Selected Readings on Data Responsibility, Refugees and Migration


By Kezia Paladina, Alexandra Shaw, Michelle Winowatan, Stefaan Verhulst, and Andrew Young

The Living Library’s Selected Readings series seeks to build a knowledge base on innovative approaches for improving the effectiveness and legitimacy of governance. This curated and annotated collection of recommended works on the topic of Data Collaboration for Migration was originally published in 2018.

Special thanks to Paul Currion whose data responsibility literature review gave us a headstart when developing the below. (Check out his article listed below on Refugee Identity)

The collection below is also meant to complement our article in the Stanford Social Innovation Review on Data Collaboration for Migration where we emphasize the need for a Data Responsibility Framework moving forward.

From climate change to politics to finance, there is growing recognition that some of the most intractable problems of our era are information problems. In recent years, the ongoing refugee crisis has increased the call for new data-driven approaches to address the many challenges and opportunities arising from migration. While data – including data from the private sector – holds significant potential value for informing analysis and targeted international and humanitarian response to (forced) migration, decision-makers often lack an actionable understanding of if, when and how data could be collected, processed, stored, analyzed, used, and shared in a responsible manner.

Data responsibility – including the responsibility to protect data and shield its subjects from harms, and the responsibility to leverage and share data when it can provide public value – is an emerging field seeking to go beyond just privacy concerns. The forced migration arena has a number of particularly important issues impacting responsible data approaches, including the risks of leveraging data regarding individuals fleeing a hostile or repressive government.

In this edition of the GovLab’s Selected Readings series, we examine the emerging literature on the data responsibility approaches in the refugee and forced migration space – part of an ongoing series focused on Data Responsibiltiy. The below reading list features annotated readings related to the Policy and Practice of data responsibility for refugees, and the specific responsibility challenges regarding Identity and Biometrics.

Data Responsibility and Refugees – Policy and Practice

International Organization for Migration (IOM) (2010) IOM Data Protection Manual. Geneva: IOM.

  • This IOM manual includes 13 data protection principles related to the following activities: lawful and fair collection, specified and legitimate purpose, data quality, consent, transfer to third parties, confidentiality, access and transparency, data security, retention and personal data, application of the principles, ownership of personal data, oversight, compliance and internal remedies (and exceptions).
  • For each principle, the IOM manual features targeted data protection guidelines, and templates and checklists are included to help foster practical application.

Norwegian Refugee Council (NRC) Internal Displacement Monitoring Centre / OCHA (eds.) (2008) Guidance on Profiling Internally Displaced Persons. Geneva: Inter-Agency Standing Committee.

  • This NRC document contains guidelines on gathering better data on Internally Displaced Persons (IDPs), based on country context.
  • IDP profile is defined as number of displaced persons, location, causes of displacement, patterns of displacement, and humanitarian needs among others.
  • It further states that collecting IDPs data is challenging and the current condition of IDPs data are hampering assistance programs.
  • Chapter I of the document explores the rationale for IDP profiling. Chapter II describes the who aspect of profiling: who IDPs are and common pitfalls in distinguishing them from other population groups. Chapter III describes the different methodologies that can be used in different contexts and suggesting some of the advantages and disadvantages of each, what kind of information is needed and when it is appropriate to profile.

United Nations High Commissioner for Refugees (UNHCR). Model agreement on the sharing of personal data with Governments in the context of hand-over of the refugee status determination process. Geneva: UNHCR.

  • This document from UNHCR provides a template of agreement guiding the sharing of data between a national government and UNHCR. The model agreement’s guidance is aimed at protecting the privacy and confidentiality of individual data while promoting improvements to service delivery for refugees.

United Nations High Commissioner for Refugees (UNHCR) (2015). Policy on the Protection of Personal Data of Persons of Concern to UNHCR. Geneva: UNHCR.

  • This policy outlines the rules and principles regarding the processing of personal data of persons engaged by UNHCR with the purpose of ensuring that the practice is consistent with UNGA’s regulation of computerized personal data files that was established to protect individuals’ data and privacy.
  • UNHCR require its personnel to apply the following principles when processing personal data: (i) Legitimate and fair processing (ii) Purpose specification (iii) Necessity and proportionality (iv) Accuracy (v) Respect for the rights of the data subject (vi) Confidentiality (vii) Security (viii) Accountability and supervision.

United Nations High Commissioner for Refugees (UNHCR) (2015) Privacy Impact Assessment of UNHCR Cash Based Interventions.

  • This impact assessment focuses on privacy issues related to financial assistance for refugees in the form of cash transfers. For international organizations like UNHCR to determine eligibility for cash assistance, data “aggregation, profiling, and social sorting techniques,” are often needed, leading a need for a responsible data approach.
  • This Privacy Impact Assessment (PIA) aims to identify the privacy risks posed by their program and seek to enhance safeguards that can mitigate those risks.
  • Key issues raised in the PIA involves the challenge of ensuring that individuals’ data will not be used for purposes other than those initially specified.

Data Responsibility in Identity and Biometrics

Bohlin, A. (2008) “Protection at the Cost of Privacy? A Study of the Biometric Registration of Refugees.” Lund: Faculty of Law of the University of Lund.

  • This 2008 study focuses on the systematic biometric registration of refugees conducted by UNHCR in refugee camps around the world, to understand whether enhancing the registration mechanism of refugees contributes to their protection and guarantee of human rights, or whether refugee registration exposes people to invasions of privacy.
  • Bohlin found that, at the time, UNHCR failed to put a proper safeguards in the case of data dissemination, exposing the refugees data to the risk of being misused. She goes on to suggest data protection regulations that could be put in place in order to protect refugees’ privacy.

Currion, Paul. (2018) “The Refugee Identity.” Medium.

  • Developed as part of a DFID-funded initiative, this essay considers Data Requirements for Service Delivery within Refugee Camps, with a particular focus on refugee identity.
  • Among other findings, Currion finds that since “the digitisation of aid has already begun…aid agencies must therefore pay more attention to the way in which identity systems affect the lives and livelihoods of the forcibly displaced, both positively and negatively.”
  • Currion argues that a Responsible Data approach, as opposed to a process defined by a Data Minimization principle, provides “useful guidelines,” but notes that data responsibility “still needs to be translated into organisational policy, then into institutional processes, and finally into operational practice.”

Farraj, A. (2010) “Refugees and the Biometric Future: The Impact of Biometrics on Refugees and Asylum Seekers.” Colum. Hum. Rts. L. Rev. 42 (2010): 891.

  • This article argues that biometrics help refugees and asylum seekers establish their identity, which is important for ensuring the protection of their rights and service delivery.
  • However, Farraj also describes several risks related to biometrics, such as, misidentification and misuse of data, leading to a need for proper approaches for the collection, storage, and utilization of the biometric information by government, international organizations, or other parties.  

GSMA (2017) Landscape Report: Mobile Money, Humanitarian Cash Transfers and Displaced Populations. London: GSMA.

  • This paper from GSMA seeks to evaluate how mobile technology can be helpful in refugee registration, cross-organizational data sharing, and service delivery processes.
  • One of its assessments is that the use of mobile money in a humanitarian context depends on the supporting regulatory environment that contributes to unlocking the true potential of mobile money. The examples include extension of SIM dormancy period to anticipate infrequent cash disbursements, ensuring that persons without identification are able to use the mobile money services, and so on.
  • Additionally, GMSA argues that mobile money will be most successful when there is an ecosystem to support other financial services such as remittances, airtime top-ups, savings, and bill payments. These services will be especially helpful in including displaced populations in development.

GSMA (2017) Refugees and Identity: Considerations for mobile-enabled registration and aid delivery. London: GSMA.

  • This paper emphasizes the importance of registration in the context of humanitarian emergency, because being registered and having a document that proves this registration is key in acquiring services and assistance.
  • Studying cases of Kenya and Iraq, the report concludes by providing three recommendations to improve mobile data collection and registration processes: 1) establish more flexible KYC for mobile money because where refugees are not able to meet existing requirements; 2) encourage interoperability and data sharing to avoid fragmented and duplicative registration management; and 3) build partnership and collaboration among governments, humanitarian organizations, and multinational corporations.

Jacobsen, Katja Lindskov (2015) “Experimentation in Humanitarian Locations: UNHCR and Biometric Registration of Afghan Refugees.” Security Dialogue, Vol 46 No. 2: 144–164.

  • In this article, Jacobsen studies the biometric registration of Afghan refugees, and considers how “humanitarian refugee biometrics produces digital refugees at risk of exposure to new forms of intrusion and insecurity.”

Jacobsen, Katja Lindskov (2017) “On Humanitarian Refugee Biometrics and New Forms of Intervention.” Journal of Intervention and Statebuilding, 1–23.

  • This article traces the evolution of the use of biometrics at the Office of the United Nations High Commissioner for Refugees (UNHCR) – moving from a few early pilot projects (in the early-to-mid-2000s) to the emergence of a policy in which biometric registration is considered a ‘strategic decision’.

Manby, Bronwen (2016) “Identification in the Context of Forced Displacement.” Washington DC: World Bank Group. Accessed August 21, 2017.

  • In this paper, Bronwen describes the consequences of not having an identity in a situation of forced displacement. It prevents displaced population from getting various services and creates higher chance of exploitation. It also lowers the effectiveness of humanitarian actions, as lacking identity prevents humanitarian organizations from delivering their services to the displaced populations.
  • Lack of identity can be both the consequence and and cause of forced displacement. People who have no identity can be considered illegal and risk being deported. At the same time, conflicts that lead to displacement can also result in loss of ID during travel.
  • The paper identifies different stakeholders and their interest in the case of identity and forced displacement, and finds that the biggest challenge for providing identity to refugees is the politics of identification and nationality.
  • Manby concludes that in order to address this challenge, there needs to be more effective coordination among governments, international organizations, and the private sector to come up with an alternative of providing identification and services to the displaced persons. She also argues that it is essential to ensure that national identification becomes a universal practice for states.

McClure, D. and Menchi, B. (2015). Challenges and the State of Play of Interoperability in Cash Transfer Programming. Geneva: UNHCR/World Vision International.

  • This report reviews the elements that contribute to the interoperability design for Cash Transfer Programming (CTP). The design framework offered here maps out these various features and also looks at the state of the problem and the state of play through a variety of use cases.
  • The study considers the current state of play and provides insights about the ways to address the multi-dimensionality of interoperability measures in increasingly complex ecosystems.     

NRC / International Human Rights Clinic (2016). Securing Status: Syrian refugees and the documentation of legal status, identity, and family relationships in Jordan.

  • This report examines Syrian refugees’ attempts to obtain identity cards and other forms of legally recognized documentation (mainly, Ministry of Interior Service Cards, or “new MoI cards”) in Jordan through the state’s Urban Verification Exercise (“UVE”). These MoI cards are significant because they allow Syrians to live outside of refugee camps and move freely about Jordan.
  • The text reviews the acquirement processes and the subsequent challenges and consequences that refugees face when unable to obtain documentation. Refugees can encounter issues ranging from lack of access to basic services to arrest, detention, forced relocation to camps and refoulement.  
  • Seventy-two Syrian refugee families in Jordan were interviewed in 2016 for this report and their experiences with obtaining MoI cards varied widely.

Office of Internal Oversight Services (2015). Audit of the operations in Jordan for the Office of the United Nations High Commissioner for Refugees. Report 2015/049. New York: UN.

  • This report documents the January 1, 2012 – March 31, 2014 audit of Jordanian operations, which is intended to ensure the effectiveness of the UNHCR Representation in the state.
  • The main goals of the Regional Response Plan for Syrian refugees included relieving the pressure on Jordanian services and resources while still maintaining protection for refugees.
  • The audit results concluded that the Representation was initially unsatisfactory, and the OIOS suggested several recommendations according to the two key controls which the Representation acknowledged. Those recommendations included:
    • Project management:
      • Providing training to staff involved in financial verification of partners supervise management
      • Revising standard operating procedure on cash based interventions
      • Establishing ways to ensure that appropriate criteria for payment of all types of costs to partners’ staff are included in partnership agreements
    • Regulatory framework:
      • Preparing annual need-based procurement plan and establishing adequate management oversight processes
      • Creating procedures for the assessment of renovation work in progress and issuing written change orders
      • Protecting data and ensuring timely consultation with the UNHCR Division of Financial and Administrative Management

UNHCR/WFP (2015). Joint Inspection of the Biometrics Identification System for Food Distribution in Kenya. Geneva: UNHCR/WFP.

  • This report outlines the partnership between the WFP and UNHCR in its effort to promote its biometric identification checking system to support food distribution in the Dadaab and Kakuma refugee camps in Kenya.
  • Both entities conducted a joint inspection mission in March 2015 and was considered an effective tool and a model for other country operations.
  • Still, 11 recommendations are proposed and responded to in this text to further improve the efficiency of the biometric system, including real-time evaluation of impact, need for automatic alerts, documentation of best practices, among others.

The Age of Perplexity: Rethinking the World we Knew


BVBA Open Access Book: “The impact of globalization, of technological progress and of the insecurity that they cause is reflected in people’s decisions, and by the path that our society is following. This path that will decide our future, in the sense that it will determine our capability of facing the challenges and taking advantage of the opportunities offered up by the advances in science and technology.

In this book, we look at generalized subjects, taking in the transformation that computing and the greater availability of information brings to our perceptions and understanding of things, and in the social imaginaries, that shape our attitudes and reactions to the events that we observe.
All this underpins the changes in politics we are witnessing, the appearance of populist movements or, more generally, the lack of commitment or disaffection with political institutions and the values that support the existing democracies. In these arenas, the new digital media, new types of digital political activism, and the rise of movements that question the dominant economic and political paradigm all play a key role.

In the supranational and geopolitical level we discuss the importance of incorporating a feminist perspective to international relations (as well, of course, as to all the spheres of human activity); new types of warfare, in which neither the contenders, strategies or media resemble anything we knew before; the huge geopolitical challenge represented by the complex and diverse Arab Islamic question; the end of the brief unipolar world era, with the emergence of powers that question the United States’ hegemony, among which we highlight China; or the future role of Latin America in the global map.

Regarding the economic questions that are at the root of the current perplexity, insecurity and discontent, we examine the impact of globalization and technological change on growth, the welfare state and, above all, employment.

From this base, we look at which are the most suitable economic policies and forms of organization for harnessing the potential of the digital revolution, and also for minimizing the risks of a society with increasing inequality, with a huge number of jobs taken over by machines, or even the loss of control of individual or collective decisions.

This technological revolution will undoubtedly require a complex transition process, but we also have before us a wonderful opportunity to better tend to the needs and demands of people: with more growth, jobs and a fairer distribution of wealth, and a richer and fuller life for the whole of humanity….(More)”.

Reapplying behavioral symmetry: public choice and choice architecture


Michael David Thomas in Public Choice: “New justifications for government intervention based on behavioral psychology rely on a behavioral asymmetry between expert policymakers and market participants. Public choice theory applied the behavioral symmetry assumption to policy making in order to illustrate how special interests corrupt the suppositions of benevolence on the part of policy makers. Cognitive problems associated with market choices have been used to argue for even more intervention.

If behavioral symmetry is applied to the experts and not just to market participants, problems with this approach to public policy formation become clear. Manipulation, cognitive capture, and expert bias are among the problems associated with a behavioral theory of market failure. The application of behavioral symmetry to the expanding role of choice architecture will help to limit the bias in behavioral policy. Since experts are also subject to cognitive failures, policy must include an evaluation of expert error. Like the rent-seeking literature before it, a theory of cognitive capture points out the systematic problems with a theory of asymmetry between policy experts and citizens when it comes to policy making….(More)”.

The People vs. Democracy: Why Our Freedom Is in Danger and How to Save It


Book by Yascha Mounk: “The world is in turmoil. From India to Turkey and from Poland to the United States, authoritarian populists have seized power. As a result, Yascha Mounk shows, democracy itself may now be at risk.

Two core components of liberal democracy—individual rights and the popular will—are increasingly at war with each other. As the role of money in politics soared and important issues were taken out of public contestation, a system of “rights without democracy” took hold. Populists who rail against this say they want to return power to the people. But in practice they create something just as bad: a system of “democracy without rights.”

The consequence, Mounk shows in The People vs. Democracy, is that trust in politics is dwindling. Citizens are falling out of love with their political system. Democracy is wilting away. Drawing on vivid stories and original research, Mounk identifies three key drivers of voters’ discontent: stagnating living standards, fears of multiethnic democracy, and the rise of social media. To reverse the trend, politicians need to enact radical reforms that benefit the many, not the few.

The People vs. Democracy is the first book to go beyond a mere description of the rise of populism. In plain language, it describes both how we got here and where we need to go. For those unwilling to give up on either individual rights or the popular will, Mounk shows, there is little time to waste: this may be our last chance to save democracy….(More)”

Psychographics: the behavioural analysis that helped Cambridge Analytica know voters’ minds


Michael Wade at The Conversation: “Much of the discussion has been on how Cambridge Analytica was able to obtain data on more than 50m Facebook users – and how it allegedly failed to delete this data when told to do so. But there is also the matter of what Cambridge Analytica actually did with the data. In fact the data crunching company’s approach represents a step change in how analytics can today be used as a tool to generate insights – and to exert influence.

For example, pollsters have long used segmentation to target particular groups of voters, such as through categorising audiences by gender, age, income, education and family size. Segments can also be created around political affiliation or purchase preferences. The data analytics machine that presidential candidate Hillary Clinton used in her 2016 campaign – named Ada after the 19th-century mathematician and early computing pioneer – used state-of-the-art segmentation techniques to target groups of eligible voters in the same way that Barack Obama had done four years previously.

Cambridge Analytica was contracted to the Trump campaign and provided an entirely new weapon for the election machine. While it also used demographic segments to identify groups of voters, as Clinton’s campaign had, Cambridge Analytica also segmented using psychographics. As definitions of class, education, employment, age and so on, demographics are informational. Psychographics are behavioural – a means to segment by personality.

This makes a lot of sense. It’s obvious that two people with the same demographic profile (for example, white, middle-aged, employed, married men) can have markedly different personalities and opinions. We also know that adapting a message to a person’s personality – whether they are open, introverted, argumentative, and so on – goes a long way to help getting that message across….

There have traditionally been two routes to ascertaining someone’s personality. You can either get to know them really well – usually over an extended time. Or you can get them to take a personality test and ask them to share it with you. Neither of these methods is realistically open to pollsters. Cambridge Analytica found a third way, with the assistance of two University of Cambridge academics.

The first, Aleksandr Kogan, sold them access to 270,000 personality tests completed by Facebook users through an online app he had created for research purposes. Providing the data to Cambridge Analytica was, it seems, against Facebook’s internal code of conduct, but only now in March 2018 has Kogan been banned by Facebook from the platform. In addition, Kogan’s data also came with a bonus: he had reportedly collected Facebook data from the test-takers’ friends – and, at an average of 200 friends per person, that added up to some 50m people.

However, these 50m people had not all taken personality tests. This is where the second Cambridge academic, Michal Kosinski, came in. Kosinski – who is said to believe that micro-targeting based on online data could strengthen democracy – had figured out a way to reverse engineer a personality profile from Facebook activity such as likes. Whether you choose to like pictures of sunsets, puppies or people apparently says a lot about your personality. So much, in fact, that on the basis of 300 likes, Kosinski’s model is able to predict someone’s personality profile with the same accuracy as a spouse….(More)”

Democracy Without Participation: A New Politics for a Disengaged Era


Phil Parvin at Rex Publica: “Changing patterns of political participation observed by political scientists over the past half-century undermine traditional democratic theory and practice. The vast majority of democratic theory, and deliberative democratic theory in particular, either implicitly or explicitly assumes the need for widespread citizen participation. It requires that all citizens possess the opportunity to participate and also that they take up this opportunity. But empirical evidence gathered over the past half-century strongly suggests that many citizens do not have a meaningful opportunity to participate in the ways that many democratic theorists require, and do not participate in anything like the numbers that they believe is necessary.

This paper outlines some of the profound changes that have been experienced by liberal democratic states in the 20th and early 21st Centuries, changes which are still ongoing, and which have resulted in declines in citizens participation and trust, the marginalisation of citizens from democratic life, and the entrenchment of social and economic inequalities which have damaged democracy. The paper challenges the conventional wisdom in rejecting the idea that the future of democracy lies in encouraging more widespread participation.

The paper takes seriously the failure of the strategies adopted by many states to increase participation, especially among the poor, and suggests that instead of requiring more of citizens, we should in fact be requiring less of them. Instead of seeking to encourage more citizen participation, we should acknowledge that citizens will probably not participate in the volume, or in the ways, many democratic theorists would like, and that therefore we need an alternative approach: a regime which can continue to produce democratic outcomes, and which satisfies the requirements of political equality, in the absence of widespread participation by citizens….(More)”.

The Politics of Evidence: From Evidence-Based Policy to the Good Governance of Evidence


Open Access Book by Justin Parkhurst: “There has been an enormous increase in interest in the use of evidence for public policymaking, but the vast majority of work on the subject has failed to engage with the political nature of decision making and how this influences the ways in which evidence will be used (or misused) within political areas. This book provides new insights into the nature of political bias with regards to evidence and critically considers what an ‘improved’ use of evidence would look like from a policymaking perspective.

Part I describes the great potential for evidence to help achieve social goals, as well as the challenges raised by the political nature of policymaking. It explores the concern of evidence advocates that political interests drive the misuse or manipulation of evidence, as well as counter-concerns of critical policy scholars about how appeals to ‘evidence-based policy’ can depoliticise political debates. Both concerns reflect forms of bias – the first representing technical bias, whereby evidence use violates principles of scientific best practice, and the second representing issue bias in how appeals to evidence can shift political debates to particular questions or marginalise policy-relevant social concerns.

Part II then draws on the fields of policy studies and cognitive psychology to understand the origins and mechanisms of both forms of bias in relation to political interests and values. It illustrates how such biases are not only common, but can be much more predictable once we recognise their origins and manifestations in policy arenas.

Finally, Part III discusses ways to move forward for those seeking to improve the use of evidence in public policymaking. It explores what constitutes ‘good evidence for policy’, as well as the ‘good use of evidence’ within policy processes, and considers how to build evidence-advisory institutions that embed key principles of both scientific good practice and democratic representation. Taken as a whole, the approach promoted is termed the ‘good governance of evidence’ – a concept that represents the use of rigorous, systematic and technically valid pieces of evidence within decision-making processes that are representative of, and accountable to, populations served….(More)”.

The world’s first blockchain-powered elections just happened in Sierra Leone


Yomi Kazeem in Quartz: “On Mar. 7, elections in Sierra Leone marked a global landmark: the world’s first ever blockchain-powered presidential elections….

In Sierra Leone’s Western District, the most populous in the country, votes cast were manually recorded by Agora, a Swiss foundation offering digital voting solutions, using a permissioned blockchain. The idea was simple: just like blockchain technology helps ensure transparency with crytpocurrency transactions using public ledgers, by recording each vote on blockchain, Agora ensured transparency with votes cast in the district. While entries on permissioned blockchains can be viewed by everyone, entries can only be validated by authorized persons.

A lack of transparency has plagued many elections around the world, but particularly in some African countries where large sections of the electorate are often suspicions incumbent parties or ethnic loyalties have been responsible for the manipulation of the results in favor of one candidate or another. These suspicions remain even when there is little evidence of manipulation. A more transparent system could help restore trust.

Leonardo Gammar, CEO of Agora, says Sierra Leone’s NEC was “open minded” about the potential of blockchain in its elections after talks began late last year. “I also thought that if we can do it in Sierra Leone, we can do it everywhere else,” he says. That thinking is rooted in Sierra Leone’s developmental challenges which make electoral transparency difficult: poor network connectivity, low literacy levels and frequent electoral violence.

The big picture for Agora is to deploy solutions to automate the entire electoral process with citizens voting electronically using biometric data and personalized cryptographic keys and the votes in turn validated by blockchain. Gammar hopes Agora can replicate its work in other African elections on a larger scale but admits that doing so will require understanding the differing challenges each country faces.

Gammar says blockchain-powered electronic voting will be cheaper for African countries by cutting out the printing cost of paper-based elections but perhaps, more importantly, vastly reduce electoral violence…(More)”.

Sub-National Democracy and Politics Through Social Media


Book edited by Mehmet Zahid Sobacı and İbrahim Hatipoğlu: “This book analyzes the impact of social media on democracy and politics at the subnational level in developed and developing countries. Over the last decade or so, social media has transformed politics. Offering political actors opportunities to organize, mobilize, and connect with constituents, voters, and supporters, social media has become an important tool in global politics as well as a force for democracy. Most of the available research literature focuses on the impact of social media at the national level; this book fills that gap by analyzing the political uses of social media at the sub-national level.

The book is divided into two parts. Part One, “Social Media for Democracy” includes chapters that analyze potential contributions of social media tools to the realizing of basic values of democracy, such as public engagement, transparency, accountability, participation and collaboration at the sub-national level. Part Two, “Social Media in Politics” focuses on the use of social media tools by political actors in political processes and activities (online campaigns, protests etc.) at the local, regional and state government levels during election and non-election periods. Combining theoretical and empirical analysis, each chapter provides evaluations of overarching issues, questions, and problems as well as real-world experiences with social media, politics, and democracy in a diverse sample of municipalities…(More)”.

Building Democratic Infrastructure


Hollie Russon Gilman, K. Sabeel Rahman, & Elena Souris in Stanford Social Innovation Review: “How can civic engagement be effective in fostering an accountable, inclusive, and responsive American democracy? This question has gained new relevance under the Trump administration, where a sense of escalating democratic crises risks obscuring any nascent grassroots activism. Since the 2016 election, the twin problems of authoritarianism and insufficient political accountability have attracted much attention, as has the need to mobilize for near-future elections. These things are critical for the long-term health of American democracy, but at the same time, it’s not enough to focus solely on Washington or to rely on electoral campaigns to salvage our democracy.

Conventional civic-engagement activities such as canvassing, registering voters, signing petitions, and voting are largely transient experiences, offering little opportunity for civic participation once the election is over. And such tactics often do little to address the background conditions that make participation more difficult for marginalized communities.

To address these issues, civil society organization and local governments should build more long-term and durable democratic infrastructure, with the aim of empowering constituencies to participate in meaningful and concrete ways, overcoming division within our societies, and addressing a general distrust of government by enhancing accountability.

In our work with groups like the Center for Rural Strategies in Appalachia and the Chicago-based Inner-City Muslim Action Network, as well as with local government officials in Eau Claire, Wis. and Boston, Mass., we identify two areas where can help build a broader democratic infrastructure for the long haul. First, we need to support and radically expand efforts by local-level government officials to innovate more participatory and accountable forms of policymaking. And then we need to continue developing new methods of diverse, cross-constituency organizing that can help build more inclusive identities and narratives. Achieving this more-robust form of democracy will require that many different communities—including organizers and advocacy groups, policymakers and public officials, technologists, and funders—combine their efforts….(More)”.