Home / Blogs

Keys to Successful Collaboration and Solving Wicked Internet Problems

Leslie Daigle

Co-authored by Leslie Daigle, Konstantinos Komaitis, and Phil Roberts.

The incredible pace of change of the Internet — from research laboratory inception to global telecommunication necessity — is due to the continuing pursuit, development and deployment of technology and practices adopted to make the Internet better. This has required continuous attention to a wide variety of problems ranging from "simple" to so-called "wicked problems". Problems in the latter category have been addressed through collaboration. This post outlines key characteristics of successful collaboration activities (download PDF version).

Problem difficulty and solution approaches

Wikipedia offers a definition of "wicked problems” [accessed September 16, 2016]:

"A wicked problem is a problem that is difficult or impossible to solve because of incomplete, contradictory, and changing requirements that are often difficult to recognize. The use of the term "wicked" here has come to denote resistance to resolution, rather than evil [.] Moreover, because of complex interdependencies, the effort to solve one aspect of a wicked problem may reveal or create other problems."

Of course, not all large problems are wicked. As noted in the Internet Society's commentary on Collaborative Stewardship, sometimes an Internet problem has a known answer and the challenge is to foster awareness and uptake of that known solution.

Denning and Dunham characterize innovation challenges as simple, complex, or wicked [see Denning, Peter J. and Robert Dunham "The Innovator's Way – Essential Practices for Successful Innovation" page 315]. In the Internet context, the characteristics and approaches to addressing them can be summarized as follows:

TypeCharacteristicsSolution path
SimpleSolutions, or design approaches for solutions, are knownCooperation: Awareness-raising and information sharing — typically through Network Operator Groups
ComplexNo known solution exists, the problem spans multiple parts of the InternetConsensus: Open, consensus-based standards development
WickedNo solution exists in any domain, general lack of agreement on existence or characterization of the problemCollaboration: moving beyond existing domain and organization boundaries and set processes for determining problems and solutions

Why Internet problems are often wicked

First, it is important to understand that, today, the Internet is largely composed of private networks. Individual participants, corporations or otherwise, must have a valid business reason for the adoption of a certain technology or practice in their own network. This does not necessarily rise to the level of a quantifiable business case, but they have to have some valid reason that it helps them make something better in their own networks or experience of the Internet.

However, if the practice is a behavior on the network that is impacted by, or includes other networks, the participants must have a standard they agree to. This might be a protocol standard governing bits on the wire and the exchange of communication, or a common practice.

To get to that level of agreement, participants — whether private companies with financial stakes in the situation, or governments, or individuals — must be disposed and willing to collaborate with others to instantiate the adoption.

Addressing wicked Internet problems: Keys to successful collaboration

We identify here four important characteristics of collaborative activities that have driven the success and innovation of the Internet to date.

  1. There must be a unifying purpose. There can be any number of participants in a successful collaboration, and they can have a range of different perspectives on what a good outcome looks like, but the participants must be united in their desire for an outcome. The participants will have some shared sense of "good." It is likely that that sense of "good" will include something about collaboration itself. That is to say, the very act of collaborating to achieve an outcome will yield a better outcome than some other method.
  2. Involved participants are committed and focused. The experience of successful collaboration includes skillful contributions that move discussions and actions forward towards a desired outcome. These contributions are regular, consistent, and timely. In such an environment, distractions are discouraged. In order to move the work forward, exploring alternatives is necessary, but willful distractions are not acceptable.
  3. Forward action requires crossing boundaries and changing practices. Collaboration is more than the cooperation of individuals or organizations contributing their existing expertise. It ultimately requires action that reaches beyond traditional boundaries and/or creation of new processes. Competitors cooperate. New ground is explored.
  4. A successful outcome is measured in terms that are broader than individual gain. There is a desired "good" toward which people are collaborating. That "good" can be something grand and exciting for everyone, or can be some outcome that is the "least bad." Yet, this is measured across a broad range of participants, rather than from the point-of-view of any single individual. Participants accept that the outcome may not reflect any immediate advances for their own activities.


The Internet has a long history of successful innovation through broad-based collaboration. As the Internet has grown continuing the same kind of collaboration has become more challenging. And yet, innovation happens, and collaboration continues. But, while invention of new technologies is often a key part of innovation, sometimes it is about practice, and in all cases it includes widespread use of technology and practice in the broad Internet community.

This only comes through collaboration and those characteristics that can ensure building a better Internet.

This post was originally published here by Leslie Daigle, Konstantinos Komaitis, and Phil Roberts.

By Leslie Daigle, Principal, ThinkingCat Enterprises and Editor, InternetImpossible. More blog posts from Leslie Daigle can also be read here.

Related topics: Internet Governance, Networks, Policy & Regulation


Don't miss a thing – get the Weekly Wrap delivered to your inbox.


To post comments, please login or create an account.

Related Blogs

Related News

Explore Topics

Dig Deeper

DNS Security

Sponsored by Afilias

Mobile Internet

Sponsored by Afilias Mobile & Web Services


Sponsored by Verisign

IP Addressing

Sponsored by Avenue4 LLC

Promoted Posts

Buying or Selling IPv4 Addresses?

ACCELR/8 is a transformative IPv4 market solution developed by industry veterans Marc Lindsey and Janine Goodman that enables organizations buying or selling blocks as small as /20s to keep pace with the evolving demands of the market by applying processes that have delivered value for many of the largest market participants. more»

Industry Updates – Sponsored Posts

Attacks Decrease by 23 Precent in 1st Quarter While Peak Attack Sizes Increase: DDoS Trends Report

Leading Internet Associations Strengthen Cooperation

i2Coalition to Present Tucows CEO Elliot Noss With Internet Community Leadership Award

Michele Neylon Appointed Chair Elect of i2Coalition

2016 U.S. Election: An Internet Forecast

MarkMonitor Supports Brand Holders' Efforts Regarding .Feedback Registry

Verisign Releases Q2 2016 DDoS Trends Report - Layer 7 DDoS Attacks a Growing Trend

Verisign Q1 2016 DDoS Trends: Attack Activity Increases 111 Percent Year Over Year

Mobile Web Intelligence Report: Bots and Crawlers May Represent up to 50% of Web Traffic

Dyn Weighs In On Whois

Season's Greetings - 2015 End of Year Message from DotConnectAfrica

Data Volumes and Network Stress to Be Top IoT Concerns

Verisign Mitigates More Attack Activity in Q3 2015 Than Any Other Quarter During Last Two Years

"The Market Has No Morality" Sophia Bekele Speaks on Business Ethics and Accountability

Dyn Evolves Internet Performance Space with Launch of Internet Intelligence

Dyn Comments on ICG Proposal for IANA Transition

Verisign's Q2'15 DDoS Trends: DDoS for Bitcoin Increasingly Targets Financial Industry

Protect Your Network From BYOD Malware Threats With The Verisign DNS Firewall

DotConnectAfrica on "CONNECTing the Dots: Options for Future Action" at UNESCO, Paris

IBCA Presentation to ICANN GAC on Protection of Geographic Names in New gTLDs