Daniel J Greenwood

Research Affiliate

Primary DLC

MIT Media Lab


Areas of Interest and Expertise

eBusiness Systems Design and Usage from a Legal and Policy Perspective
Designing Systems for Regulatory Compliance in Heavily Regulated Industries
Consumer Protection and Basic Electronic Contracts and Electronic Signatures Requirements
Virtual Reality

Research Summary

Current Projects and Initiatives:

Entrepreneurship and Innovation: Currently Dazza is prototyping Trust Network system models and reference implementations for integrated business, legal and technical rules based and user-centered personal data & identity management and scalable cross-boundary big data analytics. Dazza is also promoting a new national consensus on publishing public law as free open data in standard formats that are human readable, machine readable and lawyer readable. Dazza is developing a large-scale online “hackathon” collaborative platform and service enabling distributed networks of individuals, teams and multi-venue events to form around innovative projects, shared interests and competitive challenges. Dazza is also advancing modernization of law through development of new business models, innovative solutions for contract and regulatory automation and testing new methods to write, apply and measure law and regulation as computational data sciences.

Public Policy and Strategy and Roadmaps: Locally, Dazza is working on information age strategy, policy and roadmaps at the state and local levels. Under the City of Boston’s CIO, Dazza is drafting Open and Protected Data Sharing Policy including Identity and Authorization Management, in collaboration with the Mayor’s Office of New Urban Mechanics, the City’s Principal Data Scientist and other municipal leaders). Under the Commonwealth of Massachusetts CIO, Dazza is developing strategy and roadmaps for both Data Management for Identity Management, to treat data as an important new asset class for better government while enhancing privacy and user-centered federated methods enabling external organizations or individuals to access state systems using their own identity credentials.

Recent Work