Stefaan Verhulst
Book by Kate Crowley, Jenny Stewart, Adrian Kay and Brian Head: “For nation-states, the contexts for developing and implementing policy have become more complex and demanding. Yet policy studies have not fully responded to the challenges and opportunities represented by these developments. Governance literature has drawn attention to a globalising and network-based policy world, but politics and the role of the state have been de-emphasised.
This book addresses this imbalance by reconsidering traditional policy-analytic concepts, and re-developing and extending new ones, in a melded approach defined as systemic institutionalism. This links policy with governance and the state and suggests how real-world issues might be substantively addressed….(More)”.
Paper by G. Bolton, E. Dimant, and U. Schmidt: “Both theory and recent empirical evidence on nudging suggest that observability of behavior acts as an instrument for promoting (discouraging) pro-social (anti-social) behavior. We connect three streams of literature (nudging, social preferences, and social norms) to investigate the universality of these claims. By employing a series of high-powered laboratory and online studies, we report here on an investigation of the questions of when and in what form backfiring occurs, the mechanism behind the backfiring, and how to mitigate it. We find that inequality aversion moderates the effectiveness of such nudges and that increasing the focus on social norms can counteract the backfiring effects of such behavioral interventions. Our results are informative for those who work on nudging and behavioral change, including scholars, company officials, and policy-makers….(More)”
Book by Šárka Laboutková, Vít Šimral and Petr Vymětal: “This book deals with the current, as yet unsolved, problem of transparency of lobbying. In the current theories and prevalent models that deal with lobbying activities, there is no reflection of the degree of transparency of lobbying, mainly due to the unclear distinction between corruption, lobbying in general, and transparent lobbying. This book provides a perspective on transparency in lobbying in a comprehensive and structured manner. It delivers an interdisciplinary approach to the topic and creates a methodology for assessing the transparency of lobbying, its role in the democratization process and a methodology for evaluating the main consequences of transparency. The new approach is applied to assess lobbying regulations in the countries of Central Eastern Europe and shows a method for how lobbying in other regions of the world may also be assessed….(More)”.
Byron Tau and Michelle Hackman at the Wall Street Journal: “The Trump administration has bought access to a commercial database that maps the movements of millions of cellphones in America and is using it for immigration and border enforcement, according to people familiar with the matter and documents reviewed by The Wall Street Journal.
The location data is drawn from ordinary cellphone apps, including those for games, weather and e-commerce, for which the user has granted permission to log the phone’s location.
The Department of Homeland Security has used the information to detect undocumented immigrants and others who may be entering the U.S. unlawfully, according to these people and documents.
U.S. Immigration and Customs Enforcement, a division of DHS, has used the data to help identify immigrants who were later arrested, these people said. U.S. Customs and Border Protection, another agency under DHS, uses the information to look for cellphone activity in unusual places, such as remote stretches of desert that straddle the Mexican border, the people said.
The federal government’s use of such data for law enforcement purposes hasn’t previously been reported.
Experts say the information amounts to one of the largest known troves of bulk data being deployed by law enforcement in the U.S.—and that the use appears to be on firm legal footing because the government buys access to it from a commercial vendor, just as a private company could, though its use hasn’t been tested in court.
“This is a classic situation where creeping commercial surveillance in the private sector is now bleeding directly over into government,” said Alan Butler, general counsel of the Electronic Privacy Information Center, a think tank that pushes for stronger privacy laws.
According to federal spending contracts, a division of DHS that creates experimental products began buying location data in 2017 from Venntel Inc. of Herndon, Va., a small company that shares several executives and patents with Gravy Analytics, a major player in the mobile-advertising world.
In 2018, ICE bought $190,000 worth of Venntel licenses. Last September, CBP bought $1.1 million in licenses for three kinds of software, including Venntel subscriptions for location data.
The Department of Homeland Security and its components acknowledged buying access to the data, but wouldn’t discuss details about how they are using it in law-enforcement operations. People familiar with some of the efforts say it is used to generate investigative leads about possible illegal border crossings and for detecting or tracking migrant groups.
CBP has said it has privacy protections and limits on how it uses the location information. The agency says that it accesses only a small amount of the location data and that the data it does use is anonymized to protect the privacy of Americans….(More)”
Verna Yu in The Guardian: “…Despite the flourishing of social media, information is more tightly controlled in China than ever. In 2013, an internal Communist party edict known as Document No 9 ordered cadres to tackle seven supposedly subversive influences on society. These included western-inspired notions of press freedom, “universal values” of human rights, civil rights and civic participation. Even within the Communist party, cadres are threatened with disciplinary action for expressing opinions that differ from the leadership.
Compared with 17 years ago, Chinese citizens enjoy even fewer rights of speech and expression. A few days after 34-year-old Li posted a note in his medical school alumni social media group on 30 December, stating that seven workers from a local live-animal market had been diagnosed with an illness similar to Sars and were quarantined in his hospital, he was summoned by police. He was made to sign a humiliating statement saying he understood if he “stayed stubborn and failed to repent and continue illegal activities, (he) will be disciplined by the law”….
Unless Chinese citizens’ freedom of speech and other basic rights are respected, such crises will only happen again. With a more globalised world, the magnitude may become even greater – the death toll from the coronavirus outbreak is already comparable to the total Sars death toll.
Human rights in China may appear to have little to do with the rest of the world but as we have seen in this crisis, disaster could occur when China thwarts the freedoms of its citizens. Surely it is time the international community takes this issue more seriously….(More)”.
Paper by Alexander Campolo and Kate Crawford: “Deep learning techniques are growing in popularity within the field of artificial intelligence (AI). These approaches identify patterns in large scale datasets, and make classifications and predictions, which have been celebrated as more accurate than those of humans. But for a number of reasons, including nonlinear path from inputs to outputs, there is a dearth of theory that can explain why deep learning techniques work so well at pattern detection and prediction. Claims about “superhuman” accuracy and insight, paired with the inability to fully explain how these results are produced, form a discourse about AI that we call enchanted determinism. To analyze enchanted determinism, we situate it within a broader epistemological diagnosis of modernity: Max Weber’s theory of disenchantment. Deep learning occupies an ambiguous position in this framework. On one hand, it represents a complex form of technological calculation and prediction, phenomena Weber associated with disenchantment.
On the other hand, both deep learning experts and observers deploy enchanted, magical discourses to describe these systems’ uninterpretable mechanisms and counter-intuitive behavior. The combination of predictive accuracy and mysterious or unexplainable properties results in myth-making about deep learning’s transcendent, superhuman capacities, especially when it is applied in social settings. We analyze how discourses of magical deep learning produce techno-optimism, drawing on case studies from game-playing, adversarial examples, and attempts to infer sexual orientation from facial images. Enchantment shields the creators of these systems from accountability while its deterministic, calculative power intensifies social processes of classification and control….(More)”.
Paper by Geoff Boeing et al: “Housing scholars stress the importance of the information environment in shaping housing search behavior and outcomes. Rental listings have increasingly moved online over the past two decades and, in turn, online platforms like Craigslist are now central to the search process. Do these technology platforms serve as information equalizers or do they reflect traditional information inequalities that correlate with neighborhood sociodemographics? We synthesize and extend analyses of millions of US Craigslist rental listings and find they supply significantly different volumes, quality, and types of information in different communities.
Technology platforms have the potential to broaden, diversify, and equalize housing search information, but they rely on landlord behavior and, in turn, likely will not reach this potential without a significant redesign or policy intervention. Smart cities advocates hoping to build better cities through technology must critically interrogate technology platforms and big data for systematic biases….(More)”.
Jocelyne Bourgon at Dubai Policy Review: “The situation faced by public servants and public sector leaders today may not be more challenging in absolute terms than in previous generations, but it is certainly different. The problems societies face today stem from a world characterised by increasing complexity, hyper-connectivity and a high level of uncertainty. In this context, the public sector’s role in developing innovative solutions is critical. Despite the need for public innovation, public servants (when asked to discuss the challenges they face in New Synthesis1 labs and workshops) tend to present a narrow perspective, rarely going beyond the boundary of their respective units. While recent public sector reforms have encouraged a drive for efficiency and productivity, they have also generated a narrow and sometimes distorted view of the scale of the role of government in society. Ideas and principles matter. The way one thinks has a direct impact on the solutions that will be found and the results that will be achieved. Innovation in government has received much attention over the years. For the most part, the focus has been introspective, giving special attention to the modernisation of public sector systems and practices as well as the service delivery functions of government. The focus of attention in these conversations is on innovation in government and as a result may have missed the most important contributions of government to public innovation….
I define public innovation as “innovative solutions serving a public purpose that require the use of public means”9. What distinguishes public innovation from social innovation is the intimate link to government actions and the use of instruments of the State10. From this perspective, far from being risk averse, the State is the ultimate risk taker in society. Government takes risks on a scale that no other sector or agent in society could take on and intervenes in areas where the forces of the market or the capacity of civil society would be unable to go. This broader perspective reveals some of the distinctive characteristics of public innovation….(More)”
Book by Alison Harcourt, George Christou, and Seamus Simpson: “The book addresses representation of the public interest in Internet standard developing organisations (SDOs). Much of the existing literature on Internet governance focuses on international organisations such as the United Nations (UN), the Internet Governance Forum (IGF) and the Internet Corporation for Assigned Names and Numbers (ICANN). The literature covering standard developing organisations has to date focused on organisational aspects. This book breaks new ground with investigation of standard development within SDO fora. Case studies centre on standards relating to privacy and security, mobile communications, Intellectual Property Rights (IPR) and copyright. The book lifts the lid on internet standard setting with detailed insight into a world which, although highly technical, very much affects the way in which citizens live and work on a daily basis. In doing this it adds significantly to the trajectory of research on Internet standards and SDOs that explore the relationship between politics and protocols.
The analysis contributes to academic debates on democracy and the internet, global self-regulation and civil society, and international decision-making processes in unstructured environments. The book advances work on the Multiple Streams Framework (MS) by applying it to decision-making in non-state environments, namely SDOs which have long been dominated by private actors. ….(More)”
Paper by Anne L. Washington and Rachel S. Kuo: “The moral authority of ethics codes stems from an assumption that they serve a unified society, yet this ignores the political aspects of any shared resource. The sociologist Howard S. Becker challenged researchers to clarify their power and responsibility in the classic essay: Whose Side Are We On. Building on Becker’s hierarchy of credibility, we report on a critical discourse analysis of data ethics codes and emerging conceptualizations of beneficence, or the “social good”, of data technology. The analysis revealed that ethics codes from corporations and professional associations conflated consumers with society and were largely silent on agency. Interviews with community organizers about social change in the digital era supplement the analysis, surfacing the limits of technical solutions to concerns of marginalized communities. Given evidence that highlights the gulf between the documents and lived experiences, we argue that ethics codes that elevate consumers may simultaneously subordinate the needs of vulnerable populations. Understanding contested digital resources is central to the emerging field of public interest technology. We introduce the concept of digital differential vulnerability to explain disproportionate exposures to harm within data technology and suggest recommendations for future ethics codes….(More)”.