Selected Readings on Data Responsibility, Refugees and Migration


By Kezia Paladina, Alexandra Shaw, Michelle Winowatan, Stefaan Verhulst, and Andrew Young

The Living Library’s Selected Readings series seeks to build a knowledge base on innovative approaches for improving the effectiveness and legitimacy of governance. This curated and annotated collection of recommended works on the topic of Data Collaboration for Migration was originally published in 2018.

Special thanks to Paul Currion whose data responsibility literature review gave us a headstart when developing the below. (Check out his article listed below on Refugee Identity)

The collection below is also meant to complement our article in the Stanford Social Innovation Review on Data Collaboration for Migration where we emphasize the need for a Data Responsibility Framework moving forward.

From climate change to politics to finance, there is growing recognition that some of the most intractable problems of our era are information problems. In recent years, the ongoing refugee crisis has increased the call for new data-driven approaches to address the many challenges and opportunities arising from migration. While data – including data from the private sector – holds significant potential value for informing analysis and targeted international and humanitarian response to (forced) migration, decision-makers often lack an actionable understanding of if, when and how data could be collected, processed, stored, analyzed, used, and shared in a responsible manner.

Data responsibility – including the responsibility to protect data and shield its subjects from harms, and the responsibility to leverage and share data when it can provide public value – is an emerging field seeking to go beyond just privacy concerns. The forced migration arena has a number of particularly important issues impacting responsible data approaches, including the risks of leveraging data regarding individuals fleeing a hostile or repressive government.

In this edition of the GovLab’s Selected Readings series, we examine the emerging literature on the data responsibility approaches in the refugee and forced migration space – part of an ongoing series focused on Data Responsibiltiy. The below reading list features annotated readings related to the Policy and Practice of data responsibility for refugees, and the specific responsibility challenges regarding Identity and Biometrics.

Data Responsibility and Refugees – Policy and Practice

International Organization for Migration (IOM) (2010) IOM Data Protection Manual. Geneva: IOM.

  • This IOM manual includes 13 data protection principles related to the following activities: lawful and fair collection, specified and legitimate purpose, data quality, consent, transfer to third parties, confidentiality, access and transparency, data security, retention and personal data, application of the principles, ownership of personal data, oversight, compliance and internal remedies (and exceptions).
  • For each principle, the IOM manual features targeted data protection guidelines, and templates and checklists are included to help foster practical application.

Norwegian Refugee Council (NRC) Internal Displacement Monitoring Centre / OCHA (eds.) (2008) Guidance on Profiling Internally Displaced Persons. Geneva: Inter-Agency Standing Committee.

  • This NRC document contains guidelines on gathering better data on Internally Displaced Persons (IDPs), based on country context.
  • IDP profile is defined as number of displaced persons, location, causes of displacement, patterns of displacement, and humanitarian needs among others.
  • It further states that collecting IDPs data is challenging and the current condition of IDPs data are hampering assistance programs.
  • Chapter I of the document explores the rationale for IDP profiling. Chapter II describes the who aspect of profiling: who IDPs are and common pitfalls in distinguishing them from other population groups. Chapter III describes the different methodologies that can be used in different contexts and suggesting some of the advantages and disadvantages of each, what kind of information is needed and when it is appropriate to profile.

United Nations High Commissioner for Refugees (UNHCR). Model agreement on the sharing of personal data with Governments in the context of hand-over of the refugee status determination process. Geneva: UNHCR.

  • This document from UNHCR provides a template of agreement guiding the sharing of data between a national government and UNHCR. The model agreement’s guidance is aimed at protecting the privacy and confidentiality of individual data while promoting improvements to service delivery for refugees.

United Nations High Commissioner for Refugees (UNHCR) (2015). Policy on the Protection of Personal Data of Persons of Concern to UNHCR. Geneva: UNHCR.

  • This policy outlines the rules and principles regarding the processing of personal data of persons engaged by UNHCR with the purpose of ensuring that the practice is consistent with UNGA’s regulation of computerized personal data files that was established to protect individuals’ data and privacy.
  • UNHCR require its personnel to apply the following principles when processing personal data: (i) Legitimate and fair processing (ii) Purpose specification (iii) Necessity and proportionality (iv) Accuracy (v) Respect for the rights of the data subject (vi) Confidentiality (vii) Security (viii) Accountability and supervision.

United Nations High Commissioner for Refugees (UNHCR) (2015) Privacy Impact Assessment of UNHCR Cash Based Interventions.

  • This impact assessment focuses on privacy issues related to financial assistance for refugees in the form of cash transfers. For international organizations like UNHCR to determine eligibility for cash assistance, data “aggregation, profiling, and social sorting techniques,” are often needed, leading a need for a responsible data approach.
  • This Privacy Impact Assessment (PIA) aims to identify the privacy risks posed by their program and seek to enhance safeguards that can mitigate those risks.
  • Key issues raised in the PIA involves the challenge of ensuring that individuals’ data will not be used for purposes other than those initially specified.

Data Responsibility in Identity and Biometrics

Bohlin, A. (2008) “Protection at the Cost of Privacy? A Study of the Biometric Registration of Refugees.” Lund: Faculty of Law of the University of Lund.

  • This 2008 study focuses on the systematic biometric registration of refugees conducted by UNHCR in refugee camps around the world, to understand whether enhancing the registration mechanism of refugees contributes to their protection and guarantee of human rights, or whether refugee registration exposes people to invasions of privacy.
  • Bohlin found that, at the time, UNHCR failed to put a proper safeguards in the case of data dissemination, exposing the refugees data to the risk of being misused. She goes on to suggest data protection regulations that could be put in place in order to protect refugees’ privacy.

Currion, Paul. (2018) “The Refugee Identity.” Medium.

  • Developed as part of a DFID-funded initiative, this essay considers Data Requirements for Service Delivery within Refugee Camps, with a particular focus on refugee identity.
  • Among other findings, Currion finds that since “the digitisation of aid has already begun…aid agencies must therefore pay more attention to the way in which identity systems affect the lives and livelihoods of the forcibly displaced, both positively and negatively.”
  • Currion argues that a Responsible Data approach, as opposed to a process defined by a Data Minimization principle, provides “useful guidelines,” but notes that data responsibility “still needs to be translated into organisational policy, then into institutional processes, and finally into operational practice.”

Farraj, A. (2010) “Refugees and the Biometric Future: The Impact of Biometrics on Refugees and Asylum Seekers.” Colum. Hum. Rts. L. Rev. 42 (2010): 891.

  • This article argues that biometrics help refugees and asylum seekers establish their identity, which is important for ensuring the protection of their rights and service delivery.
  • However, Farraj also describes several risks related to biometrics, such as, misidentification and misuse of data, leading to a need for proper approaches for the collection, storage, and utilization of the biometric information by government, international organizations, or other parties.  

GSMA (2017) Landscape Report: Mobile Money, Humanitarian Cash Transfers and Displaced Populations. London: GSMA.

  • This paper from GSMA seeks to evaluate how mobile technology can be helpful in refugee registration, cross-organizational data sharing, and service delivery processes.
  • One of its assessments is that the use of mobile money in a humanitarian context depends on the supporting regulatory environment that contributes to unlocking the true potential of mobile money. The examples include extension of SIM dormancy period to anticipate infrequent cash disbursements, ensuring that persons without identification are able to use the mobile money services, and so on.
  • Additionally, GMSA argues that mobile money will be most successful when there is an ecosystem to support other financial services such as remittances, airtime top-ups, savings, and bill payments. These services will be especially helpful in including displaced populations in development.

GSMA (2017) Refugees and Identity: Considerations for mobile-enabled registration and aid delivery. London: GSMA.

  • This paper emphasizes the importance of registration in the context of humanitarian emergency, because being registered and having a document that proves this registration is key in acquiring services and assistance.
  • Studying cases of Kenya and Iraq, the report concludes by providing three recommendations to improve mobile data collection and registration processes: 1) establish more flexible KYC for mobile money because where refugees are not able to meet existing requirements; 2) encourage interoperability and data sharing to avoid fragmented and duplicative registration management; and 3) build partnership and collaboration among governments, humanitarian organizations, and multinational corporations.

Jacobsen, Katja Lindskov (2015) “Experimentation in Humanitarian Locations: UNHCR and Biometric Registration of Afghan Refugees.” Security Dialogue, Vol 46 No. 2: 144–164.

  • In this article, Jacobsen studies the biometric registration of Afghan refugees, and considers how “humanitarian refugee biometrics produces digital refugees at risk of exposure to new forms of intrusion and insecurity.”

Jacobsen, Katja Lindskov (2017) “On Humanitarian Refugee Biometrics and New Forms of Intervention.” Journal of Intervention and Statebuilding, 1–23.

  • This article traces the evolution of the use of biometrics at the Office of the United Nations High Commissioner for Refugees (UNHCR) – moving from a few early pilot projects (in the early-to-mid-2000s) to the emergence of a policy in which biometric registration is considered a ‘strategic decision’.

Manby, Bronwen (2016) “Identification in the Context of Forced Displacement.” Washington DC: World Bank Group. Accessed August 21, 2017.

  • In this paper, Bronwen describes the consequences of not having an identity in a situation of forced displacement. It prevents displaced population from getting various services and creates higher chance of exploitation. It also lowers the effectiveness of humanitarian actions, as lacking identity prevents humanitarian organizations from delivering their services to the displaced populations.
  • Lack of identity can be both the consequence and and cause of forced displacement. People who have no identity can be considered illegal and risk being deported. At the same time, conflicts that lead to displacement can also result in loss of ID during travel.
  • The paper identifies different stakeholders and their interest in the case of identity and forced displacement, and finds that the biggest challenge for providing identity to refugees is the politics of identification and nationality.
  • Manby concludes that in order to address this challenge, there needs to be more effective coordination among governments, international organizations, and the private sector to come up with an alternative of providing identification and services to the displaced persons. She also argues that it is essential to ensure that national identification becomes a universal practice for states.

McClure, D. and Menchi, B. (2015). Challenges and the State of Play of Interoperability in Cash Transfer Programming. Geneva: UNHCR/World Vision International.

  • This report reviews the elements that contribute to the interoperability design for Cash Transfer Programming (CTP). The design framework offered here maps out these various features and also looks at the state of the problem and the state of play through a variety of use cases.
  • The study considers the current state of play and provides insights about the ways to address the multi-dimensionality of interoperability measures in increasingly complex ecosystems.     

NRC / International Human Rights Clinic (2016). Securing Status: Syrian refugees and the documentation of legal status, identity, and family relationships in Jordan.

  • This report examines Syrian refugees’ attempts to obtain identity cards and other forms of legally recognized documentation (mainly, Ministry of Interior Service Cards, or “new MoI cards”) in Jordan through the state’s Urban Verification Exercise (“UVE”). These MoI cards are significant because they allow Syrians to live outside of refugee camps and move freely about Jordan.
  • The text reviews the acquirement processes and the subsequent challenges and consequences that refugees face when unable to obtain documentation. Refugees can encounter issues ranging from lack of access to basic services to arrest, detention, forced relocation to camps and refoulement.  
  • Seventy-two Syrian refugee families in Jordan were interviewed in 2016 for this report and their experiences with obtaining MoI cards varied widely.

Office of Internal Oversight Services (2015). Audit of the operations in Jordan for the Office of the United Nations High Commissioner for Refugees. Report 2015/049. New York: UN.

  • This report documents the January 1, 2012 – March 31, 2014 audit of Jordanian operations, which is intended to ensure the effectiveness of the UNHCR Representation in the state.
  • The main goals of the Regional Response Plan for Syrian refugees included relieving the pressure on Jordanian services and resources while still maintaining protection for refugees.
  • The audit results concluded that the Representation was initially unsatisfactory, and the OIOS suggested several recommendations according to the two key controls which the Representation acknowledged. Those recommendations included:
    • Project management:
      • Providing training to staff involved in financial verification of partners supervise management
      • Revising standard operating procedure on cash based interventions
      • Establishing ways to ensure that appropriate criteria for payment of all types of costs to partners’ staff are included in partnership agreements
    • Regulatory framework:
      • Preparing annual need-based procurement plan and establishing adequate management oversight processes
      • Creating procedures for the assessment of renovation work in progress and issuing written change orders
      • Protecting data and ensuring timely consultation with the UNHCR Division of Financial and Administrative Management

UNHCR/WFP (2015). Joint Inspection of the Biometrics Identification System for Food Distribution in Kenya. Geneva: UNHCR/WFP.

  • This report outlines the partnership between the WFP and UNHCR in its effort to promote its biometric identification checking system to support food distribution in the Dadaab and Kakuma refugee camps in Kenya.
  • Both entities conducted a joint inspection mission in March 2015 and was considered an effective tool and a model for other country operations.
  • Still, 11 recommendations are proposed and responded to in this text to further improve the efficiency of the biometric system, including real-time evaluation of impact, need for automatic alerts, documentation of best practices, among others.

A Clever Smartphone Attachment Will Show if Water Is Contaminated


Victor Tangermann in Futurism: “…astronomers from the University of Leiden in the Netherlands… are developing a simple smartphone attachment that makes it ridiculously, comically easy to measure the quality of water by pointing the tool at it, nothing more.

The tool’s primary purpose isn’t just so that you can whet your whistle in any lake, river, or creek you deem tasty-looking  quick and precise measurements of water pollution can be hugely beneficial for science. This kind of data can steer environmental policies on a national level. Citizens can tell if their drinking water is contaminated. Fishermen are able to determine the quality of their catch, and how pollution could affect local fish populations. Polluted water can even determine human migration patterns by forcing fishermen to move or give up their trade altogether….

There’s a precedent that have researchers hopeful. In 2013, the same team of astronomers and toxicologists developed the iSPEX (Spectropolarimeter for Planetary EXploration) — a smartphone attachment that can measure air pollution. Dutch citizens, along with people in cities from Athens to London, took thousands of measurements of the particulates in the air. The result: a detailed map of dust particles over the Netherlands and beyond.

The technology behind the smartphone attachment actually is a spin-off of sophisticated astronomy technology that can tell if oxygen is present on planets around other stars. This also foregoes the need to take local samples and send them back to the lab — a relatively expensive process that can take a lot longer….(More)”.

How Refugees Are Helping Create Blockchain’s Brand New World


Jessi Hempel at Wired: “Though best known for underpinning volatile cryptocurrencies, like Bitcoin and Ethereum, blockchain technology has a number of qualities which make it appealing for record-keeping. A distributed ledger doesn’t depend on a central authority to verify its existence, or to facilitate transactions within it, which makes it less vulnerable to tampering. By using applications that are built on the ‘chain, individuals may be able to build up records over time, use those records across borders as a form of identity—essentially creating the trust they need to interact with the world, without depending on a centralized authority, like a government or a bank, to vouch for them.

For now, these efforts are small experiments. In Finland, the Finnish Immigration Service offers refugees a prepaid Mastercard developed by the Helsinki-based startup MONI that also links to a digital identity, composed of the record of one’s financial transactions, which is stored on the blockchain. In Moldova, the government is working with digital identification expertsfrom the United Nations Office for Project Services (UNOPS) to brainstorm ways to use blockchain to provide children living in rural areas with a digital identity, so it’s more difficult for traffickers to smuggle them across borders.

Among the more robust programs is a pilot the United Nations World Food Program (WFP) launched in Jordan last May. Syrian refugees stationed at the Azraq Refugee Camp receive vouchers to shop at the local grocery store. The WFP integrated blockchain into its biometric authentication technology, so Syrian refugees can cash in their vouchers at the supermarket by staring into a retina scanner. These transactions are recorded on a private Ethereum-basedblockchain, called Building Blocks. Because the blockchain eliminates the need for WFP to pay banks to facilitate transactions, Building Blocks could save the WFP as much as $150,000 each month in bank fees in Jordan alone. The program has been so successful that by the end of the year, the WFP plans to expand the technology throughout Jordan. Blockchain enthusiasts imagine a future in which refugees can access more than just food vouchers, accumulating a transaction history that could stand in as a credit history when they attempt to resettle….

But in the rush to apply blockchain technology to every problem, many point out that relying on the ledger may have unintended consequences. As the Blockchain for Social Impact chief technology officer at ConsenSys, Robert Greenfeld IV writes, blockchain-based identity “isn’t a silver bullet, and if we don’t think about it/build it carefully, malicious actors could still capitalize on it as an element of control.” If companies rely on private blockchains, he warns, there’s a danger that the individual permissions will prevent these identity records from being used in multiple places. (Many of these projects, like the UNWFP project, are built on private blockchains so that organizations can exert more control over their development.) “If we don’t start to collaborate together with populations, we risk ending up with a bunch of siloed solutions,” says Greenfeld.

For his part, Greenfeld suggests governments could easily use state-sponsored machine learning algorithms to monitor public blockchain activity. But as bitcoin enthusiasts branch out of their get-rich-quick schemes to wrestle with how to make the web more equitable for everyone, they have the power to craft a world of their own devising. The early web should be a lesson to the bitcoin enthusiasts as they promote the blockchain’s potential. Right now we have the power to determine its direction; the dangers exist, but the potential is enormous….(More)”

Could the open government movement shut the door on Freedom of Information


 and  in The Conversation: “For democracy to work, citizens need to know what their government is doing. Then they can hold government officials and institutions accountable.

Over the last 50 years, Freedom of Information – or FOI – laws have been one of the most useful methods for citizens to learn what government is doing. These state and federal laws give people the power to request, and get, government documents. From everyday citizens to journalists, FOI laws have proven a powerful way to uncover the often-secret workings of government.

But a potential threat is emerging – from an unexpected place – to FOI laws.

We are scholars of government administration, ethics and transparency. And our research leads us to believe that while FOI laws have always faced many challenges, including resistance, evasion,  and poor implementation and enforcement, the last decade has brought a different kind of challenge in the form of a new approach to transparency….

The open government movement could help FOI implementation. Government information posted online, which is a core goal of open government advocates, can reduce the number of FOI requests. Open government initiatives can explicitly promote FOI by encouraging the passage of FOI laws, offering more training for officials who fill FOI requests, and developing technologies to make it easier to process and track FOI requests.

On the other hand, the relationship between open government and FOI may not always be positive in practice.

First, as with all kinds of public policy issues, resources – both money and political attention – are inherently scarce. Government officials now have to divide their attention between FOI and other open government initiatives. And funders now have to divide their financial resources between FOI and other open government initiatives.

Second, the open government reform movement as well as the FOI movement have long depended on nonprofit advocacy groups – from the National Freedom of Information Coalition and its state affiliates to the Sunlight Foundation – to obtain and disseminate government information. This means that the financial stability of those nonprofit groups is crucial. But their efforts, as they grow, may each only get a shrinking portion of the total amount of grant money available. Freedominfo.org, a website for gathering and comparing information on FOI laws around the world, had to suspend its operations in 2017 due to resources drying up.

We believe that priorities among government officials and good government advocates may also shift away from FOI. At a time when open data is “hot,” FOI programs could get squeezed as a result of this competition. Further, by allowing governments to claim credit for more politically convenient reforms such as online data portals, the open government agenda may create a false sense of transparency – there’s a lot more government information that isn’t available in those portals.

This criticism was leveled recently against Kenya, whose government launched a high-profile open data portal for publishing data on government performance and activities in 2011, yet delayed passage of an FOI law until 2016.

Similarly, in the United Kingdom, one government minister said in 2012,“I’d like to make Freedom of Information redundant, by pushing out so much data that people won’t have to ask for it.”…(More)”

New game aims to inoculate people against fake news


Springwise: “The term ‘fake news’ has become all too common in media coverage. However, a news item doesn’t have to be entirely made up to be misleading. Many fake news stories intend to deceive, often with a political agenda. Disinformation works because many people fail to recognise false information. A recent study, conducted by Britain’s Channel 4, found that only four percent of those surveyed could tell fake news from real. So how to inoculate people against fake news? Dutch organisation DROG, which works against the spread of disinformation, has teamed up with researchers at Cambridge University in the United Kingdom to develop a game that they claim can help confer resistance against false or misleading information.

The game, titled The Bad News Game, works by putting players in the position of creating fake news, so that they gain insight into the tactics and methods used by ‘real’ fake news-mongers to spread their message. This, in turn, builds up resistance to fake news. In the game, players are shown short texts or images and can react to them in a variety of ways. Choosing an option similar to that followed by a ‘real’ producer of disinformation earns the player more followers and credibility. Lying too blatantly, choosing an option that is obviously ridiculous, or acting in line with journalistic best practices, and the player will lose followers and credibility. The aim of the game is to gather as many followers as possible without losing too much credibility.

The Bad News Game is suitable for use in schools and takes around 20 minutes to complete. It joins other recent socially conscious educational innovations such as a cooking app that encourages healthy eating and a board game that eases discussions about arranged marriages….(More)”.

Trustworthy data will transform the world


 at the Financial Times: “The internet’s original sin was identified as early as 1993 in a New Yorker cartoon. “On the internet, nobody knows you’re a dog,” the caption ran beneath an illustration of a pooch at a keyboard. That anonymity has brought some benefits. But it has also created myriad problems, injecting distrust into the digital world. If you do not know the provenance and integrity of information and data, how can you trust their veracity?

That has led to many of the scourges of our times, such as cyber crime, identity theft and fake news. In his Alan Turing Institute lecture in London last week, the American computer scientist Sandy Pentland outlined the massive gains that could result from trusted data.

The MIT professor argued that the explosion of such information would give us the capability to understand our world in far more detail than ever before. Most of what we know in the fields of sociology, psychology, political science and medicine is derived from tiny experiments in controlled environments. But the data revolution enables us to observe behaviour as it happens at mass scale in the real world. That feedback could provide invaluable evidence about which theories are most valid and which policies and products work best.

The promise is that we make soft social science harder and more predictive. That, in turn, could lead to better organisations, fairer government, and more effective monitoring of our progress towards achieving collective ambitions, such as the UN’s sustainable development goals. To take one small example, Mr Pentland illustrated the strong correlation between connectivity and wealth. By studying the telephone records of 100,000 users in south-east Asia, researchers have plotted social connectivity against income. The conclusion: “The more diverse your connections, the more money you have.” This is not necessarily a causal relationship but it does have a strong causal element, he suggested.

Similar studies of European cities have shown an almost total segregation between groups of different socio-economic status. That lack of connectivity has to be addressed if our politics is not to descend further into a meaningless dialogue.

Data give us a new way to measure progress.

For years, the Open Data movement has been working to create public data sets that can better inform decision making. This worldwide movement is prising open anonymised public data sets, such as transport records, so that they can be used by academics, entrepreneurs and civil society groups. However, much of the most valuable data is held by private entities, notably the consumer tech companies, telecoms operators, retailers and banks. “The big win would be to include private data as a public good,” Mr Pentland said….(More)”.

Using Open Data for Public Services


New report by the Open Data Institute:  “…Today we’re publishing our initial findings based on examining 8 examples where open data supports the delivery of a public service. We have defined 3 high-level ‘patterns’ for how open data is used in public services. We think these could be helpful for others looking to redesign and deliver better services.

The patterns are summarised in the table below:

The first pattern is perhaps the model which everyone is most familiar with as it’s used by the likes of Citymapper, who use open transport data from Transport for London to inform passengers about routes and timings, and other citizen-focused apps. Data is released by a public sector organisation about a public service and a third organisation uses this data to provide a complementary service, online or face-face, to help citizens use the public service.

The second pattern involves the release of open data in the service delivery chain. Open data is used to plan public service delivery and make service delivery chains more efficient. Examples provided in the report include local authorities’ release of open spending, contract and tender data, which is used by Spend Network to support better value for money in public expenditure.

In the third pattern, public sector organisations commissioning services and external organisations involved in service delivery make strategic decisions based on insights and patterns revealed by open data. Visualisations of open data can inform policies on job seeker allowance, as shown in the example from the Department for Work and Pensions in the report.

As well as identifying these patterns, we have created ecosystem maps of the public services we have examined to help understand the relationships and the mechanisms by which open data supports each of them….

Having compared the ecosystems of the examples we have considered so far, the report sets out practical recommendations for those involved in the delivery of public services and for Central Government for the better use of open data in the delivery of public services.

The recommendations are focused on organisational collaboration; technology infrastructure, digital skills and literacy; open standards for data; senior level championing; peer networks; intermediaries; and problem focus….(More)”.

Predictive text app helps reverse gendered language


Springwise: “Research has shown that people talk differently to children depending on their gender. Without even realising it, adults tend to talk to boys in terms of their abilities, but to girls in terms of their looks. Over time, this difference can affect how children, and in particular girls, see themselves, and can affect their self-confidence. Finnish child rights organisation Plan International, in conjunction with Samsung Electronics Nordic, decided to try and change this unconscious behaviour with a predictive text app. Sheboard seeks to empower girls by raising awareness of the impacts of gendered speech.

As users are typing, Sheboard will suggest gender neutral words as well as words that are designed to empower girls, such as “I’m capable” and “I deserve”. The app also swaps stereotypical expressions with those that are more positive. The goal is to remind girls about the qualities and abilities they have. In the words of Nora Lindström, Plan’s Global Coordinator for Digital Development, “We want to help people see the impact that words have, and make them consider ways in which they can change how they talk in order to empower girls.”

In developing the app, Plan had girls and women of different ages contribute their personal empowerment phrases. Plan acknowledges that technological innovations in and of themselves won’t change gender-stereotypical behaviour. However, the hope is that the app will lead to a greater awareness and understanding of these issues and in Finland and elsewhere. The app is currently available on Google Play. Sheboard joins other girls-power products such as an app that adds augmented reality statues of remarkable women to public places and toys designed to encourage girls to enter STEM fields….(More)”.

The nation that thrived by ‘nudging’ its population


Sarah Keating at the BBC: “Singapore has grown from almost nothing in 50 years. And this well-regarded society has been built up, partly, thanks to the power of suggestion….But while Singapore still loves a public campaign, it has moved toward a more nuanced approach of influencing the behaviours of its inhabitants.

Nudging the population isn’t uniquely Singaporean; more than 150 governments across the globe have tried nudging as a better choice. A medical centre in Qatar, for example, managed to increase the uptake of diabetes screening by offering to test people during Ramadan. People were fasting anyway so the hassle of having to not eat before your testing was removed. It was convenient and timely, two key components to a successful nudge.

Towns in Iceland, India and China have trialed ‘floating zebra crossings’ – 3D optical illusions which make the crossings look like they are floating above the ground designed to urge drivers to slow down. And in order to get people to pay their taxes in the UK, people were sent a letter saying that the majority of taxpayers pay their taxes on time which has had very positive results. Using social norms make people want to conform.

In Singapore some of the nudges you come across are remarkably simple. Rubbish bins are placed away from bus stops to separate smokers from other bus users. Utility bills display how your energy consumption compares to your neighbours. Outdoor gyms have been built near the entrances and exits of HDB estates so they are easy to use, available and prominent enough to consistently remind you. Train stations have green and red arrows on the platform indicating where you should stand so as to speed up the alighting process. If you opt to travel at off-peak times (before 0700), your fare is reduced.

And with six out of 10 Singaporeans eating at food courts four or more times a week, getting people to eat healthier is also a priority. As well as the Healthier Dining Programme, some places make it cheaper to take the healthy option. If you’re determined to eat that Fried Bee Hoon at Khoo Teck Puat Hospital, for example, you’re going to have to pay more for it.

The National Steps Challenge, which encourages participants to get exercising using free step counters in exchange for cash and prizes, has been so successful that the programme name has been trademarked. This form of gamifying is one of the more successful ways of engaging users in achieving objectives. Massive queues to collect the free fitness tracker demonstrated the programme’s popularity.

And it’s not just in tangible ways that nudges are being rolled out. Citizens pay into a mandatory savings programme called the Central Provident Fund at a high rate. This can be accessed for healthcare, housing and pensions as a way to get people to save long-term because evidence has shown that people are too short-sighted when it comes to financing their future

And as the government looks to increase the population 30% by 2030, the city-state’s ageing population and declining birth rate is a problem. The Baby Bonus Scheme goes some way to encouraging parents to have more children by offering cash incentives. Introduced in 2001, the scheme means that all Singapore citizens who have a baby get a cash gift as well as a money into a Child Development Account (CDA) which can be used to pay for childcare and healthcare. The more children you have, the more money you get – since March 2016 you get a cash gift of $8,000 SGD (£4,340) for your first child and up to $10,000 (£5,430) for the third and any subsequent children, as well as money into your CDA.

So do people like being nudged? Is there any cultural difference in the way people react to being swayed toward a ‘better’ choice or behaviour? Given the breadth of the international use of behavioural insights, there is relatively little research done into whether people are happy about it….(More)”.

The Rise of Virtual Citizenship


James Bridle in The Atlantic: “In Cyprus, Estonia, the United Arab Emirates, and elsewhere, passports can now be bought and sold….“If you believe you are a citizen of the world, you are a citizen of nowhere. You don’t understand what citizenship means,” the British prime minister, Theresa May, declared in October 2016. Not long after, at his first postelection rally, Donald Trump asserted, “There is no global anthem. No global currency. No certificate of global citizenship. We pledge allegiance to one flag and that flag is the American flag.” And in Hungary, Prime Minister Viktor Orbán has increased his national-conservative party’s popularity with statements like “all the terrorists are basically migrants” and “the best migrant is the migrant who does not come.”

Citizenship and its varying legal definition has become one of the key battlegrounds of the 21st century, as nations attempt to stake out their power in a G-Zero, globalized world, one increasingly defined by transnational, borderless trade and liquid, virtual finance. In a climate of pervasive nationalism, jingoism, xenophobia, and ever-building resentment toward those who move, it’s tempting to think that doing so would become more difficult. But alongside the rise of populist, identitarian movements across the globe, identity itself is being virtualized, too. It no longer needs to be tied to place or nation to function in the global marketplace.

Hannah Arendt called citizenship “the right to have rights.” Like any other right, it can be bestowed and withheld by those in power, but in its newer forms it can also be bought, traded, and rewritten. Virtual citizenship is a commodity that can be acquired through the purchase of real estate or financial investments, subscribed to via an online service, or assembled by peer-to-peer digital networks. And as these options become available, they’re also used, like so many technologies, to exclude those who don’t fit in.

In a world that increasingly operates online, geography and physical infrastructure still remain crucial to control and management. Undersea fiber-optic cables trace the legacy of imperial trading routes. Google and Facebook erect data centers in Scandinavia and the Pacific Northwest, close to cheap hydroelectric power and natural cooling. The trade in citizenship itself often manifests locally as architecture. From luxury apartments in the Caribbean and the Mediterranean to data centers in Europe and refugee settlements in the Middle East, a scattered geography of buildings brings a different reality into focus: one in which political decisions and national laws transform physical space into virtual territory…(More)”.