Named by Inc. magazine as one of the 10 Best Business Books of 2018 Every startup wants to change the world. But the ones that truly make an impact know something the others don't: how to make government and regulation work for them. As startups use technology to shape the way we live, work, and learn, they're taking on challenges in sectors like healthcare, infrastructure, and education, where failure is far more consequential than a humorous chat with Siri or the wrong package on your doorstep. These startups inevitably have to face governments responsible for protecting citizens through regulation. Love it or hate it, we're entering the next era of the digital revolution: the Regulatory Era. The big winners in this era--in terms of both impact and financial return--will need skills they won't teach you in business school or most startup incubators: how to scale a business in an industry deeply intertwined with government. Here, for the first time, is the playbook on how to win the regulatory era. "Regulatory hacking" doesn't mean "cutting through red tape"; it's really about finding a creative, strategic approach to navigating complex markets. Evan Burfield is the cofounder of 1776, a Washington, DC-based venture capital firm and incubator specializing in regulated industries. Burfield has coached startups on how to understand, adapt to, and influence government regulation. Now, in Regulatory Hacking, he draws on that expertise and real startup success stories to show you how to do the same. For instance, you'll learn how... * AirBnB rallied a grassroots movement to vote No on San Francisco's Prop F, which would have restricted its business in the city. * HopSkipDrive overcame safety concerns about its kids' ridesharing service by working with state government to build trust into its platform. * 23andMe survived the FDA's order to stop selling its genetic testing kits by building trusted relationships with scientists who could influence the federal regulatory community. Through fascinating case studies and interviews with startup founders, Burfield shows you how to build a compelling narrative for your startup, use it to build a grassroots movement to impact regulation, and develop influence to overcome entrenched relationships between incumbents and governments. These are just some of the tools in the book that you'll need to win the next frontier of innovation.
... cyberattacks and espionage on one hand and cyber influence operations on the other hand, where the latter constitutes contentbased security threats that involve exploitation of the digital realm in order to influence human cognition ...
This volume assembles legal experts from diverse fields to examine the role of law in facilitating or impeding entrepreneurial action.
The International Bill of Rights effectively forms the ethical and legal foundation of the developing system of international human rights: R. K. M. Smith, International Human Rights (Oxford University Press, 2007), p. 38.
... regulatory hacking”, see the website of 1776, which presents itself as “the Northeast Corridor's largest network of entrepreneurial incubators”: https:// www.1776.vc/regulatory-hacking/ (accessed November 13, 2018). 3 Airbnb has faced ...
... vulnerabilities and other unknowns, eventually all computer systems and applications will be hacked 1.indd 13 November 20, 20152:45 AM. 13. Chapter 1: Introduction to Ethical Hacking Policy considerations Compliance and regulatory concerns.
This book addresses 3 questions: is money a way to create a European Union identity? If so, which type of identity is this? And in what ways is the EU identity changing?
Evasive Entrepreneurs and the Future of Governance explores why evasive entrepreneurs are increasingly engaged in different forms of technological civil disobedience and also makes the case that we should accept—and often even embrace—a ...
The aim of this book is to understand the technological and business potential of the blockchain technology and to reflect on its legal challenges.
The term “hacker” was originally used to describe a person that could modify a computer to suit his or her own purposes. However, over time and owing to the confusion of the masses and consistent media abuse, the term hacker is now ...
This book offers broad evidence on how new information and communication technologies (ICT) impact social development and contribute to social welfare.