BPC Press Release: “Today, the Bipartisan Policy Center (BPC), Heritage Provider Network (HPN), and The Advisory Board Company launched the Care Transformation Prize Series, a national contest to address the most daunting data problems U.S. health care organizations face as they implement new delivery system and payment reforms.
The goal of this big data challenge is to help health care organizations more effectively use data to drive improvements in health care cost and quality. The series was announced at a BPC-hosted event today that featured a forward-thinking discussion on the strategies that providers, health plans, and states are using to harness data to help Americans lower their health care costs and improve care.”
Peter Vanham in the FT’s Beyond Brics blog: “Don’t let success stories like M-Pesa in Kenya fool you: the worldwide digital divide is still increasing and Africa remains the biggest victim.” So says Soumitra Dutta, Dean of Cornells’ Johnson School of Management, talking to beyondbrics at the launch of the World Economic Forum’s Global Information Technology Report 2013.
M-Pesa, the highly successful mobile payments service in Kenya, has attracted global attention. Used by the vast majority of Kenyans, M-Pesa is so successful that, according to Quartz, a massive 31 per cent of Kenya’s GDP is spent through mobile phones.
It was proof that technological progress could happen in low-income countries with poor infrastructure. It has been copied in other emerging markets, leading some to believe the so-called digital divide between the developed and the developing world was ready to fall.
But the opposite is true, says the Indian born Dutta, a founding author of the WEF’s IT report….
To support his claim, Dutta refers to the latest available data on access to different mobile technologies (see graph – click to enlarge).”:
Mapping of content production presented by Felix Salmon in CJR:
Jay Rosen asks, reasonably, that people start drawing useful distinctions between buzzy terms like content marketing, sponsored content, native advertising, and even brand journalism. Here’s my stab at it:
Zach Miners in ComputerWorld: “Twitter users reacted fast to the explosions that ripped through the Boston Marathon Monday, but the incident also revealed how social media can only be so reliable in such situations. Twitter spread news of the blasts quickly and was a useful communications tool for public authorities such as the Boston police and the marathon organizers. But information on social media sites can also be questionable or just plain inaccurate, noted Greg Sterling, senior analyst with Opus Research…
The Boston Police Department’s Twitter log showed a positive side of social media. It was updated minute by minute in the aftermath of the bombings, often with instructions about which areas to avoid, or information about where the most police officers might be stationed.
There was also misinformation, however. A report was circulated quickly on Twitter that police had shut down cellphone service in Boston to prevent detonation of further blasts, though it ultimately turned out to be inaccurate, according to network operators.
Others had nefarious intentions. At one point, a Twitter account with the handle @_BostonMarathon was promising to donate US$1 to victims of the blast for every one of its tweets that was retweeted. Users soon called it out as a fake, noting the real Twitter account for the Boston Marathon was @BostonMarathon.”
See also: Google’s Person Finder
Machine-to-Machine Communications – Connecting Billions of Devices: “This document examines the future of machine-to-machine communication (M2M), with a particular focus on mobile wireless networks. M2M devices are defined, in this paper, as those that are actively communicating using wired and wireless networks, are not computers in the traditional sense and are using the Internet in some form or another. While, at the global level, there are currently around five billion devices connected to mobile networks, this may by some estimates increase to 50 billion by the end of the decade. The report provides examples of some of the uses to which M2M is being put today and its potential to enhance economic and social development. It concludes that to achieve these benefits, however, changes to telecommunication policy and regulatory frameworks may be required. Some of the main areas that will need to be evaluated, and implications of M2M assessed, include: opening access to mobile wholesale markets for firms not providing public telecommunication services; numbering policy; frequency policy; privacy and security; and access to public sector information.”
NextGov story: “Some of the same social media analyses that have helped Google and the Centers for Disease Control and Prevention spot warning signs of a flu outbreak could be used to detect the rumblings of violent conflict before it begins, scholars said in a paper released this week.
Kenyan officials used essentially this system to track hate speech on Facebook, blogs and Twitter in advance of that nation’s 2013 presidential election, which brought Uhuru Kenyatta to power.
Similar efforts to track Syrian social media have been able to identify ceasefire violations within 15 minutes of when they occur, according to the paper on New Technology and the Prevention of Violence and Conflict prepared by the United States Agency for International Development, the United Nations Development Programme and the International Peace Institute and presented at the United States Institute of Peace Friday.”
New York Times profile of a new crowdsourced service: “Watsi, which started last August, lets people donate as little as $5 toward low-cost, high-impact medical treatment for patients in third-world countries. The procedures range from relatively simple ones like fixing a broken limb to more complicated surgery — say, to remove an eye tumor. But the treatments generally have a high likelihood of success and don’t involve multiple operations or long-term care… Watsi represents the next generation of charities dependent on online donors, evolving the model started by sites like Kiva. With just a few mouse clicks, Kiva users, say, are able to lend money to a restaurant owner in the Philippines — and to examine her loan proposal and repayment schedule, to read about her and see her photograph.”
Jina Moore in the Columbia Journalism Review on the fifth “Envision” conference, convened by the UN’s Department of Public Information, the Independent Film Project, and Social Good Summit Partners: “These days, there’s lots of interest among the do-gooding world—nonprofits or NGOs, private foundations and public agencies—in how to use media. Partners in Health, to name just one big public health player, regularly uses videos and storytelling in its fundraising campaigns and on its website. So Envision’s focus on getting storytellers to understand and raise awareness about public health issues isn’t exactly new. The question is, is it useful?”
Larry Summers in the Financial Times: “The great mistake of the gridlock theorists is to suppose that all progress comes from legislation and that more legislation consistently represents more progress. While these are seen as years of gridlock, consider what has happened in the past five years…None of this is to say that the US does not face huge challenges. But these are not due to structural obstacles. They are about finding solutions to problems such as rising inequality and climate change – where we do not quite know the way forward. This is not a problem of gridlock – it is a problem of vision.”
Paper by M Mueller, A Schmidt, B Kuerbis in International Studies Review: “This paper asks whether the Internet’s heavy reliance on nonhierarchical, networked forms of governance is compatible with growing concerns about cyber-security from traditional state actors. Networked governance is defined as a semipermanent, voluntary negotiation system that allows interdependent actors to opt for collaboration or unilateral action in the absence of an overarching authority. Two case studies—Internet routing security and the response to a large-scale botnet known as Conficker—show the prevalence of networked governance on the Internet and provide insight into its strengths and limitations. The paper concludes that both cases raise doubts about the claim that introducing security concerns into Internet governance necessarily leads to more hierarchy and/or a greater role for governments.”