The Researcher Passport: Improving Data Access and Confidentiality Protection


Report by Margaret C. Levenstein, Allison R.B. Tyler, and Johanna Davidson Bleckman: “Research and evidence-building benefit from the increased availability of administrative datasets, linkage across datasets, detailed geospatial data, and other confidential data. Systems and policies for provisioning access to confidential data, however, have not kept pace and indeed restrict and unnecessarily encumber leading-edge science.

One series of roadblocks can be smoothed or removed by establishing a common understanding of what constitutes different levels of data sensitivity and risk as well as minimum researcher criteria for data access within these levels. This report presents the results of a recently completed study of 23 data repositories.

It describes the extant landscape of policies, procedures, practices, and norms for restricted data access and identifies the significant challenges faced by researchers interested in accessing and analyzing restricted use datasets.

It identifies commonalities among these repositories to articulate shared community standards that can be the basis of a community-normed researcher passport: a credential that identifies a trusted researcher to multiple repositories and other data custodians.

Three main developments are recommended.

First, language harmonization: establishing a common set of terms and definitions – that will evolve over time through collaboration within the research community – will allow different repositories to understand and integrate shared standards and technologies into their own processes.

Second: develop a researcher passport, a durable and transferable digital identifier issued by a central, community-recognized data steward. This passport will capture researcher attributes that emerged as common elements of user access requirements across repositories, including training, and verification of those attributes (e.g., academic degrees, institutional affiliation, citizenship status, and country of residence).

Third: data custodians issue visas that grant a passport holder access to particular datasets for a particular project for a specific period of time. Like stamps on a passport, these visas provide a history of a researcher’s access to restricted data. This history is integrated into the researcher’s credential, establishing the researcher’s reputation as a trusted data steward….(More)

Ten Reasons Not to Measure Impact—and What to Do Instead


Essay by Mary Kay Gugerty & Dean Karlan in the Stanford Social Innovation Review: “Good impact evaluations—those that answer policy-relevant questions with rigor—have improved development knowledge, policy, and practice. For example, the NGO Living Goods conducted a rigorous evaluation to measure the impact of its community health model based on door-to-door sales and promotions. The evidence of impact was strong: Their model generated a 27-percent reduction in child mortality. This evidence subsequently persuaded policy makers, replication partners, and major funders to support the rapid expansion of Living Goods’ reach to five million people. Meanwhile, rigorous evidence continues to further validate the model and help to make it work even better.

Of course, not all rigorous research offers such quick and rosy results. Consider the many studies required to discover a successful drug and the lengthy process of seeking regulatory approval and adoption by the healthcare system. The same holds true for fighting poverty: Innovations for Poverty Action (IPA), a research and policy nonprofit that promotes impact evaluations for finding solutions to global poverty, has conducted more than 650 randomized controlled trials (RCTs) since its inception in 2002. These studies have sometimes provided evidence about how best to use scarce resources (e.g., give away bed nets for free to fight malaria), as well as how to avoid wasting them (e.g., don’t expand traditional microcredit). But the vast majority of studies did not paint a clear picture that led to immediate policy changes. Developing an evidence base is more like building a mosaic: Each individual piece does not make the picture, but bit by bit a picture becomes clearer and clearer.

How do these investments in evidence pay off? IPA estimated the benefits of its research by looking at its return on investment—the ratio of the benefit from the scale-up of the demonstrated large-scale successes divided by the total costs since IPA’s founding. The ratio was 74x—a huge result. But this is far from a precise measure of impact, since IPA cannot establish what would have happened had IPA never existed. (Yes, IPA recognizes the irony of advocating for RCTs while being unable to subject its own operations to that standard. Yet IPA’s approach is intellectually consistent: Many questions and circumstances do not call for RCTs.)

Even so, a simple thought exercise helps to demonstrate the potential payoff. IPA never works alone—all evaluations and policy engagements are conducted in partnership with academics and implementing organizations, and increasingly with governments. Moving from an idea to the research phase to policy takes multiple steps and actors, often over many years. But even if IPA deserves only 10 percent of the credit for the policy changes behind the benefits calculated above, the ratio of benefits to costs is still 7.4x. That is a solid return on investment.

Despite the demonstrated value of high-quality impact evaluations, a great deal of money and time has been wasted on poorly designed, poorly implemented, and poorly conceived impact evaluations. Perhaps some studies had too small of a sample or paid insufficient attention to establishing causality and quality data, and hence any results should be ignored; others perhaps failed to engage stakeholders appropriately, and as a consequence useful results were never put to use.

The push for more and more impact measurement can not only lead to poor studies and wasted money, but also distract and take resources from collecting data that can actually help improve the performance of an effort. To address these difficulties, we wrote a book, The Goldilocks Challenge, to help guide organizations in designing “right-fit” evidence strategies. The struggle to find the right fit in evidence resembles the predicament that Goldilocks faces in the classic children’s fable. Goldilocks, lost in the forest, finds an empty house with a large number of options: chairs, bowls of porridge, and beds of all sizes. She tries each but finds that most do not suit her: The porridge is too hot or too cold, the bed too hard or too soft—she struggles to find options that are “just right.” Like Goldilocks, the social sector has to navigate many choices and challenges to build monitoring and evaluation systems that fit their needs. Some will push for more and more data; others will not push for enough….(More)”.

Free Speech is a Triangle


Essay by Jack Balkin: “The vision of free expression that characterized much of the twentieth century is inadequate to protect free expression today.

The twentieth century featured a dyadic or dualist model of speech regulation with two basic kinds of players: territorial governments on the one hand, and speakers on the other. The twenty-first century model is pluralist, with multiple players. It is easiest to think of it as a triangle. On one corner are nation states and the European Union. On the second corner are privately-owned Internet infrastructure companies, including social media companies, search engines, broadband providers, and electronic payment systems. On the third corner are many different kinds of speakers, legacy media, civil society organizations, hackers, and trolls.

Territorial goverments continue to regulate speakers and legacy media through traditional or “old-school” speech regulation. But nation states and the European Union also now employ “new-school” speech regulation that is aimed at Internet infrastructure owners and designed to get these private companies to surveil, censor, and regulate speakers for them. Finally, infrastructure companies like Facebook also regulate and govern speakers through techniques of private governance and surveillance.

The practical ability to speak in the digital world emerges from the struggle for power between these various forces, with old-school, new-school and private regulation directed at speakers, and both nation states and civil society organizations pressuring infrastructure owners to regulate speech.

If the characteristic feature of free speech regulation in our time is a triangle that combines new school speech regulation with private governance, then the best way to protect free speech values today is to combat and compensate for that triangle’s evolving logic of public and private regulation. The first goal is to prevent or ameliorate as much as possible collateral censorship and new forms of digital prior restraint. The second goal is to protect people from new methods of digital surveillance and manipulation—methods that emerged from the rise of large multinational companies that depend on data collection, surveillance, analysis, control, and distribution of personal data.

This essay describes how nation states should and should not regulate the digital infrastructure consistent with the values of freedom of speech and press; it emphasizes that different models of regulation are appropriate for different parts of the digital infrastructure. Some parts of the digital infrastructure are best regulated along the lines of common carriers or places of public accommodation. But governments should not impose First Amendment-style or common carriage obligations on social media and search engines. Rather, governments should require these companies to provide due process toward their end-users. Governments should also treat these companies as information fiduciaries who have duties of good faith and non-manipulation toward their end-users. Governments can implement all of these reforms—properly designed—consistent with constitutional guarantees of free speech and free press….(More)”.

4 reasons why Data Collaboratives are key to addressing migration


Stefaan Verhulst and Andrew Young at the Migration Data Portal: “If every era poses its dilemmas, then our current decade will surely be defined by questions over the challenges and opportunities of a surge in migration. The issues in addressing migration safely, humanely, and for the benefit of communities of origin and destination are varied and complex, and today’s public policy practices and tools are not adequate. Increasingly, it is clear, we need not only new solutions but also new, more agile, methods for arriving at solutions.

Data are central to meeting these challenges and to enabling public policy innovation in a variety of ways. Yet, for all of data’s potential to address public challenges, the truth remains that most data generated today are in fact collected by the private sector. These data contains tremendous possible insights and avenues for innovation in how we solve public problems. But because of access restrictions, privacy concerns and often limited data science capacity, their vast potential often goes untapped.

Data Collaboratives offer a way around this limitation.

Data Collaboratives: A new form of Public-Private Partnership for a Data Age

Data Collaboratives are an emerging form of partnership, typically between the private and public sectors, but often also involving civil society groups and the education sector. Now in use across various countries and sectors, from health to agriculture to economic development, they allow for the opening and sharing of information held in the private sector, in the process freeing data silos up to serve public ends.

Although still fledgling, we have begun to see instances of Data Collaboratives implemented toward solving specific challenges within the broad and complex refugee and migrant space. As the examples we describe below suggest (which we examine in more detail Stanford Social Innovation Review), the use of such Collaboratives is geographically dispersed and diffuse; there is an urgent need to pull together a cohesive body of knowledge to more systematically analyze what works, and what doesn’t.

This is something we have started to do at the GovLab. We have analyzed a wide variety of Data Collaborative efforts, across geographies and sectors, with a goal of understanding when and how they are most effective.

The benefits of Data Collaboratives in the migration field

As part of our research, we have identified four main value propositions for the use of Data Collaboratives in addressing different elements of the multi-faceted migration issue. …(More)”,

Open Data Charter Measurement Guide


Guide by Ana Brandusescu and Danny Lämmerhirt: “We are pleased to announce the launch of our Open Data Charter Measurement Guide. The guide is a collaborative effort of the Charter’s Measurement and Accountability Working Group (MAWG). It analyses the Open Data Charter principles and how they are assessed based on current open government data measurement tools. Governments, civil society, journalists, and researchers may use it to better understand how they can measure open data activities according to the Charter principles.

What can I find in the Measurement Guide?

  • An executive summary for people who want to quickly understand what measurement tools exist and for what principles.
  • An analysis of how each Charter principle is measured, including a comparison of indicators that are currently used to measure each Charter principle and its commitments. This analysis is based on the open data indicators used by the five largest measurement tools — the Web Foundation’s Open Data Barometer, Open Knowledge International’s Global Open Data Index, Open Data Watch’s Open Data Inventory, OECD’s OURdata Index, and the European Open Data Maturity Assessment . For each principle, we also highlight case studies of how Charter adopters have practically implemented the commitments of that principle.
  • Comprehensive indicator tables show how each Charter principle commitment can be measured. This table is especially helpful when used to compare how different indices approach the same commitment, and where gaps exist. Here, you can see an example of the indicator tables for Principle 1.
  • A methodology section that details how the Working Group conducted the analysis of mapping existing measurements indices against Charter commitments.
  • A recommended list of resources for anyone that wants to read more about measurement and policy.

The Measurement Guide is available online in the form of a Gitbook and in a printable PDF version

Introducing Sourcelist: Promoting diversity in technology policy


Susan Hennessey at Brookings: “…delighted to announce the launch of Sourcelist, a database of experts in technology policy from diverse backgrounds.

Here at Brookings, we built Sourcelist on the principle that technology policymaking stands to benefit from the inclusion of the voices of a broader diversity of people. It aims to help journalists, conference planners, and others to identify and connect with experts outside of their usual sources and panelists. Sourcelist’s purpose is to facilitate more diverse representation by leveraging technology to create a user-friendly resource for people whose decisions can make a difference. We hope that Sourcelist will take away the excuse that diverse experts couldn’t be found to comment on a story or participate on a panel.

Our first database is devoted to Women+. Countless organizations now recognize the institutional barriers that women and underrepresented gender identities face in tech policy. Sourcelist is a resource for those hoping to put recognition into practice.

I want to take the opportunity to personally thank the incredible team at Objectively that took an idea and turned it into the remarkable resource we’re launching today….(More)”.

If, When and How Blockchain Technologies Can Provide Civic Change


By Stefaan G. Verhulst and Andrew Young

The hype surrounding the potential of blockchain technologies– the distributed ledger technology (DLT) undergirding cryptocurrencies like Bitcoin – to transform the way industries and sectors operate and exchange records is reaching a fever pitch.

Gartner Hype Cycle

Source: Top Trends in the Gartner Hype Cycle for Emerging Technologies, 2017

Governments and civil society have now also joined the quest and are actively exploring the potential of DLTs to create transformative social change. Experiments are underway to leverage blockchain technologies to address major societal challenges – from homelessness in New York City to the Rohyingya crisis in Myanmar to government corruption around the world. At the same time, a growing backlash to the newest ‘shiny object’ in the technology for good space is gaining ground.   

At this year’s The Impacts of Civic Technology Conference (TICTeC), organized by mySociety in Lisbon, the GovLab’s Stefaan Verhulst and Andrew Young joined the Engine Room’s Nicole Anand, the Natural Resource Governance Institute’s Anders Pedersen, and ITS-Rio’s Marco Konopacki to consider whether or not Blockchain can truly deliver on its promise for creating civic change.

For the GovLab’s contribution to the panel, we shared early findings from our Blockchange: Blockchain for Social Change initiative. Blockchange, funded by the Rockefeller Foundation, seeks to develop a deeper understanding of the promise and practice of DLTs tin addressing public problems – with a particular focus on the lack, the role and the establishment of trusted identities – through a set of detailed case-studies. Such insights may help us develop operational guidelines on when blockchain technology may be appropriate and what design principles should guide the future use of DLTs for good.

Our presentation covered four key areas (Full presentation here):

  1. The evolving package of attributes present in Blockchain technologies: on-going experimentation, development and investment has lead to the realization that there is no one blockchain technology. Rather there are several variations of attributes that provide for different technological scenarios. Some of these attributes remain foundational -– such as immutability, (guaranteed) integrity, and distributed resilience – while others have evolved as optional including disintermediation, transparency, and accessibility. By focusing on the attributes we can transcend the noise that is emerging from having too many well funded start-ups that seek to pitch their package of attributes as the solution;Attributes of DLT
  2. The three varieties of Blockchain for social change use cases: Most of the pilots and use cases where DLTs are being used to improve society and people’s lives can be categorized along three varieties of applications:
    • Track and Trace applications. For instance: 
      1. Versiart creates verifiable, digital certificates for art and collectibles which helps buyers ensure each piece’s provenance.
      2. Grassroots Cooperative along with Heifer USA created a blockchain-powered app that allows every package of chicken marketed and sold by Grassroots to be traced on the Ethereum blockchain.
      3. Everledger works with stakeholders across the diamond supply chain to track diamonds from mine to store.
      4. Ripe is working with Sweetgreen to use blockchain and IoT sensors to track crop growth, yielding higher-quality produce and providing better information for farmers, food distributors, restaurants, and consumers.    
    • Smart Contracting applications. For instance:
      1. In Indonesia, Carbon Conservation and Dappbase have created smart contracts that will distribute rewards to villages that can prove the successful reduction of incidences of forest fires.
      2. Alice has built Ethereum-based smart contracts for a donation project that supports 15 homeless people in London. The smart contracts ensure donations are released only when pre-determined project goals are met.
      3. Bext360 utilizes smart contracts to pay coffee farmers fairly and immediately based on a price determined through weighing and analyzing beans by the Bext360 machine at the source.  
    • Identity applications. For instance:
      1. The State of Illinois is working with Evernym to digitize birth certificates, thus giving individuals a digital identity from birth.
      2. BanQu creates an economic passport for previously unbanked populations by using blockchain to record economic and financial transactions, purchase goods, and prove their existence in global supply chains.
      3. In 2015, AID:Tech piloted a project working with Syrian refugees in Lebanon to distribute over 500 donor aid cards that were tied to non-forgeable identities.
      4. uPort provides digital identities for residents of Zug, Switzerland to use for governmental services.

Three Blockchange applications

  1. The promise of trusted Identity: the potential to establish a trusted identity turns out to be foundational for using blockchain technologies for social change. At the same time identity emerges from a process (involving, for instance, provisioning, authentication, administration, authorization and auditing) and it is key to assess at what stage of the ID lifecycle DLTs provide an advantage vis-a-vis other ID technologies; and how the maturity of the blockchain technology toward addressing the ID challenge. 

ID Lifecycle and DLT

  1. Finally, we seek to translate current findings into
    • Operational conditions that can enable the public and civic sector at-large to determine when “to blockchain” including:
      • The need for a clear problem definition (as opposed to certain situations where DLT solutions are in search of a problem);
      • The presence of information asymmetries and high transaction costs incentivize change. (“The Market of Lemons” problem);
      • The availability of (high quality) digital records;
      • The lack of availability of credible and alternative disclosure technologies;
      • Deficiency (or efficiency) of (trusted) intermediaries in the space.
    • Design principles that can increase the likelihood of societal benefit when using Blockchain for identity projects (see picture) .

Design Principles

In the coming months, we will continue to share our findings from the Blockchange project in a number of forms – including a series of case studies, additional presentations and infographics, and an operational field guide for designing and implementing Blockchain projects to address challenges across the identity lifecycle.

The GovLab, in collaboration with the National Resource Governance Institute, is also delighted to announce a new initiative aimed at taking stock of the promise, practice and challenge of the use of Blockchain in the extractives sector. The project is focused in particular on DLTs as they relate to beneficial ownership, licensing and contracting transparency, and commodity trading transparency. This fall, we will share a collection of Blockchain for extractives case studies, as well as a report summarizing if, when, and how Blockchain can provide value across the extractives decision chain.

If you are interested in collaborating on our work to increase our understanding of Blockchain’s real potential for social change, or if you have any feedback on this presentation of early findings, please contact [email protected].

 

Examining Civil Society Legitimacy


Saskia Brechenmacher and Thomas Carothers at Carnegie Endowment for International Peace: “Civil society is under stress globally as dozens of governments across multiple regions are reducing space for independent civil society organizations, restricting or prohibiting international support for civic groups, and propagating government-controlled nongovernmental organizations. Although civic activists in most places are no strangers to repression, this wave of anti–civil society actions and attitudes is the widest and deepest in decades. It is an integral part of two broader global shifts that raise concerns about the overall health of the international liberal order: the stagnation of democracy worldwide and the rekindling of nationalistic sovereignty, often with authoritarian features.

Attacks on civil society take myriad forms, from legal and regulatory measures to physical harassment, and usually include efforts to delegitimize civil society. Governments engaged in closing civil society spaces not only target specific civic groups but also spread doubt about the legitimacy of the very idea of an autonomous civic sphere that can activate and channel citizens’ interests and demands. These legitimacy attacks typically revolve around four arguments or accusations:

  • That civil society organizations are self-appointed rather than elected, and thus do not represent the popular will. For example, the Hungarian government justified new restrictions on foreign-funded civil society organizations by arguing that “society is represented by the elected governments and elected politicians, and no one voted for a single civil organization.”
  • That civil society organizations receiving foreign funding are accountable to external rather than domestic constituencies, and advance foreign rather than local agendas. In India, for example, the Modi government has denounced foreign-funded environmental NGOs as “anti-national,” echoing similar accusations in Egypt, Macedonia, Romania, Turkey, and elsewhere.
  • That civil society groups are partisan political actors disguised as nonpartisan civic actors: political wolves in citizen sheep’s clothing. Governments denounce both the goals and methods of civic groups as being illegitimately political, and hold up any contacts between civic groups and opposition parties as proof of the accusation.
  • That civil society groups are elite actors who are not representative of the people they claim to represent. Critics point to the foreign education backgrounds, high salaries, and frequent foreign travel of civic activists to portray them as out of touch with the concerns of ordinary citizens and only working to perpetuate their own privileged lifestyle.

Attacks on civil society legitimacy are particularly appealing for populist leaders who draw on their nationalist, majoritarian, and anti-elite positioning to deride civil society groups as foreign, unrepresentative, and elitist. Other leaders borrow from the populist toolbox to boost their negative campaigns against civil society support. The overall aim is clear: to close civil society space, governments seek to exploit and widen existing cleavages between civil society and potential supporters in the population. Rather than engaging with the substantive issues and critiques raised by civil society groups, they draw public attention to the real and alleged shortcomings of civil society actors as channels for citizen grievances and demands.

The widening attacks on the legitimacy of civil society oblige civil society organizations and their supporters to revisit various fundamental questions: What are the sources of legitimacy of civil society? How can civil society organizations strengthen their legitimacy to help them weather government attacks and build strong coalitions to advance their causes? And how can international actors ensure that their support reinforces rather than undermines the legitimacy of local civic activism?

To help us find answers to these questions, we asked civil society activists working in ten countries around the world—from Guatemala to Tunisia and from Kenya to Thailand—to write about their experiences with and responses to legitimacy challenges. Their essays follow here. We conclude with a final section in which we extract and discuss the key themes that emerge from their contributions as well as our own research…

  1. Saskia Brechenmacher and Thomas Carothers, The Legitimacy Landscape
  2. César Rodríguez-Garavito, Objectivity Without Neutrality: Reflections From Colombia
  3. Walter Flores, Legitimacy From Below: Supporting Indigenous Rights in Guatemala
  4. Arthur Larok, Pushing Back: Lessons From Civic Activism in Uganda
  5. Kimani Njogu, Confronting Partisanship and Divisions in Kenya
  6. Youssef Cherif, Delegitimizing Civil Society in Tunisia
  7. Janjira Sombatpoonsiri, The Legitimacy Deficit of Thailand’s Civil Society
  8. Özge Zihnioğlu, Navigating Politics and Polarization in Turkey
  9. Stefánia Kapronczay, Beyond Apathy and Mistrust: Defending Civic Activism in Hungary
  10. Zohra Moosa, On Our Own Behalf: The Legitimacy of Feminist Movements
  11. Nilda Bullain and Douglas Rutzen, All for One, One for All: Protecting Sectoral Legitimacy
  12. Saskia Brechenmacher and Thomas Carothers, The Legitimacy Menu.(More)”.

Privacy and Freedom of Expression In the Age of Artificial Intelligence


Joint Paper by Privacy International and ARTICLE 19: “Artificial Intelligence (AI) is part of our daily lives. This technology shapes how people access information, interact with devices, share personal information, and even understand foreign languages. It also transforms how individuals and groups can be tracked and identified, and dramatically alters what kinds of information can be gleaned about people from their data. AI has the potential to revolutionise societies in positive ways. However, as with any scientific or technological advancement, there is a real risk that the use of new tools by states or corporations will have a negative impact on human rights. While AI impacts a plethora of rights, ARTICLE 19 and Privacy International are particularly concerned about the impact it will have on the right to privacy and the right to freedom of expression and information. This scoping paper focuses on applications of ‘artificial narrow intelligence’: in particular, machine learning and its implications for human rights.

The aim of the paper is fourfold:

1. Present key technical definitions to clarify the debate;

2. Examine key ways in which AI impacts the right to freedom of expression and the right to privacy and outline key challenges;

3. Review the current landscape of AI governance, including various existing legal, technical, and corporate frameworks and industry-led AI initiatives that are relevant to freedom of expression and privacy; and

4. Provide initial suggestions for rights-based solutions which can be pursued by civil society organisations and other stakeholders in AI advocacy activities….(More)”.

What Is Human-Centric Design?


Zack Quaintance at GovTech: “…Government services, like all services, have historically used some form of design to deploy user-facing components. The design portion of this equation is nothing new. What Olesund says is new, however, is the human-centric component.

“In the past, government services were often designed from the perspective and need of the government institution, not necessarily with the needs or desires of residents or constituents in mind,” said Olesund. “This might lead, for example, to an accumulation of stats and requirements for residents, or utilization of outdated technology because the government institution is locked into a contract.”

Basically, government has never set out to design its services to be clunky or hard to use. These qualities have, however, grown out of the legally complex frameworks that governments must adhere to, which can subsequently result in a failure to prioritize the needs of the people using the services rather than the institution.

Change, however, is underway. Human-centric design is one of the main priorities of the U.S. Digital Service (USDS) and 18F, a pair of organizations created under the Obama administration with missions that largely involve making government services more accessible to the citizenry through efficient use of tech.

Although the needs of state and municipal governments are more localized, the gov tech work done at the federal level by the USDS and 18F has at times served as a benchmark or guidepost for smaller government agencies.

“They both redesign services to make them digital and user-friendly,” Olesund said. “But they also do a lot of work creating frameworks and best practices for other government agencies to adopt in order to achieve some of the broader systemic change.”

One of the most tangible examples of human-centered design at the state or local level can be found at Michigan’s Department of Health and Human Services, which recently worked with the Detroit-based design studio Civillato reduce its paper services application from 40 pages, 18,000-some words and 1,000 questions, down to 18 pages, 3,904 words and 213 questions. Currently, Civilla is working with the nonprofit civic tech group Code for America to help bring the same massive level of human-centered design progress to the state’s digital services.

Other work is underway in San Francisco’s City Hall and within the state of California. A number of cities also have iTeams funded through Bloomberg Philanthropies, and their missions are to innovate in ways that solve ongoing municipal problems, a mission that often requires use of human-centric design….(More)”.