Who Is Falling for Fake News?


Article by Angie Basiouny: “People who read fake news online aren’t doomed to fall into a deep echo chamber where the only sound they hear is their own ideology, according to a revealing new study from Wharton.

Surprisingly, readers who regularly browse fake news stories served up by social media algorithms are more likely to diversify their news diet by seeking out mainstream sources. These well-rounded news junkies make up more than 97% of online readers, compared with the scant 2.8% who consume online fake news exclusively.

“We find that these echo chambers that people worry about are very shallow. This idea that the internet is creating an echo chamber is just not holding out to be true,” said Senthil Veeraraghavan, a Wharton professor of operations, information and decisions.

Veeraraghavan is co-author of the paper, “Does Fake News Create Echo Chambers?” It was also written by Ken Moon, Wharton professor of operations, information and decisions, and Jiding Zhang, an assistant operations management professor at New York University Shanghai who earned her doctorate at Wharton.

The study, which examined the browsing activity of nearly 31,000 households during 2017, offers empirical evidence that goes against popular beliefs about echo chambers. While echo chambers certainly are dark and dangerous places, they aren’t metaphorical black holes that suck in every person who reads an article about, say, Obama birtherism theory or conspiracies about COVID-19 vaccines. The study found that households exposed to fake news actually increase their exposure to mainstream news by 9.1%.

“We were surprised, although we were very aware going in that there was much that we did not know,” Moon said. “One thing we wanted to see is how much fake news is out there. How do we figure out what’s fake and what’s not, and who is producing the fake news and why? The economic structure of that matters from a business perspective.”…(More)”

Meet the new GDP prototype that tracks inequality


Article by Greg Rosalsky: “…Nearly a century after Kuznets pioneered the use of GDP, economists Thomas Blanchet, Emmanuel Saez, and Gabriel Zucman are trying to revolutionize it. In a new paper titled “Real-Time Inequality,” the economists imagine a new kind of GDP, one that isn’t merely a single number telling us about total economic growth, but a collection of numbers telling us where the gains from this growth are flowing. They already have a working prototype that they’ve published online, and it can provide some important insights about our economy right now…

Gabriel Zucman is an economist at UC Berkeley and the director of the James M. and Cathleen D. Stone Center on Wealth and Income Inequality. He has been working to transform government economic statistics — also called “national accounts” — for almost a decade. He says the national accounts offer the public valuable insights about economic growth. However, Zucman says, “The big problem is these data do not tell you who is benefiting from economic growth.”

America, of course, already has tons of data on inequality. The problem, Zucman says, is it usually takes a year or two for this data to be updated. “It’s not enough to come in two years after the policy battle, and say, ‘Look, this is what happened to inequality,'” Zucman says. “That’s too late.”

Their new project is an effort to fix this. Cobbling together data from a variety of official sources, Zucman and his colleagues have pioneered a method to compute in a more timely fashion how different income groups — like the working class and the middle class — are doing economically. They hope this prototype will inspire the federal government to follow suit and soon “produce numbers about how income is growing for each social group at the exact time when the Bureau of Economic Analysis releases its official GDP growth numbers.”

Zucman envisions a future where this data could inform and shape policy decisions. When considering policies like sending stimulus checks or providing tax relief, Zucman says, policymakers and voters need to know things like “which groups need more support, or whether the government may be actually overshooting, which might lead to inflation.”…(More)”.

Use of Data in Public Sector Human Resources and Workforce Management: Solutions and Challenges


White Paper by Katherine Barrett and Richard Greene: “Across the U.S., a growing number of cities, counties, and states are using data across agencies to improve management and make decisions—and HR and payroll professionals in particular stand to gain much from this data to help drive staffing and other strategic decisions. In this white paper, industry experts Katherine Barrett and Richard Greene take a deep dive into both the benefits and challenges of using data with real-life examples of how data has been instrumental in building a resilient HR apparatus.

Data can be used for positive change that includes shorter new-hire onboarding, fairer overtime distribution, and even improved employee safety. However, obstacles to using data in an optimal way to improve HR management, such as insufficient funding, lack of training, and lack of software access, can keep government organizations from making the most of all it can offer.

Despite barriers, many organizations are moving toward creating a culture that is conducive to the use of the data their computers can create. Examples of how data and data analysis can transform workforce management practices include:

  • Studying existing hiring and onboarding data to facilitate more effective and efficient administration
  • Tracking turnover data to document employee departures and reveal information about those most at risk of sudden departure
  • Reducing overtime by using the data to ensure fairer distribution of overtime
  • Uncovering equity issues by assessing and comparing the demographic makeup of a workforce to see how closely it matches their population…(More)”

Confronting Reality in Cyberspace: Foreign Policy for a Fragmented Internet


Report by Council on Foreign Affairs Task Force: “…The Task Force proposes three pillars to a foreign policy that should guide Washington’s adaptation to today’s more complex, variegated, and dangerous cyber realm.

First, Washington should confront reality and consolidate a coalition of allies and friends around a vision of the internet that preserves—to the greatest degree possible—a trusted, protected international communication platform.

Second, the United States should balance more targeted diplomatic and economic pressure on adversaries, as well as more disruptive cyber operations, with clear statements about self-imposed restraint on specific types of targets agreed to among U.S. allies.

Third, the United States needs to put its own proverbial house in order. That requirement calls for Washington to link more cohesively its policy for digital competition with the broader enterprise of national security strategy.

The major recommendations of the Task Force are as follows:

  • Build a digital trade agreement among trusted partners.
  • Agree to and adopt a shared policy on digital privacy that is interoperable with Europe’s General Data Protection Regulation (GDPR).
  • Resolve outstanding issues on U.S.-European Union (EU) data transfers.
  • Create an international cybercrime center.
  • Launch a focused program for cyber aid and infrastructure development.
  • Work jointly across partners to retain technology superiority.
  • Declare norms against destructive attacks on election and financial systems.
  • Negotiate with adversaries to establish limits on cyber operations directed at nuclear command, control, and communications (NC3) systems.
  • Develop coalition-wide practices for the Vulnerabilities Equities Process (VEP).
  • Adopt greater transparency about defend forward actions.
  • Hold states accountable for malicious activity emanating from their territories.
  • Make digital competition a pillar of the national security strategy.
  • Clean up U.S. cyberspace by offering incentives for internet service providers (ISPs) and cloud providers to reduce malicious activity within their infrastructure.
  • Address the domestic intelligence gap.
  • Promote the exchange of and collaboration among talent from trusted partners.
  • Develop the expertise for cyber foreign policy.

A free, global, and open internet was a worthy aspiration that helped guide U.S. policymakers for the internet’s first thirty years. The internet as it exists today, however, demands a reconsideration of U.S. cyber and foreign policies to confront these new realities. The Task Force believes that U.S. goals moving forward will be more limited and thus more attainable, but the United States needs to act quickly to design strategies and tactics that can ameliorate an urgent threat…(More)”.

Non-Fungible Tokens (NFTs)


Report by the Congressional Research Service:Non-fungible tokens (NFTs) have become popular as unique and non-interchangeable units of data that signify ownership of associated digital items, such as images, music, or videos. Token “ownership” is recorded and tracked on a blockchain (a digital database that records data on a decentralized network of computers without the use of a central authority). In the future, supporters believe NFTs will be used as digital representations of physical items, such as a deed to a house or title to a car. NFTs are commonly used to record and represent ownership of an item, verify authenticity, and enable exchange. However, they do not necessarily reflect the legal ownership of an asset or grant copyright to a digital or physical item. NFT owners purchase only the right to the NFT’s blockchain metadata or “token,” not the underlying asset, unless otherwise specified in external contracts or terms and conditions. NFTs share many similarities with cryptocurrencies, and they are commonly bought and traded using cryptocurrency. Both NFTs and cryptocurrencies are built and tracked on blockchains, and they share much of the same customer and community base. However, cryptocurrencies are fungible, meaning interchangeable, whereas NFTs are unique and therefore non-fungible. Most users create and buy NFTs on dedicated NFT marketplaces. For a typical NFT, it is created or “minted” on a blockchain, auctioned off or sold at a fixed price on an NFT marketplace, and “stored”in the buyer’s digital wallet. Smart contracts (self-executing contracts or lines of computer code on a blockchain) can mint NFTs or transfer them from one owner to another. In combination, blockchains and smart contracts are the backbone of the NFT ecosystem…

Report by the Congressional Research Service: “Non-fungible tokens (NFTs) have become popular as unique and non-interchangeable units of data that signify ownership of associated digital items, such as images, music, or videos. Token “ownership” is recorded and tracked on a blockchain (a digital database that records data on a decentralized network of computers without the use of a central authority). In the future, supporters believe NFTs will be used as digital representations of physical items, such as a deed to a house or title to a car. NFTs are commonly used to record and represent ownership of an item, verify authenticity, and enable exchange. However, they do not necessarily reflect the legal ownership of an asset or grant copyright to a digital or physical item. NFT owners purchase only the right to the NFT’s blockchain metadata or “token,” not the underlying asset, unless otherwise specified in external contracts or terms and conditions. NFTs share many similarities with cryptocurrencies, and they are commonly bought and traded using cryptocurrency. Both NFTs and cryptocurrencies are built and tracked on blockchains, and they share much of the same customer and community base. However, cryptocurrencies are fungible, meaning interchangeable, whereas NFTs are unique and therefore non-fungible. Most users create and buy NFTs on dedicated NFT marketplaces. For a typical NFT, it is created or “minted” on a blockchain, auctioned off or sold at a fixed price on an NFT marketplace, and “stored”in the buyer’s digital wallet. Smart contracts (self-executing contracts or lines of computer code on a blockchain) can mint NFTs or transfer them from one owner to another. In combination, blockchains and smart contracts are the backbone of the NFT ecosystem…

Despite substantial market growth over the past two years, NFTs are still relatively nascent. In their current form, NFTs have implications in a variety of policy areas:
– Consumer protection. There are a number of risks to consumers in the NFT ecosystem, and some NFT marketplaces and digital wallets lack basic features to protect consumers from fraud and misleading or deceptive practices.
– Financial regulation. Depending on the purpose and use of NFTs, some NFTs and NFT platforms may fall under existing financial regulatory regimes and definitions.
– Copyright and intellectual property. The relationship between NFTs and the legal ownership of digital or physical property is unclear. Some existing regulations may impact NFT markets.
– Energy and environmental. Both minting and selling NFTs require substantial amounts of energy, which has raised concerns about their environmental impact…(More)”.

Is GDP Becoming Obsolete? The “Beyond GDP” Debate


Paper by Charles R. Hulten & Leonard I. Nakamura: “GDP is a closely watched indicator of the current health of the economy and an important tool of economic policy. It has been called one of the great inventions of the 20th Century. It is not, however, a persuasive indicator of individual wellbeing or economic progress. There have been calls to refocus or replace GDP with a metric that better reflects the welfare dimension. In response, the U.S. agency responsible for the GDP accounts recently launched a “GDP and Beyond” program. This is by no means an easy undertaking, given the subjective and idiosyncratic nature of much of individual wellbeing. This paper joins the Beyond GDP effort by extending the standard utility maximization model of economic theory, using an expenditure function approach to include those non-GDP sources of wellbeing for which a monetary value can be established. We term our new measure expanded GDP (EGDP). A welfare-adjusted stock of wealth is also derived using the same general approach used to obtain EGDP. This stock is useful for issues involving the sustainability of wellbeing over time. One of the implications of this dichotomy is that conventional cost-based wealth may increase over a period of time while welfare-corrected wealth may show a decrease (due, for example, to strongly negative environmental externalities)…(More)”

On the Power of Networks


Essay by Jay Lloyd: “A mosquito net made from lemons, a workout shirt that feeds sweat to cyanobacteria to generate electricity, a water filter using moss from the Andes—and a slime mold that produces eerie electronic music. For a few days in late June, I logged on to help judge the Biodesign Challenge, a seven-year-old competition where high school and college students showcase designs that use biotechnology to address real problems. Fifty-six teams from 18 countries presented their creations—some practical, others purely speculative.

The competition is, by design, cautiously optimistic about the potential for technology to solve problems such as plastic pollution or malaria or sexually transmitted diseases. This caution manifests in an emphasis on ethics as a first principle in design: many problems the students seek to solve are the results of previous “solutions” gone wrong. Underlying this is a conviction that technology can help build a world that not only works better but is also more just. The biodesign worldview starts with research to understand problems in context, then imagines a design for a biology-based solution, and often envisions how that technology could transform today’s power dynamics. Two projects this year speculated about using mRNA to reduce systemic racism and global inequality. 

The Biodesign Challenge is a profoundly hopeful exercise in future-building, but the tensions inherent in this theory of change became clear at the awards ceremony, which coincided with the Supreme Court’s announcement of the reversal of Roe v. Wade, ending the right to abortion at the national level. The ceremony took place under a cloud, and these entrancing proposals for an imagined biofuture sharply juxtaposed with the results of the blunt exercise of political power. 

Clearly, networks of people devoted to a cause can be formidable forces for change—and it’s possible that Biodesign Challenge itself could become such a network in the future. The group consists of more than 100 teachers and judges—artists, scientists, social scientists, and people from the biotech industry—and the challengers themselves, who Zoom in from Shanghai, Buenos Aires, Savannah, Cincinnati, Turkey, and elsewhere. As biotechnology matures around the world, it will be applied by networks of people who have determined which problems need to be addressed…(More)”.

Hackathons should be renamed to avoid negative connotations


Article by Alison Paprica, Kimberlyn McGrail and Michael J. Schull: “Events where groups of people come together to create or improve software using large data sets are usually called hackathons. As health data researchers who want to build and maintain public trust, we recommend the use of alternative terms, such as datathon and code fest.

Hackathon is a portmanteau that combines the words “hack” and “marathon.” The “hack” in hackathon is meant to refer to a clever and improvised way of doing something rather than unauthorized computer or data access. From a computer scientist’s perspective, “hackathon” probably sounds innovative, intensive and maybe a little disruptive, but in a helpful rather than criminal way.

The issue is that members of the public do not interpret “hack” the way that computer scientists do.

Our team, and many others, have performed research studies to understand the public’s interests and concerns when health data are used for research and innovation. In all of these studies, we are not aware of any positive references to “hack” or related terms. But studies from Canadathe United Kingdom and Australia have all found that members of the public consistently raise hacking as a major concern for health data…(More)”.

See Plastic in a National Park? Log It on This Website for Science


Article by Angely Mercado: “You’re hiking through glorious nature when you see it—a dirty, squished plastic water bottle along the trail. Instead of picking it up and impotently cursing the litterer, you can now take another small helpful step—you can report the trash to a new data project that aims to inspire policy change. Environmental nonprofit 5 Gyres is asking national park visitors in the U.S. to log trash they see through a new site called TrashBlitz.

The organization, which is dedicated to reducing plastic pollution, created TrashBlitz to gather data on how much, and what kind, of plastic and other litter is clogging our parks. They want to encourage realistic plastic pollution reduction plans for all 63 national parks.

Once registered on the TrashBlitz website, park visitors can specify the types of trash that they’ve spotted, such as if the discarded item was used for food packaging. According to 5 Gyres, the data will contribute to a report to be published this fall on the top items discarded, the materials, and the brands that have created the most waste across national parks…(More)”.

Legislating Data Loyalty


Paper by Woodrow Hartzog and NNeil M. Richards: “eil M. RichardsLawmakers looking to embolden privacy law have begun to consider imposing duties of loyalty on organizations trusted with people’s data and online experiences. The idea behind loyalty is simple: organizations should not process data or design technologies that conflict with the best interests of trusting parties. But the logistics and implementation of data loyalty need to be developed if the concept is going to be capable of moving privacy law beyond its “notice and consent” roots to confront people’s vulnerabilities in their relationship with powerful data collectors.

In this short Essay, we propose a model for legislating data loyalty. Our model takes advantage of loyalty’s strengths—it is well-established in our law, it is flexible, and it can accommodate conflicting values. Our Essay also explains how data loyalty can embolden our existing data privacy rules, address emergent dangers, solve privacy’s problems around consent and harm, and establish an antibetrayal ethos as America’s privacy identity.

We propose that lawmakers use a two-step process to (1) articulate a primary, general duty of loyalty, then (2) articulate “subsidiary” duties that are more specific and sensitive to context. Subsidiary duties regarding collection, personalization, gatekeeping, persuasion, and mediation would target the most opportunistic contexts for self-dealing and result in flexible open-ended duties combined with highly specific rules. In this way, a duty of data loyalty is not just appealing in theory—it can be effectively implemented in practice just like the other duties of loyalty our law has recognized for hundreds of years. Loyalty is thus not only flexible, but it is capable of breathing life into America’s historically tepid privacy frameworks…(More)”.