How to be a public entrepreneur


Rowan Conway at the RSA: “Political theorist Elinor Ostrom was the first to coin the phrase “public entrepreneur” in her 1965 UCLA PhD thesis where she proposed that government actors should be the makers of purpose-driven businesses. She later went on to surprise the world of economics by winning a Nobel prize.

To the economic establishment Ostrom was a social scientist and her theories of common goods and public purpose enterprise ran counter to the economic orthodoxy. 44 years later, at the same time that she was taking the stage as the first (and only) woman to win a Nobel prize for economics, another California-based thinker was positing his own vision for entrepreneurship… “Move fast and break things” was famously Mark Zuckerberg’s credo for Silicon Valley entrepreneurs. “Unless you are breaking stuff,” he said in 2009, “you are not moving fast enough.” This phrase came to epitomise the “fail fast” start-up culture that has seeped into our consciousness and redefined modern life in the last decade.

Public vs Private entrepreneurs

So which of these two types of entrepreneurship should prevail? I’d say that they’re not playing on the same field and barely even playing the same game. While the Silicon Valley model glorifies the frat boys who dreamt up tech start-ups in their dorm rooms and took the “self-made” financial gains when big tech took off, public entrepreneurs are not cast from this mold. They are the government actors taking on the system to solve social and environmental problems and the idea of “breaking things” won’t appeal to them. “Moving fast”, however, speaks to their ambitions for an agile government that wants to make change in a digital world.

Public entrepreneurs are socially minded — but they differ from social entrepreneurs in that they carry out a public or state role. In a Centre for Public Impact briefing paper entitled “Enter the Public Entrepreneur” the difference is clear:

“While “social entrepreneurs” are people outside government, public entrepreneurs act within government and, at their heart, are a blend of two different roles: that of a public servant, and that of an entrepreneur. The underlying premise is that these roles are usually distinct but the skill sets they require need not be. Indeed, the future public servant will increasingly need to think and act like an entrepreneur — building new relationships, leveraging resources, working across sector lines and acting, and sometimes failing, fast.”

Today we publish a RSA Lab report entitled “Move Fast and Fix Things” in partnership with Innovate UK. The report examines the role of Public Entrepreneurs who want to find ways to move fast without leaving a trail of destruction. It builds on the literature that makes the case for public missionsand entrepreneurship in government and acts as a kind of “how to guide” for those in the public sector who want to think and act like entrepreneurs, but sometimes feel like they are pushing up against an immovable bureaucratic system.

Acting entrepreneurially with procurement

A useful distinction of types of government innovation by the European Commission describes “innovation in government” as transforming public administration, such as the shift to digital service provision and “innovation through government” as initiatives that “foster innovation elsewhere in society, such as the public procurement of innovation”. Our report looks at public procurement — specifically the Small Business Research Initiative (SBRI) — as a route for innovation through government.

Governments have catalytic spending power. The UK public sector alone spends over £251.5 billion annually procuring goods and services which accounts for 33% of public sector spend and 13.7% of GDP. A profound shift in practice is required if government is to proactively use this power to stimulate innovation in the way that Mariana Mazzucato, author of The Entrepreneurial State calls for. As Director of the UCL Institute for Innovation and Public Purpose she advocates for “mission-oriented innovation” which can enable speed as it has “not only a rate, but also a direction” — purposefully using government’s purchasing power to stimulate innovation for good.

But getting procurement professionals to understand how to be entrepreneurial with public funds is no mean feat….(More)”.

‘Mayor for a Day’ – Is Gamified Urban Management the Way Forward?


Paper by Gianluca Sgueo: “…aims at describing the use, exploring the potential – but also at understanding the limits – of the use of ‘gamification’ strategies into urban management. Commonly defined as the introduction of game-design elements into non-game contexts, with the former aimed at making the latter more fun, gamification is recognised among the technological paradigms that are shaping the evolution of public administrations.

The paper is divided in three sections.

SECTION I discusses the definition (and appropriateness of) gamification in urban management, and locates it conceptually at the crossroads between nudging, democratic innovations, and crowdsourcing.

SECTION II analyses the potentials of gamified urban management. Four benefits are assessed: first, gamified urban management seems to encourage adaptation of policy-making to structural/societal changes; second, it offers a chance to local administrators to (re-)gain trust from citizens, and thus be perceived as legitimate; third, it adapts policy-making to budgetary challenges; fourth, it helps to efficiently tackle complex regulatory issues.

SECTION III of this paper turns to consider the risks related with the use of gamification in urban management. The first consists of the obstacles faced by participatory rights within gamified policies; the second risk is defined ‘paradox of incentives’; the third is related with privacy issues. In the concluding section, this paper advances some proposals (or, alternatively, highlight valuable theoretical and empirical research efforts) aimed at solving some of the most pressing threats posed by gamified urban management.

The main features of the case studies described in SECTIONS II and III are summarised in a table at the end of the paper….(More)”.

On the Bumpy Road Towards Open Government: The Not-Invented-Here Syndrome as a Major Pothole


Paper by Lisa Schmidthuber, David Antons and Dennis Hilgers: “This paper investigates the role of public employees in absorbing external knowledge. Triggered by open government initiatives and open calls for participation, external actors are invited to integrate ideas, solutions, or experience into public organizations. Such exploitation of valuable external knowledge across organizational interfaces might, however, be hindered by negative attitudes of public employees towards external input. The rejection of outside knowledge by internal actors is known as the Not-Invented-Here syndrome. This paper sheds light on NIH attitudes in public organizations. After reviewing the state of the art of research on NIH, it emphasizes rethinking NIH in the public sector. The in-depth discussion of previous work thus serves to derive an extensive agenda for future research….(More)”

Cloud Communities: The Dawn of Global Citizenship?


Robert Schuman Centre for Advanced Studies Research Paper by Liav Orgad and Rainer Baubock: “New digital technologies are rapidly changing the global economy and have connected billions of people in deterritoralised social network. Will they also create new opportunities for global citizenship and alternatives to state-based political communities?

In his kick-off essay, Liav Orgad takes an optimistic view. Blockchain technology permits to give every human being a unique legal persona and allows individuals to associate in ‘cloud communities’ that may take on several functions of territorial states. 14 commentators discuss this vision.

Sceptics assume that states or business corporations have always found ways to capture and use new technologies for their purposes. They emphasise that the political functions of states, including their task to protect human rights, require territorial monopolies of legitimate coercion that cannot be provided by cloud communities.

Others point out that individuals would sort themselves out into cloud communities that are internally homogenous which risks to deepen political cleavages within territorial societies.

Finally, some authors are concerned that digital political communities will enhance global social inequalities through excluding from access those who are already worse off in the birthright lottery of territorial citizenship.

Optimists see instead the great potential of blockchain technology to overcome exclusion and marginalisation based on statelessness or sheer lack of civil registries; they regard it as a tool for enhancing individual freedom, since people are self-sovereign in controlling their personal data; and they emphasise the possibilities for emancipatory movements to mobilise for global justice across territorial borders or to create their own internally democratic political utopias.

In the boldest vision, the deficits of cloud communities as voluntary political associations with limited scope of power could be overcome in a global cryptodemocracy that lets all individuals participate on a one-person-one-vote basis in global political decisions….(More)”.

The ‘Datasphere’, Data Flows Beyond Control, and the Challenges for Law and Governance


Paper by Jean-Sylvestre Bergé, Stephane Grumbach and Vincenzo Zeno-Zencovich: “The flows of people, goods and capital, which have considerably increased in recent history, are leading to crises (e.g., migrants, tax evasion, food safety) which reveal the failure to control them. Much less visible, and not yet included in economic measurements, data flows have increased exponentially in the last two decades, with the digitisation of social and economic activities. A new space – Datasphere – is emerging, mostly supported by digital platforms which provide essential services reaching half of the world’s population directly. Their control over data flows raises new challenges to governance, and increasingly conflicts with public administration.

In this paper, we consider the need and the difficulty of regulating this emerging space and the different approaches followed on both sides of the Atlantic. We distinguish between three situations. We first consider data at rest, which is from the point of view of the location where data are physically stored. We then consider data in motion, and the issues related to their combination. Finally, we investigate data in action, that is data as vectors of command of legal or illegal activities over territories, with impacts on economy and society as well as security, and raise governance challenges.

The notion of ‘Datasphere’ proposes a holistic comprehension of all the ‘information’ existing on earth, originating both in natural and socio-economic systems, which can be captured in digital form, flows through networks, and is stored, processed and transformed by machines. It differs from the ‘Cyberspace’, which is mostly concerned with the networks, the technical instruments (from software and protocols to cables and data centers) together with the social activities it allows, and to what extent they could/should be allowed.

The paper suggests one – out of the many possible – approach to this new world. Clearly it would be impossible to delve in depth into all its facets, which are as many as those of the physical world. Rather, it attempts to present how traditional legal notions could be usefully managed to put order in a highly complex environment, avoiding a piecemeal approach that looks only at details….(More)”.

Information Asymmetries, Blockchain Technologies, and Social Change


Reflections by Stefaan Verhulst on “the potential (and challenges) of Distributed Ledgers for “Market for Lemons” Conditions: We live in a data age, and it has become common to extol the transformative power of data and information. It is now conventional to assume that many of our most pressing public problems—everything from climate change to terrorism to mass migration—are amenable to a “data fix.”

The truth, though, is a little more complicated. While there is no doubt that data—when analyzed and used responsibly—holds tremendous potential, many factors affect whether, and to what extent, that potential will ultimately be fulfilled.

Our ability to address complex public problems using data depends vitally on how our respective data ecosystems is designed (as well as ongoing questions of representation in, power over, and stewardship of these ecosystems).

Flaws in our data ecosystem that prevent us from addressing problems; may also be responsible for many societal failures and inequalities result from the fact that:

  • some actors have better access to data than others;
  • data is of poor quality (or even “fake”); contains implicit bias; and/or is not validated and thus not trusted;
  • only easily accessible data are shared and integrated (“open washing”) while important data remain carefully hidden or without resources for relevant research and analysis; and more generally that
  • even in an era of big and open data, information too often remains stove-piped, siloed, and generally difficult to access.

Several observers have pointed to the relationship between these information asymmetries and, for example, corruption, financial exclusion, global pandemics, forced mass migration, human rights abuses, and electoral fraud.

Consider the transaction costs, power inequities and other obstacles that result from such information asymmetries, namely:

–     At the individual level: too often someone who is trying to open a bank account (or sign up for new cell phone service) is unable to provide all the requisite information, such as credit history, proof of address or other confirmatory and trusted attributes of identity. As such, information asymmetries are in effect limiting this individual’s access to financial and communications services.

–     At the corporate level, a vast body of literature in economics has shown how uncertainty over the quality and trustworthiness of data can impose transaction costs, limit the development of markets for goods and services, or shut them down altogether. This is the well-known “market for lemons” problem made famous in a 1970 paper of the same name by George Akerlof.

–     At the societal or governance level, information asymmetries don’t just affect the efficiency of markets or social inequality. They can also incentivize unwanted behaviors that cause substantial public harm. Tyrants and corrupt politicians thrive on limiting their citizens’ access to information (e.g., information related to bank accounts, investment patterns or disbursement of public funds). Likewise, criminals, operate and succeed in the information-scarce corners of the underground economy.

Blockchain technologies and Information Asymmetries

This is where blockchain comes in. At their core, blockchain technologies are a new type of disclosure mechanism that have the potential to address some of the information asymmetries listed above. There are many types of blockchain technologies, and while I use the blanket term ‘blockchain’ in the below for simplicity’s sake, the nuances between different types of blockchain technologies can greatly impact the character and likelihood of success of a given initiative.

By leveraging a shared and verified database of ledgers stored in a distributed manner, blockchain seeks to redesign information ecosystems in a more transparent, immutable, and trusted manner. Solving information asymmetries may be the real potential of blockchain, and this—much more than the current hype over virtual currencies—is the real reason to assess its potential….(More)”.

The Case for Accountability: How it Enables Effective Data Protection and Trust in the Digital Society


Centre for Information Policy Leadership: “Accountability now has broad international support and has been adopted in many laws, including in the EU General Data Protection Regulation (GDPR), regulatory policies and organisational practices. It is essential that there is consensus and clarity on the precise meaning and application of organisational accountability among all stakeholders, including organisations implementing accountability and data protection authorities (DPAs) overseeing accountability.

Without such consensus, organisations will not know what DPAs expect of them and DPAs will not know how to assess organisations’ accountability-based privacy programs with any degree of consistency and predictability. Thus, drawing from the global experience with accountability to date and from the Centre for Information Policy Leadership’s (CIPL) own extensive prior work on accountability, this paper seeks to explain the following issues:

  • The concept of organisational accountability and how it is reflected in the GDPR;
  • The essential elements of accountability and how the requirements of the GDPR (and of other normative frameworks) map to these elements;
  • Global acceptance and adoption of accountability;
  • How organisations can implement accountability (including by and between controllers and processors) through comprehensive internal privacy programs that implement external rules or the organisation’s own data protection policies and goals, or through verified or certified accountability mechanisms, such as Binding Corporate Rules (BCR), APEC Cross-Border Privacy Rules (CBPR), APEC Privacy Recognition for Processors (PRP), other seals and certifications, including future GDPR certifications and codes of conduct; and
  • The benefits that accountability can deliver to each stakeholder group.

In addition, the paper argues that accountability exists along a spectrum, ranging from basic accountability requirements required by law (such as under the GDPR) to stronger and more granular accountability measures that may not be required by law but that organisations may nevertheless want to implement because they convey substantial benefits….(More)”.

Regulation by Blockchain: The Emerging Battle for Supremacy between the Code of Law and Code as Law


Paper by Karen Yeung at Modern Law Review: “Many advocates of distributed ledger technologies (including blockchain) claim that these technologies provide the foundations for an organisational form that will enable individuals to transact with each other free from the travails of conventional law, thus offering the promise of grassroots democratic governance without the need for third party intermediaries. But does the assumption that blockchain systems will operate beyond the reach of conventional law withstand critical scrutiny?

This is the question which this paper investigates, by examining the intersection and interactions between conventional law promulgated and enforced by national legal systems (ie the ‘code of law’) and the internal rules of blockchain systems which take the form of executable software code and cryptographic algorithms via a distributed computing network (‘code as law’).

It identifies three ways in which the code of law may interact with code as law, based primarily on the intended motives and purposes of those engaged in activities in developing, maintaining or undertaking transactions upon the network, referring to the use of blockchain: (a) with the express intention of evading the substantive limits of the law (‘hostile evasion’); (b) to complement and/or supplement conventional law with the aim of streamlining or enhancing compliance with agreed standards (‘efficient alignment’); and (c) to co-ordinate the actions of multiple participants via blockchain to avoid the procedural inefficiencies and complexities associated with the legal process, including the transaction, monitoring and agency costs associated with conventional law (‘alleviating transactional friction’).

These different classes of case are likely to generate different dynamic interactions between the blockchain code and conventional legal systems, which I describe respectively as ‘cat and mouse’, the ‘joys of (patriarchial) marriage’ and ‘uneasy coexistence and mutual suspicion’ respectively…(More)”.

Defending Politically Vulnerable Organizations Online


Center for Long-Term Cybersecurity (CLTC): “A new report …details how media outlets, human rights groups, NGOs, and other politically vulnerable organizations face significant cybersecurity threats—often at the hands of powerful governments—but have limited resources to protect themselves. The paper, “Defending Politically Vulnerable Organizations Online,” by CLTC Research Fellow Sean Brooks, provides an overview of cybersecurity threats to civil society organizations targeted for political purposes, and explores the ecosystem of resources available to help these organizations improve their cybersecurity.

“From mass surveillance of political dissidents in Thailand to spyware attacks on journalists in Mexico, cyberattacks against civil society organizations have become a persistent problem in recent years,” says Steve Weber, Faculty Director of CLTC. “While journalists, activists, and others take steps to protect themselves, such as installing firewalls and anti-virus software, they often lack the technical ability or capital to establish protections better suited to the threats they face, including phishing. Too few organizations and resources are available help them expand their cybersecurity capabilities.”

To compile their report, Brooks and his colleagues at CLTC undertook an extensive open-source review of more than 100 organizations supporting politically vulnerable organizations, and conducted more than 30 interviews with activists, threat researchers, and cybersecurity professionals. The report details the wide range of threats that politically vulnerable organizations face—from phishing emails, troll campaigns, and government-sanctioned censorship to sophisticated “zero-day” attacks—and it exposes the significant resource constraints that limit these organizations’ access to expertise and technology….(More)”.

Digital Switzerlands


Paper by Kristen Eichensehr: “U.S. technology companies are increasingly standing as competing power centers that challenge the primacy of governments. This power brings with it the capacity to bolster or undermine governmental authority, as well as increasing public demands for the companies to protect users from governments. The companies’ power raises serious questions about how to understand their role. Scholars have proposed varying conceptions, suggesting that the companies should be understood as public utilities, information fiduciaries, surveillance intermediaries, or speech governors. This Article takes up another possibility, one suggested by the companies themselves: that they are “Digital Switzerlands.”

The companies’ claim to be Digital Switzerlands encompasses two ideas: that the companies are on par with, not subordinate to, the countries that try to regulate them, and that they are in some sense neutral. This Article critically evaluates the plausibility of these claims and explores how the companies differ from other powerful private parties. The Digital Switzerlands concept sheds light on why the companies have begun to resist both the U.S. and foreign governments, but it also means that the companies do not always counter governments. Understanding the relationship between companies, users, and governments as triangular, not purely hierarchical, reveals how alliances among them affect the companies’ behavior toward governments. But the companies’ efforts to maintain a posture of neutrality also carry a risk of passivity that may allow governmental attacks on users to go unchallenged.

Turning to the normative, the Article proposes several considerations for assessing the desirability of having companies be Digital Switzerlands. Does the rise of the companies as competing power centers benefit individual users? Does the companies’ lack of democratic attributes render them illegitimate powers? If the companies claim the benefits of the sovereign analogy, should they also be held to the public law values imposed on governments, and if so, how? And if there is value in the companies acting as Digital Switzerlands, how can this role be entrenched to prevent backsliding? The Article offers preliminary answers to these questions, with the knowledge that the answers may well evolve along with the companies’ self-conception….(More)”.