You are here


Wrecking an International Project: Notes from a saboteurs vade mecum (Links From-Kx)

[First part | All ]



[2018]:  Communication Constraints and Possibilities in a Global Context Communication Constraints and Possibilities in a Global Context (Part 1/)

[2018]:  Disaster-engendering constraints on collective communication? Imminent Collective Communication Info-death? (Part 6/)

[2016]:  Game-playing in global governance? Engaging an Opposing Ideology via Martial Arts Philosophy (Part 8/)

[2013]:  Identifying patterns of moves with respect to "intelligence" Playing the Great Game with Intelligence (Part 5/)

[2012]:  Deprecation of alternatives and anomalies challenging conventional models Knowledge Processes Neglected by Science (Part 6/)

[2011]:  Identifying meta-challenges: checklists and documents Embodiment of Change: Comprehension, Traction and Impact? (Part 3/)

[2010]:  Personal despair of social change agents Implication of Personal Despair in Planetary Despair (Part 4/)

[2009]:  Game-playing, gerrymandering, astroturfing and globallooning Reframing Global Initiatives for the Future (Part 8/)

[2008]:  Further possibilities for unconventional exploration Unknown Undoing: challenge of incomprehensibility of systemic neglect (Part 8/)

[2007]:  References Emergence of a Global Misleadership Council: misleading as vital to governance of the future? (Part 13/)

[1997]:  References The Art of Non-Decision-Making (Part 6/)

[1984]:  From Networking to Tensegrity Organization From Networking to Tensegrity Organization (Part 1/)

[1981]:  Innovation, alternatives, constraints and the future In Search of Transformational Pathways: bibliography of studies conductedfrom 1962 to 1981 (Part 6/)

[1977]:  Institutional Games and Strategies as a Response to Complexity Institutional Games and Strategies as a Response to Complexity (Part 1/)

[1976]:  Intervening to "Solve" National and World "Problems" Technical facilitation of meeting dynamics and participant interaction (Part 1/)

[0000]:  References Anti-networking strategies (Part 2/)