Tom Brannon: The Arrival of Network Armies

Advanced Cyber/IO, IO Deeds of War

Tom Brannon CroppedThe Arrival of the Network Armies

The Effect on Public Policy And Marketing

Industry and government in the United States are addressing the task of dealing with ICT (Information and Communications Technologies) and its primary attribute, the Internet. The power of the Internet as a communications and marketing tool has become recognized as mission critical and is causing upheavals and reengineering throughout most industrial sectors and government agencies. This document presents a look at the decentralized phenomena known as Network Armies and proposes that a focus from the perspective of various user groups, along with the use of methodologies such as Cybernetics, will yield new and unimagined benefits in marketing and communications, new potential for private ownership of data, and a new paradigm of individual control in communications and marketing. Implementation of the ideas posited will result in substantive public policy considerations and will create a new sector on the Internet (C2B), with related political and monetary issues.

Keywords, Table of Contents, PDF Below the Line

Keywords: Network Armies, Hub Activity, Hub Entities, Cybernetics, ICT, new economics, consumer profile, Metcalf’s Law, Reed’s Law.

2015 Network Armies Tom Brannon

Contents

Present State

Five Fingers of the Internet . . . . . . . . . . . 2
Technology Assumptions . . . . . . . . . . . . 3
Business Benefits . . . . . . . . . . . . . . . . . . 5

Network Armies

Defined . . . . . . . . . . . . . . . . . . . . . . . . . 6
Community . . . . . . . . . . . . . . . . . . . . . . 8
Effects and Potentials . . . . . . . . . . . . 9

Cybernetics

History & Application to Network Armies . . .11

Privacy Army

History & Attributes . . . . . . . . . . . . . 12

Other Emerging and Latent Armies

The Investor Army . . . . . . . . . . . . . . 14
Additional Latent Armies . . . . . . . . . . 15

Public Policy Implications

General . . . . . . . . . . . . . . . . . . . . . . 16
Marketing to Network Armies . . . . . . . . . . . . . . 17
Conclusions . . . . . . . . . . . . . . . . . . . . . . . . . 20
Appendix
Gramm-Leech-Bliley Regulations . . . . . . . . . . 21