and time. One could say that data is a scale-free medium to encode knowledge, therefore knowledge is just a special kind of data: a casually related set of data. It is such a universal pattern that breaking symmetries using causal relations (Hoare Triples) gives the sound and complete foundation to reason and assign correctness to governing actions. When science evolves, innovations in instrumentation break the paradigm of existing scientific theories. As Albert Einstein said, “technology [...] has confronted mankind with problems of profound gravity. The very survival of mankind depends on a satisfactory solution of these problems.” It is time for us to share freely available data processing technologies to reduce technology-induced information asymmetry, so that SoG and self-administered data can serve as containers of knowledge to liberate willful souls around the universe.

Acknowledgements

This document is a production of the G20 Professorship Office, under the direction of Dr. Satryo S. Brodjonegoro, the President of Indonesian Academy of Sciences. The list of contributors is rather large, and can be found on the website: https://pkc.pub/wiki/G20_Contributors.


We want to acknowledge the support and trust by the following individuals:

Coordinating Minister of Maritime Affairs and Investment, Luhut Binsar Pandjaitan

Managing Director of IEEE Standards Association, Konstantinos Karachalios

Member of the House of Lords, Beeban Kidron

Works Cited

Dev4X, https://www.dev4x.com. Accessed 18 September 2022.

Akerlof, George A. “The Market for ‘Lemons’: Quality Uncertainty and the Market Mechanism.” The Quarterly Journal of Economics, vol. 84, no. 3, 1970, pp. 488–500. JSTOR, https://doi.org/10.2307/1879431.

Appelbaum, J.R. Communication in a World of Pervasive Surveillance: Sources and Methods: Counter-strategies Against Pervasive Surveillance Architecture. Technische Universiteit Eindhoven, 2022. 1 vols.

Beck, Micah. “On The Hourglass Model.” Communications of the ACM, vol. July, 2019, pp. 48-57.

Berners-Lee, Tim. “Solid.” Inrupt, https://inrupt.com/solid/. Accessed 19 September 2022. Buterin, V. (2022, January 26). Soulbound. Vitalik Buterin's website. Retrieved November 10, 2022, from https://vitalik.ca/general/2022/01/26/soulbound.html Chowdhury, Mizanul. Digitally secured ISS-based Online STEAM Education for the Developing Nations. An Abstract to be included in the SoG pilot educational program. pre-publish ed., 17 September 2022, Mass, USA.

Chowdhury, Mizanul. Small Satellite Systems for the Advancement of Developing Nations. A proposed educational program to the SoG pilot educational programs. Pre-publish ed., 17 September 2022, Cambridge, Massachusetts, USA.

Cousot, Patrick. Principles of Abstract Interpretation. MIT Press, 2021.

Dirac, P A M. The Principles of Quantum Mechanics. BN Publishing, 2019. Doerr, John E. Measure what Matters: OKRs - the Simple Idea that Drives 10x Growth. Portfolio Penguin, 2018.

Dougherty, Raymond C. “Einstein and Chomsky on Scientific Methodology.” Linguistics, vol. 167, 1976, pp. 5-14.

Drucker Peter F. The Practice of Management. 1st ed. Harper & Row 1954.

Einstein, Albert. The Cosmic View of Albert Einstein: Writings on Art, Science, and Peace. Edited by Walt Martin and Magda Ott, Sterling Publishing Company, Incorporated, 2013.

Epp, Susanna S. Discrete Mathematics with Applications. Cengage, 2019.

Fechner, Chris. Digital Government Strategy. Accelerating the digital future of our Australian Public Service. Australian Government, https://www.dta.gov.au/sites/default/files/2021-12/Digital%20Government%20Strategy_web-ready_FA.pdf.

Hoare, Charles Antony Richard. Communicating sequential processes. Prentice/Hall International, 1985.

Kofler, Johannes, and Anton Zeilinger. “Quantum information and randomness.” European Review, vol. 18, no. 04, 2010, pp. 469-480. arXiv:1301.2515.

Koo, Hsueh-Yung Benjamin, et al. “Algebra of Systems as a Meta Language for Model Synthesis and Analysis.” IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS, PART A: SYSTEMS AND HUMANS, vol. 39, no. 3, 2009.

Kuhn, Thomas S. The Structure of Scientific Revolutions: 50th Anniversary Edition. Edited by Ian Hacking, University of Chicago Press, 2012.

Kundu, Sourav, and Sovereign Union. Sovereign Union |, https://sovereignunion.io/. Accessed 20 September 2022.

Latour, Bruno. Science in action : how to follow scientists and engineers through society. Harvard University Press, 1987.

Leibniz, GW, and Robert Latta. The Monadology, by GW Leibniz, http://home.datacomm.ch/kerguelen/monadology/. Accessed 14 November 2022.

Lessig, Lawrence, and Director Edmond J Safra Center for Ethics and Roy L Furman Professorship of Law Lawrence Lessig. Code and other laws of cyberspace. Basic Books, 1999.

Luo, Jianxi. “Data-Driven Innovation: What is it?” IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT, 2022. https://academics.sutd.edu.sg/wp-content/uploads/DDI-20220119-Preprint.pdf. Accessed 19 September 2022. Nakamoto, Satoshi. “Bitcoin: A Peer-to-Peer Electronic Cash System.” 24 May 2009

Rousseau, Jean-Jacques, et al. The Social Contract: And, The First and Second Discourses. Edited by Susan Dunn and Gita May, translated by Susan Dunn, Yale University Press, 2002.

Saltzer, J. H., et al. “End-to-End Arguments in System Design.” Proceedings of the Second International Conference on Distributed Computing Systems, 1981, pp. 509-512.

Spivak, David I., and Brendan Fong. An Invitation to Applied Category Theory: Seven Sketches in Compositionality. Cambridge University Press, 2019.

Surya, Yohanes. GASING as a Scientific Method for Learning at Scale. Surya Foundation, 2022.

Verhulst, Ferdinand, and Henry Poincare. “An interview with Henri Poincare: Mathematics is the art of giving the same name to different things.” Mathematical Institute, Utrecht University, 3 September 2012, http://www.nieuwarchief.nl/serie5/pdf/naw5-2012-13-3-154.pdf.

Vincej, Viktor. “Indonesian Government Has Officially Approved Bali Digital Nomad Visa And Many Are Already Moving There.” Traveling Lifestyle, 16 September 2022, https://www.travelinglifestyle.net/indonesian-government-has-officially-approved-bali-digital-nomad-visa/. Accessed 18 September 2022.

Weyl, E. Glen, et al. “Decentralized Society: Finding Web3's Soul.” SSRN, https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4105763.

Wiener, Norbert. Cybernetics: or the Control and Communication in the Animal and the Machine. 2nd ed., Cambridge, MIT Press, 1965.

Appendix

Logic Models as Multi-Level Hoare Triples Logic models describe the chains of causes and effects leading to an outcome. While many logic models use a four-step process (Input, Activities, Output, and Outcomes/Impacts), logic models can be turned into concise (one page) document, listing the abstract goal statements in a triple, called: Context -> Actionable Goal -> Success Criteria, and another triple called Input -> Process -> Output. This is structurally identical to a Hoare Triple, which consists of three things:

Pre-Condition   →   Command   →   Post-Condition

A logic model is shown in the following example:


Logic Model (Smart Contract) Template:LogicModel 12 9, 2022
Abstract Specification
Context Smart Contract is a piece of program that would guarantee transparency and non-corruptibility of its execution logic. For scalable deployment, blockchain technologies and infrastructures are often required to guarantee data security.
Goal Manage human readable contract description, source code of the Smart Contracts, and execution trace data all in a unifying system, namely PKC.
Success Criteria
  1. Assign timestamps to all data assets using blockchain infrastructures.
  2. Make at least 3 copies of data backups.
  3. Allow 1 hour cycle time to backup all data.
Concrete Implementation
Given Inputs When Process is executed... Then, we get Outputs
  1. A set of stakeholders that are identified through Externally Owned Accounts.
  2. An interface to create Smart Contracts.
  3. An interface to enter data to each of the created Smart Contracts.
  1. A running instance of PKC that hosts all execution of the Smart Contracts.
  2. An Ethereum-based blockchain to support the time-stamping services.
  1. A growing list of Smart Contracts viewable through web browsers
  2. A web browser-based navigation user interface to view the execution trace of each contract
  3. A growing history of data assets.
Boundary/Safety Conditions of Smart Contract
  1. The running instance of PKC fails completely.
  2. The supporting blockchain fails.

A logic model can also be considered as a macro-structure, which can be condensed into a higher order triple: Abstract Specification → Execution Plan → Boundary Conditions From a Correct by Design viewpoint, it is necessary to convert all structures into a Hoare Triple. Therefore, one can use the same data structure to organize all causal relations into temporally-ordered data elements. The consistent format allows convenient verification and version control of these three types of information containers, and can be executed and validated using humans or machines. The idea of a logic model being composed of a multi-level Hoare Triple can be illustrated as follows:


LogicModel as Three Levels of HoareTriples.png

The box marked Hash-Code contains two Hoare Triples. The left one is the Context→Goal→Success Criteria triple. The right one is the Inputs→Process→Outputs triple. It is the intention in the diagram to show that there could be many implementation approaches to satisfy abstract specification. Therefore, the diagram has many other entries for Inputs→Process→Outputs Hoare Triples. The overall logic model as a “Ricardian Contract” is shown on the top of the above diagram as a collection of Human Readable Text. Hash-Code entables bundled data and a piece of Smart Contract code that can be executed by machines “reliably.” The operation of such a “Ricardian Contract” would generate execution logs, and its anomaly or conditions that might break in any known or unknown cause can be captured as a “Boundary Condition of Logic Model” and stored in a common data structure, similar to the notion of exception capture in modern programming languages. The three kinds of Hoare Triple, including the last one that is the “higher level” Hoare Triple, treating “Boundary Conditions” as a Postcondition, is a nested data structure that allows many different pieces of content knowledge to be composed of different instances of textual descriptions, executable code, and data type descriptions. This provides a mechanism to store and capture all kinds of enforcement mechanisms, which therefore can serve as a generic data container for information. The numbers that marks these boxes, 4, 1, 7 for Context→Goal→Success Criteria,

and 5, 2, 6 for Inputs→Process→Outputs, can be found in the following Venn diagram:


VennDiagram EnumeratedTypes.png

Each of the numbers represents a “Namespace” that covers a different area of interpretive interest. The goal of this Venn Diagram is to help classify content knowledge in categorized namespaces that each lead to appropriate interpretive actions, so that knowledge content can be managed in a consistent manner, using appropriate computational or human interpretation approaches. Also important to note is that a logic model/logic frame is a tool that is being used by many government agencies to express the intent and expected outcomes of government-sponsored programs. This short explanatory text and diagrams hope to present a path to organize traditional pen/paper content of the model to a computable medium that can be captured directly in tools such as MediaWiki. In fact, the first screenshot of the logic model is an implementation of a logic model template in MediaWiki. In other words, the notion of using a logic model in a relational/hypertext oriented data storage is already feasible. With a proper set of tools, such as using Blockchain and Smart Contract to assign trustworthy timestamps and unique hash code to a Smart Contract, one can make information and contract execution globally transparent in ways that traditional logic models cannot do. It will be a very pragmatic and powerful tool for governmental project management and control, since it will help easily track all kinds of changes in the logic model with access and links to many other kinds of digitized data content. In other words, logic models can serve as a human-machine front end to the full stack of Technology Stack for Building Trust (Tech for Trust).

  1. Scott, Dana (January 1, 1970). "Outline of a Mathematical Theory of Computation". local page: Oxford University Computing Laboratory Programming Research Group. 
  2. Luo, Jianxi (Jan 19, 2022). Data-Driven Innovation: What is it? (PDF). local page: IEEE TRANSACTIONS ON ENGINEERING MANAGEMENT. 
  3. Skaf-Molli, Hala; Canals, G ́erˆome; Molli, Pascal (2010). DSMW: Distributed Semantic MediaWiki (PDF). Part II. Berlin Heidelberg: Springer-Verlag. p. 26–430. 
  4. Koren, Yaron (2020). Working with MediaWiki (2nd ed.). local page: WikiWorks Press. ISBN 978-1540761149. 
  5. https://www.mediawiki.org/wiki/Meza
  6. MediaWiki Manual:Installation Guide. local page: WikiMedia. Jan 8, 2022.