<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Peaceful Governance Institute]]></title><description><![CDATA[Peaceful Governance Institute prevents and mitigates violence in the U.S. and abroad. Free access to reports, tips and guidance, working papers, and more. Gain insights into ending conflict.]]></description><link>https://substack.peacegov.org</link><image><url>https://substackcdn.com/image/fetch/$s_!b2g-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355110d5-45a4-4eb2-bb73-95a00339a0c1_500x500.png</url><title>Peaceful Governance Institute</title><link>https://substack.peacegov.org</link></image><generator>Substack</generator><lastBuildDate>Tue, 21 Apr 2026 01:40:05 GMT</lastBuildDate><atom:link href="https://substack.peacegov.org/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Peaceful Governance Institute]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[peacegov@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[peacegov@substack.com]]></itunes:email><itunes:name><![CDATA[Edward Uechi]]></itunes:name></itunes:owner><itunes:author><![CDATA[Edward Uechi]]></itunes:author><googleplay:owner><![CDATA[peacegov@substack.com]]></googleplay:owner><googleplay:email><![CDATA[peacegov@substack.com]]></googleplay:email><googleplay:author><![CDATA[Edward Uechi]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[Managing Information for Accurate and Timely Decisions]]></title><description><![CDATA[Should AI be used or is there another method?]]></description><link>https://substack.peacegov.org/p/managing-information-accurate-timely-decisions-should-ai-be-used</link><guid isPermaLink="false">https://substack.peacegov.org/p/managing-information-accurate-timely-decisions-should-ai-be-used</guid><dc:creator><![CDATA[Edward Uechi]]></dc:creator><pubDate>Mon, 23 Mar 2026 10:03:31 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!b2g-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355110d5-45a4-4eb2-bb73-95a00339a0c1_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This essay offers a practical tip in the information management area within good governance. It is part of the monthly series on strengthening governance in private companies, non-profit organizations, and public institutions.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/p/managing-information-accurate-timely-decisions-should-ai-be-used?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/p/managing-information-accurate-timely-decisions-should-ai-be-used?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><blockquote><p>&#8220;Acquiring and using information is a cornerstone of economic activity. In order to channel resources to their most productive ends, needs and capabilities must be identified.&#8221;[1]</p></blockquote><p>Any organization, whether it&#8217;s a small business, a community center, or a public institution, needs information (data more precisely) to make accurate decisions. Without information, an organization may make a mistake or fail to reach its goals. How will the manager know how much to produce? How many customers should be served? How many dollars need to be spent and received? Answering these questions necessitate gathering and analyzing information. Collecting information is just an important task in business as it is with managing financial transactions and hiring employees.</p><p>As with anything else in business, information has a cost. Purchasing a mailing list has a certain price. Tools to manage and analyze data come with various prices. Cloud computing or a computer server has a cost to store and process data. Even without modern conveniences provided by the Internet, managing records on paper by hand with pencil and calculator has a cost involved. Time itself adds to expenditures in terms of the level of effort necessary to collect, review, and catalog information.</p><p>Given information&#8217;s relative importance in business and in decision-making, how can an organization control its expenses in obtaining and processing information? Are there practical strategies to minimize information collection without sacrificing quality? Does an organization need to acquire all available data?</p><p>A casual observer might say information management is cheap and even free. One can download and use all sorts of software apps for little to no cost. Another can subscribe to free web services. None of these options are actually free. It may appear to be free to the user. But, in fact, costs are borne by the software developer or service provider. Using freeware and shareware software applications and the risks they bring is a whole separate topic for another essay. For now, I will offer the common refrain, &#8220;Buyer beware,&#8221; which remains even more relevant today with modern information and communication technologies.</p><p>In the drive to develop artificial intelligence (AI) to a level that matches human thinking capability, tech companies have based their data models on grabbing whatever information is available on the World Wide Web, regardless of whether the information is a fact, an opinion, or a lie. Data are indiscriminately being gathered and stored like a vacuum cleaner sucks up dust and debris. OpenAI, the developer of ChatGPT, asserts that the performance of language models can improve by adding more data by the billions. Software engineers tested OpenAI&#8217;s assertion with a data model comprising 1 billion parameters over a collection of 20.3 million documents containing 16.2 billion words.[2] It&#8217;s amazing how technology has evolved. The latest feats in computing, nevertheless, don&#8217;t resolve the fundamental question on whether the generated output is true or relevant.</p><p>In my own research, I explored the history of data analysis and was struck by the insight of John Tukey, a renowned statistician. Tukey reminds us that statistics is one facet of data analysis and that statistics should be used as a basis to form a judgment, not to validate a proposition.[3] Data analysis is a scientific discipline that requires a rigorous inquiry into the problem at hand.</p><p>Users of information technology (IT) and AI especially need to be wary about the software that they&#8217;re using to make forecasts and decisions. A person can do immediate checks by corroborating computer results with other sources. Utter reliance on AI output could lead to pursing a wrong path, purchasing a faulty product, issues that negatively impact personal well-being, or perhaps war. One study created a provocative fictional story in which the U.S. and China relied on a stream of outputs from their AI systems, and the results had led both countries to launch nuclear missiles against each other.[4] The authors of the study showed how generated outputs could not present the real reason behind each state&#8217;s actions. What was missing in the output was the context of what was really happening on the ground. Leaders in the war game scenario had made a grave decision based on a false narrative that failed to bring all the data points together into a coherent whole.</p><p>Despite its technical limitations, AI will be used for better or worse. I remain optimistic that AI will reach maturity. Chatbots, in their present form, communicate like adolescents. They still have much to learn, indeed.</p><p>In terms of business application, there&#8217;s a better alternative. Advanced IT systems with data analytical tools[5] exist that will enable companies to process their production data to create efficiencies in how they manufacture their products. What is more important is choosing the right kind of information to enter into the IT system. Companies themselves have a wealth of internal information in their offices and production facilities. The emphasis here is on using <em>internal</em>, proprietary data as the input in IT systems. Organizations don&#8217;t need to rely on an open-source system where much of its external information is questionable. A private system containing the organization&#8217;s proprietary data will ensure that managers receive valid results.</p><p>While adoption of information technology had risen dramatically from 2005 to 2010, Brynjolfsson and McElheran found that the adoption rate was uneven across the manufacturing sector with 70% of manufacturing plants choosing not to adopt.[6] Study results indicate that non-adopters tend to be those companies where leaders play a more hands-on role in production activities and the tenure of managers is longer.[7] The study suggests that the decision to use advanced IT systems is largely dependent on the size of the company. Large producers are likely to adopt while small producers are not. This difference would correlate with a firm&#8217;s ability to invest in information technology. Small companies may neither have the cash to purchase computer hardware and software nor have the expertise to use such equipment.</p><p>Organizations can find other avenues and develop methods to analyze their data without being heavily reliant on information technology. To start: leaders can utilize the talents of their employees who have expert knowledge or years of experience. Organizations have already invested in <em>natural </em>intelligence by employing people. Workers have the brain power to understand the operating environment, troubleshoot whenever something goes wrong, and make necessary corrections. Workers are available resources to process internal information.</p><p>Crawford and Sobel developed a seminal paper on how information can be collected and transmitted between two parties, a principal and an agent. Numerous studies were produced in the literature to explore and extend Crawford and Sobel&#8217;s concept of strategic communication. The core question is in deciding how much information to send to a decision-maker. Crawford and Sobel&#8217;s contribution was in finding that communication can proceed when the goals of both parties are closely related.[8] In an organization, the manager&#8217;s and worker&#8217;s interests would be aligned. An external partner who contracts with an organization would have shared goals with the organization. In these two cases, there would be an incentive to communicate and transfer information. Shared or similar goals or interests among internal and external parties forms the bedrock for knowledge sharing and information transfer.</p><p>The literature suggests that there are three general avenues for collecting information for decision-making purposes.[9] It could be centralized where the principal (a corporate leader or a single organization) collects all information and makes a decision. Centralization of all efforts could be time consuming for the principal. In another avenue, the principal can delegate all work including the decision to an agent. Delegating all efforts to another person or entity might be less expensive but poses high risk in depending on someone else to make critical decisions. The third avenue divides the task of information collection to an agent and the decision-making task to the principal. In this last approach, the leader would wait a certain period for his expert to analyze acquired information. Once the expert sends her analysis to the leader, the leader will decide on a particular action based on the expert&#8217;s results. One can see that most organizations would employ the third avenue for information collection and decision-making.</p><p>Studies examined how the different avenues play out to achieve equilibrium or an optimal environment. One study considers the factor of time to determine the effect of making a decision early or later in the process. Grenadier and his team found differing effects from the perspective of an agent in that an early decision is beneficial under delegation and a later decision is optimal under centralization.[10]  Argenziano and her team found that a decision (made by the principal) may be more precise when advice is provided by an expert (the agent), regardless of the amount of acquired information.[11] Argenziano&#8217;s conclusion suggests that collecting more information may not be necessary. Less information may be sufficient, so long as it is valid. It&#8217;s assumed that the expert would only acquire just enough information as needed to provide credible and justifiable recommendations. It is clear from the literature that an agent carries weight and influence to provide advice to a principal.</p><p>The burden of data acquisition and analysis is placed on an agent. Just how much data should be collected? A better question to ask is how can all the collected information be reviewed and analyzed quickly?</p><p>Mandler examined a method by organizing data in less fine (more coarse) categories.[12] His method reduces complex information down to manageable chunks (binary categories), which would allow a person to make a quick decision. Instead of reviewing many solutions in great detail, one can generalize solutions into a smaller set of broad scenarios. An implication of such an approach is in cost savings. Evaluating the former approach would entail a higher cost, additional time, and more information in comparison to the latter approach. Some degree of precision may be lost in generalizing categories, but the same objective and intent would still be achieved. Mandler&#8217;s method implies less information can be collected.</p><p>The idea of drilling down complexity to binary categories may facilitate work for analysts to quickly weigh the pros and cons of competing priorities. Mandler&#8217;s method may be useful in a government agency where analysts are constrained by time to evaluate multiple policy options. Each option or priority would be equally time consuming to collect and analyze relevant data specific to each one.</p><p>The struggle to provide equal treatment to competing priorities is compounded by the interests of political leaders. Leadership may be biased toward one particular priority over another (building weapons versus providing health care, for example). And while a civil servant who conducts the analysis would evaluate each priority on its merits in a non-partisan manner, the civil servant still faces time pressure to complete an unbiased analysis. Patty examined this situation and found that when a political leader&#8217;s preferences are known, the civil servant will likely follow the leader&#8217;s prerogative and invest her time and energy in evaluating the leader&#8217;s preferred priority.[13] The other priority loses out. This is not to say that the least preferred priority would not be evaluated fairly. The civil servant would be driven to gather information that the leader cares about most. That means focusing on the leader&#8217;s preferences. Patty&#8217;s study shows that in the U.S. government it is the <em>process </em>to collect and analyze information related to a particular policy option that is politically motivated. The civil servant is <em>not </em>biased. It&#8217;s the process.</p><p>The civil servant performs her job to develop a credible case and deliver it to the leader. The leader can take the advice or ignore it. The civil servant has no control on what the leader ultimately decides.</p><p>In sum, various organizations from the public sector to the private sector have options to better manage and process their internal information for improved decision-making. If funding is available and capacity exists to use technology, an organization can invest in an advanced IT system with data analytical tools and the IT infrastructure that supports those tools. Leaders should carefully weigh the risks and opportunities if they intend to use an AI chatbot as the emerging technology remains relatively immature.[14] Unintended consequences may result when decisions are based solely on AI outputs.</p><p>With or without information technology, an organization still needs procedures and a methodology for how it manages information in general and conducts data analysis in particular. It could control the entire process internally or contract out to partners. Leaders need to develop a strategy and a protocol to ensure all parties understand their roles and when results of the analysis are needed to make timely decisions. Timing may be critical in certain situations where a decision must be made at a specific point in time.</p><p>In all instances of making decisions, the leader wants to be certain that his decision is based on credible information. It is not necessary to collect all available data, parts of which may be irrelevant or dubious. Data quality remains more important than data quantity. A few factual and authoritative documents would build a stronger case than an exhaustive compilation of unsubstantiated opinions. An organization can defer to staff members&#8217; expertise and experience to fill in any gaps and synthesize the limited collection of acquired information. A person remains involved in communicating recommendations to the leader, who in turn will decide on which recommendation to pursue.</p><p>While information technology can certainly play a role in information management, organizations should not discount the ability of the human operator. People still have roles to oversee the process and to make the actual decision. Human intelligence remains more capable than artificial intelligence in the areas of nuance, context, and synthesis.</p><h2>Evidence for Practice</h2><ul><li><p>AI chatbots are wholly inappropriate for complex, sophisticated decision-making where the results of critical decisions can have consequential impacts.</p></li><li><p>Involving people in a coordinated effort to collect, analyze, and report information remains crucial to good management practice.</p></li><li><p>Experts assigned to evaluate options for decision-makers can save time by limiting their information collection effort to a small and strategic set of credible data. Less information may produce meaningful and fruitful advice.</p></li></ul><h2>Next Steps for Leaders</h2><ul><li><p>Leaders should review their procedures and methods pertinent to information management, information collection, and data analysis. If data collection forms are long or complicated, consider revising the forms by simplifying or generalizing the questions and responses. Can the forms by shortened to obtain only what you need for your particular project or goal? Do staff and partners understand their roles and responsibilities to ensure the information process from collection to analysis runs smoothly? Will the decision-maker receive the results of the analysis in time to make a decision? Is it clear who makes the decision? Is it a machine or a human who decides on what action to take?</p></li><li><p>Leaders should analyze their operating environment to determine what&#8217;s the best and most suitable IT solution that will meet business needs and organizational objectives. All division managers should be consulted to get their input and secure their buy-in. Are there old and outdated IT systems that need to be upgraded? Would an enterprise wide IT system work across all divisions, or should each division have its own system? Do current employees have skills and abilities to use an advanced IT system with data analytical tools?</p></li></ul><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/p/managing-information-accurate-timely-decisions-should-ai-be-used?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/p/managing-information-accurate-timely-decisions-should-ai-be-used?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Open for Discussion</h3><p>How does your organization manage and analyze information? Are you using ChatGPT or some other AI chatbot to help you make decisions? Did you encounter any problems in the outputs? Feel free to submit your answers in the comment section. If you&#8217;re not comfortable sharing your experiences, you can talk to a specialist at Peaceful Governance Institute (PGI) in private; <a href="https://www.peacegov.org/contact/">click this link</a> to call the PGI hotline support.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/p/managing-information-accurate-timely-decisions-should-ai-be-used/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/p/managing-information-accurate-timely-decisions-should-ai-be-used/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.peacegov.org/contact/&quot;,&quot;text&quot;:&quot;Hotline Support&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.peacegov.org/contact/"><span>Hotline Support</span></a></p><div><hr></div><h3>Notes</h3><p>1. Jerry Green, (1982) &#8220;The Current Status of the Interface Between Information Science and Economics,&#8221; in <em>Research Opportunities in Information Science and Technology</em>, (Alexandria, VA: National Science Foundation): 17. Accessed 28 February 2026 at <a href="https://green.scholars.harvard.edu/sites/g/files/omnuum5981/files/green/files/the_current_status_of_the_interface_between_information_science_and_economics.pdf">https://green.scholars.harvard.edu/sites/g/files/omnuum5981/files/green/files/the_current_status_of_the_interface_between_information_science_and_economics.pdf</a>.</p><p>2. Jared Kaplan, Sam McCandlish, Tom Henighan, et al., (2020) &#8220;Scaling Laws for Neural Language Models,&#8221; <em>arXiv:2001.08361v1</em>, (Ithaca, NY: Cornell University): 4, 7. Accessed 28 February 2026 at <a href="https://doi.org/10.48550/arXiv.2001.08361">https://doi.org/10.48550/arXiv.2001.08361</a>.</p><p>3. Edward Y. Uechi, (2023) &#8220;Chapter 2: Technological Development,&#8221; in <em>Business Automation and Its Effect on the Labor Force</em>, (New York: Routledge/Productivity Press): 30&#8211;31.</p><p>4. Matthew Price, Stephen Walker, and Will Wiley, (2018) &#8220;The Machine Beneath: Implications of Artificial Intelligence in Strategic Decisionmaking,&#8221; <em>PRISM</em> 7(4): 93&#8211;95.</p><p>5. Advanced IT systems are enterprise grade information management systems designed specifically to meet the needs and requirements of particular organizations, typically built from a base design provided by IBM, Microsoft, or Oracle. The advancement includes tools and proprietary methods for users to carry out data analysis functions. An organization&#8217;s internal data are imported for deep analysis. The IT system operates in a closed network that&#8217;s restricted to employees.</p><p>6. Erik Brynjolfsson, and Kristina McElheran, (2016) &#8220;The Rapid Adoption of Data-Driven Decision-Making,&#8221; <em>American Economic Review: Papers &amp; Proceedings</em> 106(5): 138.</p><p>7. Brynjolfsson and McElheran: 136&#8211;137.</p><p>8. Vincent P. Crawford, and Joel Sobel, (1982) &#8220;Strategic Information Transmission,&#8221; <em>Econometrica</em> 50(6): 1450.</p><p>9. I summarize the three avenues and add my interpretation in the paragraph based on cogent and succinct descriptions provided in: Rossella Argenziano, Sergei Severinov, and Francesco Squintani, (2016) &#8220;Strategic Information Acquisition and Transmission,&#8221; <em>American Economic Journal: Microeconomics</em> 8(3): 136&#8211;137.</p><p>10. Steven R. Grenadier, Andrey Malenko, and Nadya Malenko, (2016) &#8220;Timing Decisions in Organizations: Communication and Authority in a Dynamic Environment,&#8221; <em>American Economic Review</em> 106(9): 2570&#8211;2571.</p><p>11. Argenziano et al.: 140.</p><p>12. Michael Mandler, (2020) &#8220;Coarse, Efficient Decision-making,&#8221; <em>Journal of the European Economic Association</em> 18(6): 3006&#8211;3009.</p><p>13. John W. Patty, (2009) &#8220;The Politics of Biased Information,&#8221; <em>The Journal of Politics</em> 71(2): 393.</p><p>14. Recent news reports highlight competing AI chatbots from Meta and xAI (Grok) are still in the development stage (works in progress).</p><p>Reuters, (2026) &#8220;Meta Pushes AI Model &#8216;Avocado&#8217; Rollout to May or Later, NYT Reports,&#8221; <em>Reuters</em>, 12 March. Accessed 15 March 2026 at <a href="https://www.reuters.com/technology/meta-delays-rollout-new-ai-model-nyt-reports-2026-03-12/">https://www.reuters.com/technology/meta-delays-rollout-new-ai-model-nyt-reports-2026-03-12/</a>.</p><p>Fred Lambert, (2026) &#8220;Musk Admits xAI &#8216;Not Built Right&#8217; &#8212; Weeks After Tesla Invested $2 Billion,&#8221; <em>Electrek</em>, 13 March. Accessed 15 March 2026 at <a href="https://electrek.co/2026/03/13/elon-musk-admits-xai-built-wrong-rebuild-tesla-spacex-investment/">https://electrek.co/2026/03/13/elon-musk-admits-xai-built-wrong-rebuild-tesla-spacex-investment/</a>.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/subscribe?"><span>Subscribe now</span></a></p><p></p><p></p>]]></content:encoded></item><item><title><![CDATA[Leading With an Iron Fist or a Compassionate Heart]]></title><description><![CDATA[Which Style of Leadership is Better?]]></description><link>https://substack.peacegov.org/p/leading-with-iron-fist-or-compassionate-heart-leadership</link><guid isPermaLink="false">https://substack.peacegov.org/p/leading-with-iron-fist-or-compassionate-heart-leadership</guid><dc:creator><![CDATA[Edward Uechi]]></dc:creator><pubDate>Mon, 23 Feb 2026 11:03:10 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!2Pqh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1107b016-a310-441f-bb83-d0db9b043af8_1100x753.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This essay offers a practical tip in the executive leadership area within good governance. It is part of the monthly series on strengthening governance in private companies, non-profit organizations, and public institutions.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/p/leading-with-iron-fist-or-compassionate-heart-leadership?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/p/leading-with-iron-fist-or-compassionate-heart-leadership?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!2Pqh!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1107b016-a310-441f-bb83-d0db9b043af8_1100x753.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!2Pqh!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1107b016-a310-441f-bb83-d0db9b043af8_1100x753.png 424w, https://substackcdn.com/image/fetch/$s_!2Pqh!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1107b016-a310-441f-bb83-d0db9b043af8_1100x753.png 848w, https://substackcdn.com/image/fetch/$s_!2Pqh!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1107b016-a310-441f-bb83-d0db9b043af8_1100x753.png 1272w, https://substackcdn.com/image/fetch/$s_!2Pqh!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1107b016-a310-441f-bb83-d0db9b043af8_1100x753.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!2Pqh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1107b016-a310-441f-bb83-d0db9b043af8_1100x753.png" width="1100" height="753" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/1107b016-a310-441f-bb83-d0db9b043af8_1100x753.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:753,&quot;width&quot;:1100,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:254861,&quot;alt&quot;:&quot;Struggle between fist and people.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://substack.peacegov.org/i/188781176?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1107b016-a310-441f-bb83-d0db9b043af8_1100x753.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Struggle between fist and people." title="Struggle between fist and people." srcset="https://substackcdn.com/image/fetch/$s_!2Pqh!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1107b016-a310-441f-bb83-d0db9b043af8_1100x753.png 424w, https://substackcdn.com/image/fetch/$s_!2Pqh!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1107b016-a310-441f-bb83-d0db9b043af8_1100x753.png 848w, https://substackcdn.com/image/fetch/$s_!2Pqh!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1107b016-a310-441f-bb83-d0db9b043af8_1100x753.png 1272w, https://substackcdn.com/image/fetch/$s_!2Pqh!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F1107b016-a310-441f-bb83-d0db9b043af8_1100x753.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><blockquote><p>&#8220;All authority implies the exercise of power, power in the sense of the capacity to bring about change, to bring about transformation. A leader needs to have power, and that power needs to be the right kind of power for the function involved. We call authoritarianism the use of excessive power beyond that needed to carry out the function in question. Authoritarianism is a distortion of functional power, because it tends to distort the structural characteristics of the organization itself. Authoritarianism often stems from a problem in the personality of the leader.&#8221;[1]</p></blockquote><p>Dr. Otto Kernberg, a psychiatrist and expert on personality disorders, commented on the purpose of executive leadership from the perspective of psychoanalysis. His insight on how a person should lead has bearing and tremendous gravity at this particular moment in time. It&#8217;s 2026. A leader needs a certain degree of power to accomplish objectives. However, the power he wields can be taken to extreme ends. And if that leader has an unresolved internal conflict within himself, he may use power, which was legitimately authorized initially, to exact his will against others and perhaps society, which then becomes an illegitimate use of authority. Indeed, the U.S. Supreme Court reviewed President Trump&#8217;s assertion that he has &#8220;extraordinary power to unilaterally impose tariffs of unlimited amount, duration, and scope.&#8221;[2] A leader assumes a powerful role, and in the right hands or evil hands, his powerful role can be used justly or wrongly.</p><p>How should a person act when he or she is appointed or elected to a position of authority? Should she coerce people to follow along by dictating rules and threatening punishments? Or, should she support people to gain their cooperation by working with them instead of against them?</p><p>Studies abound in the literature on leadership. In one corner, scholars examine a leader&#8217;s physical appearance. According to Murray, followers are likely to choose a leader who is physically imposing or intimidating.[3] Another article makes the claim that a person&#8217;s facial structure is a predictor for earning higher profits.[4]</p><p>The preoccupation on physical looks is emblematic of narcissism, a personality disorder. A person with narcissistic tendencies is self-absorbed with her own image and strives to present her outward appearance in ways that will return constant admiration, whether deserved or not, from others. Certain leaders may capitalize on their level of attractiveness to increase clients, raise revenues, and influence change.</p><p>Research indicates, however, that narcissistic leaders can do more harm than good. An example in the computer industry from 1992 to 2004 showed that these types of leaders implemented bold actions in their organizations, and their decisions resulted in extreme swings in financial performance (&#8220;big wins and big losses&#8221;).[5] A pattern has emerged where narcissistic leaders go through three stages during their tenure; they start by introducing a vision and taking decisive actions; then they&#8217;re confronted with anger, frustration, and even antipathy by their followers, as questionable financial and ethical decisions come to light; and finally the organization in which they lead must face the prospect of letting the leader go or accommodating to the leader&#8217;s plans.[6] Narcissistic leaders bring with them not only vision and inspiration but also volatility and chaos to their organizations.</p><p>Are inborn characteristics a precondition for leadership? A review of books on government leaders identified unusual drive, political and managerial acumen, dealing with difficult situations, and obtaining buy-in from both internal and external stakeholders as common attributes of leadership.[7] Of these qualities, unusual drive may be considered innate. All other attributes can be learned through training or experience. Based on his review, Van Wart found that leaders cannot &#8220;simply rely on their natural leadership talents,&#8221; but that they must &#8220;continuously hone&#8221; their skills and abilities over a lifetime.[8] Whether or not a leader has inborn traits, it is incumbent on the leader to navigate and maneuver among obstacles in front of her, and that involves an ability to assess and adapt to a changing environment. &#8220;To lead change does not require charisma, but it does require basic managerial or transactional <em>competence </em>[emphasis mine].&#8221;[9]</p><p>The type of organization (private or public), the relative stage of its growth (startup or established), and its organizational values are factors that could promote or thwart a particular leadership style. One study suggests that an innovative leader who values freedom and creativity might not achieve much in a bureaucratic institution where employees prefer to follow strict procedures.[10] Another study suggests that a forceful leader who commands his employees to meet specific goals would be a better fit in a dynamic startup as opposed to a more stable company.[11]</p><p>Having a more directive style that&#8217;s similar to transactional leadership may lead to unintended consequences or worse. Imposing too much structure on employees could lead to an increase in counterproductive work behavior.[12] In other words, employees will react unkindly to a pushy boss in a variety of ways to push back against aggressive tactics. One negative action would lead to another in a transactional leader. Continued aggression could veer into territory that makes the environment ripe for unethical behavior. The transactional leader becomes oppressive or manipulative to compel people to do things that they would not otherwise commit under their own volition. Brown and Mitchell examined the difference between ethical and unethical leadership and described the corrosive effects of the latter and how unethical leadership can lead to ineffective functioning of organizations and even to their dissolution, such as in the high-profile cases of Enron and WorldCom.[13]</p><p>Research on ethical leadership indicates a self-perpetrating process that will reward itself. In other words, being morally good as a leader sets the tone and creates an atmosphere that would elicit equally moral behavior in people. A person would not have a motive to harm others. Employees will reciprocate in kind to a leader who demonstrates strong ethics.[14] By observing ethical behavior in their leader, employees are willing to support the organization in ways that go beyond their official job description.[15] An ethical leader will turn out ethical followers, bringing the good out of everyone.</p><p>Ethical leadership is aligned with other styles, namely empowering leadership and transformational leadership. A common theme in these styles is in their support for people&#8217;s well-being. These types of leaders do not force anyone to comply with rules. They can motivate people to follow along willingly. Transformational and ethical leaders support employees to show initiative and think proactively. And this way of leading could potentially result in innovation. If employees are made to feel empowered psychologically to try something new, they would be more than willing to experiment with a novel approach.[16] Simply saying the organization is innovative or that the leader values innovation is inadequate to produce an innovative product or service. People need to be reassured that there will not be repercussions in the event that their experiment fails. Finding a new approach often takes a number of failed attempts (trial and error) before success can be realized. The transformational leader in this regard nurtures people&#8217;s latent abilities by creating a safe environment.</p><p>Of course, nobody likes to fail. And this is where a narcissistic leader is left dumbfounded. The narcissist being so enamored with self-worth and pride cannot face up to the fact that he may have failed. It requires humility to see that a mistake was made. A humble leader who realizes that she had made a faux pas will accept it and change course immediately. This type of leader&#8212;the opposite of a narcissist&#8212;knows when an error was made and will make necessary corrections. Rather than pursuing the same course over and over again like a stubborn fool, the humble leader reassesses the situation, consults with others, and decides on the next best alternative solution.</p><p>Recent studies indicate that humble leadership is generally positive. Most important, humility transcends cultural boundaries. A humble leader can be seen in both Western and Eastern societies. Humility is associated with an empowering leadership style that increases employee commitment.[17] Companies led by humble leaders have proven to outperform earnings expectations in comparison to those companies led by narcissistic leaders.[18] Latest research belies the myth that being humble is somehow weak or inadequate. A humble leader can be just as strong as, if not better than, a narcissistic one.</p><p>The evidence from the literature is clear on the type of leadership that can bring people together and transform an organization or a country for the better. Choosing a strongman who imposes his will on others with coercion would result in frustration among his followers and a level of volatility that would not permit gains achieved in the short term to have any long-lasting positive effect. The outcome is an overall net negative to keep a strongman leader in power. Tolerating and accommodating a narcissistic leader is the worst thing to do, as the narcissist will relentlessly infiltrate and corrupt the entire system to the point of making the organization unrecognizable.</p><h4><em>Is there a better choice?</em></h4><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!r9BU!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b05928-40e7-4dac-9730-096af780e2ea_1100x745.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!r9BU!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b05928-40e7-4dac-9730-096af780e2ea_1100x745.png 424w, https://substackcdn.com/image/fetch/$s_!r9BU!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b05928-40e7-4dac-9730-096af780e2ea_1100x745.png 848w, https://substackcdn.com/image/fetch/$s_!r9BU!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b05928-40e7-4dac-9730-096af780e2ea_1100x745.png 1272w, https://substackcdn.com/image/fetch/$s_!r9BU!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b05928-40e7-4dac-9730-096af780e2ea_1100x745.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!r9BU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b05928-40e7-4dac-9730-096af780e2ea_1100x745.png" width="1100" height="745" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/53b05928-40e7-4dac-9730-096af780e2ea_1100x745.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:745,&quot;width&quot;:1100,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:218392,&quot;alt&quot;:&quot;Person supporting another person.&quot;,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:true,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://substack.peacegov.org/i/188781176?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b05928-40e7-4dac-9730-096af780e2ea_1100x745.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="Person supporting another person." title="Person supporting another person." srcset="https://substackcdn.com/image/fetch/$s_!r9BU!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b05928-40e7-4dac-9730-096af780e2ea_1100x745.png 424w, https://substackcdn.com/image/fetch/$s_!r9BU!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b05928-40e7-4dac-9730-096af780e2ea_1100x745.png 848w, https://substackcdn.com/image/fetch/$s_!r9BU!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b05928-40e7-4dac-9730-096af780e2ea_1100x745.png 1272w, https://substackcdn.com/image/fetch/$s_!r9BU!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F53b05928-40e7-4dac-9730-096af780e2ea_1100x745.png 1456w" sizes="100vw" loading="lazy"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>There is a better choice. Companies and societies can choose an ethical leader who supports and nurtures people to perform at their absolute best. This type of leader does not need to resort to pressure or force to compel anyone to do anything, especially if it&#8217;s an illegal act. He knows how to motivate people through persuasion and communication to move them to act lawfully and responsibly. The ethical leader creates the conditions which are conducive to productivity, cooperation, and innovation. The outcome is a positive one where most people are likely to feel satisfied as gains accumulate steadily over time.</p><p>The difference in leadership styles cannot be starker. One can lead with an iron fist and leave people miserable. Or, one can lead with a compassionate heart and keep people content. Choosing one or the other will produce dramatically different outcomes.</p><p>I will end the essay with a quotation. Executive leadership, properly understood, is a selfless pursuit that puts ego aside. A leader has so many other things to worry about than to think about himself. He must think about others and lead them to where they need to go.</p><blockquote><p>&#8220;Although usually perceived through individuals, leadership is a group process. Indeed, the literature on contemporary leadership emphasizes the idea that leadership itself is constantly being socially constructed, making it both subjective and a moving target.&#8221;[19]</p></blockquote><h2>Evidence for Practice</h2><ul><li><p>Emerging research shows that humility provides value to an organization. A humble leader is not a sign of inadequacy but can work to develop the workforce and meet and exceed goals.</p></li><li><p>An organization assumes tremendous risk and potential liabilities when it decides to be led by a person who exhibits narcissism, a personality disorder.</p></li><li><p>A leader is not necessarily born with innate qualities but must continuously learn the craft of leadership, especially if he or she moves from one organization to another.</p></li></ul><h2>Next Steps for Leaders (the Governing Body, actually)</h2><ul><li><p>Leaders need to be supervised just as much as subordinates do. A leader usually reports to a higher authority. This would be the Board of Directors, shareholders, a legislative council, or some other form of governing body. The leader&#8217;s supervisor (governing body) should review the performance of the leader on a regular basis to ensure that the leader is acting in accordance with established rules. The governing body should not be afraid to threaten the leader with disciplinary action, dismissal, or forced resignation.</p></li><li><p>When searching for a new leader: the selection committee should find the right person who has a leadership style that matches the organization. A mismatch in personality, ethos, and standards could cause friction at best or be destructive at worst with current management and employees.</p></li></ul><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/p/leading-with-iron-fist-or-compassionate-heart-leadership?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/p/leading-with-iron-fist-or-compassionate-heart-leadership?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Open for Discussion</h3><p>What type of leadership is in your organization? Is it transactional, transformational, empowering, or ethical? Are you led by someone who nurtures your professional growth? Do you follow a leader who keeps everybody in their lane, never swerving off course? Feel free to submit your answers in the comment section. If you&#8217;re not comfortable sharing your experiences, you can talk to a specialist at Peaceful Governance Institute (PGI) in private; <a href="https://www.peacegov.org/contact/">click this link</a> to call the PGI hotline support.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/p/leading-with-iron-fist-or-compassionate-heart-leadership/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/p/leading-with-iron-fist-or-compassionate-heart-leadership/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.peacegov.org/contact/&quot;,&quot;text&quot;:&quot;Hotline Support&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.peacegov.org/contact/"><span>Hotline Support</span></a></p><div><hr></div><h3>Notes</h3><p>1. Otto F. Kernberg, (2009) &#8220;Organizational Leadership in a Time of Ideological Turbulence,&#8221; <em>Gregorianum</em> 90(4): 821.</p><p>2. Supreme Court of the United States, (2026) &#8220;Learning Resources, Inc., et al., Petitioners v. Donald J. Trump, President of the United States, et al.,&#8221; No. 24&#8211;1287, 20 February 2026, S<em>upreme Court of the United States</em>: 20. (Accessed 20 February 2026 at <a href="https://www.supremecourt.gov/opinions/25pdf/24-1287_4gcj.pdf">https://www.supremecourt.gov/opinions/25pdf/24-1287_4gcj.pdf</a>.)</p><p>The U.S. Supreme Court decided by a 6&#8211;3 ruling that President Trump does not have the authority to impose tariffs under the law that was invoked.</p><p>3. Gregg R. Murray, (2014) &#8220;Evolutionary Preferences for Physical Formidability in Leaders,&#8221; <em>Politics and the Life Sciences</em> 33(1): 42&#8211;43.</p><p>4. Elaine M. Wong, Margaret E. Ormiston, and Michael P. Haselhuhn, (2011) &#8220;A Face Only an Investor Could Love: CEOs&#8217; Facial Structure Predicts Their Firms&#8217; Financial Performance,&#8221; <em>Psychological Science</em> 22(12): 1481.</p><p>5. Arijit Chatterjee, and Donald C. Hambrick, (2007) &#8220;It&#8217;s All about Me: Narcissistic Chief Executive Officers and Their Effects on Company Strategy and Performance,&#8221; <em>Administrative Science Quarterly</em> 52(3): 375&#8211;380.</p><p>6. Constantine Sedikides, and W. Keith Campbell, (2017) &#8220;Narcissistic Force Meets Systemic Resistance: The Energy Clash Model,&#8221; <em>Perspectives on Psychological Science</em> 12(3): 404&#8211;408, 412.</p><p>7. W. Henry Lambright, and Madison M. Quinn, (2011) &#8220;Understanding Leadership in Public Administration: The Biographical Approach,&#8221; <em>Public Administration Review</em> 71(5): 784&#8211;785.</p><p>8. Montgomery Van Wart, (2013) &#8220;Lessons from Leadership Theory and the Contemporary Challenges of Leaders,&#8221; <em>Public Administration Review</em> 73(4): 561.</p><p>9. Van Wart: 561&#8211;562.</p><p>10. Yair Berson, Shaul Oreg, and Taly Dvir, (2008) &#8220;CEO Values, Organizational Culture and Firm Outcomes,&#8221; <em>Journal of Organizational Behavior</em> 29(5): 626&#8211;628.</p><p>11. Keith M. Hmieleski, and Michael D. Ensley, (2007) &#8220;A Contextual Examination of New Venture Performance: Entrepreneur Leadership Behavior, Top Management Team Heterogeneity, and Environmental Dynamism,&#8221; <em>Journal of Organizational Behavior</em> 28(7): 882&#8211;883.</p><p>12. Brian C. Holtz, and Crystal M. Harold, (2013) &#8220;Effects of Leadership Consideration and Structure on Employee Perceptions of Justice and Counterproductive Work Behavior,&#8221; <em>Journal of Organizational Behavior</em> 34(4): 504, 509.</p><p>13. Michael E. Brown, and Marie S. Mitchell, (2010) &#8220;Ethical and Unethical Leadership: Exploring New Avenues for Future Research,&#8221; <em>Business Ethics Quarterly</em> 20(4): 587&#8211;591.</p><p>14. Brown and Mitchell: 584&#8211;586.</p><p>15. Mitchell J. Neubert, Cindy Wu, and James A. Roberts, (2013) &#8220;The Influence of Ethical Leadership and Regulatory Focus on Employee Outcomes,&#8221; <em>Business Ethics Quarterly</em> 23(2): 276&#8211;277, 284&#8211;288.</p><p>16. Anne Nederveen Pieterse, Daan Van Knippenberg, Micha&#233;la Schippers, and Daan Stam, (2010) &#8220;Transformational and Transactional Leadership and Innovative Behavior: The Moderating Role of Psychological Empowerment,&#8221; <em>Journal of Organizational Behavior</em> 31(4): 613.</p><p>17. Amy Y. Ou, Anne S. Tsui, Angelo J. Kinicki, David A. Waldman, Zhixing Xiao, and Lynda Jiwen Song, (2014) &#8220;Humble Chief Executive Officers&#8217; Connections to Top Management Team Integration and Middle Managers&#8217; Responses,&#8221; <em>Administrative Science Quarterly</em> 59(1): 51, 60&#8211;61.</p><p>18. Oleg V. Petrenko, Federico Aime, Tessa Recendes, and Jeffrey A. Chandler, (2019) &#8220;The Case for Humble Expectations: CEO Humility and Market Performance,&#8221; <em>Strategic Management Journal</em> 40(12): 1950, 1958&#8211;1959.</p><p>19. Van Wart: 562.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[IRS Tax Exemption Determination Letter]]></title><description><![CDATA[This is a notice that the Internal Revenue Service (IRS) has determined the tax-exempt status of Peaceful Governance Institute (EIN: 39-3038994).]]></description><link>https://substack.peacegov.org/p/irs-tax-exemption-determination-letter</link><guid isPermaLink="false">https://substack.peacegov.org/p/irs-tax-exemption-determination-letter</guid><dc:creator><![CDATA[Edward Uechi]]></dc:creator><pubDate>Fri, 13 Feb 2026 17:45:19 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!b2g-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355110d5-45a4-4eb2-bb73-95a00339a0c1_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is a notice that the Internal Revenue Service (IRS) has determined the tax-exempt status of Peaceful Governance Institute (EIN: 39-3038994). We are exempt from federal income tax effective July 1, 2025. All donations, including bequests, devises, transfers, and gifts under Sections 2055, 2106, and 2522, are tax deductible. The IRS has classified us as a public charity under Internal Revenue Code Section 170(b)(1)(A)(vi). The determination letter can be viewed and downloaded by clicking the button or following this link: <a href="https://www.peacegov.org/assets/public/legal/governance/PeaceGov-IRS-Determination.pdf">https://www.peacegov.org/assets/public/legal/governance/PeaceGov-IRS-Determination.pdf</a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.peacegov.org/assets/public/legal/governance/PeaceGov-IRS-Determination.pdf&quot;,&quot;text&quot;:&quot;Read the letter&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.peacegov.org/assets/public/legal/governance/PeaceGov-IRS-Determination.pdf"><span>Read the letter</span></a></p><p>Please help us promote peace and strengthen good governance in the United States and around the world. Your support is needed more than ever. At this particular moment in time, Peaceful Governance Institute will show how we as citizens can come together to solve problems. Please give what you can. Your donation is tax deductible.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.peacegov.org/donate/&quot;,&quot;text&quot;:&quot;Donate now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.peacegov.org/donate/"><span>Donate now</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/p/irs-tax-exemption-determination-letter?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/p/irs-tax-exemption-determination-letter?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p>]]></content:encoded></item><item><title><![CDATA[The Insider Threat Problem]]></title><description><![CDATA[How to Protect the Infrastructure Against Espionage, Sabotage, and Theft from the Ones We Least Suspect]]></description><link>https://substack.peacegov.org/p/insider-threat-problem-protect-infrastructure-espionage-sabotage-theft-from-the-ones-we-least-suspect</link><guid isPermaLink="false">https://substack.peacegov.org/p/insider-threat-problem-protect-infrastructure-espionage-sabotage-theft-from-the-ones-we-least-suspect</guid><dc:creator><![CDATA[Edward Uechi]]></dc:creator><pubDate>Tue, 27 Jan 2026 12:02:52 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!b2g-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355110d5-45a4-4eb2-bb73-95a00339a0c1_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This essay offers a practical tip in information security as part of establishing good governance in private companies, non-profit organizations, and public institutions. It is the first part of a nine-part series to support organizations in modernizing their information systems.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/p/insider-threat-problem-protect-infrastructure-espionage-sabotage-theft-from-the-ones-we-least-suspect?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/p/insider-threat-problem-protect-infrastructure-espionage-sabotage-theft-from-the-ones-we-least-suspect?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><blockquote><p>The president of a small company had caught his Information Technology (IT) manager at playing video games on a number of occasions. The leader finally had it and decided to fire the manager under the assumption that the manager wasn&#8217;t doing his job. What the president failed to understand was that his manager had kept the computer network operating flawlessly without a single instance of downtime. The network and computer systems were running so well and smoothly that the manager had plenty of free time on his hands. The manager said, &#8220;No worries,&#8221; and had accepted his boss&#8217; decision. But just minutes before his departure, he installed some malicious code that would execute six months later and would self-destruct without leaving a trace of the act. The software time bomb did indeed go off, and the company&#8217;s financial system was toast. The president had no idea how it happened or whom to blame.</p></blockquote><p>The foregoing dramatization is based on a true account. Damage to an information system may not always be attributable to an outsider who breaches the network perimeter. An information security disaster can be created by a privileged employee who has all the access provided to her by authority of her job position. The high-profile cases of Chelsea (Bradley) Manning and Edward Snowden should serve as a warning to corporations that the private sector needs adequate safeguards against insider threats just as much as government.[1] An insider can arguably do more harm to an organization&#8217;s data assets than a computer hacker can dream.</p><p>With cybersecurity becoming increasingly critical across all sectors of the economy, leaders must understand exactly <em>who </em>is a threat and not necessarily need to know what technical control can stop the threat. Technology is important, but it is not the be-all and end-all to protecting information. A security system can go down or be bypassed. What is equally important if not more is understanding the motivations and attitudes of individuals who may commit a cyberattack. &#8220;Technical solutions can identify occurrences but understanding human factors allows employers to act preventatively.&#8221;[2] Information security is not simply a matter of implementing technology but involves developing rules and standards for people to follow. Breaches of cybersecurity is a people problem&#8212;not a tech issue.</p><p>At a U.S. Senate committee hearing on 3 May 2017, the then-director of the Federal Bureau of Investigation, James Comey, responded to a question about addressing insider and outsider threats in the federal government. Director Comey answered, &#8220;Technically it is a matter of law and policy. It&#8217;s about the security culture inside our organizations.&#8221;[3] His point stressed the need for information security policies.</p><p>Who is an insider? Can an outsider also be an insider?</p><p>Rowlingson explored the definition of an insider and concluded that a person can vary by profile: technically skilled in computers in some and little knowledge of computers in others; employees in an organization and contractors affiliated with an organization; and computer users in a physical office and remote users who connect from home.[4] An insider isn&#8217;t necessarily someone who has deep computer knowledge to penetrate an IT system. An insider may be the least savvy prone to making mistakes. She may also be a partner not employed with the company but has a connection to the company&#8217;s records. It can be hard to detect or easy to overlook because employees are &#8220;often viewed as responsible, honest, and patriotic because of passing a background check&#8230;&#8221;[5] It is not unusual to see a good person turn rogue. This wider view of potential perpetrators expands the traditional definition of an insider.</p><p>Knowing all actors who could do harm leads to a question of why. What motivates a person to commit a breach? It must be noted that a security issue may not be malicious. A security violation may be unintentional or an innocent mistake made by a person who wasn&#8217;t trained or aware of the issue. Breaches can be either malicious or non-malicious.</p><p>Studies examined people&#8217;s proclivities to comply and not to comply with security policies. Individuals were found likely to break security rules when they learn techniques to rationalize their rule-breaking behavior to deny responsibility, to say that no one was harmed, or to explain that their act was warranted in order to complete a task.[6] The tendency to break rules could be countered by appealing to individuals&#8217; beliefs on intrinsic benefits (accomplishment and fulfillment), intrinsic costs (guilt and embarrassment), vulnerability, safety of resources, and self-efficacy. Bulgurcu and team found that individuals who hold attitudes of intrinsic benefits and costs and have self-efficacy have the intention to comply with information security policies.[7]</p><p>Fear through the use of warning messages may play a role in compelling users to abide by security practices. An example of a warning message is a brief note that is automatically inserted at the top of an incoming email message that indicates it is from a sender unaffiliated with the recipient&#8217;s organization. Another example is a message that displays when a user is about to log in to her computer or to a website. The warning includes language that indicates the user may be fined or imprisoned for committing a prohibited act.</p><p>Research suggests that warning messages universally applied to all computer users could backfire. Fear-inducing messaging is a double-edged sword in view of self-efficacy. Johnston and Warkentin highlighted that some may choose to reduce their fear instead of acknowledging that a threat exists in compliance with the warning; and as a result, they suggested a recommendation &#8220;[to] devise a strategy in which end users are exposed to fear appeals with language suitable to their efficacy level.&#8221;[8] People with high self-efficacy may react differently when actions are forced upon them. Sending an automated warning may be effective for a recent new hire. The same warning, however, may not be effective when sent to an experienced employee who already knows how to handle himself.</p><p>Research has emerged to move beyond the analysis of tangible consequences of cyberattacks and into the domain of understanding human behaviors. In developing a comprehensive threat analytical model, Greitzer and Hohimer included in their model several psychosocial risk factors in which a concerning behavior such as disgruntlement, disengagement, poor performance, or self-centeredness could act as a trigger that provides a catalyst for a person to carry out a malicious act.[9] Along a similar vein, Willison and Warkentin followed the approach to examine offenders&#8217; thought processes to understand what led them to be disgruntled, what caused them to have a perception of injustice, or how they&#8217;re able to rationalize away their responsibility.[10] A novel study formalized a theory for researchers to understand how employees across an organization can behave in certain positive ways to protect the organization&#8217;s data, converting insiders into stewards of information security.[11] The new concept would make cybersecurity a shared responsibility among all employees&#8212;not compartmentalized only for IT experts to manage.</p><p>Analyzing behaviors that pose risks would need to be presented in a format that is useful to take action by decision-makers. The literature indicates that a substantial amount of data would need to be collected on individuals in order to consider a range of human factors. How will all the data be summarized with a degree of coherence? And more importantly, can personal privacy be preserved in light of all the data that would be saved and stored?</p><p>A monitoring tool was proposed for the Department of Defense to measure user behavior that&#8217;s akin to the Fair Isaac Corporation (FICO) credit score. Along a similar purpose of FICO, which enables lenders to measure consumers&#8217; creditworthiness, the User Online Risk Score (UORS) model, according to Roberts, would measure an employee&#8217;s risk level in using and accessing an organization&#8217;s information resources and IT systems. Capturing data on an employee&#8217;s use of login credentials, access to physical and digital information sources, visits to websites and the Dark Web, changes to work-related stressors and events such as demotions and complaints, and influences from external sources, UORS would report behaviors across seven dimensions in a dashboard viewable by the employee and actionable for management.[12] Not only would it benefit the organization in mitigating security risks, UORS would benefit the insider in that the computer user would be able to see for himself where he needs to make needed corrections.</p><p>The literature points out the problem of insiders as a major concern for information security. As physical boundaries are blurred with remote, telework, and hybrid work arrangements and organizations rely on contractors, grantees, and partners, the definition of who is an insider expands to include many individuals that hitherto would not have been considered. An outsider can indeed be an insider. Anyone of these actors could commit a cyberattack that causes serious harm to an IT system or leads to a considerable loss of records.</p><p>Monitoring holds the key to mitigating and preventing security breaches, whether they&#8217;re malicious or accidental. Technical tools can be implemented to monitor the operations of an organization&#8217;s physical and technological assets. But the same technology used to protect computer hardware and software may be useless or inappropriate in supervising humans. If technology is used to monitor people, technology can be neutralized through techniques of rationalizing personal actions. It becomes apparent that monitoring human behavior requires employing methods that are not created by computer scientists but rather are devised by behavioral experts. Tools and measures based on psychology and social behavior would be better suited at analyzing a person&#8217;s past actions and in predicting how the person may react in the near and distant future. Social scientific methods provide for the more appropriate means to evaluate people&#8217;s behaviors and actions.</p><p>While this essay has focused on the insider threat as a sub category under information security, conventional threats coming from outside an organization (examples such as an anonymous hacker and an enemy agent) continue to pose high risks to an organization. Management must remain vigilant on all possible security breaches and must be capable of handling both the outsider threat and the insider threat.</p><p>A final point that needs to be said is the potential for an organization to abuse its power in collecting too much data on anybody who has access to information. Not only would it raise administrative costs but reviewing too much activity may infringe on a person&#8217;s privacy and civil liberties. Not to mention the overly obtrusive monitoring&#8212;the &#8220;big brother&#8221; effect&#8212;can be creepy that may induce ill will among employees against their employer. Balance is necessary here to collect a certain, <em>limited </em>amount of data that effectively predicts future behavior, on one hand, and does not invade personal privacy, on the other hand. Securing data and the entire IT infrastructure should not come at the expense of individual freedom. Both data and privacy can and <em>must </em>be protected.</p><h2>Evidence for Practice</h2><ul><li><p>Organizations will be positioned to prevent security breaches when managers can identify and promptly address motivational factors or triggers in an employee&#8217;s behavior and attitude that would give rise to committing an information security violation.</p></li><li><p>An information security policy needs to be crafted in a way that considers human behavior, intrinsic benefits, and intrinsic costs in people&#8217;s willingness to comply with mandated rules. Not doing so could enable individuals to break the rules and use techniques to rationalize their behavior to escape culpability.</p></li><li><p>Fear tactics to force employees to comply with cybersecurity rules should be applied carefully with an attention on crafting nuanced warning messages tailored to different types of computer users. Security messages that play on human emotion may produce the opposite effect in certain individuals who already know the risks and take voluntary actions to protect themselves.</p></li></ul><h2>Next Steps for Leaders</h2><ul><li><p>The head of the IT Department should consult with the head of the Human Resources (HR) Department on how their departments can collaborate on cybersecurity initiatives, security awareness training, and other related programming. Each department provides complementary expertise to implement an effective information security policy that&#8217;s human centered.</p></li><li><p>The IT Department should evaluate current programs to raise awareness of security risks to determine if they&#8217;re producing desired effects. Security programs would need to be changed or adapted if they&#8217;re not achieving expected outcomes.</p></li><li><p>The HR Department should review procedures on disciplinary action in cases of information security violations. How does the organization hold a person accountable for a security breach? Is there due process to allow for discovery of facts and a fair hearing of the alleged violation?</p></li><li><p>The HR Department should review procedures on offboarding an employee for separation. Does the exit interview ask questions to ascertain whether the departing employee holds any grudges or negative attitudes toward the organization? Are all of the departing employee&#8217;s login credentials, access codes, and identification cards inactivated, so that nobody can use the credentials to gain access into any system or facility? Does the supervisor provide direct and immediate supervision as the departing employee completes final tasks in the last few days of employment?</p></li></ul><p></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/p/insider-threat-problem-protect-infrastructure-espionage-sabotage-theft-from-the-ones-we-least-suspect?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/p/insider-threat-problem-protect-infrastructure-espionage-sabotage-theft-from-the-ones-we-least-suspect?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Open for Discussion</h3><p>Have you witnessed or experienced a security breach in your organization? How did the organization respond? Do you talk about security risks and the potential threats in internal meetings? Feel free to submit your answers in the comment section. If you&#8217;re not comfortable sharing your experiences, you can talk to a specialist at Peaceful Governance Institute (PGI) in private; <a href="https://www.peacegov.org/contact/">click this link</a> to call the PGI hotline support.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/p/insider-threat-problem-protect-infrastructure-espionage-sabotage-theft-from-the-ones-we-least-suspect/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/p/insider-threat-problem-protect-infrastructure-espionage-sabotage-theft-from-the-ones-we-least-suspect/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.peacegov.org/contact/&quot;,&quot;text&quot;:&quot;Hotline Support&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.peacegov.org/contact/"><span>Hotline Support</span></a></p><div><hr></div><h3>Notes</h3><p>1. Stew Magnuson, (2013) &#8220;Companies Ill-Prepared to Fend Off Insider Threats,&#8221; <em>National Defense</em> 98(720): 30.</p><p>2. Mike Patterson, (2019) &#8220;Insider Threats: More Than Just an IT Problem,&#8221; <em>National Defense</em> 104(790): 18.</p><p>3. U.S. Senate Committee on the Judiciary, Full Committee Hearing, (2017) &#8220;Oversight of the Federal Bureau of Investigation,&#8221; 3 May 2017, <em>U.S. Senate</em>. (Accessed 27 December 2025 at <a href="https://www.judiciary.senate.gov/committee-activity/hearings/05/03/2017/oversight-of-the-federal-bureau-of-investigation">https://www.judiciary.senate.gov/committee-activity/hearings/05/03/2017/oversight-of-the-federal-bureau-of-investigation</a>.)</p><p>&#8220;Senate Judiciary Hearing with FBI Director James Comey,&#8221; Transcript of meeting, 3 May 2017, <em>CNN</em>. (Accessed 27 December 2025 at <a href="https://transcripts.cnn.com/show/ath/date/2017-05-03/segment/02">https://transcripts.cnn.com/show/ath/date/2017-05-03/segment/02</a>.)</p><p>4. R. R. Rowlingson, (2005) &#8220;Inside and Out? The Information Security Threat from Insiders,&#8221; <em>Journal of Information Warfare</em> 4(2): 27&#8211;28, 35.</p><p>5. William E. Kelly, (2018) &#8220;Insider Threats: Enemies Within Our Government,&#8221; <em>American Intelligence Journal</em> 35(2): 8.</p><p>6. Mikko Siponen and Anthony Vance, (2010) &#8220;Neutralization: New Insights into the Problem of Employee Information Systems Security Policy Violations,&#8221; <em>MIS Quarterly</em> 34(3): 489, 496, 499.</p><p>7. Burcu Bulgurcu, Hasan Cavusoglu, and Izak Benbasat, (2010) &#8220;Information Security Policy Compliance: An Empirical Study of Rationality-Based Beliefs and Information Security Awareness,&#8221; <em>MIS Quarterly</em> 34(3): 540&#8211;542.</p><p>8. Allen C. Johnston and Merrill Warkentin, (2010) &#8220;Fear Appeals and Information Security Behaviors: An Empirical Study,&#8221; <em>MIS Quarterly</em> 34(3): 562.</p><p>9. Frank L. Greitzer and Ryan E. Hohimer, (2011) &#8220;Modeling Human Behavior to Anticipate Insider Attacks,&#8221; <em>Journal of Strategic Security</em> 4(2): 41&#8211;43.</p><p>10. Robert Willison and Merrill Warkentin, (2013) &#8220;Beyond Deterrence: An Expanded View of Employee Computer Abuse,&#8221; <em>MIS Quarterly</em> 37(1): 1&#8211;20.</p><p>11. Clay Posey, Tom L. Roberts, Paul Benjamin Lowry, Rebecca J. Bennett, and James F. Courtney, (2013) &#8220;Insiders&#8217; Protection of Organizational Information Assets: Development of a Systematics-Based Taxonomy and Theory of Diversity for Protection-Motivated Behaviors,&#8221; <em>MIS Quarterly</em> 37(4): 1189&#8211;1210.</p><p>12. Stephen A. Roberts, (2021) &#8220;DoD Has Over 3.5 Million Insiders &#8211; Now What?: A User Online Risk Score Framework To Reduce The Insider Threat,&#8221; <em>The Cyber Defense Review</em> 6(4): 124&#8211;126.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Quarterly Financial Report for 31 December 2025, Volume 1, Issue 2]]></title><description><![CDATA[This is a notice of the organization&#8217;s quarterly financial report for quarter ending December 31, 2025.]]></description><link>https://substack.peacegov.org/p/qfr-vol01-issue2</link><guid isPermaLink="false">https://substack.peacegov.org/p/qfr-vol01-issue2</guid><dc:creator><![CDATA[Edward Uechi]]></dc:creator><pubDate>Fri, 23 Jan 2026 14:03:26 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!b2g-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355110d5-45a4-4eb2-bb73-95a00339a0c1_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is a notice of the organization&#8217;s quarterly financial report for quarter ending December 31, 2025. The report reflects transactions from October 1 to December 31, 2025. It also marks the end of the 2025 fiscal year. Peaceful Governance Institute makes its financial reports available to the public &#8212; no matter how small total revenues and expenditures may be.</p><p>The reporting period represents work to begin program development. A public communications campaign was implemented in December to introduce the organization and the upcoming <a href="https://www.peacegov.org/programs/reconciliation.html">Truth and Reconciliation Conferences</a>.</p><p>Click the button or the following link to view the details of the report.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.peacegov.org/assets/public/legal/reports/financial/PeaceGov-QFR-Vol01-Issue2-FINAL.pdf&quot;,&quot;text&quot;:&quot;Report Details&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.peacegov.org/assets/public/legal/reports/financial/PeaceGov-QFR-Vol01-Issue2-FINAL.pdf"><span>Report Details</span></a></p><p><a href="https://www.peacegov.org/assets/public/legal/reports/financial/PeaceGov-QFR-Vol01-Issue2-FINAL.pdf">https://www.peacegov.org/assets/public/legal/reports/financial/PeaceGov-QFR-Vol01-Issue2-FINAL.pdf</a></p>]]></content:encoded></item><item><title><![CDATA[Dealing with a Bully and Outrageous Behavior]]></title><description><![CDATA[Fight Back, Remain Silent, or Quit]]></description><link>https://substack.peacegov.org/p/dealing-with-a-bully-and-outrageous</link><guid isPermaLink="false">https://substack.peacegov.org/p/dealing-with-a-bully-and-outrageous</guid><dc:creator><![CDATA[Edward Uechi]]></dc:creator><pubDate>Mon, 05 Jan 2026 11:03:46 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!b2g-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355110d5-45a4-4eb2-bb73-95a00339a0c1_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p><em>This essay offers a practical tip in the human resources area within good governance. It begins the monthly series on strengthening governance in private companies, non-profit organizations, and public institutions.</em></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/p/dealing-with-a-bully-and-outrageous?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/p/dealing-with-a-bully-and-outrageous?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><blockquote><p>The chief executive officer (CEO) of a large corporation takes pleasure in threatening all of his employees to increase sales. He accosts his sales agents to &#8220;push, push, push, until they succumb!&#8221; Everyone has so much fear that they keep to themselves like hermits in their cubicles. A few individuals begin to show signs of distress. The CEO doesn&#8217;t care. He knows he can fire those souls and hire newbies to feed his hunger for endless growth.</p></blockquote><blockquote><p>In a team meeting, colleagues discuss a work-related topic. They share their experiences. Suddenly, one person raises his arm, points to the wall, and shouts an off-color remark. The entire room goes silent, stopping the conversation like hailstones hitting the window. The supervisor doesn&#8217;t say a word, appearing unfazed by the outburst as if it were a natural occurrence. The abradant colleague is known by everyone to create friction among the team from time to time.</p></blockquote><p>Do these two fictitious personalities sound familiar? Did you encounter a similar situation? If yes, how did you feel? Did you feel demoralized?</p><p>The actions portrayed in the above examples can be described as workplace bullying, especially if the acts persist over time causing stress and emotional harm on others. Such acts are not illegal, but they are, nevertheless, disruptive in carrying out business. Insults, verbal abuse, and other unruly behaviors stop the flow of work. Some employees may find it difficult to complete assigned tasks. Left unchecked and unaddressed, unruly behaviors could affect the performance of the team. One&#8217;s work and the work of others will suffer as a consequence of what may seem like innocent conduct at the time but are in fact vicious or underhanded tactics.</p><p>Is there anything that can be done to stop unruly and outrageous behavior? Should a person fight back, remain silent, or quit her job?</p><p>Bullying and a closely related issue of harassment are growing concerns that can have detrimental effects on the well-being of workers. The academic literature shows that these types of negative behaviors have increased over the past few decades. Depending on the parties involved and the circumstances of the cases, studies indicate that the proportion of affected workers can vary from a low percentage to a large share of the workforce. One study that surveyed 17,524 U.S. workers across the private and public sectors reported 8.1% being harassed in the past 12 months and found that &#8220;workplace harassment [is] associated with significantly higher rates of serious mental illnesses, disrupted sleep patterns, and psychosocial distress symptoms.&#8221;[1]  Another sample of the American workforce showed bullying to have a direct relationship with stress but an indirect one with mental health.[2]  In other words, workers&#8217; mental health decreases as bullying increases.</p><p>Workplace bullying can manifest itself in varied forms, which make it difficult to prosecute aggressive behavior. Behaviors of this sort can span a wide spectrum from physical assault to verbal abuse to emotional and psychological manipulation. The aggression can be non-sexual or sexual in nature and perpetrated by either sex. Both women and men can be a bully. And between the bully and the bullied is a power dynamic of one person trying to assert control over another person.</p><p>A framework has been proposed that examines all forms of aggression along a continuum, so that an investigator can evaluate relevant actions that led to the violent outburst and related consequences that followed after the incident. Berlingieri described how this framework can explain bullying in the context of organizational and social processes, changing the study of bullying from understanding why it happened to <em>how </em>it occurred.[3]  Aggressive behavior doesn&#8217;t just erupt by chance but is a collection of interrelated issues that preceded the eruption.</p><p>The RAND Corporation has a model that evaluates whether a person has a propensity to engage in aggressive behaviors. Does the person have a preference for committing such an act? The individual &#8220;may have some degree of positive (or accepting) attitudes about the behavior and may have beliefs that rationalize or even glorify it.&#8221;[4]  Such a person has a perverse idea to think, in his mind, that bullying or harassment is somehow a good thing to act out. This insight is instructive in getting to the root of the problem. Aggressive interpersonal behavior is a psychological problem.</p><p>By understanding a person&#8217;s preferences for certain types of behavior, Matthews and Farris explained how aggressive behavior can be reduced or even continued by the influence of peers and leaders. An individual&#8217;s propensity to engage in a particular act can be inhibited by disapproval of his peers or it can be stimulated by observing others in carrying out the deed.[5]  Leadership and peer groups can set a good example by demonstrating positive attitudes and socially acceptable norms to combat aggressive behavior. Exhibiting the opposite by leaders and peers would perpetuate aggression.</p><p>Studying how positive interpersonal behaviors can counteract negative ones is an area of research in the literature. Lutgen-Sandvik and her team tested several hypotheses to evaluate how treating people with respect, soliciting feedback from others, and instituting virtues in an organization (the positive side) are related to bullying and bullying&#8217;s effects (the negative side) on the workforce. A key finding is that negative actions have a stronger influence over positive ones; moreover, positive outcomes would diminish as bullying continues.[6]  This is not to say that positive interpersonal and organizational values contribute nothing. The study suggests that positive behaviors can strengthen mental health, which in turn can alleviate stress. Instituting positive attitudes and values brings benefits to the workforce.</p><p>Creating a positive atmosphere is a step in the right direction. But that still doesn&#8217;t address the root cause. There will be victims who would want to seek redress for a bully&#8217;s persistent acts. Are there legal remedies to help those who were violated?</p><p>Morris compared recent efforts to pass legislation in numerous states against the practice of existing tort law. Morris explained how intentional infliction of emotional distress (IIED) tort is more effective and flexible over a new law in that IIED tort can handle a wide range of cases of aggression and by contrast a statute could encourage frivolous claims and undermine protections against discrimination.[7]  A growing body of IIED case law shows that a court would accept a workplace bullying case when extreme and outrageous behavior has persisted over a period of time and has demonstrated an intent to cause harm. Aggressive behavior is narrowly defined to refer to an act that is extreme and outrageous.</p><p>An act committed one time at random would not be allowed in a court of law. Only under certain circumstances where a single instance is egregious and malicious (such as in wrongful termination or a false accusation) would a single instance of bullying be allowed. The action by the perpetrator must be so bad to cause irreparable harm to the victim.</p><p>To summarize what can be done to deal with bullying in the workplace: a lawsuit may be pursued in cases where an extreme behavior has caused significant harm. Legal action, however, may be expensive and can take time to resolve. It would sustain tensions in the employer-employee relationship, ending in a permanent breakup.</p><p>Organizational policies such as zero tolerance or a complaint process may be implemented. But an internal policy has limitations. A policy prescription might not be followed if leaders don&#8217;t enforce it or employees perceive it as ineffective or a waste of time. Leadership needs to construct an anti-bullying policy that effectively addresses specific egregious behaviors and puts in place meaningful sanctions that unequivocally tell perpetrators that their abnormal acts are not acceptable.</p><p>An organization may establish a culture that reinforces virtues and certain positive values such as dignity, respect, and cooperation. Exhibiting these values throughout the organization (from the CEO down to the cleaner) provides a buttress to protect everyone against individual aggression. A bully may think twice about acting on his impulse when he knows that everyone would not accept such behavior. A positive environment might keep aggression at bay and in check.</p><p>However, a positive organizational culture by itself is not enough, as research indicates that continued bullying will diminish positivity&#8217;s effects. An organizational policy is necessary to stop aggressive behavior when it happens. Implementing a well-crafted policy coupled with positive values will cover all the bases to keep staff motivated and productive, on one hand, while preventing recurrences of abuse and violence, on the other.</p><p>Organizations have ways to deal with bullying and outrageous behavior in the workplace. It does not have to drag on for weeks or months to a point where it harms workers and affects performance. Workplace bullying can be managed. And the bully can be controlled.</p><h2>Evidence for Practice</h2><ul><li><p>Positive attitudes and virtues may diminish in currency in the face of incessant bullying.</p></li><li><p>An effective anti-bullying policy must be precise in what particular types of aggressive behavior are socially unacceptable. <em>This is dependent on organizational culture, because organizations will have differences in opinion in how aggression is interpreted in each organization.</em></p></li><li><p>A civil action case may be brought to hold a bully and potentially his employer liable for damages.</p></li></ul><h2>Next Steps for Leaders</h2><ul><li><p>Reexamine your human resources policy or personnel handbook. Do you have specific behaviors and acts identified as prohibited? What disciplinary actions do you take to handle the prohibited acts? Are supervisors trained on promptly identifying and addressing inappropriate behaviors?</p></li><li><p>Review your grievance and complaint procedures and recent cases in the past 12 months. Were complaints resolved to the satisfaction of parties involved? Do you see any patterns or common issues arising from the complaints? Are employees aware of the procedures to know that they can submit their grievances confidentially? Your complaint procedures may need to change based on your review.</p></li><li><p>Conduct an internal survey to ask your employees for their opinion on what they value. This will allow you to identify attitudes, values, and beliefs shared by your employees. It could further lead to identifying specific behaviors that most people would find unacceptable. Results of the internal survey will inform how you&#8217;ll define your organizational policy.</p></li><li><p>Consider developing a code of ethics for all employees to follow. This will contribute to establishing professionalism in your organization.</p></li></ul><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/p/dealing-with-a-bully-and-outrageous?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/p/dealing-with-a-bully-and-outrageous?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><div><hr></div><h3>Open for Discussion</h3><p>Have you witnessed or experienced bullying at work? How did your organization respond? When was the last time you discussed workplace culture and employee well-being in your meetings? Feel free to submit your answers in the comment section. If you&#8217;re not comfortable sharing your experiences, you can talk to a specialist at Peaceful Governance Institute (PGI) in private; <a href="https://www.peacegov.org/contact/">click this link</a> to call the PGI hotline support.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/p/dealing-with-a-bully-and-outrageous/comments&quot;,&quot;text&quot;:&quot;Leave a comment&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/p/dealing-with-a-bully-and-outrageous/comments"><span>Leave a comment</span></a></p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.peacegov.org/contact/&quot;,&quot;text&quot;:&quot;Hotline Support&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.peacegov.org/contact/"><span>Hotline Support</span></a></p><div><hr></div><h3>Notes</h3><p>1. Jagdish Khubchandani and James H. Price, (2015) &#8220;Workplace Harassment and Morbidity Among U.S. Adults: Results from the National Health Interview Survey,&#8221; <em>Journal of Community Health</em> 40(3): 557, 559.</p><p>2. Pamela Lutgen-Sandvik, Jacqueline N. Hood, and Ryan P. Jacobson, (2016) &#8220;The Impact of Positive Organizational Phenomena and Workplace Bullying on Individual Outcomes,&#8221; <em>Journal of Managerial Issues</em> 28(1/2): 44.</p><p>3. Adriana Berlingieri, (2015) &#8220;Workplace Bullying: Exploring an Emerging Framework,&#8221; <em>Work, Employment &amp; Society</em> 29(2): 346&#8211;350.</p><p>4. Miriam Matthews and Coreen Farris, (2022) &#8220;Harmful Interpersonal Behaviors in the Department of the Air Force: Informing Prevention and Response,&#8221; <em>RAND Corporation</em>: 5.</p><p>5. Matthews: 6.</p><p>6. Lutgen-Sandvik: 44&#8211;45.</p><p>7. Sarah E. Morris, (2016) &#8220;Tackling Workplace Bullying in Tort: Emerging Extreme and Outrageous Conduct Test Averts Need for Statutory Solution,&#8221; <em>ABA Journal of Labor &amp; Employment Law</em> 31(2): 268&#8211;293.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/subscribe?&quot;,&quot;text&quot;:&quot;Subscribe now&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/subscribe?"><span>Subscribe now</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Fiscal Year (FY) 2026–2030 Strategic Plan]]></title><description><![CDATA[&#8220;Think Anew&#8221; about solutions to addressing today&#8217;s challenges. Peaceful Governance Institute strives toward creating an harmonious balance in human relations.]]></description><link>https://substack.peacegov.org/p/fiscal-year-fy-20262030-strategic</link><guid isPermaLink="false">https://substack.peacegov.org/p/fiscal-year-fy-20262030-strategic</guid><dc:creator><![CDATA[Edward Uechi]]></dc:creator><pubDate>Fri, 07 Nov 2025 12:03:53 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!M_Ja!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae2f46b1-b2a0-4335-a893-47fb93893c31_1100x725.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!M_Ja!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae2f46b1-b2a0-4335-a893-47fb93893c31_1100x725.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!M_Ja!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae2f46b1-b2a0-4335-a893-47fb93893c31_1100x725.png 424w, https://substackcdn.com/image/fetch/$s_!M_Ja!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae2f46b1-b2a0-4335-a893-47fb93893c31_1100x725.png 848w, https://substackcdn.com/image/fetch/$s_!M_Ja!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae2f46b1-b2a0-4335-a893-47fb93893c31_1100x725.png 1272w, https://substackcdn.com/image/fetch/$s_!M_Ja!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae2f46b1-b2a0-4335-a893-47fb93893c31_1100x725.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!M_Ja!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae2f46b1-b2a0-4335-a893-47fb93893c31_1100x725.png" width="1100" height="725" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/ae2f46b1-b2a0-4335-a893-47fb93893c31_1100x725.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:725,&quot;width&quot;:1100,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:1266036,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:true,&quot;internalRedirect&quot;:&quot;https://substack.peacegov.org/i/178256258?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae2f46b1-b2a0-4335-a893-47fb93893c31_1100x725.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!M_Ja!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae2f46b1-b2a0-4335-a893-47fb93893c31_1100x725.png 424w, https://substackcdn.com/image/fetch/$s_!M_Ja!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae2f46b1-b2a0-4335-a893-47fb93893c31_1100x725.png 848w, https://substackcdn.com/image/fetch/$s_!M_Ja!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae2f46b1-b2a0-4335-a893-47fb93893c31_1100x725.png 1272w, https://substackcdn.com/image/fetch/$s_!M_Ja!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fae2f46b1-b2a0-4335-a893-47fb93893c31_1100x725.png 1456w" sizes="100vw" fetchpriority="high"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Terrorism has not abated. Mass shootings continue to erupt in various cities across the United States. People of different opinions and beliefs cannot seem to agree and continuously choose to talk past each other.</p><p>Numerous conflicts exist around the world &#8212; between nation-states, non-state actors, and those who harm civilians. The International Committee of the Red Cross counted 120 armed conflicts at year&#8217;s end 2024. With so many conflicts, even the United States is not immune. A report published by the Council on Foreign Relations projected that political violence precipitating from the 2024 presidential election might arise in the United States.</p><p>Peaceful Governance Institute (PGI) was established to work with warring parties especially formal and informal groups. PGI deploys disinterested mediators to work with all stakeholders, examine all sides of a conflict, and develop pragmatic solutions that everyone can apply. As a non-profit, educational and charitable organization, PGI offers non-partisan and independent solutions.</p><p>Over the course of five years from January 1, 2026 to December 31, 2030, PGI will train, advise, and assist diverse groups of individuals and organizations to support them in resolving disputes and strengthening their capacities with tools and knowledge to mitigate future conflicts. Ultimately, situations can be improved in so far as violence can be reduced to a minimum occurrence, if not eliminated altogether. Peaceful Governance Institute strives toward creating an harmonious balance in human relations &#8212; from a societal level between two nation-states down to an individual level between two persons. People can come together and work peacefully to solve their problems. Here are a few outcomes expected to be achieved by the end of 2030:</p><ul><li><p>80% of participants followed through on their terms and conditions three years after coming to an agreement in the Peacekeeping Intervention Program.</p></li><li><p>60% of victims of gun violence, mass shootings, and domestic terrorism understand the reasons and motivations underlying perpetrators&#8217; actions.</p></li><li><p>70% of participants improved their lives three years later after attending the truth and reconciliation conference.</p></li><li><p>636 out of 848 people (75%) became certified conflict mediators.</p></li><li><p>25% average change in improving governance three years after advising distressed organizations in an emergency situation.</p></li><li><p>30% average change in improving information technology management three years after advising organizations that suffered an information security breach causing significant damage.</p></li><li><p>18 reports related to the results of the truth and reconciliation conferences.</p></li><li><p>60 short essays providing practical, actionable steps to improve governance.</p></li></ul><p></p><p>To achieve these goals, PGI will need to raise $6.8 million in individual and corporate contributions and $985,000 from fee-for-service programs over the entire five-year period of its strategic plan. The total amount in donations and program fees will match needed expenses to cover operations and five programs. PGI will gradually scale up operations from minimal staff to full employment, spending approximately $731,600 in FY 2026, $941,100 in FY 2027, $1.1 million in FY 2028, $2.4 million in FY 2029, and $2.5 million in FY 2030. By 2029, all costs will have stabilized to focus on peacekeeping interventions, truth and reconciliation, and conflict mediation certification as PGI&#8217;s three program priorities.</p><div class="captioned-image-container"><figure><a class="image-link image2 is-viewable-img" target="_blank" href="https://substackcdn.com/image/fetch/$s_!4CIS!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb8e9284-056d-4c38-a3e8-71ead3caff84_488x325.png" data-component-name="Image2ToDOM"><div class="image2-inset"><picture><source type="image/webp" srcset="https://substackcdn.com/image/fetch/$s_!4CIS!,w_424,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb8e9284-056d-4c38-a3e8-71ead3caff84_488x325.png 424w, https://substackcdn.com/image/fetch/$s_!4CIS!,w_848,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb8e9284-056d-4c38-a3e8-71ead3caff84_488x325.png 848w, https://substackcdn.com/image/fetch/$s_!4CIS!,w_1272,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb8e9284-056d-4c38-a3e8-71ead3caff84_488x325.png 1272w, https://substackcdn.com/image/fetch/$s_!4CIS!,w_1456,c_limit,f_webp,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb8e9284-056d-4c38-a3e8-71ead3caff84_488x325.png 1456w" sizes="100vw"><img src="https://substackcdn.com/image/fetch/$s_!4CIS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb8e9284-056d-4c38-a3e8-71ead3caff84_488x325.png" width="488" height="325" data-attrs="{&quot;src&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/cb8e9284-056d-4c38-a3e8-71ead3caff84_488x325.png&quot;,&quot;srcNoWatermark&quot;:null,&quot;fullscreen&quot;:null,&quot;imageSize&quot;:null,&quot;height&quot;:325,&quot;width&quot;:488,&quot;resizeWidth&quot;:null,&quot;bytes&quot;:248534,&quot;alt&quot;:null,&quot;title&quot;:null,&quot;type&quot;:&quot;image/png&quot;,&quot;href&quot;:null,&quot;belowTheFold&quot;:false,&quot;topImage&quot;:false,&quot;internalRedirect&quot;:&quot;https://substack.peacegov.org/i/178256258?img=https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb8e9284-056d-4c38-a3e8-71ead3caff84_488x325.png&quot;,&quot;isProcessing&quot;:false,&quot;align&quot;:null,&quot;offset&quot;:false}" class="sizing-normal" alt="" srcset="https://substackcdn.com/image/fetch/$s_!4CIS!,w_424,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb8e9284-056d-4c38-a3e8-71ead3caff84_488x325.png 424w, https://substackcdn.com/image/fetch/$s_!4CIS!,w_848,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb8e9284-056d-4c38-a3e8-71ead3caff84_488x325.png 848w, https://substackcdn.com/image/fetch/$s_!4CIS!,w_1272,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb8e9284-056d-4c38-a3e8-71ead3caff84_488x325.png 1272w, https://substackcdn.com/image/fetch/$s_!4CIS!,w_1456,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Fcb8e9284-056d-4c38-a3e8-71ead3caff84_488x325.png 1456w" sizes="100vw"></picture><div class="image-link-expand"><div class="pencraft pc-display-flex pc-gap-8 pc-reset"><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container restack-image"><svg role="img" width="20" height="20" viewBox="0 0 20 20" fill="none" stroke-width="1.5" stroke="var(--color-fg-primary)" stroke-linecap="round" stroke-linejoin="round" xmlns="http://www.w3.org/2000/svg"><g><title></title><path d="M2.53001 7.81595C3.49179 4.73911 6.43281 2.5 9.91173 2.5C13.1684 2.5 15.9537 4.46214 17.0852 7.23684L17.6179 8.67647M17.6179 8.67647L18.5002 4.26471M17.6179 8.67647L13.6473 6.91176M17.4995 12.1841C16.5378 15.2609 13.5967 17.5 10.1178 17.5C6.86118 17.5 4.07589 15.5379 2.94432 12.7632L2.41165 11.3235M2.41165 11.3235L1.5293 15.7353M2.41165 11.3235L6.38224 13.0882"></path></g></svg></button><button tabindex="0" type="button" class="pencraft pc-reset pencraft icon-container view-image"><svg xmlns="http://www.w3.org/2000/svg" width="20" height="20" viewBox="0 0 24 24" fill="none" stroke="currentColor" stroke-width="2" stroke-linecap="round" stroke-linejoin="round" class="lucide lucide-maximize2 lucide-maximize-2"><polyline points="15 3 21 3 21 9"></polyline><polyline points="9 21 3 21 3 15"></polyline><line x1="21" x2="14" y1="3" y2="10"></line><line x1="3" x2="10" y1="21" y2="14"></line></svg></button></div></div></div></a></figure></div><p>Peaceful Governance Institute is a new not-for-profit organization equipped with a modern way of doing things &#8212; from studying international security to mediating disputes to enabling employees to have work-life balance. PGI breaks from anachronistic ways of thinking that may have been practiced in the 19th and early 20th centuries but are counterproductive, if no longer applicable, in the 21st century.</p><p>A common theme that runs across all programs is the idea of thinking anew. The global population is going through immense changes. Culture shocks. Climate disruptions. Manufacturing shifts. Trade adjustments. Livelihood upheavals. Practices that may have worked in the past may no longer be useful today.</p><p>If something is not working, it is good to reflect &#8212; to think &#8212; if there is a better way. Does it make sense to repeat using a broken system? Is that old system still up to task? Maybe it is time to make repairs or schedule a complete overhaul. Change may necessitate replacing an old tool with a new one or devising an entirely new model.</p><p>Peaceful Governance Institute encourages everyone to think anew about solutions to addressing today&#8217;s challenges. Change is hard of course. But by coming together, we can overcome any challenge. PGI stands with you to solve your problems.</p><p>All the details about how PGI will achieve peace and strengthen good governance can be found in the FY 2026&#8211;2030 Strategic Plan. Click the button or follow the link to read the plan.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.peacegov.org/assets/public/legal/governance/PeaceGov-FY26-30-Plan-PUBLIC.pdf&quot;,&quot;text&quot;:&quot;Read the Strategic Plan&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.peacegov.org/assets/public/legal/governance/PeaceGov-FY26-30-Plan-PUBLIC.pdf"><span>Read the Strategic Plan</span></a></p><p><a href="https://www.peacegov.org/assets/public/legal/governance/PeaceGov-FY26-30-Plan-PUBLIC.pdf">https://www.peacegov.org/assets/public/legal/governance/PeaceGov-FY26-30-Plan-PUBLIC.pdf</a></p><div><hr></div><p>If you have a moment, we will appreciate a small donation. We kindly ask each person to give $10 to cover expenses for all programs and operations. Your gift will help create a real peace movement that produces results. It only takes a few seconds to pay by credit card. Please give by clicking the Donate button. Thank you.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://square.link/u/Wqf0qXqD&quot;,&quot;text&quot;:&quot;Donate&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://square.link/u/Wqf0qXqD"><span>Donate</span></a></p><p>Share this post with your family, friends, and neighbors. Let&#8217;s create a real peace movement that produces results.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://substack.peacegov.org/p/fiscal-year-fy-20262030-strategic?utm_source=substack&utm_medium=email&utm_content=share&action=share&quot;,&quot;text&quot;:&quot;Share&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://substack.peacegov.org/p/fiscal-year-fy-20262030-strategic?utm_source=substack&utm_medium=email&utm_content=share&action=share"><span>Share</span></a></p><p></p>]]></content:encoded></item><item><title><![CDATA[Bylaws of Peaceful Governance Institute]]></title><description><![CDATA[This is a notice to provide access to the Bylaws of Peaceful Governance Institute.]]></description><link>https://substack.peacegov.org/p/bylaws-of-peaceful-governance-institute</link><guid isPermaLink="false">https://substack.peacegov.org/p/bylaws-of-peaceful-governance-institute</guid><dc:creator><![CDATA[Edward Uechi]]></dc:creator><pubDate>Fri, 31 Oct 2025 17:05:06 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!b2g-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355110d5-45a4-4eb2-bb73-95a00339a0c1_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is a notice to provide access to the Bylaws of Peaceful Governance Institute. The Bylaws document is available by clicking the button and at the following link.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.peacegov.org/assets/public/legal/governance/PeaceGov-Bylaws-v2-5-20250908-PUBLIC.pdf&quot;,&quot;text&quot;:&quot;Read the Bylaws&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.peacegov.org/assets/public/legal/governance/PeaceGov-Bylaws-v2-5-20250908-PUBLIC.pdf"><span>Read the Bylaws</span></a></p><p><a href="https://www.peacegov.org/assets/public/legal/governance/PeaceGov-Bylaws-v2-5-20250908-PUBLIC.pdf">https://www.peacegov.org/assets/public/legal/governance/PeaceGov-Bylaws-v2-5-20250908-PUBLIC.pdf</a></p><p>Some parts of the Bylaws are worth mentioning here. Peaceful Governance Institute holds itself accountable to a high standard. Our conflict of interest policy applies not only to leadership but to all employees and family members inclusive of nephews, nieces, and second cousins. Conflicts of interest cover business relationships and financial interests. Fiscal thresholds are established to ensure the organization does not exceed the limits on investment income and program fees and that donations represent the majority share of total revenues. The non-discrimination policy describes procedures for reporting discrimination claims, reporting criminal behavior, and protecting individuals against reprisal. You can read all the details in the Bylaws.</p><p></p>]]></content:encoded></item><item><title><![CDATA[Quarterly Financial Report for 30 September 2025, Volume 1, Issue 1]]></title><description><![CDATA[This is a notice of the organization&#8217;s quarterly financial report for quarter ending September 30, 2025.]]></description><link>https://substack.peacegov.org/p/qfr-vol01-issue1</link><guid isPermaLink="false">https://substack.peacegov.org/p/qfr-vol01-issue1</guid><dc:creator><![CDATA[Edward Uechi]]></dc:creator><pubDate>Tue, 28 Oct 2025 17:01:43 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!b2g-!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F355110d5-45a4-4eb2-bb73-95a00339a0c1_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This is a notice of the organization&#8217;s quarterly financial report for quarter ending September 30, 2025. The report reflects transactions from July 1 to September 30, 2025. Peaceful Governance Institute makes its financial reports available to the public &#8212; no matter how small total revenues and expenditures may be.</p><p>The reporting period represents the time for establishing the non-profit organization. This is why administration had carried the majority share of expenditures. Several books were purchased to develop the conflict mediation course for the Mediation Certification Program. Indirect expenditures amounted to 8%. All expenses were paid by the Executive Director.</p><p>Click the button or the following link to view the details of the report.</p><p class="button-wrapper" data-attrs="{&quot;url&quot;:&quot;https://www.peacegov.org/assets/public/legal/reports/financial/PeaceGov-QFR-Vol01-Issue1-FINAL.pdf&quot;,&quot;text&quot;:&quot;Report Details&quot;,&quot;action&quot;:null,&quot;class&quot;:null}" data-component-name="ButtonCreateButton"><a class="button primary" href="https://www.peacegov.org/assets/public/legal/reports/financial/PeaceGov-QFR-Vol01-Issue1-FINAL.pdf"><span>Report Details</span></a></p><p><a href="https://www.peacegov.org/assets/public/legal/reports/financial/PeaceGov-QFR-Vol01-Issue1-FINAL.pdf">https://www.peacegov.org/assets/public/legal/reports/financial/PeaceGov-QFR-Vol01-Issue1-FINAL.pdf</a></p><p></p>]]></content:encoded></item></channel></rss>