Friday, February 15, 2013
Thursday, February 14, 2013
First Steps to Open Gov- Getting Your Ducts in a Row
From the article: "Modern versions of open government only work if the basic
input, connectivity, can be taken for granted. We need electricity to light our
homes and offices, and we need cheap, abundant communications capacity to
make open government function. The near-term payoff will be dramatically lower
bills paid by local governments; long-term, you'll be empowering every member
of your community and your local economy. And isn't that what governments are
supposed to do?" Read more
Twitter: A Live Megaphone for Lobbying Groups, Companies
From the article: "On television, President Obama spent a commercial-free hour
delivering his State of the Union speech. But on Twitter,
the nation’s biggest lobbying groups and corporations found a megaphone to
place ad money and promote their views." Read more
Labels:
new economic forms,
point of view,
social media
The Public Domain: Surveillance in Everyday Life
From the report: "People create profiles on social network sites and Twitter
accounts against the background of an audience.
This paper argues that closely examining content created by others and looking at one’s
own content through other people’s eyes, a common part of social media use, should be framed as social surveillance. While
social surveillance is distinguished from traditional surveillance along three axes (power, hierarchy, and reciprocity), its effects
and behavior modification is common to traditional surveillance. Drawing on ethnographic studies of United States populations, I
look at social surveillance, how it is practiced, and its impact on people who engage in it. I use Foucault’s concept of capillaries of power to
demonstrate that social surveillance assumes the power differentials evident in everyday interactions rather than
the hierarchical power relationships assumed in much of the surveillance literature. Social media involves a collapse of social
contexts and social roles, complicating boundary work but facilitating social surveillance. Individuals strategically
reveal, disclose and conceal personal information to create connections with others and tend social boundaries. These processes are normal
parts of day-to-day life in communities that are highly connected through social media." Read more
Labels:
reports,
social media,
surveillance
Wednesday, February 13, 2013
Online Privacy and Security is a Shared Responsibility: Government, Industry and You
Planes do crash on very rare occasions but not nearly as often as cars. And when driving, there are things you can do to increase your safety, whereas when flying, there’s not much you can do to protect yourself but we do rely on the airline industry and government regulators to do all they can to protect us.
Likewise, when we’re online, there are things we can control and things we can’t." Read more
Labels:
point of view,
privacy
Follow the Surplus: How U.S. Consumers Value Online Media
From the report: "U.S. consumers realize large and growing value from online
media. In fact, they now derive more value from online media—net of the
associated costs—than they receive from offline media, according to new
research by The Boston Consulting Group. We call this measure of value
“consumer surplus” and, for online media, it amounts on average to
approximately $970 per U.S. connected consumer, or online user, per year—or
about 2.5 percent of the average annual income in the U.S. The comparable
consumer surplus for offline media is approximately $900." Read more
Labels:
digital economy,
stats
Obama Orders Voluntary Security Standards for Critical Industries’ Computer Networks
From the article: "Citing the growing threat from cyberattacks, President Obama
on Tuesday announced that he had signed an executive order that
calls for the creation of voluntary standards to boost the security of computer
networks in critical industries such as those that keep trains from colliding
and drinking water clean…. The order does not create regulations or
authorities. Rather, it directs the Commerce Department to work with industry
and federal agencies to craft a framework of standards within a year. The
standards would apply only to sectors regulated by federal agencies, such as
banking and electric power. “This is not designed to be a one-size-fits-all
approach,” said a senior administration official, speaking on the condition of anonymity
to discuss an order before Obama announced it." Read more
Labels:
cyber security,
privacy
Sovereignty and Liberty in the Internet Era
From the report: "The global revolution in communications technologies and services is
fracturing the historic relationship between the media and the state. That
relationship, born in the early print era, was first framed by the territorial
authority of sovereigns and later found new legitimacy in the rise of popular
sovereignty, thus becoming a definitive feature of the modern liberal
democratic state. For centuries, states have sought to impose their territorial
boundaries on the flow of information and ideas. This however has required ever
increasing inventiveness and cost as new communications technologies have both
empowered and threatened the security, authority and legitimacy of the state.
In the internet era, the state’s capacity to
control its public information sphere is now being tested to exhaustion." Read more
Labels:
impact of tech,
information sharing,
reports
The First Amendment is an Information Policy
From the report: "This essay,
based on the 20th annual Hugo Black lecture at Wesleyan University, argues that
we should think about individual liberties of freedom of speech, press, and
assembly not in isolation, but in the larger context of policies for the spread
and growth of knowledge and information.
Although we normally think about the First Amendment as an individual right, we should also see it as an integral part of a knowledge and information policy for a democratic state. That is because the practical ability to speak rests on an infrastructure of free expression that involves a wide range of institutions, statutory frameworks, programs, technologies and practices.
Using the examples of democratic protests in the Middle East and the controversy over WikiLeaks, the essay explains how free speech values are implicated in knowledge and information policies, in the design of digital networks and in the maintenance of infrastructure.
Around the world today, the fight over free speech is a fight over knowledge and information policy, and, in particular, how the infrastructure that makes free speech possible will be designed and implemented. Although the First Amendment is a crucial information policy for democracy, it is only one information policy among many. It needs the assistance of an infrastructure of free expression to make good on its promises. We must design democratic values into the infrastructure of free expression if we want an infrastructure that protects democracy." Read more
Although we normally think about the First Amendment as an individual right, we should also see it as an integral part of a knowledge and information policy for a democratic state. That is because the practical ability to speak rests on an infrastructure of free expression that involves a wide range of institutions, statutory frameworks, programs, technologies and practices.
Using the examples of democratic protests in the Middle East and the controversy over WikiLeaks, the essay explains how free speech values are implicated in knowledge and information policies, in the design of digital networks and in the maintenance of infrastructure.
Around the world today, the fight over free speech is a fight over knowledge and information policy, and, in particular, how the infrastructure that makes free speech possible will be designed and implemented. Although the First Amendment is a crucial information policy for democracy, it is only one information policy among many. It needs the assistance of an infrastructure of free expression to make good on its promises. We must design democratic values into the infrastructure of free expression if we want an infrastructure that protects democracy." Read more
Patient Portal Explosion Has Major Health Care Implications
Labels:
health IT,
medical records,
point of view
AHRQ Report Summarizes Health IT Grant Initiative's Efforts
The report highlights key findings from the experiences of 16 projects awarded in 2007, which aimed to investigate approaches for using health IT to enhance patient-centered care and ambulatory care. The four main areas of interest in the analysis were: patient self-management, providing access to medical information, patient-clinician communication and shared decision making." Read more
The Rise and Decline of the Intellectual Property Powers
From the report: "In
the past decade, China has experienced many impressive economic and
technological developments. Intriguingly, the narrative about piracy and
counterfeiting there is rarely linked to the narrative about the China's
technological rise. To provide a more comprehensive picture, this article
brings together these two different narratives to explore what their
combination would mean for the United States and its intellectual property
industries.
Delivered as the keynote luncheon address at the Symposium on "Applications of Intellectual Property Law in China," this article begins with the good news that China is at the cusp of crossing over from a pirating nation to a country respectful of intellectual property rights. It draws on the historical developments of intellectual property protection in the United States and other once-developing countries.
The article then delivers the bad news that, even though China will finally experience improvements in the protection and enforcement of intellectual property rights when it hits the proverbial crossover point, such improvements will bring some disappointments and unintended consequences.
In light of both the good and bad news, the article offers suggestions on three types of policy changes that could help prepare U.S. industries for the identified challenges. It specifically discusses changes at the domestic, bilateral and multilateral levels. Noting the challenges of making prognostications, this article concludes by suggesting that the United States may still have some time and wiggle room to decide its course of action for the near future." Read more
Labels:
China,
intellectual property,
reports
Monday, February 11, 2013
A Declaration of the Interdependence of Cyberspace
From the article: "On the anniversary of John Perry Barlow's issuing 'A Declaration
of the Independence of Cyberspace,' a response and alternate call to action. Seventeen
years ago today, on February 8, 1996, John Perry Barlow sent out his manifesto
"A Declaration of the Independenceof Cyberspace," a statement of the core belief of many
cyber-libertarians that governments should have no authority on the Internet.
That belief may seem quaint to many of us today, when the separation between
the real and the virtual is growing ever fuzzier. And yet the Declaration
remains a fairly accurate representation of the views of many of the
anti-government voices on the Internet." Read more
Labels:
internet governance,
point of view
U.S. Said To Be Target of Massive Cyber-Espionage Campaign
The National Intelligence Estimate identifies China as the country most aggressively seeking to penetrate the computer systems of American businesses and institutions to gain access to data that could be used for economic gain." Read more
Dr. Watson Will See You Now: IBM Offers Supercomputer Watson Apps in Cancer, Health Insurance
Both applications take advantage of the speed, huge database and language skill the computer demonstrated in defeating the best human “Jeopardy!” players on television two years ago.
Armonk-based IBM said Watson has improved its performance by 240 percent since the “Jeopardy!” win." Read more
Labels:
health IT
Power-Curve Society
Bollier, David. "Power-Curve Society." The Aspen Institute Communications and Society Program, 2013.
From the report: "Power-Curve Society,
written by David Bollier, examines how technological
innovation is restructuring productivity and the social and economic impact
resulting from these changes. It addresses the growing concern about the
technological displacement of jobs, stagnant middle class income, and wealth
disparities in an emerging "winner-take-all" economy. It also
examines cutting-edge innovations in personal data ecosystems that could
potentially unlock a revolutionary wave of individual economic empowerment. Power-Curve
Society is the Report of the Twenty-First Annual Roundtable on InformationTechnology, a dialogue convened by the Communications and
Society Program." Read more
Labels:
economic growth,
impact of tech,
jobs of the future,
reports
EU to Order Banks, Energy Firms to Report Cyber Attacks
Almost 15,000 transport companies, 8,000 banks, 4,000 energy firms, and 15,000 hospitals will have to report cyber attacks if the proposals are approved by EU governments and the European Parliament." Read more
Labels:
cyber security,
Europe,
internet governance
Solving Big-Data Bottleneck
From the report: "In a study that represents a potential cultural shift in how
basic science research can be conducted, researchers from Harvard Medical
School, Harvard Business School and London Business School have demonstrated
that a crowdsourcing platform pioneered in the commercial sector can solve a
complex biological problem more quickly than conventional approaches—and at a
fraction of the cost." Read more
Labels:
Big Data,
crowdsourcing,
population health,
reports
Thursday, February 7, 2013
Coming and Going on Facebook
From the article: "Two-thirds of
online American adults (67%) are Facebook users, making Facebook the dominant
social networking site in this country. And new findings from the Pew Research
Center’s Internet & American Life Project indicate there is considerable
fluidity in the Facebook user population:
- 61% of current Facebook users say
that at one time or another in the past they have voluntarily taken a
break from using Facebook for a period of several weeks or more.
- 20% of the online adults who do not
currently use Facebook say they once used the site but no longer do so.
- 8% of online adults who do not currently use Facebook are interested in becoming Facebook users in the future." Read more
Labels:
social media,
stats
Health IT, Feedback Can Raise Quality of Care
Hall, Susan D. "Health IT, Feedback Can Raise Quality of Care." Fierce Health IT, February 6, 2013.
From the article: "Providing feedback loops, as recommended by the Institute of Medicine, was a
core recommendation in the pre-rulemaking report of the Measure Applications
Partnership (MAP).
The public-private partnership, convened by the National Quality Forum to make recommendations to the U.S. Department of Health & Human Services, called feedback the best way to determine whether measurement is being used in the way it was intended.
"Ideally, the exchange of information through feedback loops is systematic, standardized, real-time, two-way, occurs among all levels of the system, and takes best advantage of information technology," the report states." Read more
See also
"MAP Pre-Rulemaking Report: 2013 Recommendations on Measures Under Consideration by HHS." National Quality Forum, February 2013.
Millard, Mike. "MAP Weighs in on Performance Measures." Government Health IT, February 5, 2013.
"NQF-Convened Group Provides Recommendations on Measures for Federal Healthcare Programs." Nationla Quality Forum, February 4, 2013.
The public-private partnership, convened by the National Quality Forum to make recommendations to the U.S. Department of Health & Human Services, called feedback the best way to determine whether measurement is being used in the way it was intended.
"Ideally, the exchange of information through feedback loops is systematic, standardized, real-time, two-way, occurs among all levels of the system, and takes best advantage of information technology," the report states." Read more
See also
"MAP Pre-Rulemaking Report: 2013 Recommendations on Measures Under Consideration by HHS." National Quality Forum, February 2013.
Millard, Mike. "MAP Weighs in on Performance Measures." Government Health IT, February 5, 2013.
"NQF-Convened Group Provides Recommendations on Measures for Federal Healthcare Programs." Nationla Quality Forum, February 4, 2013.
Crowdsourcing Grows Up as Online Workers Unite
From the article: "Crowdsourcing might be big business now but it has never
been fair. The pay is terrible, there is zero regulation and no recourse for
workers if things go wrong. But crowdsourcing's Wild West days of exploitation
could soon be over. Moves to make employers more accountable and give crowd
workers more benefits are helping shift the balance in favour of the employees." Read more
Labels:
crowdsourcing,
jobs of the future
CHIME Presses ONC on Patient Safety
CHIME said it agreed with ONC that, “the accurate and efficient matching of patients to their health information is critical to ensuring patient safety,” and it urged a more focused effort to address patient data matching, saying that, “despite years of development, no clear strategy has emerged to accurately and consistently match patient data.” Read more
Labels:
Health care,
health IT,
information sharing
Ovum: Big Data Collection Collides with Privacy Concerns
From the article: "Ovum, in a recent survey of about 11,000 people across 11
countries, found that 68 percent said they would use a do-not-track feature if
it was easily available on a search engine. Just 14 percent of respondents said
they believe Internet companies are honest about their use of personal data." Read more
FCC to Congress: U.N.'s ITU Internet Plans 'Must Be Stopped'
The FCC Commissioner ominously warned Congress that what happened at WCIT-12 "ended the era of an international consensus to keep inter-governmental hands off of the Internet in dramatic fashion." Read more
Labels:
internet governance,
ITU
Tags, Blogs, Tweets: Social Media as Science Tool?
Ogden, Lesley Evans. "Tags, Blogs, Tweets: Social Media as Science Tool?" BioScience 63 (2013): 148.
From the article: "Is social media changing the way we do science—even
speeding it up? Preliminary data, and a growing number of cases, suggest that
the answer is yes.
One now-famous example of its growing ubiquity is the
social media storm that followed the publication of a NASA-funded paper in the
journal Science, on 2 December 2010 (doi:10.1126/science.1197258). The
authors of the paper claimed to have discovered a bacterium that could
substitute arsenic in place of phosphate as a key nutrient necessary to support
life.
Rosie Redfield, zoology professor at the University of
British Columbia (UBC), wasn’t buying it, and said so on her blog. Ironically,
this was a communication platform that UBC graduate students chose to parody,
along with Redfield, at their Christmas party. Asking the fake Redfield,
“What’s a blog?” the reply was, “it’s a publication that nobody reads, not even
reviewers.” Their mockery was to be quickly proved wrong." Read more
Labels:
point of view,
social media