Getting Serious About Evidence-Based Public Management


Philip Joyce at Governing: “In a column in this space in 2015, the late Paul L. Posner, who was one of the most thoughtful observers of public management and intergovernmental relations of the last half-century, decried the disappearance of report cards of government management. In particular, he issued an appeal for someone to move into the space that had been occupied by the Government Performance Project, the decade-long effort funded by the Pew Charitable Trusts to assess the management of states and large local governments.

If anything, what Posner advocated is needed even more today. In an era in which the call for evidence-based decision-making is ubiquitous in government, we have been lacking any real analysis, or even description, of what states and local governments are doing. A couple of recent notable efforts, however, have moved to partially fill this void at the state level.

First, a 2017 report by Pew and the MacArthur Foundation looked across the states at ways in which evidence-based policymaking was used in human services. The study looked at six types of actions that could be undertaken by states and identified states that were engaging, in some way, across four specific policy areas (behavioral health, child welfare, criminal justice and juvenile justice): defining levels of evidence (40 states); inventorying existing programs (50); comparing costs and benefits at a program level (17); reporting outcomes in the budget (42); targeting funds to evidence-based programs (50); and requiring action through state law (34)….

The second notable effort is an ongoing study of the use of data and evidence in the states that was launched recently by the National Association of State Budget Officers (NASBO). Previously, no one had attempted to summarize and categorize all of the initiatives – including those with their impetus in both laws and executive orders — underway across the 50 states. NASBO’s inventory of “Statewide Initiatives to Advance the Use of Data & Evidence for Decision-Making” is part of a set of resources aimed at providing state officials and other interested parties with a summary demonstrating the breadth of these initiatives.

The resulting “living” inventory, which is updated as additional practices are discovered, categorizes these state efforts into five types, listing a total of 90 as of this writing: data analytics (13 initiatives in 9 states), evidence-based policymaking (12 initiatives in 10 states), performance budgeting (18 initiatives in 16 states), performance management (27 initiatives in 24 states) and process improvement (20 initiatives in 19 states).

NASBO acknowledges that it is difficult to draw a bright line between these categories and classifies the initiatives according to the one that appears to be the most dominant. Nevertheless, this inventory provides a very useful catalogue of what states report they are doing, with links to further resources that make it a valuable resource for those considering launching similar initiatives….(More)”.

Crowd-mapping gender equality – a powerful tool for shaping a better city launches in Melbourne


Nicole Kalms at The Conversation: “Inequity in cities has a long history. The importance of social and community planning to meet the challenge of creating people-centred cities looms large. While planners, government and designers have long understood the problem, uncovering the many important marginalised stories is an enormous task.

ion: “Inequity in cities has a long history. The importance of social and community planning to meet the challenge of creating people-centred cities looms large. While planners, government and designers have long understood the problem, uncovering the many important marginalised stories is an enormous task.

Technology – so often bemoaned – has provided an unexpected and powerful primary tool for designers and makers of cities. Crowd-mapping asks the community to anonymously engage and map their experiences using their smartphones and via a web app. The focus of the new Gender Equality Map launched today in two pilot locations in Melbourne is on equality or inequality in their neighbourhood.

How does it work?

Participants can map their experience of equality or inequality in their neighbourhood using locator pins. Author provided

Crowd-mapping generates geolocative data. This is made up of points “dropped” to a precise geographical location. The data can then be analysed and synthesised for insights, tendencies and “hotspots”.

The diversity of its applications shows the adaptability of the method. The digital, community-based method of crowd-mapping has been used across the globe. Under-represented citizens have embraced the opportunity to tell their stories as a way to engage with and change their experience of cities….(More)”

Declaration of Cities Coalition for Digital Rights


New York City, Barcelona and Amsterdam: “We, the undersigned cities, formally come together to form the Cities Coalition for Digital Rights, to protect and uphold human rights on the internet at the local and global level.

The internet has become inseparable from our daily lives. Yet, every day, there are new cases of digital rights abuse, misuse and misinformation and concentration of power around the world: freedom of expression being censored; personal information, including our movements and communications, monitored, being shared and sold without consent; ‘black box’ algorithms being used to make unaccountable decisions; social media being used as a tool of harassment and hate speech; and democratic processes and public opinion being undermined.

As cities, the closest democratic institutions to the people, we are committed to eliminating impediments to harnessing technological opportunities that improve the lives of our constituents, and to providing trustworthy and secure digital services and infrastructures that support our communities. We strongly believe that human rights principles such as privacy, freedom of expression, and democracy must be incorporated by design into digital platforms starting with locally-controlled digital infrastructures and services.

As a coalition, and with the support of the United Nations Human Settlements Program (UN-Habitat), we will share best practices, learn from each other’s challenges and successes, and coordinate common initiatives and actions. Inspired by the Internet Rights and Principles Coalition (IRPC), the work of 300 international stakeholders over the past ten years, we are committed to the following five evolving principles:

01.Universal and equal access to the internet, and digital literacy

02.Privacy, data protection and security

03.Transparency, accountability, and non-discrimination of data, content and algorithms

04.Participatory Democracy, diversity and inclusion

05.Open and ethical digital service standards”

Reach is crowdsourcing street criminal incidents to reduce crime in Lima


Michael Krumholtz at LATAM Tech: “Unfortunately, in Latin America and many other places around the world, robberies are a part of urban life. Moisés Salazar of Lima has been a victim of petty crime in the streets, which is what led him to create Reach.

The application that markets itself as a kind of Waze for street crime alerts users through a map of incident reports or crimes that display visibly on your phone….

Salazar said that Reach helps users before, during and after incidents that could victimize them. That’s because the map allows users to avoid certain areas where a crime may have just happened or is being carried out.

In addition, there is a panic button that users can push if they find themselves in danger or in need of authorities. After the fact, that data then gets made public and can be analyzed by expert users or authorities wanting to see which incidents occur most commonly and where they occur.

Reach is very similar to the U.S. application Citizen, which is a crime avoidance tool used in major metropolitan areas in the U.S. like New York. That application alerts users to crime reports in their neighborhoods and gives them a forum to either record anything they witness or talk about it with other users….(More)”.

Security in Smart Cities: Models, Applications, and Challenges


Book edited by Aboul Ella Hassanien, Mohamed Elhoseny, Syed Hassan Ahmed and Amit Kumar Singh: “This book offers an essential guide to IoT Security, Smart Cities, IoT Applications, etc. In addition, it presents a structured introduction to the subject of destination marketing and an exhaustive review on the challenges of information security in smart and intelligent applications, especially for IoT and big data contexts. Highlighting the latest research on security in smart cities, it addresses essential models, applications, and challenges.

Written in plain and straightforward language, the book offers a self-contained resource for readers with no prior background in the field. Primarily intended for students in Information Security and IoT applications (including smart cities systems and data heterogeneity), it will also greatly benefit academic researchers, IT professionals, policymakers and legislators. It is well suited as a reference book for both undergraduate and graduate courses on information security approaches, the Internet of Things, and real-world intelligent applications….(More)

The Nail Finds a Hammer: Self-Sovereign Identity, Design Principles, and Property Rights in the Developing World


Report by Michael Graglia, Christopher Mellon and Tim Robustelli: “Our interest in identity systems was an inevitable outgrowth of our earlier work on blockchain-based1 land registries.2 Property registries, which at the simplest level are ledgers of who has which rights to which asset, require a very secure and reliable means of identifying both people and properties. In the course of investigating solutions to that problem, we began to appreciate the broader challenges of digital identity and its role in international development. And the more we learned about digital identity, the more convinced we became of the need for self-sovereign identity, or SSI. This model, and the underlying principles of identity which it incorporates, will be described in detail in this paper.

We believe that the great potential of SSI is that it can make identity in the digital world function more like identity in the physical world, in which every person has a unique and persistent identity which is represented to others by means of both their physical attributes and a collection of credentials attested to by various external sources of authority. These credentials are stored and controlled by the identity holder—typically in a wallet—and presented to different people for different reasons at the identity holder’s discretion. Crucially, the identity holder controls what information to present based on the environment, trust level, and type of interaction. Moreover, their fundamental identity persists even though the credentials by which it is represented may change over time.

The digital incarnation of this model has many benefits, including both greatly improved privacy and security, and the ability to create more trustworthy online spaces. Social media and news sites, for example, might limit participation to users with verified identities, excluding bots and impersonators.

The need for identification in the physical world varies based on location and social context. We expect to walk in relative anonymity down a busy city street, but will show a driver’s license to enter a bar, and both a driver’s license and a birth certificate to apply for a passport. There are different levels of ID and supporting documents required for each activity. But in each case, access to personal information is controlled by the user who may choose whether or not to share it.

Self-sovereign identity gives users complete control of their own identities and related personal data, which sits encrypted in distributed storage instead of being stored by a third party in a central database. In older, “federated identity” models, a single account—a Google account, for example—might be used to log in to a number of third-party sites, like news sites or social media platforms. But in this model a third party brokers all of these ID transactions, meaning that in exchange for the convenience of having to remember fewer passwords, the user must sacrifice a degree of privacy.

A real world equivalent would be having to ask the state to share a copy of your driver’s license with the bar every time you wanted to prove that you were over the age of 21. SSI, in contrast, gives the user a portable, digital credential (like a driver’s license or some other document that proves your age), the authenticity of which can be securely validated via cryptography without the recipient having to check with the authority that issued it. This means that while the credential can be used to access many different sites and services, there is no third-party broker to track the services to which the user is authenticating. Furthermore, cryptographic techniques called “zero-knowledge proofs” (ZKPs) can be used to prove possession of a credential without revealing the credential itself. This makes it possible, for example, for users to prove that they are over the age of 21 without having to share their actual birth dates, which are both sensitive information and irrelevant to a binary, yes-or-no ID transaction….(More)”.

The Nail Finds a Hammer: Self-Sovereign Identity, Design Principles, and Property Rights in the Developing World


Report by Michael Graglia, Christopher Mellon and Tim Robustelli: “Our interest in identity systems was an inevitable outgrowth of our earlier work on blockchain-based1 land registries.2 Property registries, which at the simplest level are ledgers of who has which rights to which asset, require a very secure and reliable means of identifying both people and properties. In the course of investigating solutions to that problem, we began to appreciate the broader challenges of digital identity and its role in international development. And the more we learned about digital identity, the more convinced we became of the need for self-sovereign identity, or SSI. This model, and the underlying principles of identity which it incorporates, will be described in detail in this paper.

We believe that the great potential of SSI is that it can make identity in the digital world function more like identity in the physical world, in which every person has a unique and persistent identity which is represented to others by means of both their physical attributes and a collection of credentials attested to by various external sources of authority. These credentials are stored and controlled by the identity holder—typically in a wallet—and presented to different people for different reasons at the identity holder’s discretion. Crucially, the identity holder controls what information to present based on the environment, trust level, and type of interaction. Moreover, their fundamental identity persists even though the credentials by which it is represented may change over time.

The digital incarnation of this model has many benefits, including both greatly improved privacy and security, and the ability to create more trustworthy online spaces. Social media and news sites, for example, might limit participation to users with verified identities, excluding bots and impersonators.

The need for identification in the physical world varies based on location and social context. We expect to walk in relative anonymity down a busy city street, but will show a driver’s license to enter a bar, and both a driver’s license and a birth certificate to apply for a passport. There are different levels of ID and supporting documents required for each activity. But in each case, access to personal information is controlled by the user who may choose whether or not to share it.

Self-sovereign identity gives users complete control of their own identities and related personal data, which sits encrypted in distributed storage instead of being stored by a third party in a central database. In older, “federated identity” models, a single account—a Google account, for example—might be used to log in to a number of third-party sites, like news sites or social media platforms. But in this model a third party brokers all of these ID transactions, meaning that in exchange for the convenience of having to remember fewer passwords, the user must sacrifice a degree of privacy.

A real world equivalent would be having to ask the state to share a copy of your driver’s license with the bar every time you wanted to prove that you were over the age of 21. SSI, in contrast, gives the user a portable, digital credential (like a driver’s license or some other document that proves your age), the authenticity of which can be securely validated via cryptography without the recipient having to check with the authority that issued it. This means that while the credential can be used to access many different sites and services, there is no third-party broker to track the services to which the user is authenticating. Furthermore, cryptographic techniques called “zero-knowledge proofs” (ZKPs) can be used to prove possession of a credential without revealing the credential itself. This makes it possible, for example, for users to prove that they are over the age of 21 without having to share their actual birth dates, which are both sensitive information and irrelevant to a binary, yes-or-no ID transaction….(More)”.

Creating Smart Cities


Book edited by Claudio Coletta, Leighton Evans, Liam Heaphy, and Rob Kitchin: “In cities around the world, digital technologies are utilized to manage city services and infrastructures, to govern urban life, to solve urban issues and to drive local and regional economies. While “smart city” advocates are keen to promote the benefits of smart urbanism – increased efficiency, sustainability, resilience, competitiveness, safety and security – critics point to the negative effects, such as the production of technocratic governance, the corporatization of urban services, technological lock-ins, privacy harms and vulnerability to cyberattack.

This book, through a range of international case studies, suggests social, political and practical interventions that would enable more equitable and just smart cities, reaping the benefits of smart city initiatives while minimizing some of their perils.

Included are case studies from Ireland, the United States of America, Colombia, the Netherlands, Singapore, India and the United Kingdom. These chapters discuss a range of issues including political economy, citizenship, standards, testbedding, urban regeneration, ethics, surveillance, privacy and cybersecurity. This book will be of interest to urban policymakers, as well as researchers in Regional Studies and Urban Planning…(More)”.

Blockchain Technologies for Social Change


Launch of New Platform and Field Report:

Screen Shot 2018-10-31 at 2.33.43 PM“Blockchain technologies are a new form of data disclosure technologies that have received extensive coverage and attention because of their potential to transform (or “disrupt”) industry sectors – ranging from financial services and publishing to supply chain management and real-estate. Additionally, blockchain is increasingly believed to be capable of positively empowering underserved populations in a myriad of ways – from improving service delivery for homeless people in New York City to bringing the “unbanked” into the global economy. As such, blockchain has been heralded as an avenue for creating positive social change, or “Blockchange.”

Yet for all the enthusiasm, we know very little about how blockchain can actually impact social change — what kinds of applications can serve what needs, what technological attributes matter most, what risks are involved, and under what conditions blockchain can have maximum social impact.

Exploring Three Application Areas

Today, the GovLab is launching the Blockchange platform: a hub for research and evidence into blockchain’s capacity to create social change. In particular, we are exploring the promise and practice of blockchain for creating societal benefits and addressing information asymmetries through three applications: improved identity management, smart contracting, and the ability to track and trace transactions. Blockchange features a repository of Curated Examples of projects that are actively seeking to leverage blockchain for social change across each of the these three areas, as well as efforts to create an ecosystem of blockchain use for societal benefit.

Focus on Identity

In addition, the platform provides access to our first Blockchange Field Report, which focuses on Blockchain’s potential and limitation for trusted identity management.

Of the three types of Blockchange applications, identity should be considered  foundational because it a) plays a prominent role in social change; b) underpins most other blockchange applications; and c) provides a necessary missing ID protocol layer of the Internet.

The field report, Blockchan.ge: Blockchain Technologies for Social Change – Field Report on the Emergent Use of Distributed Ledger Technologies for Identity Management, was developed through a yearlong exploration project supported by the Rockefeller Foundation. Our initial analysis centered on the current theory, practice and dominant narratives in the blockchain and identity spaces – and at the nexus of the two….(More)”.

Houston’s $6 Billion Census Problem: Frightened Immigrants


Natasha Rausch at Bloomberg: “At Houston’s City Hall last week, Mayor Sylvester Turner gathered with company CEOs, university professors, police officers, politicians and local judges to discuss a $6 billion problem they all have in common: the 2020 census.

City officials and business leaders are worried about people like 21-year-old Ana Espinoza, a U.S. citizen by birth who lives with undocumented relatives. Espinoza has no intention of answering the census because she worries it could expose her family and get them deported….

Getting an accurate count has broad economic implications across the city, said Laura Murillo, chief executive officer of the Hispanic Chamber. “For everyone, the census is important. It doesn’t matter if you’re a Republican or Democrat, black or white or green.”…

For growing businesses, the census is crucial for understanding the population they’re serving in different regions. Enterprise Rent-A-Car used the 2010 census to help diversify the company’s employee base. The data prompted Enterprise to staff a new location in Houston with Spanish-speaking employees to better serve area customers, said the company’s human resources manager Phil Dyson.

“It’s been one of our top locations,” he said.

Doing the Math

Texas stands to lose at least $1,161 in federal funding for each person not counted, according to a March report by Andrew Reamer, a research professor at the George Washington Institute of Public Policy. Multiplied by the estimated 506,000 unathorized immigrants who live in the nation’s fourth-largest city, that puts at stake about $6 billion for Houston over the 10 years the census applies.

That’s just for programs such as Medicare and Medicaid. The potential loss is even larger when grants are taken into account for items like highways and community development, he said…(More)”.