full time aicte approved with dual specialization - Taxila ...
The Game Changer and Specialization
Transcript of The Game Changer and Specialization
Ways of Knowing: The Game Changer and Specialization
Philip ManningCleveland State University
Public LectureWays of Knowing in the College of Liberal Arts and Social
SciencesApril 8, 2015
The Project in a Nutshell
At its most general, this talk is about three dichotomies:
(1) The tension between the specialist and what Max
Weber called the ‘dilettante’. We normally understand
this to be about the rise of the specialist and the
decline of the amateur (or ‘dabbler’). However, the
etymology of the dilettante indicates that this is a
person who brings joy to something.
(2) The transition from revolutionary to normal
science. These are Thomas Kuhn’s terms. Normal science
is our existing problem-solving techniques;
revolutionary science is a proposed alternative to
these techniques. The need for revolutionary science
occurs because of dissatisfaction with the results of
normal science.
(3) The troubling divide between value-free or value-
neutral research and value-laden research. In the
latter, the researchers have some vested interest in
the outcomes of the research.
1
As a way in to these broad concerns, consider an episode in
the career of one of the most important (albeit now largely
forgotten) quantitative sociologists: Sam Stouffer. After
graduating from Morningside College in Iowa with a degree in
Latin in 1921, Stouffer became interested in journalism and
eventually sociological research, getting a PhD from the
University of Chicago in 1930. In 1941, he received a small
fortune - $325,0001 - from the American Government to
conduct attitudinal surveys of soldiers. This means that Sam
Stouffer is the original poster child for transferable
skills. Tellingly, today Morningside College does not offer
degrees in either Latin or Sociology and appears to have no
institutional knowledge that one of their alumni went on to
become one of the leading academics of his time.
Very early on in his work for the U.S. Government Stouffer
was asked how the military could lower the rate of
desertions among soldiers on leave. Stouffer asked whether
the men went home in civilian clothes. When he was told
that they did, he suggested that it should be military
policy for them to show up at home in military uniform. The
desertion rate dropped dramatically after this and as far as
I know Stouffer’s suggestion is still policy today.
1 This is about $5.5 million today, adjusted for inflation. My guess is that the buying power in 1941 of this grant was even greater than this adjustment suggests.
2
What struck me about this vignette is that Stouffer’s
ingenious solution to a military problem worked despite it
having nothing to do with his specialist training in
statistics – or for that matter, his earlier training in
Latin. Rather, he approached the problem as a dilettante
and found a solution that specialists had missed. He
offered what Kuhn might call revolutionary science that
could then be confirmed by normal science. In short,
Stouffer found a new way to solve a problem that could then
be broadly applied. And despite the fortune put at his
disposal, Stouffer’s solution was value-free in the sense
that he had no financial stake in the outcome. Later, when
he had to justify the large cash outlay on attitudinal
surveys, his work had become value-laden in the sense that
he had been hired by the Government and wanted to show value
to his client.
The project I’m going to discuss today is based on a very
simple idea that also has its origins in the work of a
dilettante. Imagine you want to check your bank balance.
After going online or going to an ATM, you are asked to
enter your password. On the screen you see a bunch of board
games – Scrabble, Monopoly, Chess, a Crossword puzzle,
Hangman and so on. You click on Monopoly and with your
finger drag three hotels onto Park Avenue and put a hat in
jail. Immediately you see your bank account, transfer some
3
money and log out. A few minutes later you want to check
your email on your smart phone. Again you see a bunch of
games on the screen. This time you click on Chess and put a
white king on each of the four corners of the board.
Immediately you have access to the contents of your phone.
So what I plan to discuss today for the most part is whether
this is a good way of protecting the many disparate pathways
we have to the electronic infrastructure of the modern
world. Telling this story raises general questions that have
been asked in different times in the history of sociological
theory. Max Weber often wondered whether instrumental
rationality and specialization will outlaw the generalist or
dilettante. Thomas Kuhn wondered why and how the normal
scientific way of solving problems was sometimes replaced by
a revolutionary way of solving problems. And Max Weber and
later Talcott Parsons (Stouffer’s boss at Harvard) wondered
what happens to the university and the values it represents
when it is fully commodified. Is a university that is not
value-free a university at all?
However, I’m also interested in a second, quirkier,
question. This is one that someone asked me at a talk I
gave on this project a while ago at Case Western. There I
was asked why I thought my work had anything to do with
sociology. And in responding to this provocation (or
4
compliment?) I was led to wonder how I came up with the idea
in the first place and how my collaborators, Ye Zhu and
Conor McLennan, then took the idea in directions that I
certainly hadn’t thought of myself. The short answer to
this is that I believe that revolutionary science is
produced by manufactured luck. Revolutionary scientists
either win the lottery for new ideas or they expose
themselves to disparate influences that put them in the
fortunate position of ‘seeing’ a solution that others had
missed. This solution has then to be confirmed by existing
normal science methodology or it has to point to a new
methodology that can validate it.
A Narrative of the Project:
From Manufactured luck to Revolutionary Science to Normal
Science
This project came about not because of events at CSU but
because of discussions at NSF. A meeting of great minds
there had decided that there were a number of computer-
related issues that had befuddled specialists. They decided
that enough time and money had been spent without producing
breakthrough solutions to a range of apparently intractable
problems and that it was now worth taking a punt at
something new. The NSF therefore authorized pilot money to
be spent on projects that engaged a multidisciplinary team
to offer new solutions to thorny old questions. By
multidisciplinary the NSF had in mind not just
5
collaborations between, say, software engineers and
mathematicians but between technical specialists and
generalists from outside of the natural sciences.
One of my collaborators here at CSU, Ye Zhu, had a track
record with the NSF and, as a Professor of Electrical
Engineering, was aware that this funding opportunity was
forthcoming. He contacted me and arranged a meeting. There
he outlined about ten technical, computer-based problems
that the NSF had identified as ones where progress had
largely dried up. Optimistically, he asked me whether I had
any ideas, however hesitant, about how we could make any
headway with any of them.
When luck is needed, timing is everything! In fact, the
‘open systems’ that social scientists and historians study
are such that both good and bad luck play a much bigger role
than we often want to admit. And so is the case here. Just
before I met with Ye Zhu I had been told about an entirely
different kind of multidisciplinary collaboration and this
had made a big impact on me. I had just heard my wife
(Maria Hatzoglou, a Professor at Case Western) describe a
workshop hosted by a Foundation interested in finding a
treatment for Huntington’s disease. As with the NSF, the
old heads at the CHDI Foundation feared that specialists
were not making tangible progress toward a cure for this
6
neurodegenerative disorder. They therefore set up workshops
across the United States. Local contacts were asked to
identify smart people with no prior ties to research on
Huntington’s disease and invite them to an all day retreat.
There, specialists explained the current state of knowledge
and asked for ideas. Maria, who knew nothing about the
disease ahead of time, pointed out a way of approaching the
problem that was new to the specialists. A few days later
she received an email offering her $100,000 to carry out the
experiments to find out whether the idea would fly.
So, I was unusually receptive to the unlikely idea that a
social theorist such as myself might have something to offer
a specialist in cyber-security and electrical engineering.
If Ye had walked into my office the year before there’s a
good chance I would have said ‘not my area’. Glancing at the
ten or so possible topics for collaboration I fixated on the
password security. Why was I interested at all in password
security?
First, because I try to read the Economist magazine and
something had caught my eye in a recent issue. What had
interested me the week before was something different: an
article on password security. There I had discovered that
the most common password in America is the word, ‘password’.
The same article also pointed out that an iPhone has a four
7
digit authentication code and hence its security blanket has
only 10,000 permutations – not exactly bulletproof.
The Economist then gave what I thought was an interesting
example of a more secure password (than the word
‘password’):
TBONTBTITQ.
This bit of gobbledygook is actually meaningful. Each letter
represents the first letter of ‘To be or not to be, that is
the question’. Replacing the two uses of ‘to’ with the
digit 2 and then adding an exclamation point at the end
could strengthen the math of this potential password even
further.
This then gives us the possible password:
2BON2BTITQ!
This approach seemed to me then and still today to be
promising. The experimental question to be answered is
whether the world contains too many Hamlets for this
password to be secure. But if testing shows that
participants have their own favorite literary, poetic, movie
or song lines that they are willing to spice up with a
8
couple of digits and a symbol or two, this might be a good
stopgap cyber-security measure.
The second serendipitous event that led to the research
project that the NSF ultimately funded is that someone broke
into my house. At the time I didn’t appreciate how lucky
I’d been. Among the stolen items was an unopened and I’m
told very special Kentucky bourbon, a twenty-year old Tag
Heuer watch that had been the beginning of my interest in
watches and, unfortunately, my Green Card. A few days
after the break-in the burglar was arrested breaking into
another house. Since he was wearing my old and rare Tag
watch the police were able to link him to me. When they
searched his house they found the very special Kentucky
bourbon. Actually, they only found the empty bottle. So
instead of a hangover courtesy of the bourbon I just had the
hangover of having to deal with Homeland Security to replace
my Green Card. In fairness, Homeland Security proved to be
very supportive. My difficulty was mainly that I needed to
log into their system to initiate the process of getting a
replacement Green Card and to do that I needed to construct
a password that their system recognized as secure. To pass
this test I had to come up with a long list of unrelated
letters, digits, symbols. This proved impossible for me to
memorize. As a result, I had to do the one thing you’re
really not supposed to do: I wrote my password down. As I
9
did this, I understood that I was compromising the security
of the system – but what to do? From this experience I
learned the tabiya of cyber-security research: passwords
can be memorable or secure but not both. So I now knew what
the NSF wanted non-specialists to help them solve.
The third event is really a non-event: for much of my life
I’ve been a competitive chess player and because of this I
sometimes see the world through the prism of chess. Chess is
both an exhilarating and a frustrating game. The path to
victory in games played between strong players is often
quite narrow and an aesthetically pleasing set of moves can
be undone by one simple oversight. When I was studying
chess seriously even twenty years ago computers were helpful
but not the final word. Now they are the final word.
Watching super-grandmasters play online today is interesting
because the internet allows enthusiastic amateurs such as
myself to follow the game while seeing at the same time a
computer analyze and confirm the main variations. It’s not
unlike televised poker tournaments where viewers can see the
players’ hole cards.
After my troubles with the password requirements for
Homeland Security and while engrossed in a grandmaster chess
tournament I came up with a password system for myself that
a competitive chess player would recognize instantly.
10
Consider this password:
e4e5f4?exf4Nf3d6!
This password has 17 components mixing digits, lower and
upper case letters and symbols. It has the pleasing
appearance of gobbledygook but a competitive chess player
will instantly recognize it as Bobby Fischer’s supposed
refutation of the romantic King’s Gambit. Thus for a former
competitive chess player such as myself, this password is
both trivial to remember and probably quite secure
mathematically.
So, returning to the day when Ye walked into my office
looking for a partner for an NSF grant, it’s possible to see
that the stars were aligning in completely unexpected ways.
I suggested to him that we could propose using games such as
Chess or Monopoly to store passwords. I drew a chessboard on
a piece of paper, drew four pieces on four of the squares
and said that this could be an ‘iconic code’. Although not
convinced, Ye said he would think about it and get back to
me.
After he left I wondered whether the idea had any hope. For
my own curiosity I got out a piece of paper and a pencil to
11
figure out how many permutations there were of four chess
pieces on a chessboard. Now I realize that for many or most
of the people in this room this is not a very challenging
math problem. However, it’s important for you to realize
that the zenith of my math ambition is to count down
correctly when playing 501 darts after having drunk a couple
of beers. Ordinarily I would have done what I normally do
in these situations: ask someone else to figure it out for
me. Today I might text my older son who is studying
economics and math at university, asking him to tell me the
answer, especially because he would enjoy being able to do
it, just as my younger son enjoys pointing out to me and
anyone in earshot just how useless I am at doing anything on
my iPhone. But on this afternoon I decided I should make
the effort and so I sat down to figure it out. My intuition
was that I was looking for an answer in the millions. After
a while I had something that I thought might be right but I
wasn’t sure. I then did what I really wanted to do from the
get go: I knocked on Myong Chang’s door (the Chair of the
Economics department) and asked him to figure it out. Myong
is a mathematical economist, maybe a very mathematical
economist, who comes out of a background in engineering. I
would happily challenge Myong at squash, running or chess
but I would definitely not challenge him at math – even 501
darts. Remember this as I tell you that I then explained the
math problem to him, told him I had tried to solve it and
12
had what may be the answer in my hand and that I wanted him
to solve it independently of me.
In a nice way he said the problem was trivial, punched a few
numbers on a calculator and told me that there were several
thousand possible permutations. Now I was sure that he was
wrong about this and, as there’s only so much kneeling I can
do at the altar of mathematical economics, I told him to try
harder. He asked me to explain the conditions again and
then took me into his second study. Yes, it’s true:
economics is so important a discipline that its chair has to
have two connected offices, not just one like the rest of
us. No matter that they only have twelve majors. Now Myong
turned on the supercomputer, got the pure math software
warmed up and went back to work. Meanwhile I was thinking
that the math whiz got to use the computer with the fancy
software package while the idiot had to attack this problem
with a pencil and paper.
A few seconds later Myong told me that he had in fact jumped
the gun earlier and that the real answer was as follows:
12x64x12x63x12x62x12x61=3.162038e+11.
This password is very secure mathematically: as there are 12
possible icons (a black and white pawn, knight, bishop,
13
rook, queen and king) that can be placed on any of 64
squares on the board, the number of permutations is
therefore: 3.162038e+11.
It took me a while to recognize that Myong’s math answer
with its awkward letter and the numbers on my piece of paper
were miraculously the same: putting four chess pieces on a
chessboard generates over 316 billion permutations.
Instantly this became my new favorite number. As I then
explained the nascent project to Myong I was keenly aware
that any security system that generated 316 billion
permutations so easily might very well have a future.
Simple additions – such as multiple game choices and so on –
will take the base count into the trillions. The engine
behind the math in this example is multidimensionality: the
icons are stored not just in space but in a location, the
existence of which dramatically increases the number of
possibilities that a would-be hacker has to wade through.
The following week Ye reported back, saying that the idea
might have legs but we needed a psychological theory to back
it up. Looking back, his realization that we needed a
theory from the psychology of memory was a key moment in the
project. Even though I was resistant to contamination from a
cognate social science, I agreed to try to find an expert on
campus. That person turned out to be Conor McLennan. I
14
honestly believe that if we had not found Conor this project
would have gone nowhere. Ye’s hunch was correct:
psychologists with expertise in memory really do have
theories that affect how we should understand this
electrical engineering project. As I explained to Conor
what I understood about the project I could see that a light
bulb had gone off in his head. He told me that one of his
research interests was in the role of ‘interference’ and
‘neighborhood effects’. It turns out that psychologists
interested in memory and language issues are aware that we
easily confuse words that are close to other words; that is,
words that have many noisy neighbors. In the context of
research on passwords, this is an important insight because
most security systems require users to change passwords.
Here at CSU we have to do so every six months.
Interestingly, everyone knows the reason why the concept of
interference is important for password security: when we
have to choose a new password we often choose one that is
very similar to the old one. We therefore inflict the
problem of neighborhood effect or interference on ourselves
by choosing passwords that we are likely to mix up in the
future. Conor understood straightaway that what I was
proposing had merit because users could store different
passwords in different games in which there would be zero
interference. How can anyone confuse the Monopoly and
Chess examples I gave at the beginning of the paper? From
15
this, the title of the project, although a cliché, made
sense: we had a solution to cyber-security based on The Game
Changer. In our case this wasn’t a metaphor but a literal
description of what we were proposing.
Conor’s input was still, to use Thomas Kuhn’s term, ‘normal
science’. This means that what he pointed out was in
keeping with the ways that psychologists typically solve
puzzles in his disciplinary paradigm. What he suggested
next was, in my view, more important. He emphasized that
what was key about this approach, above and beyond
mathematical robustness and memorability, was fun. That is,
storing passwords on Monopoly boards can be fun and
creative. Remember the misery Homeland Security put me
through. Instead my password (or ‘iconic code’) could have
been ‘two houses on Park Ave, a shoe on GO and a community
chest card informing me that I had won third prize in a
beauty competition’. Fun, we came to realize, was not
ephemeral or cosmetic but a major advantage of our approach.
Ye’s technical ability and keen awareness of the viability
of this approach led to the successful submission of the NSF
grant and a provisional patent filed by CSU. Without his
initiatives this project would have remained at best a set
of loose ideas.
16
In the past few months we have been testing The Game Changer
using CSU students and High School participants. In the
future we hope to find out whether older populations who
might be less enthusiastic adopters of new technology find
our system useful. Initial findings are promising. At this
point it looks like 9 out of 10 test participants can
remember their iconic code on either a Chess or Monopoly
board well enough to store it in their long-term memory.
Most people can also enter their iconic code easily enough
on an iPad but the dexterity needed to move icons on a
Monopoly board on a smart phone is challenging. So we’ve
learned that not all games are equal and not all platforms
are equal. Had we tried this on the keypad on a home
security system I don’t think we would have had any trouble.
Early feedback from participants suggests that they found it
cool but worry that it’s not as mathematically secure as
their iPhone security. In this estimate, participants are
off in their informal calculations by more than 316 billion!
But is it Original?
I think that most people can accept that this approach to
cyber-security could be worth something. It is, after all,
a very simple idea that’s made robust by
multidimensionality. It’s also psychologically compelling
because of the absence of neighborhood effects due to game
changing and it’s also propped up by being a bit of a laugh.
17
But like most simple ideas, the suspicion is that even if
it’s not too good to be true, it must be too good to be
original. Hasn’t someone else already been there and done
that?
As far as I know, three research groups have tried something
similar. One used Go, another Snakes and Ladders and a third
a modified version of Chess. So, these three after the fact
discoveries were also three doses of potential bad news for
us. On closer inspection, none of these competitors
recognized the importance of either game changing or fun.
However, they all understood the importance of
multidimensionality.
A fourth case is much more interesting and because it is
also much more ambitious its future success could render The
Game Changer obsolete. I had been made aware of this fourth
approach from the very start, as Ye knew about a group of
computer scientists at Stanford who had their own quirky
approach to cyber-security. When I first read their work I
was struck by how creative they were and also by my own
prejudices against people whose skill sets are primarily
technical. The Stanford researchers stored passwords inside
the game ‘Guitar Hero’. For those of you who avoided this
short-lived craze, in ‘Guitar Hero’ people play a plastic
guitar while looking at a computer screen belting out
18
‘Stairway to Heaven’ or their own favorite track. The
computer screen also shows the player where to place his or
her fingers on the neck of the plastic guitar. The Stanford
group found a way of allowing a computer to recognize the
unique playing style of a ‘Guitar Hero’ fan. It works like
this: the user initially plays the game as the computer
monitors the playing style. After a while, the computer
announces: ‘Okay, I got it’. If that player returns a week
later, the computer can authenticate the user based on his
or her implicit, unconscious, playing style - in about
thirty minutes. They have published data suggesting they
can make this work. Now, although no-one apart from a 16
year old heavy metal freak is prepared to play Guitar Hero
for half an hour just so as to be able to check email, the
Stanford research group has to my mind established ‘proof of
principle’ that their approach works. It might therefore
only be a matter of time (ah, that’s a pun) before they or
someone else equally smart figures how to do this in three
seconds instead of thirty minutes.
What makes their approach so interesting is not just that
the password is stored in a game, if you consider ‘Guitar
Hero’ to be a game at all. What is so provocative is that
the Stanford group is proposing a cyber-security system in
which the users themselves employ a password without knowing
what their password is. If they ever succeed in a practical
19
way they will have solved two longstanding dilemmas in
cyber-security research: ‘rubber hosing’ and ‘shoulder
surfing’. Rubber hosing is the idea that some people know a
password that they really must never divulge. Perhaps they
hold the launch key for nuclear weapons. Even if they are
tortured – rubber hosed – they must never give up the
password. The Stanford group has an ingenious solution to
this problem: for example, even if captured by ISIS,
President Obama can never reveal the password to initiate
the launch code for our nuclear submarines because he really
doesn’t know what it is. In order to start World War III,
the President will have to play ‘Guitar Hero’ for half an
hour. However, I do detect at least one weakness in this
approach. ISIS intelligence might figure out that this is
the case and purchase ‘Guitar Hero’ from Nintendo and then
torture the President until he agrees to play ‘Stairway to
Heaven’ for half an hour. But, joking aside, I take the
proof of principle point that the Stanford group appear to
have something new and something that could be extended to a
great many practices.
The shoulder surfing problem is less dramatic but more
common. This is important because passwords are routinely
stolen by low-tech and not hi-tech means: by someone
watching people and writing down what they do. If any of us
today wanted to, for example, we could probably
20
surreptitiously watch someone enter an iPhone passcode. If,
later in the day, we could steal the phone we would have
become very low-tech cyber thieves.
Sociology and Specialized Knowledge
I want to finish this talk by returning to the question of
whether any of the foregoing discussion has anything to do
with sociology. To get traction with this, I want to make
some comments about the nature of sociology and about the
nature of science, most of which I draw from one of
sociology’s heavyweights, Max Weber.
Although he couldn’t have known so at the time, when Weber
gave his justly famous lecture on ‘Science as a Vocation’ in
the winter of 1917, the end of the Great War was not too far
off. For his audience who may very have expected the troops
to be home by Christmas of 1914, the end of the war could
likely not come soon enough. Weber eased his audience into
his discussion by contrasting the experiences of professors
in Germany and in the United States, although he did pause
at one moment to remind his audience of the rampant anti-
Semitism in Germany at large and in the universities in
particular. But then Weber focused on his main contentions:
science can only be advanced by people with a passion for
what they do. Further, just as politicians have to live for
politics and not off politics (as Weber said in a lecture
21
just after the end of the war), so scientists have to live
for science and not off it.
But the passion of a scientist is nevertheless value-free
and self-destructive. What Weber meant by this is that
whether scientists passionately conduct research about
either the natural or the social world, they must recognize
that their findings will inevitably be short-lived. In fact,
it is not just that these passionate scientists must
recognize that their contributions will soon be surpassed;
they must also welcome the defeat of their own ideas. For
example, in Weber’s day, naval military strategy was based
on a set of assumptions that were metaphorically and
literally sunk with the arrival of the Dreadnought – a new
kind of warship that rendered everything else obsolete.
Weber also pointed out that science leads to
‘disenchantment’. By this he meant that modern life makes
us aware of the omnipresence of calculation and this empties
the world of its magic. David Owen, an undergraduate
classmate of mine from the University of Durham, wrote
recently in a commentary on Weber that disenchantment makes
sense if we think of the phrase: ‘she’s got it down to a
science’. We use this to suggest that someone can reproduce
something successfully over and over again. For example, a
few years ago I had a heart procedure. I remember asking the
22
cardiologist if he performed this procedure often. He gave
me the answer I was looking for: ‘I do it about 500 times a
year’. He has it down to a science.
Weber then advocated specialization in science, stating very
clearly that greater and greater academic specialization was
inevitable. On the face of it, this is an easy claim for us
to accept. For example, for my cardiologist to have this one
procedure down to a science he cannot be performing a lot of
other heart procedures and he is also not making psychiatric
diagnoses and he is definitely not fixing cars. Or, a
historian who is an expert on the Great War may very well be
an expert on an aspect of the Great War rather than the
terrible event as a whole. And such a historian will not
likely be an expert on the Roman Empire or the history of
Cuba and so on. And in my neck of the woods, it is asking a
lot of a sociological theorist to be an expert on Marx,
Durkheim and Weber and that is before we mention other
interesting figures such as Sumner, Mead, Freud, Parsons,
Goffman, Foucault and so on. And to find a sociologist who
knows about all these great predecessors and is also up to
date on the latest quantitative methods, trends in urban
development and so on is ridiculous. That said, we do half
joke in my department that this is actually a relatively
accurate description of my colleague Jim Chriss’ areas of
research expertise.
23
But although it seems that Weber’s observation about
specialization and science is obviously true, I think that
the matter is more complicated. Ironically, Weber himself
is evidence against his own assertion. At different times
in his career he appeared to be a lawyer, an economist and a
sociologist. In terms of his research interests, he might
fairly be described in an entirely different way as a
specialist in comparative religion. Fast forward to today
and many of our leading researchers in the humanities and
social sciences are similarly very hard to pin down
departmentally. Think of Martha Nussbaum, Richard Rorty,
Quentin Skinner or Michel Foucault.
The choice of these examples might lead you to suspect that
the social sciences are in disarray. That might be true but,
if anything, the situation in the natural sciences is more
contradictory. Since I’ve already used my wife as an
example of the payoffs of multidisciplinary work, let me use
her experiences again. Two years ago Maria was a Professor
of Nutrition. This year she is a Professor of Pharmacology.
Next year she has accepted a position as a Professor of
Genetics. In the mean time she has turned down a very
senior position in a research center conducting liver
research. She also declined a separate offer in a research
24
center studying degenerative eye disease. The last position
she didn’t apply for; they just offered it her anyway.
So how can it be that such an intuitive idea as Weber’s,
suggesting that science requires specialization, can be so
difficult to demonstrate in practice? Or why is it that when
at CSU the occasional tenure track position opens up,
departments are usually completely unwilling to consider
anyone outside of their narrow specialization?
As an undergraduate I read Jeffrey Bergner’s The Origins of
Formalism in Modern Social Science. After a thirty-year
hiatus I’m drawn back to this slim book. I think his take-
home message is that sociology as Durkheim conceived it to
be does not exist. That is, there is not a special social
reality for sociologists to study and there are no methods
for sociologists to monopolize. Rather, sociology, just
like every other social science discipline (and academic
History as well) has to study the same ‘total social-
political-economic-historical reality’. Further,
sociologists can study this reality from a variety of
perspectives – all of which are available to all other
social scientists to use as they see fit.
Bergner is therefore suggesting that the current
configuration of social sciences and history is artificial.
25
Ironically, this book began life as a Princeton PhD and
therefore should have positioned Bergner for a top academic
job. After he graduated he did work in universities for a
short while, in what departments I’m not sure, before
becoming what seems to me to be a Machiavellian figure in
the backrooms of Washington political circles. So perhaps
he was a better observer than practitioner of the social
sciences. Interestingly, what Bergner claims for the social
sciences and history might already be established practice
for the natural sciences – an argument he chose not to make.
So what I’m left with is the idea that although there will
be increasingly technical specializations and increasingly
technical specialists, we should recognize that
breakthroughs need more than just specializations. There
will always be experts to translate Ancient Greek for us, to
perform surgical procedures, to do mathematical modeling and
so on. We can get these things down to a science. But above
and beyond these specialized areas of expertise, there will
be problems and proposed solutions that cross all known and
all artificial boundaries. These problems exist and are as
yet unsolved precisely because we haven’t got them down to a
science. We can only pursue them with a passion and with a
sense of excitement and humor – as I’ve tried weakly to
demonstrate here. We must also accept gracefully that our
proposed solutions are only one small conceptual or
26
technological revolution away from obsolescence. In
striving to solve these problems – whether they concern
cyber-security, Weber’s sociology, the architecture of
memory, naval military strategy or Huntington’s disease, no-
one in his or her right mind will care what academic
discipline you temporarily and artificially claim as your
own. All that remains is a passion to solve the problem and
the honesty to recognize the superiority of rival solutions.
This honesty is part of what Max Weber understood by the
necessity of value-freedom in social science. In a modern
phrase, value-freedom is the commitment to let the chips
fall where they will and then honestly report the result.
What I’ve tried to do today is to show you how and why I had
fun trying to solve an aspect of the cyber-security problem.
Fun or no fun the project nevertheless required normal
science - the technical know-how of software engineers,
statisticians and others to make it real. The kicker though
is that university professors must live for science and not
off science, as Weber put it. Our job is not to make a
value-laden appeal about the importance of ‘our’ commodity
over and above another commodity. The fate of the Game
Changer password model described here is no different from
the fate of every other scientific product: it will be
surpassed by better solutions – and maybe the whacky Guitar
Hero approach out of Stanford is that better solution. Our
27
responsibility as scientists is to stand at the door and
welcome in the people who will render us obsolete. If we
understand this and internalize it, we have grasped the key
characteristic of the ‘value-sphere’ or ‘life-order’ of the
university.
However, it is obvious that the commodification of the
university has passed the point of no return. Stouffer did
not cause this to happen when he took a lot of Government
money to produce surveys about the attitudes of soldiers but
– for sociology at least – that was a fork in the road.
Stouffer died before his time in a car crash in 1960. The
sociologists who continued his work in military sociology -
such as Morris Janowitz at the University of Chicago - were
later judged harshly by the radical students of the 1960s
and 1970s. On one occasion, they even burned an effigy of
him outside of his office. I doubt that they did this in an
attempt to promote value-free research. Rather, they
preferred their own value-laden research to that of
Janowitz.
The clash between value-free and value-laden research has
since produced many more forks in the road. The task as I
see it is for faculty is to continue to practice both normal
and revolutionary science: to manufacture luck and thereby
to produce revolutionary science that can be confirmed or
28
disconfirmed by normal scientific means. Their vocation as
professors requires them to let the chips fall where they
may – and to do so happily. The task as I see it is for
administrators is to build an internal university firewall
between science and money. External pressures will make this
difficult for them, as will their own ambitions and salary
aspirations. The ambition of professors as professors2 on
one side of the firewall is to see their ideas replaced by
better ideas. On the other side of the firewall we see
concerns about grant dollars and enrollment trends. If the
firewall collapses, University Incorporated awaits us. Put
in Weber’s terms, the traditional value-sphere of the idea
of the university requires value-freedom. By contrast,
actual universities require money. Those universities that
don’t have enough money won’t be able to sustain the
firewall and the external demands on the university will
overpower its traditional value-free aspirations.
About 6500 words
2 Of course professors don’t have to act as professors. Manyyears ago I remember asking someone what his research was about. He told me it was about $3 million.
29