Data on real-time individuals’ location may provide significant opportunities for managing emergency situations. For example, in the case of outbreaks, besides informing on the proximity of people, hence supporting contact tracing activities, location data can be used to understand spatial heterogeneity in virus transmission. However, individuals’ low consent to share their data, proved by the low penetration rate of contact tracing apps in several countries during the coronavirus disease-2019 (COVID-19) pandemic, re-opened the scientific and practitioners’ discussion on factors and conditions triggering citizens to share their positioning data. Following the Antecedents → Privacy Concerns → Outcomes (APCO) model, and based on Privacy Calculus and Reasoned Action Theories, the study investigates factors that cause university students to share their location data with public institutions during outbreaks. To this end, an explanatory survey was conducted in Italy during the second wave of COVID-19, collecting 245 questionnaire responses. Structural equations modeling was used to contemporary investigate the role of trust, perceived benefit, and perceived risk as determinants of the intention to share location data during outbreaks. Results show that respondents’ trust in public institutions, the perceived benefits, and the perceived risk are significant predictor of the intention to disclose personal tracking data with public institutions. Results indicate that the latter two factors impact university students’ willingness to share data more than trust, prompting public institutions to rethink how they launch and manage the adoption process for these technological applications.
]]>Bus Rapid Transit (BRT) has grown fast in the last 25 years, promising low-cost, rapid implementation, and large positive impacts. Despite advances, many systems in middle- and low-income countries face operational and financial issues, particularly in Latin America. Some practitioners, researchers, and decision makers, and the media are questioning its ability to provide quality services. Is this the end of a trend? To answer this question, this paper explores the status of the BRT industry and literature on the topic, with a focus on Latin America, as well as the emblematic cases of Curitiba, Quito, Bogotá, Mexico, and Santiago. Overcrowding, lack of reliability, fare evasion, issues of safety and security, and poor maintenance are evident problems in these and other cities. They seem to be a result of institutional and financial constraints, as well as technical limitations of surface-based transit modes. BRT has been able to deliver high-capacity and fast and reliable services, but requires permanent management and investment to face growing demand and aging infrastructure and vehicles, just like rail systems do. In addition, attention needs to be provided to data, technology innovation, urban integration, and public participation to keep BRT as an integral part of multimodal high-quality sustainable mobility networks in the future.
]]>Cash transfer programs are the most common anti-poverty tool in low- and middle-income countries, reaching more than one billion people globally. Benefits are typically targeted using prediction models. In this paper, we develop an extended targeting assessment framework for proxy means testing that accounts for societal sensitivity to targeting errors. Using a social welfare framework, we weight targeting errors based on their position in the welfare distribution and adjust for different levels of societal inequality aversion. While this approach provides a more comprehensive assessment of targeting performance, our two case studies show that bias in the data, particularly in the form of label bias and unstable proxy means testing weights, leads to a substantial underestimation of welfare losses, disadvantaging some groups more than others.
]]>Current research on data in policy has primarily focused on street-level bureaucrats, neglecting the changes in the work of policy advisors. This research fills this gap by presenting an explorative theoretical understanding of the integration of data, local knowledge and professional expertise in the work of policy advisors. The theoretical perspective we develop builds upon Vickers’s (1995, The Art of Judgment: A Study of Policy Making, Centenary Edition, SAGE) judgments in policymaking. Empirically, we present a case study of a Dutch law enforcement network for preventing and reducing organized crime. Based on interviews, observations, and documents collected in a 13-month ethnographic fieldwork period, we study how policy advisors within this network make their judgments. In contrast with the idea of data as a rationalizing force, our study reveals that how data sources are selected and analyzed for judgments is very much shaped by the existing local and expert knowledge of policy advisors. The weight given to data is highly situational: we found that policy advisors welcome data in scoping the policy issue, but for judgments more closely connected to actual policy interventions, data are given limited value.
]]>Social network analysis is known to provide a wealth of insights relevant to many aspects of policymaking. Yet, the social data needed to construct social networks are not always available. Furthermore, even when they are, interpreting such networks often relies on extraneous knowledge. Here, we propose an approach to infer social networks directly from the texts produced by actors and the terminological similarities that these texts exhibit. This approach relies on fitting a topic model to the texts produced by these actors and measuring topic profile correlations between actors. This reveals what can be called “hidden communities of interest,” that is, groups of actors sharing similar semantic contents but whose social relationships with one another may be unknown or underlying. Network interpretation follows from the topic model. Diachronic perspectives can also be built by modeling the networks over different time periods and mapping genealogical relationships between communities. As a case study, the approach is deployed over a working corpus of academic articles (domain of philosophy of science; N=16,917).
]]>We outline a theory of algorithmic attention rents in digital aggregator platforms. We explore the way that as platforms grow, they become increasingly capable of extracting rents from a variety of actors in their ecosystems—users, suppliers, and advertisers—through their algorithmic control over user attention. We focus our analysis on advertising business models, in which attention harvested from users is monetized by reselling the attention to suppliers or other advertisers, though we believe the theory has relevance to other online business models as well. We argue that regulations should mandate the disclosure of the operating metrics that platforms use to allocate user attention and shape the “free” side of their marketplace, as well as details on how that attention is monetized.
]]>This study sought to establish the elements that constitute comprehensive legal and regulatory landscape for successful digital identity system establishment and implementation. Subsequently, the study sought to assess whether these elements were present in the establishment and implementation of the National Integrated Identity Management System (NIIMS) in Kenya. The study adopted a qualitative approach, data was obtained firstly, through literature review that provided background information to the study. Secondly, semi structured interviews were undertaken on purposively selected key informants. The study established that the elements that constitute a robust legal and regulatory framework for digital identity (ID) establishment and implementation include presence of a constitutional provision on the right to privacy; existence of a digital ID law governing the establishment of the system; amendment of laws relating to the registration of persons; existence of a data protection law; existence of an overarching law governing the digital economy among others. Largely, most of these elements were present in Kenya. However, the legislative approach adopted in crafting digital ID law in Kenya was wanting. This has undermined effective implementation of the NIIM system by among other things eroding public confidence in the system. The study concluded that effective operation of the system hinged on the existence of a robust and comprehensive legal and regulatory framework that will engender users’ trust in the system. In this regard, the study recommended review of the existing legal framework to ensure that it underpins both the foundational and functional aspects of the NIIM system.
]]>The use of computer technology to automate the enforcement of law is a promising alternative to simplify bureaucratic procedures. However, careless automation might result in an inflexible and dehumanized law enforcement system driven by algorithms that do not account for the particularities of individuals or minorities. In this article, we argue that hybrid smart contracts deployed to monitor rather than blindly enforce regulations can be used to add flexibility. Enforcement is a suitable alternative only when prevention is strictly necessary; however, we argue that in many situations a corrective approach based on monitoring is more flexible and suitable. To add more flexibility, the hybrid smart contract can be programmed to stop to request the intervention of a human or of a group of them when human judgment is needed.
]]>Researchers have encountered many issues while studying rare illnesses such as lack of information, limited sample sizes, difficulty in diagnosis, and more. However, perhaps the biggest challenge is to recruit a large enough sample size for clinical studies; at the same time, obtaining chronological data for these patients is even more difficult. This has urged us to implement a decentralized crowdsourcing medical data sharing platform to obtain chronological rare data for certain diseases, providing both patients and other stakeholders an easier and more secure way of trading medical data by utilizing blockchain technology. This facilitates the obtention of the most elusive types of health data by dynamically allocating extra financial incentives depending on data scarcity. We also provide a novel framework for medical data cross-validation where the system checks the volunteer reviewer count. The review score depends on the count, and the more the reviewers, the bigger the final score. We also explain how differential privacy is used to protect the privacy of individual medical data while enabling data monetization.
]]>Nowadays public policymakers are offered with opportunities to take data-driven evidence-based decisions by analyzing the very large volumes of policy-related data that are generated through different channels (e.g., e-services, mobile apps, social media). Machine learning (ML) and artificial intelligence (AI) tehcnologies ease and automate the analysis of large policy-related datasets, which helps policymakers to realize a shift toward data-driven decisions. Nevertheless, the deployment and use of AI tools for public policy development is also associated with significant technical, political, and operation challenges. For instance, AI-based policy development solutions must be transparent and explainable to policymakers, while at the same time adhering to the mandates of emerging regulations such as the AI Act of the European Union. This paper introduces some of the main technical, operational, regulatory compliance challenges of AI-based policymaking. Accordingly, it introduces technological solutions for overcoming them, including: (i) a reference architecture for AI-based policy development, (ii) a virtualized cloud-based tool for the specification and implementation of ML-based data-driven policies, (iii) a ML framework that enables the development of transparent and explainable ML models for policymaking, and (iv) a set of guidelines for using the introduced technical solutions to achieve regulatory compliance. The paper ends up illustrating the validation and use of the introduced solutions in real-life public policymaking cases for various local governments.
]]>This paper investigates the role of motorized three-wheelers (MTW) in urban mobility within popular transport, a demand-responsive and unscheduled mode of transportation provided by self-organized small operators frequently operating in grey areas of regulation. Although popular transport is the primary mobility option for millions worldwide, knowledge about its users, operation, and environmental and social impacts remains scarce. This paper sheds light on some of the features and impacts of popular MTW, focusing on two case studies in the Caribbean with different scales and urban trajectories: Puerto Viejo, Costa Rica, and Soledad in Colombia. We explored the relationship between MTW and fragmentation–(in)accessibility–exclusion in these cities, drawing on a framework connecting these concepts in the Latin American and Caribbean context. Using primary data from qualitative and quantitative methods, the paper examines the distribution of inhibitors or enablers of accessibility within the context of unequal, splintered, and fragmented transport and communication infrastructures. Additionally, the environmental impact of MTW in terms of CO2 and PM2.5 emissions is assessed using field data from low-cost sensors. The paper argues that planning for just urban mobility necessitates considering the ecological consequences of various transportation modes and their social consequences and potential for participation and inclusion. The applied methodology introduces low-cost, replicable, and scalable data production and analysis techniques, contributing to future research on sustainable and just mobility in resource-limited urban areas.
]]>Publicly funded data-driven innovation programmes frequently involve partnerships between small and medium enterprises (SMEs) and municipal authorities utilizing citizen data. The intention of these projects is to benefit citizens. However, few such projects achieve success or impact within the project timeframe. This may result in benefit accruing mainly to the SME partner, who gains both learning and data, engendering questions of data justice around whether citizen data are being exploited without sufficient benefit returning to citizens. Through case studies composed of interviews and document analysis, we examine how benefits for citizens are conceived and achieved in the publicly funded data-driven air quality projects Data Pitch and Smart Cities Innovation Framework Implementation. We find the differences between the programme funders’ policies had a clear influence on the citizen engagement elements. There are also a number of ways in which the desired citizen engagement and benefit becomes diluted, including through misalignment of incentives and focus, a lack of prioritization and ownership, and power imbalances between citizens and the other actors in the quadruple helix model. To retain the focus on ensuring citizens benefit from data-driven innovation programmes using citizen data, we propose the use of data Justice plans. More work is required to specify the content and mechanisms of such plans for application in such programmes.
]]>The advent of smart and digital cities is bringing data to the forefront as a critical resource for addressing the multifaceted transitions faced by African cities from rapid urbanization to the climate crisis. However, this commentary highlights the formidable considerations that must be addressed to realize the potential of data-driven urban planning and management. We argue that data should be viewed as a tool, not a panacea, drawing from our experience in modeling and mapping the accessibility of transport systems in Accra and Kumasi, Ghana. We identify five key considerations, including data choice, imperfections, resource intensity, validation, and data market dynamics, and propose three actionable points for progress: local data sharing, centralized repositories, and capacity-building. While our focus is on Kumasi and Accra, the considerations discussed are relevant to cities across the African continent.
]]>This study uses anonymized GPS traces to explore travel patterns within six suburban zones and a central area in Mexico City. The descriptive analysis presented in this paper profiles trips by distance and investigates their distribution within each zone. It examines the prevalence of local trips, walkability, and the availability and spread of entertainment sites within 15-min isochrones accessible by foot, bicycle, transit, and private vehicle. Notably, the central zone boasts diverse entertainment offerings, commendable walkability, and a substantial proportion of short and long trips. It is found that GPS traces are within their home. However, the share of long trips for the inhabitants of central zones is considerably more significant than that for the suburbs. The study highlights suburban zones that could benefit from governmental intervention to enhance transportation and pedestrian conditions. Additionally, it identifies other suburban zones that resemble the central areas in terms of walkability, trip distribution by distances, and the accessibility of entertainment places.
]]>People rely extensively on online social networks (OSNs) in Africa, which aroused cyber attackers’ attention for various nefarious actions. This global trend has not spared African online communities, where the proliferation of OSNs has provided new opportunities and challenges. In Africa, as in many other regions, a burgeoning black-market industry has emerged, specializing in the creation and sale of fake accounts to serve various purposes, both malicious and deceptive. This paper aims to build a set of machine-learning models through feature selection algorithms to predict the fake account, increase performance, and reduce costs. The suggested approach is based on input data made up of features that describe the profiles being investigated. Our findings offer a thorough comparison of various algorithms. Furthermore, compared to machine learning without feature selection and Boruta, machine learning employing the suggested genetic algorithm-based feature selection offers a clear runtime advantage. The final prediction model achieves AUC values between 90% and 99.6%. The findings showed that the model based on the features chosen by the GA algorithm provides a reasonable prediction quality with a small number of input variables, less than 31% of the entire feature space, and therefore permits the accurate separation of fake from real users. Our results demonstrate exceptional predictive accuracy with a significant reduction in input variables using the genetic algorithm, reaffirming the effectiveness of our approach.
]]>As the world has become more digitally dependent, questions of data governance, such as ethics, institutional arrangements, and statistical protection measures, have increased in significance. Understanding the economic contribution of investments in data sharing and data governance is highly problematic: outputs and outcomes are often widely dispersed and hard to measure, and the value of those investments is very context-dependent. The “Five Safes” is a popular data governance framework. It is used to design and critique data management strategies across the world and has also been used as a performance framework to measure the effectiveness of data access operations. We report on a novel application of the Five Safes framework to structure the economic evaluation of data governance. The Five Safes was designed to allow structured investigation into data governance. Combining this with more traditional logic models can provide an evaluation methodology that is practical, reproducible, and comparable. We illustrate this by considering the application of the combined logic model-Five Safes framework to data governance for agronomy investments in Ethiopia. We demonstrate how the Five Safes was used to generate the necessary context for a more traditional quantitative study, and consider lessons learned for the wider evaluation of data and data governance investments.
]]>