The Future of Citizen Engagement: five trends transforming government


Catherine Andrews at GovLoop: “Every year, citizen engagement seems to improve. New technologies are born; new innovations connect citizens with the government; new ideas start to take root.

It’s 2015, and citizen engagement has gone far beyond basic social media and town halls. As we make our way through the 21st century, citizen engagement is continuing to evolve. New platforms and concepts such as geographic information systems (GIS), GitHub, open data, human-centered design and novel uses of social media have challenged the traditional notions of citizen engagement and pushed government into uncharted territories. As citizens become more tech-savvy, this growth is only continuing.

This GovLoop guide will dive into five of the latest and newest trends in citizen engagement. From the customer experience to the Internet of Things, we’ll highlight the most innovative ways federal, state and local governments are connecting with citizens….(More)”

Detroit Revitalizes City with 311 App


Jason Shueh at Government Technology: “In the wake of the Detroit bankruptcy, blight sieged parts of the city as its populous exited. The fallouts were typical. There was a run of vandalism, thefts, arson and graffiti. Hard times pushed throngs of looters into scores of homes to scavenge for anything that wasn’t bolted down — and often, even for the things that were…. For solutions, Detroit Mayor Mike Duggan and DWSD’s CIO Dan Rainey partnered with SeeClickFix. The company, based in New Haven, Conn., is known for its mobile platform that’s embedded itself as a conduit between city service departments and citizen non-emergency — or 311 — requests. Duggan saw the platform as an opportune answer to address more than a single issue. Instead, the mayor asked how the app could be integrated throughout the city. Potholes, downed trees, graffiti, missing signage, streetlight outages — the mayor wanted a bundled solution to handle an array of common challenges.

Improve Detroit was his answer. The city app, officially available since April, allows citizens to report problems using photos, location data and by request type. Notifications on progress follow and residents can even pay utility bills through the app. For departments, it’s ingrained into work orders and workflows, while analytics provide data for planning, and filters permit a deep-dive analysis….

improve detroit app

Detroit now sits among many metropolitan cities pioneering such 311 apps. San Francisco, New York, Los Angeles, Philadelphia and Chicago are just a few of them. And there are a host of equally adroit tech providers supplying and supporting the apps — companies like Salesforce, CitySourced, PublicStuff, Fix 311 and others. Some cities have even developed their own apps through their internal IT departments.

What’s unique in Detroit is the city’s ambition to leverage a 311 app against major blight while the city works to demolish more than 20,000 abandoned homes — susceptible to fire, flooding, pest infestations and criminal activity. Beyond this, Lingholm said the initiative doubles as a tool to rejuvenate public trust. Data from the app is fed to the city’s new open data portal, and departments have set goals to ensure responsiveness….(More)

How to use mobile phone data for good without invading anyone’s privacy


Leo Mirani in Quartz: “In 2014, when the West African Ebola outbreak was at its peak, some academics argued that the epidemic could have been slowed by using mobile phone data.

Their premise was simple: call-data records show the true nature of social networks and human movement. Understanding social networks and how people really move—as seen from phone movements and calls—could give health officials the ability to predict how a disease will move and where a disease will strike next, and prepare accordingly.

The problem is that call-data records are very hard to get a hold of. The files themselves are huge, there are enormous privacy risks, and the process of making the records safe for distribution is long.
First, the technical basics

Every time you make a phone call from your mobile phone to another mobile phone, the network records the following information (note: this is not a complete list):

  • The number from which the call originated
  • The number at which the call terminated
  • Start time of the call
  • Duration of the call
  • The ID number of the phone making the call
  • The ID number of the SIM card used to make the call
  • The code for the antenna used to make the call

On their own, these records are not creepy. Indeed, without them, networks would be unable to connect calls or bill customers. But it is easy to see why operators aren’t rushing to share this information. Even though the data includes none of the actual content of a phone call in the data, simply knowing which number is calling which, and from where and when, is usually more than enough to identify people.
So how can network operators use this valuable data for good while also protecting their own interests and those of their customers? A good example can be found in Africa, where Orange, a French mobile phone network with interests across several African countries, has for the second year run its “Data for Development” (D4D) program, which offers researchers a chance to mine call data for clues on development problems.

Steps to safe sharing

After a successful first year in Ivory Coast, Orange this year ran the D4D program in Senegal. The aim of the program is to give researchers and scientists at universities and other research labs access to data in order to find novel ways to aid development in health, agriculture, transport or urban planning, energy, and national statistics….(More)”

Citizen Science in the Unexplored Terrain of the Brain


Aaron Krol at BioITWorld: “The game is simple. On the left-hand side of the screen you see a cube containing a misshapen 3D figure, a bit like a tree branch with a gall infestation. To the right is a razor-thin cross-section of the cube, a grainy image of overlapping gray blobs. Clicking on a blob colors it in, like using the paint bucket tool in MS Paint, while also sending colorful extensions out from the branch to the left. Working your way through 256 of these cross-sections, your job is to extend the branch through the cube, identifying which blobs are continuous with the branch and which are nearby distractions.
It hardly sounds like a game at all, but strange to say, there’s something very compelling about playing EyeWire. Maybe it’s watching the branches grow and fork as you discover new connections. Maybe it’s how quickly you can rack up progress, almost not noticing time go by as you span your branches through cube after cube.
“It draws you in,” says Nikitas Serafetinidis ― or Nseraf, as he’s known in-game. “There’s an unexplained component that makes this game highly addictive.”
Serafetinidis is the world record holder in EyeWire, a game whose players are helping to build a three-dimensional map of brain cells in the retina. The images in EyeWire are in fact photos taken with an electron microscope at the Max Planck Institute of Medical Research in Heidelberg: each one represents a tiny sliver of a mouse’s retina, just 20 nanometers thick. The “blobs” are thin slices of closely adjoined neurons, and the “branch” shows the path of a single cell, which can cross through hundreds of thousands of those images….(More)”

The Hague Declaration on Knowledge Discovery in the Digital Age


The Hague Declaration: “New technologies are revolutionising the way humans can learn about the world and about themselves. These technologies are not only a means of dealing with Big Data1, they are also a key to knowledge discovery in the digital age; and their power is predicated on the increasing availability of data itself. Factors such as increasing computing power, the growth of the web, and governmental commitment to open access2 to publicly-funded research are serving to increase the availability of facts, data and ideas.

However, current legislative frameworks in different legal jurisdictions may not be cast in a way which supports the introduction of new approaches to undertaking research, in particular content mining. Content mining is the process of deriving information from machine-readable material. It works by copying large quantities of material, extracting the data, and recombining it to identify patterns and trends.

At the same time, intellectual property laws from a time well before the advent of the web limit the power of digital content analysis techniques such as text and data mining (for text and data) or content mining (for computer analysis of content in all formats)3. These factors are also creating inequalities in access to knowledge discovery in the digital age. The legislation in question might be copyright law, law governing patents or database laws – all of which may restrict the ability of the user to perform detailed content analysis.

Researchers should have the freedom to analyse and pursue intellectual curiosity without fear of monitoring or repercussions. These freedoms must not be eroded in the digital environment. Likewise, ethics around the use of data and content mining continue to evolve in response to changing technology.

Computer analysis of content in all formats, that is content mining, enables access to undiscovered public knowledge and provides important insights across every aspect of our economic, social and cultural life. Content mining will also have a profound impact for understanding society and societal movements (for example, predicting political uprisings, analysing demographical changes). Use of such techniques has the potential to revolutionise the way research is performed – both academic and commercial….(More: Declaration (PDF); Infographic)”

Social network targeting to maximise population behaviour change: a cluster randomised controlled trial


Paper by Prof. Nicholas A Christakis et al in The Lancet: “Information and behaviour can spread through interpersonal ties. By targeting influential individuals, health interventions that harness the distributive properties of social networks could be made more effective and efficient than those that do not. Our aim was to assess which targeting methods produce the greatest cascades or spillover effects and hence maximise population-level behaviour change…..Deployment of certain types of health interventions via network targeting, without increasing the number of individuals targeted or the resources used, could enhance the adoption and efficiency of those interventions, thereby improving population health….(More)

Advances in Crowdsourcing


New book edited by Garrigos-Simon, Fernando J., Gil-Pechuán, Ignacio, Estelles-Miguel, Sofia: “This book attempts to link some of the recent advances in crowdsourcing with advances in innovation and management. It contributes to the literature in several ways. First, it provides a global definition, insights and examples of this managerial perspective resulting in a theoretical framework. Second, it explores the relationship between crowdsourcing and technological innovation, the development of social networks and new behaviors of Internet users. Third, it explores different crowdsourcing applications in various sectors such as medicine, tourism, information and communication technology (ICT), and marketing. Fourth, it observes the ways in which crowdsourcing can improve production, finance, management and overall managerial performance.

Crowdsourcing, also known as “massive outsourcing” or “voluntary outsourcing,” is the act of taking a job or a specific task usually performed by an employee of a company or contractors, and outsourcing it to a large group of people or a community (crowd or mass) via the Internet, through an open call. The term was coined by Jeff Howe in a 2006 issue of Wired magazine. It is being developed in different sciences (i.e., medicine, engineering, ICT, management) and is used in the most successful companies of the modern era (i.e., Apple, Facebook, Inditex, Starbucks). The developments in crowdsourcing has theoretical and practical implications, which will be explored in this book.

Including contributions from international academics, scholars and professionals within the field, this book provides a global, multidimensional perspective on crowdsourcing.​…(More)”

Slacktivism and the social benefits of social video: Sharing a video to ‘help’ a cause


Cat Jones at FirstMonday: “Interest in online ‘slacktivism’ is high both within and outside academia, and the online sharing of cause-related campaigns is increasing, but research into the extent to which ‘slacktivism’ applies to the act of sharing online content to ‘help’ a cause is limited. Slacktivism, as used in much of today’s popular discourse, is defined as ‘feel-good online activism [with] zero political or social impact’ (Morozov, 2009). Here, a survey-based analysis investigates social videos’ impacts on U.K. and U.S. viewers. Results show that the stronger viewers’ motivations are to share to help a cause, the stronger their motivations are to find out more afterwards. Further, a case study shows that social videos that motivate viewers to share the video ‘because it’s for a good cause, and I want to help’ (cause-related sharing versus, for example, to appear knowledgeable about a subject), can also prompt real-life actions, including donations. These results indicate that cause-related video sharing does have an impact, and therefore is not slacktivism by Morozov’s definition. Preliminary analysis suggests that of viewers sharing to ‘help’ causes, those discriminating in their choice of sharing audience (narrow vs. broad) are more likely to further engage than indiscriminate sharers. Result patterns from U.S. narrowcast sharers differ from those of other groups, indicating that tie strength and cultural differences may play a role in modifying slacktivist behaviors….(More)”

Crowdsourced website flags up sexism in the workplace


Springwise: “Female jobseekers can now review the treatment of women in their potential workplace via an online platform called InHerSight. The website collates anonymous reviews from former and current employees — both male and female — so that women can find out more about the company’s policies, office culture and other potential issues before applying for or accepting a job there.

A recent survey by Cosmopolitan magazine found that one in three women are sexually harassed at work and InHerSight enables those women to communicate misconduct and other problematic corporate policies. Importantly, they can do so without fear of recrimination or consequence, since the scorecards are entirely anonymous. Users can complete surveys about their experience at any given company — either adding to an existing score or creating a new profile — by scoring them on 14 categories including their stance on maternity leave, flexible work hours and female representation in top positions. They can also leave a written review of the company. The crowdsourced data is then used to create comprehensive scorecards for other users to view.

Founder Ursula Mead envisions the site as a TripAdvisor for women in the workplace and hopes that by holding companies accountable for their support for women, it will encourage them to review and improve their treatment….(More)”

Privacy in the Modern Age: The Search for Solutions


New book edited by Marc Rotenberg, Julia Horwitz, and Jeramie Scott: “The threats to privacy are well known: the National Security Agency tracks our phone calls, Google records where we go online and how we set our thermostats, Facebook changes our privacy settings when it wishes, Target gets hacked and loses control of our credit card information, our medical records are available for sale to strangers, our children are fingerprinted and their every test score saved for posterity, and small robots patrol our schoolyards while drones may soon fill our skies.

The contributors to this anthology don’t simply describe these problems or warn about the loss of privacy- they propose solutions. They look closely at business practices, public policy, and technology design and ask, “Should this continue? Is there a better approach?” They take seriously the dictum of Thomas Edison: “What one creates with his hand, he should control with his head.” It’s a new approach to the privacy debate, one that assumes privacy is worth protecting, that there are solutions to be found, and that the future is not yet known. This volume will be an essential reference for policy makers and researchers, journalists and scholars, and others looking for answers to one of the biggest challenges of our modern day. The premise is clear: there’s a problem- let’s find a solution….(More)”