Are blockchain applications guided by adequate social values?


Philip Boucher at EuroScientist: “…The way blockchains create fast, cheap and secure public records means that they also can be used for many non-financial tasks, such as casting votes in elections or proving that a document existed at a specific time. Blockchains are particularly well suited to situations where it is necessary to record ownership histories. For example, they could help keep track of how and where our diamonds are sourced and our clothes are made, or to be sure that our champagne really came from Champagne.

They could help us to finally resolve the problem of music and video piracy while enabling second-hand markets for digital media; just like we have for books and vinyl. They also present opportunities in all kinds of public services, such as health and welfare payments. At the frontier of blockchain development, self-executing contracts are paving the way for companies that run themselves without human intervention.

The opportunities are many, but there are also some challenges to consider. For example, blockchain’s transparency is fine for matters of public record such as land registries, but what about bank balances and other sensitive data? It is possible (albeit only sometimes and with substantial effort), to identify the individuals associated with transactions, which could compromise their privacy and anonymity. While some blockchains do offer full anonymity, some sensitive information simply should not be distributed in this way.

Technologies have social values

We often talk about blockchain’s economic and functional potential. These are important, but its most profound legacy may be in subtle changes to broad social values and political structures. Just because technologies can be used for both ‘good’ actions and ‘bad’ actions does not mean that they are neutral.

To the contrary, all technologies have values and politics, and they usually reinforce the interests of those that control them. Each time we use a centralised ledger – like a bank or government database – we confirm their owners’ legitimacy and strengthen their position.

Perhaps each time we use a decentralised blockchain ledger instead, we will participate in the gradual relegation of traditional financial and governance institutions and the prioritisation of transparency over anonymity. But this would only happen if we develop and use blockchains that have these values at their core….

We cannot know exactly where and how blockchain will change our lives. They have the potential to help us develop more transparent and distributed social and economic structures. However, we have to look closely to see whether this is really what we are getting.

The sharing economy also promised to connect individuals more directly, ousting middlemen and unburdening people from the intervention of states, banks and other traditional institutions. It also had a similar rhetoric of transition, disruption and even revolution. However, the most successful initiatives of this movement are, at heart, very effective middlemen. Even with ubiquitous blockchain development, we might not achieve the levels of transparency and distribution that we expected.

For example, as an alternative to the most open and transparent blockchain applications such as Bitcoin, so-called permissioned blockchains allow their creators to maintain some centralised control. These blockchains offer a more moderate form of decentralisation and are favoured by many governments and businesses.

Blockchains and regulation

For now, there is little appetite for intervention in blockchain development at a European level. Indeed, a recent European Parliament report on virtual currencies, published in May 2016, acknowledged the increased risks, which will require enhanced regulatory oversight and adequate technical expertise to handle such currencies. However, the report also calls for a proportionate EU regulatory approach to avoid hampering innovation in the field at such an early stage. This means that, for now, we will continue to analyse developments and promote dialogue amongst policymakers, businesses and citizens….(More)”

Realising the Data Revolution for Sustainable Development: Towards Capacity Development 4.0


Report by Niels Keijzer and Stephan Klingebiel for Paris21: “An ever-deepening data revolution is shaping everyday lives in many parts of the world. As just one of many mindboggling statistics on Big Data, it has been estimated that by the year 2020, about 1.7 megabytes of new information will be created every second for every human being on the planet. The benefits of the data revolution extend to different groups of people, social movements, institutions and businesses. Yet many people and countries do not have access to these positive benefits and in richer countries potentially positive changes raise suspicion amongst citizens as well as concerns related to privacy and confidentiality. The availability of potential advantages is, to a large extent, guided by levels of development and income. Despite the rapid spread of mobile phone technology that allows regions otherwise disconnected from the grid to ‘leapfrog’ in terms of using and producing data and statistics, poor people are still less likely to benefit from the dramatic changes in the field of data.

Against the background of the 2030 Agenda for Sustainable Development and its Sustainable Development Goals (SDGs), the main challenge for statistics is to manage the data revolution in support of sustainable development. The main priorities are the broadening and deepening of production, dissemination and use of data and statistics, and achieving them requires identifying those population groups which are most vulnerable and making governments more accountable to their citizens. In parallel, the risks accompanying the data revolution need to be mitigated and reduced, including the use of data for purposes of repression or otherwise infringing on the privacy of citizens. In addition to representing a universal agenda that breaks away from the dichotomy of developed and developing countries, the new agenda calls for tailor-made approaches in each country or region concerned, supported by global actions. The 2030 Agenda further states the international community’s realisation of the need to move away from ‘business as usual’ in international support for data and statistics.

The most important driving forces shaping the data revolution are domestic (legal) frameworks and public policies across the globe. This applies not only to wealthier countries but also developing countries2 , and external support cannot compensate for absent domestic leadership and investment. Technical, legal and political factors all affect whether countries are willing and able to succeed in benefiting from the data revolution. However, in both low income countries and lower-middle income countries, and to some extent in upper-middle income countries, we can observe two constraining factors in this regard, capacities and funding. These factors are, to some degree, interrelated: if funding is not sufficiently available it might be difficult to increase the capacities required, and if capacities are insufficient funding issues might be more challenging….(More)”

Ten simple rules for responsible big data research


Matthew Zook et al in PLOS Computational Biology: “The use of big data research methods has grown tremendously over the past five years in both academia and industry. As the size and complexity of available datasets has grown, so too have the ethical questions raised by big data research. These questions become increasingly urgent as data and research agendas move well beyond those typical of the computational and natural sciences, to more directly address sensitive aspects of human behavior, interaction, and health. The tools of big data research are increasingly woven into our daily lives, including mining digital medical records for scientific and economic insights, mapping relationships via social media, capturing individuals’ speech and action via sensors, tracking movement across space, shaping police and security policy via “predictive policing,” and much more.

The beneficial possibilities for big data in science and industry are tempered by new challenges facing researchers that often lie outside their training and comfort zone. Social scientists now grapple with data structures and cloud computing, while computer scientists must contend with human subject protocols and institutional review boards (IRBs). While the connection between individual datum and actual human beings can appear quite abstract, the scope, scale, and complexity of many forms of big data creates a rich ecosystem in which human participants and their communities are deeply embedded and susceptible to harm. This complexity challenges any normative set of rules and makes devising universal guidelines difficult.

Nevertheless, the need for direction in responsible big data research is evident, and this article provides a set of “ten simple rules” for addressing the complex ethical issues that will inevitably arise. Modeled on PLOS Computational Biology’s ongoing collection of rules, the recommendations we outline involve more nuance than the words “simple” and “rules” suggest. This nuance is inevitably tied to our paper’s starting premise: all big data research on social, medical, psychological, and economic phenomena engages with human subjects, and researchers have the ethical responsibility to minimize potential harm….

  1. Acknowledge that data are people and can do harm
  2. Recognize that privacy is more than a binary value
  3. Guard against the reidentification of your data
  4. Practice ethical data sharing
  5. Consider the strengths and limitations of your data; big does not automatically mean better
  6. Debate the tough, ethical choices
  7. Develop a code of conduct for your organization, research community, or industry
  8. Design your data and systems for auditability
  9. Engage with the broader consequences of data and analysis practices
  10. Know when to break these rules…(More)”

Innovations in Federal Statistics: Combining Data Sources While Protecting Privacy


Report by the National Academies of Sciences’s Panel on Improving Federal Statistics for Policy and Social Science: “Federal government statistics provide critical information to the country and serve a key role in a democracy. For decades, sample surveys with instruments carefully designed for particular data needs have been one of the primary methods for collecting data for federal statistics. However, the costs of conducting such surveys have been increasing while response rates have been declining, and many surveys are not able to fulfill growing demands for more timely information and for more detailed information at state and local levels.

Innovations in Federal Statistics examines the opportunities and risks of using government administrative and private sector data sources to foster a paradigm shift in federal statistical programs that would combine diverse data sources in a secure manner to enhance federal statistics. This first publication of a two-part series discusses the challenges faced by the federal statistical system and the foundational elements needed for a new paradigm….(More)”

Can social media, loud and inclusive, fix world politics


 at the Conversation: “Privacy is no longer a social norm, said Facebook founder Mark Zuckerberg in 2010, as social media took a leap to bring more private information into the public domain.

But what does it mean for governments, citizens and the exercise of democracy? Donald Trump is clearly not the first leader to use his Twitter account as a way to both proclaim his policies and influence the political climate. Social media presents novel challenges to strategic policy, and has become a managerial issues for many governments.

But it also offers a free platform for public participation in government affairs. Many argue that the rise of social media technologies can give citizens and observers a better opportunity to identify pitfalls of government and their politics.

As government embrace the role of social media and the influence of negative or positive feedback on the success of their project, they are also using this tool to their advantages by spreading fabricated news.

This much freedom of expression and opinion can be a double-edged sword.

A tool that triggers change

On the positive side, social media include social networking applications such as Facebook and Google+, microblogging services such as Twitter, blogs, video blogs (vlogs), wikis, and media-sharing sites such as YouTube and Flickr, among others.

Social media as a collaborative and participatory tool, connects users with each other and help shaping various communities. Playing a key role in delivering public service value to citizens it also helps people to engage in politics and policy-making, making processes easier to understand, through information and communication technologies (ICTs).

Today four out of five countries in the world have social media features on their national portals to promote interactive networking and communication with the citizen. Although we don’t have any information about the effectiveness of such tools or whether they are used to their full potential, 20% of these countries shows that they have “resulted in new policy decisions, regulation or service”.

Social media can be an effective tool to trigger changes in government policies and services if well used. It can be used to prevent corruption, as it is direct method of reaching citizens. In developing countries, corruption is often linked to governmental services that lack automated processes or transparency in payments.

The UK is taking the lead on this issue. Its anti-corruption innovation hub aims to connect several stakeholders – including civil society, law enforcement and technologies experts – to engage their efforts toward a more transparent society.

With social media, governments can improve and change the way they communicate with their citizens – and even question government projects and policies. In Kazakhstan, for example, a migration-related legislative amendment entered into force early January 2017 and compelled property owners to register people residing in their homes immediately or else face a penalty charge starting in February 2017.

Citizens were unprepared for this requirement, and many responded with indignation on social media. At first the government ignored this reaction. However, as the growing anger soared via social media, the government took action and introduced a new service to facilitate the registration of temporary citizens….

But the campaigns that result do not always evolve into positive change.

Egypt and Libya are still facing several major crises over the last years, along with political instability and domestic terrorism. The social media influence that triggered the Arab Spring did not permit these political systems to turn from autocracy to democracy.

Brazil exemplifies a government’s failure to react properly to a massive social media outburst. In June 2013 people took to the streets to protest the rising fares of public transportation. Citizens channelled their anger and outrage through social media to mobilise networks and generate support.

The Brazilian government didn’t understand that “the message is the people”. Though the riots some called the “Tropical Spring” disappeared rather abruptly in the months to come, they had major and devastating impact on Brazil’s political power, culminating in the impeachment of President Rousseff in late 2016 and the worst recession in Brazil’s history.

As in the Arab Spring countries, the use of social media in Brazil did not result in economic improvement. The country has tumbled down into depression, and unemployment has risen to 12.6%…..

Government typically asks “how can we adapt social media to the way in which we do e-services, and then try to shape their policies accordingly. They would be wiser to ask, “how can social media enable us to do things differently in a way they’ve never been done before?” – that is, policy-making in collaboration with people….(More)”.

The Conversation

Google DeepMind and healthcare in an age of algorithms


Julia Powles and Hal Hodson in Health and Technology: “Data-driven tools and techniques, particularly machine learning methods that underpin artificial intelligence, offer promise in improving healthcare systems and services. One of the companies aspiring to pioneer these advances is DeepMind Technologies Limited, a wholly-owned subsidiary of the Google conglomerate, Alphabet Inc. In 2016, DeepMind announced its first major health project: a collaboration with the Royal Free London NHS Foundation Trust, to assist in the management of acute kidney injury. Initially received with great enthusiasm, the collaboration has suffered from a lack of clarity and openness, with issues of privacy and power emerging as potent challenges as the project has unfolded. Taking the DeepMind-Royal Free case study as its pivot, this article draws a number of lessons on the transfer of population-derived datasets to large private prospectors, identifying critical questions for policy-makers, industry and individuals as healthcare moves into an algorithmic age….(More)”

Dark Web


Kristin Finklea for the Congressional Research Service: “The layers of the Internet go far beyond the surface content that many can easily access in their daily searches. The other content is that of the Deep Web, content that has not been indexed by traditional search engines such as Google. The furthest corners of the Deep Web, segments known as the Dark Web, contain content that has been intentionally concealed. The Dark Web may be used for legitimate purposes as well as to conceal criminal or otherwise malicious activities. It is the exploitation of the Dark Web for illegal practices that has garnered the interest of officials and policymakers.

Individuals can access the Dark Web by using special software such as Tor (short for The Onion Router). Tor relies upon a network of volunteer computers to route users’ web traffic through a series of other users’ computers such that the traffic cannot be traced to the original user. Some developers have created tools—such as Tor2web—that may allow individuals access to Torhosted content without downloading and installing the Tor software, though accessing the Dark Web through these means does not anonymize activity. Once on the Dark Web, users often navigate it through directories such as the “Hidden Wiki,” which organizes sites by category, similar to Wikipedia. Individuals can also search the Dark Web with search engines, which may be broad, searching across the Deep Web, or more specific, searching for contraband like illicit drugs, guns, or counterfeit money.

While on the Dark Web, individuals may communicate through means such as secure email, web chats, or personal messaging hosted on Tor. Though tools such as Tor aim to anonymize content and activity, researchers and security experts are constantly developing means by which certain hidden services or individuals could be identified or “deanonymized.” Anonymizing services such as Tor have been used for legal and illegal activities ranging from maintaining privacy to selling illegal goods—mainly purchased with Bitcoin or other digital currencies. They may be used to circumvent censorship, access blocked content, or maintain the privacy of sensitive communications or business plans. However, a range of malicious actors, from criminals to terrorists to state-sponsored spies, can also leverage cyberspace and the Dark Web can serve as a forum for conversation, coordination, and action. It is unclear how much of the Dark Web is dedicated to serving a particular illicit market at any one time, and, because of the anonymity of services such as Tor, it is even further unclear how much traffic is actually flowing to any given site.

Just as criminals can rely upon the anonymity of the Dark Web, so too can the law enforcement, military, and intelligence communities. They may, for example, use it to conduct online surveillance and sting operations and to maintain anonymous tip lines. Anonymity in the Dark Web can be used to shield officials from identification and hacking by adversaries. It can also be used to conduct a clandestine or covert computer network operation such as taking down a website or a denial of service attack, or to intercept communications. Reportedly, officials are continuously working on expanding techniques to deanonymize activity on the Dark Web and identify malicious actors online….(More)”

The Crowd & the Cloud


The Crowd & the Cloud (TV series): “Are you interested in birds, fish, the oceans or streams in your community? Are you concerned about fracking, air quality, extreme weather, asthma, Alzheimer’s disease, Zika or other epidemics? Now you can do more than read about these issues. You can be part of the solution.

Smartphones, computers and mobile technology are enabling regular citizens to become part of a 21st century way of doing science. By observing their environments, monitoring neighborhoods, collecting information about the world and the things they care about, so-called “citizen scientists” are helping professional scientists to advance knowledge while speeding up new discoveries and innovations.

The results are improving health and welfare, assisting in wildlife conservation, and giving communities the power to create needed change and help themselves.

Citizen science has amazing promise, but also raises questions about data quality and privacy. Its potential and challenges are explored in THE CROWD & THE CLOUD, a 4-part public television series premiering in April 2017. Hosted by former NASA Chief Scientist Waleed Abdalati, each episode takes viewers on a global tour of the projects and people on the front lines of this disruptive transformation in how science is done, and shows how anyone, anywhere can participate….(More)”

 

Migration tracking is a mess


Huub Dijstelbloem in Nature: “As debates over migration, refugees and freedom of movement intensify, technologies are increasingly monitoring the movements of people. Biometric passports and databases containing iris scans or fingerprints are being used to check a person’s right to travel through or stay within a territory. India, for example, is establishing biometric identification for its 1.3 billion citizens.

But technologies are spreading beyond borders. Security policies and humanitarian considerations have broadened the landscape. Drones and satellite images inform policies and direct aid to refugees. For instance, the United Nations Institute for Training and Research (UNITAR), maps refugee camps in Jordan and elsewhere with its Operational Satellite Applications Programme (UNOSAT; see www.unitar.org/unosat/map/1928).

Three areas are in need of research, in my view: the difficulties of joining up disparate monitoring systems; privacy issues and concerns over the inviolability of the human body; and ‘counter-surveillance’ deployed by non-state actors to highlight emergencies or contest claims that governments make.

Ideally, state monitoring of human mobility would be bound by ethical principles, solid legislation, periodical evaluations and the checks and balances of experts and political and public debates. In reality, it is ad hoc. Responses are arbitrary, fuelled by the crisis management of governments that have failed to anticipate global and regional migration patterns. Too often, this results in what the late sociologist Ulrich Beck called organized irresponsibility: situations of inadequacy in which it is hard to blame a single actor.

Non-governmental organizations, activists and migrant groups are using technologies to register incidents and to blame and shame states. For example, the Forensic Architecture research agency at Goldsmiths, University of London, has used satellite imagery and other evidence to reconstruct the journey of a boat that left Tripoli on 27 March 2011 with 72 passengers. A fortnight later, it returned to the Libyan coast with just 9 survivors. Although the boat had been spotted by several aircraft and vessels, no rescue operation had been mounted (go.nature.com/2mbwvxi). Whether the states involved can be held accountable is still being considered.

In the end, technologies to monitor mobility are political tools. Their aims, design, use, costs and consequences should be developed and evaluated accordingly….(More)”.

Bit By Bit: Social Research in the Digital Age


Open Review of Book by Matthew J. Salganik: “In the summer of 2009, mobile phones were ringing all across Rwanda. In addition to the millions of calls between family, friends, and business associates, about 1,000 Rwandans received a call from Joshua Blumenstock and his colleagues. The researchers were studying wealth and poverty by conducting a survey of people who had been randomly sampled from a database of 1.5 million customers from Rwanda’s largest mobile phone provider. Blumenstock and colleagues asked the participants if they wanted to participate in a survey, explained the nature of the research to them, and then asked a series of questions about their demographic, social, and economic characteristics.

Everything I have said up until now makes this sound like a traditional social science survey. But, what comes next is not traditional, at least not yet. They used the survey data to train a machine learning model to predict someone’s wealth from their call data, and then they used this model to estimate the wealth of all 1.5 million customers. Next, they estimated the place of residence of all 1.5 million customers by using the geographic information embedded in the call logs. Putting these two estimates together—the estimated wealth and the estimated place of residence—Blumenstock and colleagues were able to produce high-resolution estimates of the geographic distribution of wealth across Rwanda. In particular, they could produce an estimated wealth for each of Rwanda’s 2,148 cells, the smallest administrative unit in the country.

It was impossible to validate these estimates because no one had ever produced estimates for such small geographic areas in Rwanda. But, when Blumenstock and colleagues aggregated their estimates to Rwanda’s 30 districts, they found that their estimates were similar to estimates from the Demographic and Health Survey, the gold standard of surveys in developing countries. Although these two approaches produced similar estimates in this case, the approach of Blumenstock and colleagues was about 10 times faster and 50 times cheaper than the traditional Demographic and Health Surveys. These dramatically faster and lower cost estimates create new possibilities for researchers, governments, and companies (Blumenstock, Cadamuro, and On 2015).

In addition to developing a new methodology, this study is kind of like a Rorschach inkblot test; what people see depends on their background. Many social scientists see a new measurement tool that can be used to test theories about economic development. Many data scientists see a cool new machine learning problem. Many business people see a powerful approach for unlocking value in the digital trace data that they have already collected. Many privacy advocates see a scary reminder that we live in a time of mass surveillance. Many policy makers see a way that new technology can help create a better world. In fact, this study is all of those things, and that is why it is a window into the future of social research….(More)”