[ A B C D E F G H I L M N O P R S T U W

[4] The Four Rules

The Four Rules is a version of [4] The Quad frame — the fourth systems shape of Semantic Ontology Framework (SOF). The Four Rules outline a sequence of principles — each applied to a specific step in the growth cycle of the Quad — that should govern the management of human systems.

Rules

The Four Rules should be applied in sequence — each corresponding to a step in the growth cycle represented by the Quad — as follows:

  1. People over systems: Always make room and empower people to allow their human capacity and sovereignty to emerge.
  2. Respect the system, but don’t get entangled: Respect and acknowledge the tension in the system, but use it creatively and collaboratively to grow new potential.
  3. Create simple, shareable, revelatory improvements: Distill contributions for mobility with a core of human identity and wrap it in something tasty and beneficial. Design [3] Seed-Change that catalyses sea-change.
  4. Invest your change as broadly as possible: Spread the fruit of your contribution as far as possible with as few barriers as possible and expect it to evolve as it takes root and grows in new places.

Media

Show a gallery of the available media for this frame.

In this video, Ben Cheek explains The Four Rules of the Hacking as a paradigm for Jesus’ own ethic and how it can lay a foundation for a shift in paradigm for leaders challenged by the current crisis of complexity.

Meta

Origin

The Four Rules were developed based on The Hacker Ethic, adapted by Chris Castiglione from the earlier 1984 book Hackers by Steve Levy. Steve Levy’s book contains 6 tenents of a “hacker ethic” that Castiglione condensed into four.

The Four Rules, which eventually gave rise to [4] The Quad, were first articulated in the ebook Squared and the conference talk “Vision Can Do Anything” by Ben Cheek in 2012 when he was part of the GoAheadLaunch start-up consultancy. During the research and writing for the book, a strong correlation was discovered between the four rules of The Hacker Ethic and the ethical teachings and demonstrations of Jesus.

Related Entries