Data Collaboratives: Matching Demand with Supply of (Corporate) Data to solve Public Problems


Blog by Stefaan G. Verhulst, IrynaSusha and Alexander Kostura: “Data Collaboratives refer to a new form of collaboration, beyond the public-private partnership model, in which participants from different sectors (private companies, research institutions, and government agencies) share data to help solve public problems. Several of society’s greatest challenges — from climate change to poverty — require greater access to big (but not always open) data sets, more cross-sector collaboration, and increased capacity for data analysis. Participants at the workshop and breakout session explored the various ways in which data collaborative can help meet these needs.

Matching supply and demand of data emerged as one of the most important and overarching issues facing the big and open data communities. Participants agreed that more experimentation is needed so that new, innovative and more successful models of data sharing can be identified.

How to discover and enable such models? When asked how the international community might foster greater experimentation, participants indicated the need to develop the following:

· A responsible data framework that serves to build trust in sharing data would be based upon existing frameworks but also accommodates emerging technologies and practices. It would also need to be sensitive to public opinion and perception.

· Increased insight into different business models that may facilitate the sharing of data. As experimentation continues, the data community should map emerging practices and models of sharing so that successful cases can be replicated.

· Capacity to tap into the potential value of data. On the demand side,capacity refers to the ability to pose good questions, understand current data limitations, and seek new data sets responsibly. On the supply side, this means seeking shared value in collaboration, thinking creatively about public use of private data, and establishing norms of responsibility around security, privacy, and anonymity.

· Transparent stock of available data supply, including an inventory of what corporate data exist that can match multiple demands and that is shared through established networks and new collaborative institutional structures.

· Mapping emerging practices and models of sharing. Corporate data offers value not only for humanitarian action (which was a particular focus at the conference) but also for a variety of other domains, including science,agriculture, health care, urban development, environment, media and arts,and others. Gaining insight in the practices that emerge across sectors could broaden the spectrum of what is feasible and how.

In general, it was felt that understanding the business models underlying data collaboratives is of utmost importance in order to achieve win-win outcomes for both private and public sector players. Moreover, issues of public perception and trust were raised as important concerns of government organizations participating in data collaboratives….(More)”

The Digital Equilibrium Project


Press Release by The Digital Equilibrium Project: “Cybersecurity, government and privacy experts are banding together as part of The ‘Digital Equilibrium Project’ to foster a new, productive dialogue on balancing security and privacy in the connected world. The project aims to address the underlying issues fueling acrimonious debates like the contentious court order between Apple and the U.S. Government.

  • The diverse group includes current and former leaders of some of the world’s largest cybersecurity firms and organizations, former officials in the NSA and national law enforcement, and leaders of some of the nation’s most influential privacy organizations. These individuals believe new thinking and collaboration is needed to avert potential catastrophes as the digital and physical worlds become more interdependent.
  • The group will release its foundational paper ‘Balancing Security and Privacy in the Connected World’ on Tuesday, March 1st at the RSA Conference – the world’s largest cybersecurity conference.
  • This project and related paper, months in the making, seek to end the kinds of standoffs we are seeing between Apple and the U.S. Government, addressing the underlying lack of social norms and legal constructs for the digital world.
  • They will convene a mid-year summit to craft a framework or ‘constitution’ for the digital world. The intent of this constitution is to help guide policy creation, broker compromise and serve as the foundation for decision making around cybersecurity issues. Senior executives from the Justice Department, Apple and other technology firms will be invited to participate…..

Next week the group will publish its foundational paper, crafted over extensive meetings, interviews and working sessions. The paper is meant to foster a new, collaborative discussion on the most pressing questions that could determine the future safety and social value of the Internet and the digital technologies that depend on it. In addition to releasing the paper at the RSA Conference, members of the group will discuss the paper and related issues during a main-stage panel session moderated by Art Coviello, former Executive Chairman of RSA Security, and James Kaplan, a McKinsey partner, on Thursday, March 3rd. Panel members will include: Michael Chertoff, Executive Chairman of The Chertoff Group and former Secretary of Homeland Security; Trevor Hughes, President and CEO of the International Association of Privacy Professionals; Mike McConnell, former Director of the NSA and Director, National Intelligence; and Nuala O’Connor, President and CEO, Center for Democracy & Technology.

The paper urges governments, corporations and privacy advocates to put aside the polarizing arguments that have cast security and privacy as opposing forces, and calls for a mid-year summit meeting between these parties to formulate a new structure for advancement of these pressing issues. It poses four fundamental questions that must be addressed to ensure the digital world can evolve in ways that ensure individual privacy while enabling the productivity and commercial gains that can improve quality of life around the globe. The four questions are:

  • What practices should organizations adopt to achieve their goals while protecting the privacy of their customers and other stakeholders?
  • How can organizations continue to improve the protection of their digital infrastructures and adopt privacy management practices that protect their employees?
  • What privacy management practices should governments adopt to maintain civil liberties and expectations of privacy, while ensuring the safety and security of their citizens, organizations, and critical infrastructure?
  • What norms should countries adopt to protect their sovereignty while enabling global commerce and collaboration against criminal and terrorist threats?

The Digital Equilibrium Project’s foundational paper will available for download on March 1st at www.digitalequilibriumproject.com

Give Up Your Data to Cure Disease


David B. Agus in The New York Times: “How far would you go to protect your health records? Your privacy matters, of course, but consider this: Mass data can inform medicine like nothing else and save countless lives, including, perhaps, your own.

Over the past several years, using some $30 billion in federal stimulus money, doctors and hospitals have been installing electronic health record systems. ….Yet neither doctors nor patients are happy. Doctors complain about the time it takes to update digital records, while patients worry about confidentiality…

We need to get over it. These digital databases offer an incredible opportunity to examine trends that will fundamentally change how doctors treat patients. They will help develop cures, discover new uses for drugs and better track the spread of scary new illnesses like the Zika virus….

Case in point: Last year, a team led by researchers at the MD Anderson Cancer Center and Washington University found that a common class of heart drugs called beta blockers, which block the effects of adrenaline, may prolong ovarian cancer patients’ survival. This discovery came after the researchers reviewed more than 1,400 patient records, and identified an obvious pattern among those with ovarian cancer who were using beta blockers, most often to control their blood pressure. Women taking earlier versions of this class of drug typically lived for almost eight years after their cancer diagnosis, compared with just three and a half years for the women not taking any beta blocker….

We need to move past that. For one thing, more debate over data sharing is already leading to more data security. Last month a bill was signed into law calling for the Department of Health and Human Services to create a health care industry cybersecurity task force, whose members would hammer out new voluntary standards.

New technologies — and opportunities — come with unprecedented risks and the need for new policies and strategies. We must continue to improve our encryption capabilities and other methods of data security and, most important, mandate that they are used. The hack of the Anthem database last year, for instance, which allowed 80 million personal records to be accessed, was shocking not only for the break-in, but for the lack of encryption….

Medical research is making progress every day, but the next step depends less on scientists and doctors than it does on the public. Each of us has the potential to be part of tomorrow’s cures. (More)”

What a Million Syllabuses Can Teach Us


College course syllabuses are curious documents. They represent the best efforts by faculty and instructors to distill human knowledge on a given subject into 14-week chunks. They structure the main activity of colleges and universities. And then, for the most part, they disappear….

Until now. Over the past two years, we and our partners at the Open Syllabus Project (based at the American Assembly at Columbia) have collected more than a million syllabuses from university websites. We have also begun to extract some of their key components — their metadata — starting with their dates, their schools, their fields of study and the texts that they assign.

This past week, we made available online a beta version of our Syllabus Explorer, which allows this database to be searched. Our hope and expectation is that this tool will enable people to learn new things about teaching, publishing and intellectual history.

At present, the Syllabus Explorer is mostly a tool for counting how often texts are assigned over the past decade. There is something for everyone here. The traditional Western canon dominates the top 100, with Plato’s “Republic” at No. 2, “The Communist Manifesto” at No. 3, and “Frankenstein” at No. 5, followed by Aristotle’s “Ethics,” Hobbes’s “Leviathan,” Machiavelli’s “The Prince,” “Oedipus” and “Hamlet.”….

Top articles? Garrett Hardin’s “The Tragedy of the Commons” and Francis Fukuyama’s “The End of History.” And so on. Altogether, the Syllabus Explorer tracks about 933,000 works. Nearly half of these are assigned only once.

Such data has many uses. For academics, for example, it offers a window onto something they generally know very little about: how widely their work is read.

It also allows us to introduce a new publication metric based on the frequency with which works are taught, which we call the “teaching score.” The score is derived from the ranking order of the text, not the raw number of citations, such that a book or article that is used in four or five classes gets a score of 1, while “The Republic,” which is assigned 3,500 times, gets a score of 100….

Because of a complex mix of privacy and copyright issues concerning syllabuses, the Open Syllabus Project publishes only metadata, not the underlying documents or any personally identifying material (even though these documents can be viewed on university websites). But we think that it is important for schools to move toward a more open approach to curriculums. As universities face growing pressure to justify their teaching and research missions, we doubt that curricular obscurity is helpful.

We think that the Syllabus Explorer demonstrates how more open strategies can support teaching, diversify evaluation practices and offer new perspectives on publishing, scholarship and intellectual traditions. But as with any newly published work, that judgment now passes out of our hands and into yours…(More)”

Distributed ledger technology: beyond block chain


UK Government Office for Science: “In a major report on distributed ledgers published today (19 January 2016), the Government Chief Scientist, Sir Mark Walport, sets out how this technology could transform the delivery of public services and boost productivity.

A distributed ledger is a database that can securely record financial, physical or electronic assets for sharing across a network through entirely transparent updates of information.

Its first incarnation was ‘Blockchain’ in 2008, which underpinned digital cash systems such as Bitcoin. The technology has now evolved into a variety of models that can be applied to different business problems and dramatically improve the sharing of information.

Distributed ledger technology could provide government with new tools to reduce fraud, error and the cost of paper intensive processes. It also has the potential to provide new ways of assuring ownership and provenance for goods and intellectual property.

Distributed ledgers are already being used in the diamond markets and in the disbursing of international aid payments.

Sir Mark Walport said:

Distributed ledger technology has the potential to transform the delivery of public and private services. It has the potential to redefine the relationship between government and the citizen in terms of data sharing, transparency and trust and make a leading contribution to the government’s digital transformation plan.

Any new technology creates challenges, but with the right mix of leadership, collaboration and sound governance, distributed ledgers could yield significant benefits for the UK.

The report makes a number of recommendations which focus on ministerial leadership, research, standards and the need for proof of concept trials.

They include:

  • government should provide ministerial leadership to ensure that it provides the vision, leadership and the platform for distributed ledger technology within government; this group should consider governance, privacy, security and standards
  • government should establish trials of distributed ledgers in order to assess the technology’s usability within the public sector
  • government could support the creation of distributed ledger demonstrators for local government that will bring together all the elements necessary to test the technology and its application.
  • the UK research community should invest in the research required to ensure that distributed ledgers are scalable, secure and provide proof of correctness of their contents….View the report ‘Distributed ledger technology: beyond block chain’.”

Big Data in U.S. Agriculture


Megan Stubbs at the Congressional Research Service: “Recent media and industry reports have employed the term big data as a key to the future of increased food production and sustainable agriculture. A recent hearing on the private elements of big data in agriculture suggests that Congress too is interested in potential opportunities and challenges big data may hold. While there appears to be great interest, the subject of big data is complex and often misunderstood, especially within the context of agriculture.

There is no commonly accepted definition of the term big data. It is often used to describe a modern trend in which the combination of technology and advanced analytics creates a new way of processing information that is more useful and timely. In other words, big data is just as much about new methods for processing data as about the data themselves. It is dynamic, and when analyzed can provide a useful tool in a decisionmaking process. Most see big data in agriculture at the end use point, where farmers use precision tools to potentially create positive results like increased yields, reduced inputs, or greater sustainability. While this is certainly the more intriguing part of the discussion, it is but one aspect and does not necessarily represent a complete picture.

Both private and public big data play a key role in the use of technology and analytics that drive a producer’s evidence-based decisions. Public-level big data represent records collected, maintained, and analyzed through publicly funded sources, specifically by federal agencies (e.g., farm program participant records and weather data). Private big data represent records generated at the production level and originate with the farmer or rancher (e.g., yield, soil analysis, irrigation levels, livestock movement, and grazing rates). While discussed separately in this report, public and private big data are typically combined to create a more complete picture of an agricultural operation and therefore better decisionmaking tools.

Big data may significantly affect many aspects of the agricultural industry, although the full extent and nature of its eventual impacts remain uncertain. Many observers predict that the growth of big data will bring positive benefits through enhanced production, resource efficiency, and improved adaptation to climate change. While lauded for its potentially revolutionary applications, big data is not without issues. From a policy perspective, issues related to big data involve nearly every stage of its existence, including its collection (how it is captured), management (how it is stored and managed), and use (how it is analyzed and used). It is still unclear how big data will progress within agriculture due to technical and policy challenges, such as privacy and security, for producers and policymakers. As Congress follows the issue a number of questions may arise, including a principal one—what is the federal role?…(More)”

Managing Secrecy


Clare Birchall in the International Journal of Communication: “As many anthropologists and sociologists have long argued, understanding the meaning and place of secrets is central to an adequate representation of society. This article extends previous accounts of secrecy in social, governmental, and organizational settings to configure secrecy as one form of visibility management among others. Doing so helps to remove the secret from a post-Enlightenment value system that deems secrets bad and openness good. Once secrecy itself is seen as a neutral phenomenon, we can focus on the politicality or ethics of any particular distribution of the visible, sayable, and knowable. Alongside understanding the work secrecy performs in contemporary society, this article argues that we can also seek inspiration from the secret as a methodological tool and political tactic. Moving beyond the claim to privacy, a claim that has lost bite in this era of state and consumer dataveillance, a “right to opacity”—the right to not be transparent, legible, seen—might open up an experience of subjectivity and responsibility beyond the circumscribed demands of the current politicotechnological management of visibilities….(More)”

Privacy, security and data protection in smart cities: a critical EU law perspective


CREATe Working Paper by Lilian Edwards: “Smart cities” are a buzzword of the moment. Although legal interest is growing, most academic responses at least in the EU, are still from the technological, urban studies, environmental and sociological rather than legal, sectors2 and have primarily laid emphasis on the social, urban, policing and environmental benefits of smart cities, rather than their challenges, in often a rather uncritical fashion3 . However a growing backlash from the privacy and surveillance sectors warns of the potential threat to personal privacy posed by smart cities . A key issue is the lack of opportunity in an ambient or smart city environment for the giving of meaningful consent to processing of personal data; other crucial issues include the degree to which smart cities collect private data from inevitable public interactions, the “privatisation” of ownership of both infrastructure and data, the repurposing of “big data” drawn from IoT in smart cities and the storage of that data in the Cloud.

This paper, drawing on author engagement with smart city development in Glasgow as well as the results of an international conference in the area curated by the author, argues that smart cities combine the three greatest current threats to personal privacy, with which regulation has so far failed to deal effectively; the Internet of Things(IoT) or “ubiquitous computing”; “Big Data” ; and the Cloud. While these three phenomena have been examined extensively in much privacy literature (particularly the last two), both in the US and EU, the combination is under-explored. Furthermore, US legal literature and solutions (if any) are not simply transferable to the EU because of the US’s lack of an omnibus data protection (DP) law. I will discuss how and if EU DP law controls possible threats to personal privacy from smart cities and suggest further research on two possible solutions: one, a mandatory holistic privacy impact assessment (PIA) exercise for smart cities: two, code solutions for flagging the need for, and consequences of, giving consent to collection of data in ambient environments….(More)

Daedalus Issue on “The Internet”


Press release: “Thirty years ago, the Internet was a network that primarily delivered email among academic and government employees. Today, it is rapidly evolving into a control system for our physical environment through the Internet of Things, as mobile and wearable technology more tightly integrate the Internet into our everyday lives.

How will the future Internet be shaped by the design choices that we are making today? Could the Internet evolve into a fundamentally different platform than the one to which we have grown accustomed? As an alternative to big data, what would it mean to make ubiquitously collected data safely available to individuals as small data? How could we attain both security and privacy in the face of trends that seem to offer neither? And what role do public institutions, such as libraries, have in an environment that becomes more privatized by the day?

These are some of the questions addressed in the Winter 2016 issue of Daedalus on “The Internet.”  As guest editors David D. Clark (Senior Research Scientist at the MIT Computer Science and Artificial Intelligence Laboratory) and Yochai Benkler (Berkman Professor of Entrepreneurial Legal Studies at Harvard Law School and Faculty Co-Director of the Berkman Center for Internet and Society at Harvard University) have observed, the Internet “has become increasingly privately owned, commercial, productive, creative, and dangerous.”

Some of the themes explored in the issue include:

  • The conflicts that emerge among governments, corporate stakeholders, and Internet users through choices that are made in the design of the Internet
  • The challenges—including those of privacy and security—that materialize in the evolution from fixed terminals to ubiquitous computing
  • The role of public institutions in shaping the Internet’s privately owned open spaces
  • The ownership and security of data used for automatic control of connected devices, and
  • Consumer demand for “free” services—developed and supported through the sale of user data to advertisers….

Essays in the Winter 2016 issue of Daedalus include:

  • The Contingent Internet by David D. Clark (MIT)
  • Degrees of Freedom, Dimensions of Power by Yochai Benkler (Harvard Law School)
  • Edge Networks and Devices for the Internet of Things by Peter T. Kirstein (University College London)
  • Reassembling Our Digital Selves by Deborah Estrin (Cornell Tech and Weill Cornell Medical College) and Ari Juels (Cornell Tech)
  • Choices: Privacy and Surveillance in a Once and Future Internet by Susan Landau (Worcester Polytechnic Institute)
  • As Pirates Become CEOs: The Closing of the Open Internet by Zeynep Tufekci (University of North Carolina at Chapel Hill)
  • Design Choices for Libraries in the Digital-Plus Era by John Palfrey (Phillips Academy)…(More)

See also: Introduction

Swipe right to fix the world: can Tinder-like tech match solutions to problems?


Beth Noveck in The Guardian: “Increasingly, these technologies of expertise are making it possible for the individual to make searchable lived experience. The New York police department, for example, maintains a database of employee skills. As the social service agency of last resort, the department needs to be able to pinpoint quickly who within the organization has the know how to wrangle a runaway beehive in Brooklyn or sing the national anthem in Queens in Chinese.

In public institutions, especially, it is all too common for individual knowhow to be masked by vague titles like “manager” and “director”. Using software to give organizations insights about the aptitude of employees has the potential to improve effectiveness and efficiency for public good.

Already an accelerating practice in the private sector, where managers want granular evidence of hard skills not readily apparent from transcripts, this year the World Bank created its own expert network called SkillFinder to index the talents of its 27,000 employees, consultants and alumni. With the launch of SkillFinder, the bank is just beginning to explore how to use the tool to better organize its human capital to achieve the bank’s mission of eradicating poverty.

Giving people outside as well as inside institutions opportunities to share their knowledge could save time, financial resources and even lives. Take the example of PulsePoint, a smartphone app created by the fire department of San Ramon, California. Now used by 1400 communities across the United States, PulsePoint matches those with a specific skill, namely CPR training, with dramatic results.

By tapping into a feed of the 911 calls, PulsePoint sends a text message “CPR Needed!” to those registered members of the public – off-duty doctors, nurses, police and trained amateurs – near the victim. Effective bystander CPR immediately administered can potentially double or triple the victim’s chance of survival. By augmenting traditional government first response,  Pulsepoint’s matching has already helped over 7,000 victims.

Employers can accelerate this process by going beyond merely asking employees for HR information and, instead, begin to catalog systematically the unique skills of the individuals within their organization. Many employers are anyway turning to new technology to match employees (and would-be employees) with the right skills to available jobs. How easily they could develop and share databases with public information about who has what experience while at the same time protecting the privacy of personal information….(More)”