Collective Intelligence in Open Policymaking


Book by Rafał Olszowski: “This book examines the nexus of collective intelligence (CI), a feature of online projects in which various types of communities solve problems intelligently, and open policymaking, as a trend of large groups of people shaping public policies.

While doing so, it presents the current state of theoretical knowledge for these concepts, many practical examples of successful and unsuccessful projects, as well as additional research and laboratory experiments. The book develops an analytical framework based on qualitative research, which is applied to the analysis of different projects in selected case studies, such as Decide Madrid; Better Reykjavik; Loomio; Deliberatorium; Civic Budget of the City of Kraków.

The book is structured into four chapters, addressing essential questions in the field: (1) Opening Policymaking; (2) Beyond the Individual: Understanding the Evolution of Collective Intelligence; (3) A Review of the Projects Using Collective Intelligence in Policymaking; (4) Online Public Debate. How Can We Make it More Intelligent?…(More)”.

Towards a pan-EU Freedom of Information Act? Harmonizing Access to Information in the EU through the internal market competence


Paper by Alberto Alemanno and Sébastien Fassiaux: “This paper examines whether – and on what basis – the EU may harmonise the right of access to information across the Union. It does by examining the available legal basis established by relevant international obligations, such as those stemming from the Council of Europe, and EU primary law. Its demonstrates that neither the Council of Europe – through the European Convention of Human Rights and the more recent Trømso Convention – nor the EU – through Article 41 of the EU Charter of Fundamental Rights – do require the EU to enact minimum standards of access to information. That Charter’s provision combined with Articles 10 and 11 TEU do require instead only the EU institutions – not the EU Member States – to ensure public access to documents, including legislative texts and meeting minutes. Regulation 1049/2001 was adopted (originally Art. 255 TEC) on such a legal basis and should be revised accordingly. The paper demonstrates that the most promising legal basis enabling the EU to proceed towards the harmonisation of access to information within the EU is offered by Article 114 TFEU. It argues hat the harmonisation of the conditions governing access to information across Member States would facilitate cross-border activities and trade, thus enhancing the internal market. Moreover, this would ensure equal access to information for all EU citizens and residents, irrespective of their location within the EU. Therefore, the question is not whether but how the EU may – under Article 114 TFEU – act to harmonise access to information. If the EU enjoys wide legislative discretion under Article 114(1) TFEU, this is not absolute but is subject to limits derived from fundamental rights and principles such as proportionality, equality, and subsidiarity. Hence, the need to design the type of harmonisation capable of preserving existing national FOIAs while enhancing the weakest ones. The only type of harmonisation fit for purpose would therefore be minimal, as opposed to maximal, by merely defining the minimum conditions required on each Member State’s national legislation governing the access to information…(More)”.

Digital Media and Grassroots Anti-Corruption


Open access book edited by Alice Mattoni: “Delving into a burgeoning field of research, this enlightening book utilises case studies from across the globe to explore how digital media is used at the grassroots level to combat corruption. Bringing together an impressive range of experts, Alice Mattoni deftly assesses the design, creation and use of a wide range of anti-corruption technologies…(More)”.

Private Thought and Public Speech


Essay by David Bromwich: “The past decade has witnessed a notable rise in the deployment of outrageous speech and censorship: opposite tendencies, on the face of things, which actually strengthen each other’s claim. My aim in this essay is to defend the traditional civil libertarian argument against censorship, without defending outrageous speech. By outrageous, I should add, I don’t mean angry or indignant or accusing speech, of the sort its opponents call “extreme” (often because it expresses an opinion shared by a small minority). Spoken words of this sort may give an impetus to thought, and their existence is preferable to anything that could be done to silence them. Outrageous speech, by contrast, is speech that means only to enrage, and not to convey any information or argument, in however primitive a form. No intelligent person wishes there were more of it. But, for the survival of a free society, censorship is far more dangerous.  

Let me try for a closer description of these rival tendencies. On the one hand, there is the unembarrassed publication of the degrading epithet, the intemperate accusation, the outlandish verbal assault against a person thought to be an erring member of one’s own milieu; and on the other hand, the bureaucratized penalizing of inappropriate speech (often classified as such quite recently) which has become common in the academic, media, professional, and corporate workplace. …(More)”.

The not-so-silent type: Vulnerabilities across keyboard apps reveal keystrokes to network eavesdroppers


Report by Jeffrey KnockelMona Wang, and Zoë Reichert: “Typing logographic languages such as Chinese is more difficult than typing alphabetic languages, where each letter can be represented by one key. There is no way to fit the tens of thousands of Chinese characters that exist onto a single keyboard. Despite this obvious challenge, technologies have developed which make typing in Chinese possible. To enable the input of Chinese characters, a writer will generally use a keyboard app with an “Input Method Editor” (IME). IMEs offer a variety of approaches to inputting Chinese characters, including via handwriting, voice, and optical character recognition (OCR). One popular phonetic input method is Zhuyin, and shape or stroke-based input methods such as Cangjie or Wubi are commonly used as well. However, used by nearly 76% of mainland Chinese keyboard users, the most popular way of typing in Chinese is the pinyin method, which is based on the pinyin romanization of Chinese characters.

All of the keyboard apps we analyze in this report fall into the category of input method editors (IMEs) that offer pinyin input. These keyboard apps are particularly interesting because they have grown to accommodate the challenge of allowing users to type Chinese characters quickly and easily. While many keyboard apps operate locally, solely within a user’s device, IME-based keyboard apps often have cloud features which enhance their functionality. Because of the complexities of predicting which characters a user may want to type next, especially in logographic languages like Chinese, IMEs often offer “cloud-based” prediction services which reach out over the network. Enabling “cloud-based” features in these apps means that longer strings of syllables that users type will be transmitted to servers elsewhere. As many have previously pointed out, “cloud-based” keyboards and input methods can function as vectors for surveillance and essentially behave as keyloggers. While the content of what users type is traveling from their device to the cloud, it is additionally vulnerable to network attackers if not properly secured. This report is not about how operators of cloud-based IMEs read users’ keystrokes, which is a phenomenon that has already been extensively studied and documented. This report is primarily concerned with the issue of protecting this sensitive data from network eavesdroppers…(More)”.

Digitalization in Practice


Book edited by Jessamy Perriam and Katrine Meldgaard Kjær: “..shows that as welfare is increasingly digitalized, an investigation of the social implications of this digitalization becomes increasingly pertinent. The book offers chapters on how the state operates, from the day-to-day practices of governance to keeping registers of businesses, from overarching and sometimes contradictory policies to considering how to best include citizens in digitalized processes. Moreover, the book takes a citizen perspective on key issues of access, identification and social harm to consider the social implications of digitalization in the everyday. The diversity of topics in Digitalization in Practice reflects how digitalization as an ongoing process and practice fundamentally impacts and often reshapes the relationship between states and citizens.

  • Provides much needed critical perspectives on digital states in practice.
  • Opens up provocative questions for further studies and research topics in digital states.
  • Showcases empirical studies of situations where digital states are enacted…(More)”.

The citizen’s panel on AI issues its report


Belgian presidency of the European Union: “Randomly select 60 citizens from all four corners of Belgium. Give them an exciting topic to explore. Add a few local players. Season with participation experts. Bake for three weekends at the Egmont Palace conference centre. And you’ll end up with the rich and ambitious views of citizens on the future of artificial intelligence (AI) in the European Union.

This is the recipe that has been in progress since February 2024, led by the Belgian presidency of the European Union, with the ambition of involving citizens in this strategic field and enriching the debate on AI, which has been particularly lively in recent months as part of the drafting of the AI Act recently adopted by the European Parliament.

And the initiative really cut the mustard, as the 60 citizens worked enthusiastically, overcoming their apprehensions about a subject as complex as AI. In a spirit of collective intelligence, they dove right into the subject, listening to speakers from academia, government, civil society and the private sector, and sharing their experiences and knowledge. Some of them were just discovering AI, while others were already using it. They turned this diversity into a richness, enabling them to write a report on citizens’ views that reflects the various aspirations of the Belgian population.

At the end of the three weekends, the citizens almost unanimously adopted a precise and ambitious report containing nine key messages focusing on the need for a responsible, ambitious and beneficial approach to AI, ensuring that it serves the interests of all and leaves no one behind…(More)”

Artificial intelligence, the common good, and the democratic deficit in AI governance


Paper by Mark Coeckelbergh: “There is a broad consensus that artificial intelligence should contribute to the common good, but it is not clear what is meant by that. This paper discusses this issue and uses it as a lens for analysing what it calls the “democracy deficit” in current AI governance, which includes a tendency to deny the inherently political character of the issue and to take a technocratic shortcut. It indicates what we may agree on and what is and should be up to (further) deliberation when it comes to AI ethics and AI governance. Inspired by the republican tradition in political theory, it also argues for a more active role of citizens and (end-)users: not only as participants in deliberation but also in ensuring, creatively and communicatively, that AI contributes to the common good…(More)”.

Dynamic Collective Action and the Power of Large Numbers


Paper by Marco Battaglini & Thomas R. Palfrey: “Collective action is a dynamic process where individuals in a group assess over time the benefits and costs of participating toward the success of a collective goal. Early participation improves the expectation of success and thus stimulates the subsequent participation of other individuals who might otherwise be unwilling to engage. On the other hand, a slow start can depress expectations and lead to failure for the group. Individuals have an incentive to procrastinate, not only in the hope of free riding, but also in order to observe the flow of participation by others, which allows them to better gauge whether their own participation will be useful or simply wasted. How do these phenomena affect the probability of success for a group? As the size of the group increases, will a “power of large numbers” prevail producing successful outcomes, or will a “curse of large numbers” lead to failure? In this paper, we address these questions by studying a dynamic collective action problem in which n individuals can achieve a collective goal if a share of them takes a costly action (e.g., participate in a protest, join a picket line, or sign an environmental agreement). Individuals have privately known participation costs and decide over time if and when to participate. We characterize the equilibria of this game and show that under general conditions the eventual success of collective action is necessarily probabilistic. The process starts for sure, and hence there is always a positive probability of success; however, the process “gets stuck” with positive probability, in the sense that participation stops short of the goal. Equilibrium outcomes have a simple characterization in large populations: welfare converges to either full efficiency or zero as n→∞ depending on a precise condition on the rate at which the share required for success converges to zero. Whether success is achievable or not, delays are always irrelevant: in the limit, success is achieved either instantly or never…(More)”

Multiple Streams and Policy Ambiguity


Book by Rob A. DeLeo, Reimut Zohlnhöfer and Nikolaos Zahariadis: “The last decade has seen a proliferation of research bolstering the theoretical and methodological rigor of the Multiple Streams Framework (MSF), one of the most prolific theories of agenda-setting and policy change. This Element sets out to address some of the most prominent criticisms of the theory, including the lack of empirical research and the inconsistent operationalization of key concepts, by developing the first comprehensive guide for conducting MSF research. It begins by introducing the MSF, including key theoretical constructs and hypotheses. It then presents the most important theoretical extensions of the framework and articulates a series of best practices for operationalizing, measuring, and analyzing MSF concepts. It closes by exploring existing gaps in MSF research and articulating fruitful areas of future research…(More)”.