Our New Three Rs: Rigor, Relevance, and Readability


Article by Stephen J. Del Rosso in Governance: “…Because of the dizzying complexity of the contemporary world, the quest for a direct relationship between academic scholarship and its policy utility is both quixotic and unnecessary. The 2013 U.S. Senate’s vote to prohibit funding for political science projects through the National Science Foundation, except for those certified “as promoting national security or the economic interests of the United States,” revealed a fundamental misreading of the nonlinear path between idea and policy. Rather than providing a clear blueprint for addressing emergent or long-standing challenges, a more feasible role for academic scholarship is what political scientist Roland Paris describes as helping to “order the world in which officials operate.” Scholarly works can “influence practitioners’ understandings of what is possible or desirable in a particular policy field or set of circumstances,” he believes, by “creating operational frameworks for … identifying options and implementing policies.”

It is sometimes claimed that think tanks should play the main role in conveying scholarly insights to policymakers. But, however they may have mastered the sound bite, the putative role of think tanks as effective transmission belts for policy-relevant ideas is limited by their lack of academic rigor and systematic peer review. There is also a tendency, particularly among some “Inside the Beltway” experts, to trim their sails to the prevailing political winds and engage in self-censorship to keep employment options open in current or future presidential administrations. Scholarship’s comparative advantage in the marketplace of ideas is also evident in terms of its anticipatory function—the ability to loosen the intellectual bolts for promising policies not quite ready for implementation. A classic example is Swedish Nobel laureate Gunner Myrdal’s 1944 study of race relations, The American Dilemma, which was largely ignored and even disavowed by its sponsors for over a decade until it proved essential to the landmark Supreme Court decision in Brown v. Board of Education. Moreover, it should also be noted, rather than providing a detailed game plan for addressing the problem of race in the country, Myrdal’s work was a quintessential example of the power of scholarship to frame critically important issues.

To bridge the scholarship–policy gap, academics must balance rigor and relevance with a third “R”—readability. There is no shortage of important scholarly work that goes unnoticed or unread because of its presentation. Scholars interested in having influence beyond the ivory tower need to combine their pursuit of disciplinary requirements with efforts to make their work more intelligible and accessible to a broader audience. For example, new forms of dissemination, such as blogs and other social media innovations, provide policy-relevant scholars with ample opportunities to supplement more traditional academic outlets. The recent pushback from the editors of the International Studies Association’s journals to the announced prohibition on their blogging is one indication that the cracks in the old system are already appearing.

At the risk of oversimplification, there are three basic tribes populating the political science field. One tribe comprises those who “get it” when it comes to the importance of policy relevance, a second eschews such engagement with the real world in favor of knowledge for knowledge’s sake, and a third is made up of anxious untenured assistant professors who seek to follow the path that will best provide them with secure employment. If war, as was famously said, is too important to be left to the generals, then the future of the political science field is too important to be left to the intellectual ostriches who bury their heads in self-referential esoterica. However, the first tribe needs to be supported, and the third tribe needs to be shown that there is professional value in engaging with the world, both to enlighten and, perhaps more importantly, to provoke—a sentiment the policy-relevant scholar and inveterate provocateur, Huntington, would surely have endorsed…(More)”

Why Entrepreneurs Should Go Work for Government


Michael Blanding interviewing Mitchell B. Weiss for HBS Working Knowledge:  “…In the past five years, cities around the world have increasingly become laboratories in innovation, producing idea labs that partner with outside businesses and nonprofits to solve thorny public policy problems—and along the way deal with challenges of knowing when to follow the established ways of government and when to break the mold. States and federal government, too, have been reaching out to designers, engineers, and entrepreneurs to help redo their operations. The new US Digital Service, for example, follows other federal efforts like 18F and the Presidential Innovation Fellows to streamline government websites and electronic records—adapting from models in the UK and elsewhere.

“We have many talented people in government, but by and large they have tended to be analysts and strategists, rather than inventors and builders,” says Weiss, who hopes his course can help change that. “One reason we didn’t have them is we weren’t training them. At policy schools we had not been training people to be all that entrepreneurial, and at business schools, we were not prepping or prodding entrepreneurial people to enter the public sector or even just to invent for the public realm.”

“Government should be naturals at crowdsourcing”

Government entrepreneurship takes many forms. There are “public-public entrepreneurs” who work within government agencies, as well as “private-public entrepreneurs” who establish private businesses that sell to government agencies or sometimes to citizens directly.

In Philadelphia, for example, Textizen enables citizens to communicate with city health and human services agencies by text messages, leading to new enforcement on air pollution controls. In California, OpenCounter streamlined registration for small businesses and provided zoning clearances in a fraction of the usual time. In New York, Mark43 is developing software to analyze crime statistics and organize law enforcement records. And in Boston, Bridj developed an on-demand bus service for routes underserved by public transportation.

The innovations are happening at a scale large enough to even attract venture capital investment, despite past VC skepticism about funding public projects.

“There was this paradox—on the one hand, government is the biggest customer in the world; on the other hand, 90 out of 100 VCs would say they don’t back business models that sell to government,” says Weiss. “Though that’s starting to change as startups and government are starting to change.” OpenGov received a $15 million round of funding last spring led by Andreessen Horowitz, and $17 million was pumped into civic social-networking app MindMixer last fall….

Governments could attract even more capital by examining their procurement rules to speed buying, says Weiss, giving them that same sense of urgency and lean startup practices needed to be successful in entrepreneurial projects…(More)”

Who Retweets Whom: How Digital And Legacy Journalists Interact on Twitter


Paper by Michael L. Barthel, Ruth Moon, and William Mari published by the Tow Center: “When bloggers and citizen journalists became fixtures of the U.S. media environment, traditional print journalists responded with a critique, as this latest Tow Center brief says. According to mainstream reporters, the interlopers were “unprofessional, unethical, and overly dependent on the very mainstream media they criticized. In a 2013 poll of journalists, 51 percent agreed that citizen journalism is not real journalism”.

However, the digital media environment, a space for easy interaction has provided opportunities for journalists of all stripes to vault the barriers between legacy and digital sectors; if not collaborating, then perhaps communicating at least.

This brief by three PhD candidates at The University of Washington, Michael L. Barthel, Ruth Moon and William Mari, takes a snapshot of how fifteen political journalists from BuzzFeed, Politico and The New York Times, interact (representing digital, hybrid and legacy outlets respectively). The researchers place those interactions in the context of reporters’ longstanding traditions of gossip, goading, collaboration and competition.

They found tribalism, pronounced most strongly in the legacy outlet, but present across each grouping. They found hierarchy and status-boosting. But those phenomena were not absolute; there were also instances of co-operation, sharing and mutual benefit. None-the-less, by these indicators at least; there was a clear pecking order: Digital and hybrid organizations’ journalists paid “more attention to traditional than digital publications”.

You can download your copy here (pdf).”

Turning smartphones into personal, real-time pollution-location monitors


Kurzweil Newsletter: “Scientists reporting in the ACS journal Environmental Science & Technology have used smartphone and sensing technology to better pinpoint times and locations of the worst air pollution, which is associated with respiratory and cardiovascular problems.

Most such studies create a picture of exposure based on air pollution levels outside people’s homes. This approach ignores big differences in air quality in school and work environments. It also ignores spikes in pollution that happen over the course of the day such as during rush hour.

To fill in these gaps, Mark J. Nieuwenhuijsen and colleagues in Spain, The Netherlands, and the U.S. equipped 54 school children from from 29 different schools around Barcelona with smartphones that could track their location and physical activity. The children also received sensors that continuously measured the ambient levels of black carbon, a component of soot. Although most children spent less than 4 percent of their day traveling to and from school, this exposure contributed 13 percent of their total potential black carbon exposure.

The study was associated with BREATHE, an epidemiological study of the relation between air pollution and brain development.

The researchers conclude that mobile technologies could contribute valuable new insights into air pollution exposure….

More: Mark J. Nieuwenhuijsen, David Donaire-Gonzalez, Ioar Rivas, Montserrat de Castro, Marta Cirach, Gerard Hoek, Edmund Seto, Michael Jerrett, Jordi Sunyer. Variability in and Agreement between Modeled and Personal Continuously Measured Black Carbon Levels Using Novel Smartphone and Sensor Technologies. Environmental Science & Technology, 2015; 150209104136008 DOI: 10.1021/es505362x

How’s the Weather There? Crowdsourcing App Promises Better Forecasts


Rachel Metz  at MIT Technology Review: “An app called Sunshine wants you to help it create more accurate, localized weather forecasts.
The app, currently in a private beta test, combines data from the National Oceanic and Atmospheric Administration (NOAA) with atmospheric pressure readings captured by a smartphone. The latest iPhones, and some Android smartphones, include barometers for measuring atmospheric pressure. These sensors are generally used to determine elevation for navigation, but changes in air pressure can also signal changes in the weather.
Sunshine will also rely on users to report sudden weather hazards like fog, cofounder Katerina Stroponiati says. About 250 people spread out among the Bay Area, New York, and Dallas are now using Sunshine, she says, and the team behind it plans to release the app publicly at the end of March for the iPhone. It will be free, though some features may eventually cost extra.
While weather predictions have gotten more accurate over the years, they’re far from perfect. Weather information usually isn’t localized, either. The goal of Sunshine is to better serve places like its home base of San Francisco, where weather can be markedly different over just a few blocks.
Stroponiati aims for Sunshine to get enough people sending in data—three per square mile would be needed, according to experiments the team has conducted—that the app can be used to make weather prediction more accurate than it tends to be today. Some other apps, like PressureNet and WeatherSignal, already gather data entered manually by users, but they don’t yet offer crowdsourced forecasts….(More)
 

Budgets for the People


How Open Is University Data?


Daniel Castro  at GovTech: “Many states now support open data, or data that’s made freely available without restriction in a nonproprietary, machine-readable format, to increase government transparency, improve public accountability and participation, and unlock opportunities for civic innovation. To date, 10 states have adopted open data policies, via executive order or legislation, and 24 states have built open data portals. But while many agencies have joined the open data movement, state colleges and universities have largely ignored this opportunity. To remedy this, policymakers should consider how to extend open data policies to state colleges and universities.

There are many potential benefits of open data for higher education. First, it can help prospective students and their parents better understand the value of different degree programs. One way to control rising higher ed costs is to create more informed consumers. The feds are already pushing for such changes. President Obama and Education Secretary Arne Duncan called for schools to make more information publicly available about the costs of obtaining a college degree, and the White House launched the College Scorecard, an online tool to compare data about the average tuition cost, size of loan payments and loan default rate for different schools.

But students deserve more detailed information. Prospective students should be able to decide where to attend and what to study based on historical data like program costs, percentage of students completing the program and how long they take to do so, and what kind of earning power they have after graduating.

Second, open data can aid better fiscal oversight and accountability of university operations. In 2014, states provided about $76 billion in support for higher ed, yet few colleges and universities have adopted open data policies to increase the transparency of their budgets. Contrast this with California cities like Oakland, Palo Alto and Los Angeles, which created online tools to let others explore and visualize their budgets. Additional oversight, including from the public, could help reduce fraud, waste and abuse in higher education, save taxpayers money and create more opportunities for public participation in state budgeting.

Third, open data can be a valuable resource for producing innovations that make universities a better place to work and study. Large campuses are basically small cities, and many cities have found open data useful for improving public safety and optimizing transportation services. Universities hold much untapped data: course catalogs, syllabi, bus schedules, campus menus, campus directories, faculty evaluations, etc. Creating portals to release these data sets and building application programming interfaces to access this information would give developers direct access to data that students, faculty, alumni and other stakeholders could use to build apps and services to improve the college experience….(More)”

Citizens Connect


Harvard Business School Case Study by Mitchell Weiss: “Funding to scale Citizens Connect, Boston’s 311 app, is both a blessing and a burden and tests two public entrepreneurs. In 2012, the Commonwealth of Massachusetts provides Boston’s Mayor’s Office of New Urban Mechanics with a grant to scale Citizens Connect across the state. The money gives two co-creators of Citizens Connect, Chris Osgood and Nigel Jacob, a chance to grow their vision for citizen-engaged governance and civic innovation, but it also requires that the two City of Boston leaders sit on a formal selection committee that pits their original partner, Connected Bits, against another player that might meet the specific requirements for delivering a statewide version. The selection and scaling process raise questions beyond just which partner to choose. What would happen to the Citizens Connect brand as Osgood and Jacob’s product spreads across the state? Who could help scale their work best then nationally? Which business models were best positioned to drive that growth? What intellectual property arrangements would best enable it? And what role should the two city employees have, anyway, in scaling Citizens Connect outside of Boston in the first place? These questions hung in the air as they pondered the one big one about passing over Connected Bits for another partner: should they?…(More)”

Evaluating Complex Social Initiatives


Srik Gopal at Stanford Social Innovation Review: “…the California Endowment (TCE) .. and ..The Grand Rapids Community Foundation (GRCF) …are just two funders who are actively “shifting the lens” in terms of how they are looking at evaluation in the light of complexity. They are building on the recognition that a traditional approach to evaluation—assessing specific effects of a defined program according to a set of pre-determined outcomes, often in a way that connects those outcomes back to the initiative—is increasingly falling short. There is a clear message emerging that evaluation needs to accommodate complexity, not “assume it away.”

My colleagues at FSG and I have, based on our work with TCE, GRCF, and numerous other clients, articulated a set of nine “propositions” in a recent practice brief that are helpful in guiding how we conceptualize, design, and implement evaluations of complex initiatives. We derived these propositions from what we now know (based on the emerging field of complexity science) as distinctive characteristics of complex systems. We know, for example, that complex systems are always changing, often in unpredictable ways; they are never static. Hence, we need to design evaluations so that they are adaptive, flexible, and iterative, not rigid and cookie-cutter.

Below are three of the propositions in more detail, along with tools and methods that can help apply the proposition in practice.

It is important to note that many of the traditional tools and methods that form the backbone of sound evaluations—such as interviews, focus groups, and surveys—are still relevant. We would, however, suggest that organizations adapt those methods to reflect a complexity orientation. For example, interviews should explore the role of context; we should not confine them to the initiative’s boundaries. Focus groups should seek to understand local adaptation, not just adherence. And surveys should probe for relationships and interdependencies, not just perceived outcomes. In addition to traditional methods, we suggest incorporating newer, innovative techniques that provide a richer narrative, including:

  • Systems mapping—an iterative, often participatory process of graphically representing a system, including its components and connections
  • Appreciative inquiry—a group process that inquires into, identifies, and further develops the best of “what is” in organizations
  • Design thinking—a user-centered approach to developing new solutions to abstract, ill-defined, or complex problems… (More)”

Crowdsourcing America’s cybersecurity is an idea so crazy it might just work


at the Washington Post: “One idea that’s starting to bubble up from Silicon Valley is the concept of crowdsourcing cybersecurity. As Silicon Valley venture capitalist Robert R. Ackerman, Jr. has pointed out, due to “the interconnectedness of our society in cyberspace,” cyber networks are best viewed as an asset that we all have a shared responsibility to protect. Push on that concept hard enough and you can see how many of the core ideas from Silicon Valley – crowdsourcing, open source software, social networking, and the creative commons – can all be applied to cybersecurity.

Silicon Valley venture capitalists are already starting to fund companies that describe themselves as crowdsourcing cybersecurity. For example, take Synack, a “crowd security intelligence” company that received $7.5 million in funding from Kleiner Perkins (one of Silicon Valley’s heavyweight venture capital firms), Allegis Ventures, and Google Ventures in 2014. Synack’s two founders are ex-NSA employees, and they are using that experience to inform an entirely new type of business model. Synack recruits and vets a global network of “white hat hackers,” and then offers their services to companies worried about their cyber networks. For a fee, these hackers are able to find and repair any security risks.

So how would crowdsourced national cybersecurity work in practice?

For one, there would be free and transparent sharing of computer code used to detect cyber threats between the government and private sector. In December, the U.S. Army Research Lab added a bit of free source code, a “network forensic analysis network” known as Dshell, to the mega-popular code sharing site GitHub. Already, there have been 100 downloads and more than 2,000 unique visitors. The goal, says William Glodek of the U.S. Army Research Laboratory, is for this shared code to “help facilitate the transition of knowledge and understanding to our partners in academia and industry who face the same problems.”

This open sourcing of cyber defense would be enhanced with a scaled-up program of recruiting “white hat hackers” to become officially part of the government’s cybersecurity efforts. Popular annual events such as the DEF CON hacking conference could be used to recruit talented cyber sleuths to work alongside the government.

There have already been examples of communities where people facing a common cyber threat gather together to share intelligence. Perhaps the best-known example is the Conficker Working Group, a security coalition that was formed in late 2008 to share intelligence about malicious Conficker malware. Another example is the Financial Services Information Sharing and Analysis Center, which was created by presidential mandate in 1998 to share intelligence about cyber threats to the nation’s financial system.

Of course, there are some drawbacks to this crowdsourcing idea. For one, such a collaborative approach to cybersecurity might open the door to government cyber defenses being infiltrated by the enemy. Ackerman makes the point that you never really know who’s contributing to any community. Even on a site such as Github, it’s theoretically possible that an ISIS hacker or someone like Edward Snowden could download the code, reverse engineer it, and then use it to insert “Trojan Horses” intended for military targets into the code….  (More)