Club of Amsterdam, Future, Think Tank ..

Club of Amsterdam Journal
Free Subscription
click here

























































































































keyword search
Club of Amsterdam Journal, February 2006, Issue 63

The Club of Amsterdam Journal appears 2 x per month.
You can find the online version at:
February 2006, Issue 63
the future of
tell a friend.


March 1st, 2006


Health-related effects of Electromagnetic fields

Strategy Paper and Indicative Programme for Multi-Country Programmes in Asia 2005-2006
Acceleration Studies Foundation

Life Sciences Group IPTS

Entertainment Software Association

United Nations Economic and Social Commission for Western Asia - ESCWA

Smart Card Alliance


International Association for the Study of Insurance Economics



  .eID for business in Belgium


eID for business in Belgium

The citizen will receive his identity card from his municipality, which is electronically connected to the federal government, the approved societies and the certification authorities that participate to the eID project at various levels. The National register also plays a key part in the organization as well as in the surveillance of the system.

Objective of the eID
The implementation of the electronic identity card (eID) is part of an e-Government project in order to simplify the administration and to modernize the public services.

The electronic identity card allows the citizen to identify himself electronically from a distance and to dispose of a legally valuable electronic signature. The result is a quick and customer-oriented service which guarantees the security of the private data of the owner.

The appearance of those applications combined with the legal recognition of the electronic signature will rapidly and safely replace a part of the paper documents by their electronic equivalent.

Visible data
The electronic identity card has the same size as a bank card. The basic identity informations are visible (name, first name, gender, nationality, place and date of birth, signature, national number and period of validity of the card) and you will also find a photo of the bearer. These informations (picture included) are also electronically contained in the card. The address of the owner and two electronic certificates complete the information’s that are encrypted on the chip.

Electronic data
The chip of the electronic identity card contains the following information:
  • the same informations as the one that are visible on the card (including the picture)
  • the address of the card owner;
  • the identity and signature keys;
  • the identity and signature certificates;
  • the service provider of the certification;
  • the information necessary for the authentification of the card;
  • the information necessary for the for the protection of the electronically visible data that are encrypted on the card;
  • the information necessary for the use of the corresponding qualified certificates.
The standard digital certificates allow the citizens to make an electronic signature and to identify themselves when they perform electronic transactions. They are also valid for the different e-Gov applications and for a private use, like for example:
  • sending of electronic registered mail;
  • signed e-mails;
  • online signing of contracts;
  • authentification by web browsers (e-Banking, e-Contracting…)
Baring in mind that this list is not exhaustive, here some ideas of how to use the card:
  • At the counter
    At numerous counters, you have to verify the identity of the person first before you can manually introduce those data in a computer. Thanks to the eID, all this will be done automatically and without any error.
  • On-line contracts and "tele-statements"…
    At any time of the day and without leaving your home, you can complete and sign on-line forms, contracts, and documents. The automatic treatment of these forms simplifies the manual process and allows the drawing of new information and opportunities thanks to an electronically operated information.
  • Physical access control
    The authentification based on the eID offers a greater security access without generating supplementary compatibility problems and allows the use of a limited infrastructure investment.
  • On-line access control
    It is possible to control the access to website portals, websites for the exchange of files, Webmail, limited users collectivity, teleworking, fidelity programs, e-Commerce, tickets sale, and so on. In the SSL protocol, the eID card can be immediately used without any supplementary development.
Here are some more concrete examples of the eID card

  • Car and tool renting…
    The service on the counter is improving thanks to the acceleration of the administrative tasks.
  • Banks / Insurance companies
    Statements without having to move, information demands by using the eID, signing of standard contracts and opening of an account without having to go out, access control to make operations on accounts, simplification of the security measures used in telebanking…
  • Ticketing services
    On-line reservations are easier thanks to the identification of the inquirer.
  • Direct contact with the customers
    By putting new services on-line, you will benefit a direct contact with your clients, who are perfectly identified.
  • Telework
    Your employees can do telework without needing important technological security investments.


.Knowledge based Risk Management

Summit for the Future on Risk May 3-5, 2006

Interdisciplinary Stream:
Knowledge based Risk Management

What are the disciplines that specifically address risk and uncertainty? ... actuarial sciences, contract law, evidence based decision making, strategic management, project management, program management, portfolio management, .... How widely are they applied in specific categories of risk? and what is their scope of application? How will this change in the future? How will they evolve ... What new disciplines will emerge? Will old ones applied in new ways? Will the scope of application expand?

Kalle Kähkönen, Chief Research Scientist, Technical Research Centre of Finland, (VTT)

Fundamental Enablers for Wide-Scope Risk and Opportunity Management

We are still pioneering in the area of project risk management. The discipline of project risk management is under continuous development and it is only gradually finding its role and position within other managerial work.

This presentation shall provide a discussion on the main body of risk and opportunity management pinpointing several shortcomings and proposing improvements. In particular, localised risk and opportunity definitions, holistic paradigm for wide-scope risk and opportunity management together with the core process where focus is on risk and opportunity identification are presented as new contributions.

Marc Vollenweider, President & CEO, Evalueserve
Global Risk Management by using Data Analytics and Business Research

Global market and product risks represent a large part of today’s companies’ total risk exposure. Ever shorter product development cycles and an increasingly global competitive environment require continuous monitoring of markets, products and technologies. Quickly changing customer behaviours and shorter product lifecycles force companies to react ever more quickly to competitive threats. A good example of this is how Skype’s P2P VoiP solutions revolutionized the global telecom markets. By using advanced analytics of company-internal data and external market dynamics, companies can significantly reduce their exposure.

Moderated by Simon Jones, Director, HCS, University of Amsterdam, Advisory Board, Club of Amsterdam

.Club of Amsterdam blog

Club of Amsterdam blog

February 24: Russian Prospects - political and economic scenarios
January 04: How now wit! Whither wander you?

  .News about the future of Electronic Identity
Dick Hardt founded Sxip

Sxip Identity

Sxip Identity is building simple, secure, and open Identity 2.0 solutions for the Web.

Sxip Access: On-Demand Identity Management
As critical customer data moves beyond your firewall, control over access and usage should not. The unique provisioning and single sign-on capabilities of Sxip Access extend the security and manageability of your corporate network to your hosted application.

SXIP: Enabling Authentic Internet Identities
SXIP - the Simple, eXtensible Identity Protocol is the power behind Identity 2.0. SXIP is a simple mechanism that gives users control over their online identities and provides websites with the ability to construct rich user-centric relationships.


Smart University

“Smart University” (2nd edition) is an educational programme dedicated to advanced technologies of Smart Card, e-ID and AmI. Successfully launched in 2005 “Smart University” relies on a strong academic background provided by its 15 partner European Universities. This approach is completed by cases and live testimonials from R&D labs and industry researchers that focus on the newest developments of technologies…

  .News about the Future

Sugars to make polylactic acid
NatureWorks produces and sells a renewable-resource-based resin derived entirely from the sugar found in common field maize (corn).

QDC's PET bottles can be custom molded to provide the size or shape. With its clarity and its ability to project no odor and no taste, QDC's PET bottle is the perfect compliment to water, juice, and even milk

Called “CornCard USA” by Arthur Blank & Co., the card itself can be composted, incinerated and mechanically recycled in industrial facilities. This new corn-based card can be used in the same applications as the more traditional petroleum-based counterparts.



Financial Times series on "mastering risk"

A delicate balance between risk and reward
By Eamonn Kelly and Steve Weber

Is risk bad for business? In the uncertain, complex and volatile environment of 2005, it no doubt seems to many executives to be so. Risk is something to be managed, reduced, hedged or sold to others. But it is worth recalling that the original concept of risk, derived from early European seafaring adventurism, contained a powerful sense of opportunity and reward as well as downside and danger.

We believe that, in the future, winning businesses will be those that are best able to balance coping strategies, which are defensive and focused on avoiding downside risks, with an increasing mix of exploitation and exploration strategies, which embrace risk and make the most of the opportunities it presents. This will require more than just continuous improvement in traditional risk management tools - it will also involve a shift in mindset and focus.


..Next Event: Wednesday, March 1st, 16:30-19:15

the future of Electronic Identity
its impact and benefits for the individual and business

Wednesday, March 1st, 2006
Registration: 16:00-16:30, Conference: 16:30-19:15
Where: Syntens, De Ruyterkade 5, 1013 AA Amsterdam [Building of the Chamber of Commerce]

Jan Willem Broekema, Programme Manager, Open Source Software programme OSOSS, National Co-ordinator Open Standards:
ID by Law - Is the European Directive valid in 10 years?

Dennis van Ham
, Consultant, Information Risk Management, KPMG:

Electronic identity: are you (proven) in control?

Marcel van Beek, Program Manager, Passenger Process, Amsterdam Airport Schiphol:
The new self service airport and the role of electronic identity

and our Moderator
Homme Heida, Promedia, Member of the Club of Amsterdam Round Table

.Summit for the Future blog

Summit for the Future blog

February 22: Is the Asian upswing a threat?
February 22: Healthcare Issues

February 15: The Rise of Spirituality
February 07: Release the power of cultural diversity in international business

.Recommended Book

Knowledge Management Tools and Techniques : Practitioners and Experts Evaluate KM Solutions
by Madanmohan Rao

Knowledge management (KM) - or the practice of using information and collaboration technologies and processes to capture organizational learning and thereby improve business performance - is becoming one of the key disciplines in management, especially in large companies. Many books, magazines, conferences, vendors, consultancies, Web sites, online communities and email lists have been formed around this concept.

This practical book focuses on the vast offerings of KM solutionstechnology, content, and services. The focus is not on technology details, but on how KM and IT practitioners actually use KM tools and techniques. Over twenty case studies describe the real story of choosing and implementing various KM tools and techniques, and experts analyse the trends in the evolution of these technologies and tools, along with opportunities and challenges facing companies harnessing them. Lessons from successes and failures are drawn, along with roadmaps for companies beginning or expanding their KM practice.

The introductory chapter presents a taxonomy of KM tools, identifies IT implications of KM practices, highlights lessons learned, and provides tips and recommendations for companies using these tools. Relevant literature on KM practices and key findings of market research groups and industry consortia such as IDC, Gartner and APQC, are presented.

The majority of the book is devoted to case studies, featuring clients and vendors along the entire spectrum of solutions: hardware (e.g. handheld/wearable devices), software (e.g. analytics, collaboration, document management) and content (e.g. newsfeeds, market research).

Each chapter is structured along the "8Cs" framework developed by the author: connectivity, content, community, commerce, community, capacity, culture, cooperation and capital. In other words, each chapter addresses how appropriate KM tools and technologies help a company on specific fronts such as fostering adequate employee access to knowledge bodies, user-friendly work-oriented content, communities of practice, a culture of knowledge, learning capacity, a spirit of cooperation, commercial and other incentives, and carefully measured capital investments and returns. Vendor history, product/service offerings, implementation details, client testimonials, ROI reports, and future trends are highlighted.

Madanmohan Rao is a speaker about Media & Entertainment at the Summit for the Future on Risk, May 3-5, 2006



Hydropolis in Dubai is the world's first luxury underwater hotel.

In order to enter this surreal space, visitors will begin at the land station. This 120m woven, semicircular cylinder will arch over a multi-storey building.

"We want to create the first ever faculty for marine architecture because I believe that the future lies in the sea, including the future of city planning. I am certain that one day a whole city will be built in the sea. Our aim is to lay the first mosaic by colonising the sea."

Architect Hauser plans to incorporate many different elements associated with the sea. He views his creation as a place where those who do not dive - or do not even swim - can experience the tranquillity and inspiration of the underwater world.


Don't Stop
Business Innovation Conference in Copenhagen on 15 March 2006.

Copenhagen Institute for Futures Studies (CIFS) presents some of the worlds most innovative thinkers. They are the creators of the ideas that will shape the future of our society and your business. And they all have successful experience implementing them – in Shell, IKEA, Coca-Cola, IBM, PlayStation, Apple, UK Cabinet Office, etc. If you’re looking for the winning ideas of tomorrow, be part of this unique international event and experience how these masters of the Creative Class think. Be inspired by their knowledge and ideas and feel the transformation power. Meet Arie de Geus, Adam Morgan, John Grant, Geoff Mulgan, and CIFS on this event.
Members of the Club of Amsterdam get a discount of 25%!


Brian Tracy about Maximum Achievement

One of the most popular professional speakers from the US is coming to The Netherlands on April 27th. Brian Tracy is the world's leading authority on personal and business success. He had written more books, formulated more specific training programs and impacted more people in the corporate and entrepreneurial world than probably any other respected author, lecturer or peak performance expert. In Amersfoort he will speak about achieving more results, strategies and habits of high performers and Leadership.

.Club of Amsterdam Agenda

printable version.

Our Season Events are Wednesdays 16:30!

16:00-16:30 Registration
16:30-17:45 Part I: Presentations
17:45-18:15 Break: Drinks
18:15-19:15 Part II: Discussion

.Club of Amsterdam Season Events 2005/2006

the future of

March 1
Electronic Identity - its impact and benefits for the individual and business
March 29
Governance - participatory democracy
April 26
Drugs - Pharma
May 31
Reputation Management - Reputation is a new currency
June 28
Journalism - Ethics in Journalism

.. .

.Club of Amsterdam Open Business Club

Club of Amsterdam Open Business Club
Are you interested in networking, sharing visions, ideas about your future, the future of your industry, society, discussing issues, which are relevant for yourself as well as for the 'global' community? The future starts now - join our online platform ...:
Including the very latest Skype client Version 2.0 for download

CIWI - Creative Minds Worldwide
CIWI Club of Amsterdam Forum


Your comments, ideas are welcome!
Please write to Felix Bopp, Editor-in-Chief:

.Subscribe & Unsubscribe


To unsubscribe:



Copyright © 2002-2006, Club of Amsterdam. All rights reserved.

Copyright © 2002-2018 Club of Amsterdam. All rights reserved.    Contact     Privacy statement    Cancellation Policy