Visual argumentation


Volta: “Visualising arguments helps people assemble their throughts and get to grip with complex problems according to The Argumentation Factory, based in Amsterdam. Their Argument Maps, constructed for government agencies, NGOs and commercial organizations, are designed to enable people to make better decisions and share and communicate information.
Dutch research organisation TNO, in association with The Argumentation Factory, have launched the European Shale Gas Argument Map detailing the pros and cons of the production of shale gas for EU member states with shale gas resources. Their map is designed to provide the foundation for an open discussion and help the user make a balaced assessment.”

schaliegaswinning-s-26

The Social Affordances of the Internet for Networked Individualism


Paper by NetLab (Toronto University) scholars in the latest issue of the Journal of Computer-Mediated Communication: “We review the evidence from a number of surveys in which our NetLab has been involved about the extent to which the Internet is transforming or enhancing community. The studies show that the Internet is used for connectivity locally as well as globally, although the nature of its use varies in different countries. Internet use is adding on to other forms of communication, rather than replacing them. Internet use is reinforcing the pre-existing turn to societies in the developed world that are organized around networked individualism rather than group or local solidarities. The result has important implications for civic involvement.”

Procurement needs better data now


Howard Rolfe, procurement director for East of England NHS Collaborative Procurement Hub, in The Guardian: “Knowledge management is fundamental to any organisation and procurement in the NHS is no exception. Current systems are not joined up and don’t give the level of information that should be expected. Management in many NHS trusts cannot say how effective procurement is within their organisation because they don’t have a dashboard of information that tells them, for example, the biggest spend areas, who is placing the order, what price is paid and how that price compares.
Systems now exist that could help answer these questions and increase board and senior management focus on this area of huge spend….The time for better data is now, the opportunity is at the top of political and management agendas and the need is overwhelming. What is the solution? The provision of effective knowledge management systems is key and will facilitate improvements in information, procurement and collaborative aggregation by providing greater visibility of spend and reduction of administrative activity.”

The Dangers of Surveillance


Paper by Neil M. Richards in Harvard Law Review. Abstract:  “From the Fourth Amendment to George Orwell’s Nineteen Eighty-Four, our culture is full of warnings about state scrutiny of our lives. These warnings are commonplace, but they are rarely very specific. Other than the vague threat of an Orwellian dystopia, as a society we don’t really know why surveillance is bad, and why we should be wary of it. To the extent the answer has something to do with “privacy,” we lack an understanding of what “privacy” means in this context, and why it matters. Developments in government and corporate practices have made this problem more urgent. Although we have laws that protect us against government surveillance, secret government programs cannot be challenged until they are discovered.
… I propose a set of four principles that should guide the future development of surveillance law, allowing for a more appropriate balance between the costs and benefits of government surveillance. First, we must recognize that surveillance transcends the public-private divide. Even if we are ultimately more concerned with government surveillance, any solution must grapple with the complex relationships between government and corporate watchers. Second, we must recognize that secret surveillance is illegitimate, and prohibit the creation of any domestic surveillance programs whose existence is secret. Third, we should recognize that total surveillance is illegitimate and reject the idea that it is acceptable for the government to record all Internet activity without authorization. Fourth, we must recognize that surveillance is harmful. Surveillance menaces intellectual privacy and increases the risk of blackmail, coercion, and discrimination; accordingly, we must recognize surveillance as a harm in constitutional standing doctrine.

Investigating Terror in the Age of Twitter


Michael Chertoff and Dallas Lawrence in WSJ: “A dozen years ago when the terrorists struck on 9/11, there was no Facebook or Twitter or i-anything on the market. Cellphones were relatively common, but when cell networks collapsed in 2001, many people were left disconnected and wanting for immediate answers. Last week in Boston, when mobile networks became overloaded following the bombings, the social-media-savvy Boston Police Department turned to Twitter, using the platform as a makeshift newsroom to alert media and concerned citizens to breaking news.
Law-enforcement agencies around the world will note how social media played a prominent role both in telling the story and writing its eventual conclusion. Some key lessons have emerged.”

Policy Modeling through Collaboration and Simulation


New paper on “Bridging narrative scenario texts and formal policy modeling through conceptual policy modeling” in Artificial Intelligence and Law.

Abstract: “Engaging stakeholders in policy making and supporting policy development with advanced information and communication technologies including policy simulation is currently high on the agenda of research. In order to involve stakeholders in providing their input to policy modeling via online means, simple techniques need to be employed such as scenario technique. Scenarios enable stakeholders to express their views in narrative text. At the other end of policy development, a frequently used approach to policy modeling is agent-based simulation. So far, effective support to transform narrative text input to formal simulation statements is not widely available. In this paper, we present a novel approach to support the transformation of narrative texts via conceptual modeling into formal simulation models. The approach also stores provenance information which is conveyed via annotations of texts to the conceptual model and further on to the simulation model. This way, traceability of information is provided, which contributes to better understanding and transparency, and therewith enables stakeholders and policy modelers to return to the sources that informed the conceptual and simulation model.”

Hacktivists as Gadflies


Peter Ludlow, professor of philosophy at Northwestern University, in the New York Times: “Hacktivists, roughly speaking, are individuals who redeploy and repurpose technology for social causes….For some reason, it seems that the government considers hackers who are out to line their pockets less of a threat than those who are trying to make a political point….The law, as interpreted by the prosecutors, makes it a felony to use a computer system for “unintended” applications, or even violate a terms-of-service agreement. That would theoretically make a felon out of anyone who lied about their age or weight on Match.com…In a world in which nearly everyone is technically a felon, we rely on the good judgment of prosecutors to decide who should be targets and how hard the law should come down on them. We have thus entered a legal reality not so different from that faced by Socrates when the Thirty Tyrants ruled Athens, and it is a dangerous one. When everyone is guilty of something, those most harshly prosecuted tend to be the ones that are challenging the established order, poking fun at the authorities, speaking truth to power — in other words, the gadflies of our society.”

June 1: National Day of Civic Hacking


From Peter Welsch at the White House: “On the first weekend in June, civic activists, technology experts, and entrepreneurs around the country will gather together for the National Day of Civic Hacking. By combining their expertise with new technologies and publicly released data, participants hope to build tools that help others in their own neighborhoods and across the United States”.

Apply for the National Day of Civic Hacking at the White House. The deadline for applications is 5:00pm on Friday, April 19.