SlideShare a Scribd company logo
1 of 3
1) Values in Computational Models Revalued
Computational models are mathematical representations that are
designed to study the behaviour of complex systems. Systems
under study are usually nonlinear and complex to the extent that
conventional analytics cannot be used. Scholars have tried to
establish the role played by trust and values in the use of such
models in the analysis of public administration.
Public decision-making is itself a complex endeavour that
involves the input of multiple stakeholders. Usually, there are a
lot of conflicting interests that influence the final outcome of
such decision-making processes (Klabunde & Willekens, 2016).
In a computational model, a number of factors equally influence
the outcome of the process. One of them is the number of actors
involved –the presence of more actors normally implies
increased mistrust. Another factor is the amount of trust that
already exists among the decision makers. In cases where the
group is homogenous, there is likely to be more trust and thus,
less concern about the number of actors involved.
Given the importance of these two factors, the designer of any
such model bears the largest burden in assuring the value of the
model. He or she can choose to implement agency by humans or
by technology depending on the number of actors and trust
among them. Also, model designer determines the margins of
error from each scenario while modelling (Gershman, Markman
& Otto, 2014). Since in conventional decision-making processes
different actors have different roles, the model designer may
decide to accord different levels of authority to different actors.
Nevertheless, they must ensure that such a decision does not
affect the trust of the system. Overall, what values are sought
from a computational model in a public decision-making
context?
References
Gershman, S. J., Markman, A. B., & Otto, A. R. (2014).
Retrospective revaluation in sequential decision making: A tale
of two systems.
Journal of Experimental Psychology: General
,
143
(1), 182-194.
Klabunde, A., & Willekens, F. (2016). Decision-making in
agent-based models of migration: state of the art and
challenges.
European Journal of Population
,
32
(1), 73-97.
2) Active and Passive Crowdsourcing in Government
The authors of the article “Active and Passive Crowdsourcing in
Government” discuss the application of the idea of
crowdsourcing by public agencies. It leverages Web-based
platforms to gather information from a large number of
individuals for solving intricate problems (Loukis and
Charalabidis 284). The scholars revealed that the concept of
crowdsourcing was first adopted by organizations in the private
sector, especially creative and design firms. Later on, state
agencies began to determine how to leverage crowdsourcing to
obtain “collective wisdom” from citizens aimed at informing the
formulation and implementation of public policies.
Active and passive approaches to crowdsourcing are similar as
they are both directed at creating innovative solutions based on
the knowledge, thoughts, and insights of members of the public.
They are highly automated and contain application programming
interfaces (API) (Loukis and Charalabidis 264). In addition, the
two models involve the use of Web 2.0 technologies such as
blogs, online forums, and news sharing sites for data collection.
However, they differ in their ICT infrastructure. Active
crowdsourcing platform has a task management function for
adding multimedia and starting campaigns. It also contains a
contribution management component for processing content
from citizens. Conversely, passive crowdsourcing platform does
not have functions for analyzing information from users.
The researchers assert that the crowdsourcing methods they
recommend for state agencies should be aligned with the special
needs of users (Loukis and Charalabidis 261). They conducted
extensive research to indicate that public institutions should
improve the application of process models in gathering
information from citizens. Notably, the government is still
experimenting on the use of the crowdsourcing methods that are
discussed in the article. Consequently, it is necessary to ask the
following question: In what ways can the government realize
the real-life application of crowdsourcing models?

More Related Content

Similar to 1) Values in Computational Models RevaluedComputational mode.docx

Od2010 osimo v2
Od2010 osimo v2Od2010 osimo v2
Od2010 osimo v2osimod
 
Crowdsourcing the Policy Cycle - Collective Intelligence 2014 Araz Taeihagh ...
Crowdsourcing the Policy Cycle - Collective Intelligence 2014 Araz  Taeihagh ...Crowdsourcing the Policy Cycle - Collective Intelligence 2014 Araz  Taeihagh ...
Crowdsourcing the Policy Cycle - Collective Intelligence 2014 Araz Taeihagh ...Araz Taeihagh
 
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docxRunning head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docxjenkinsmandie
 
15 minutes agoKalyan Pradyumna Peddinti Complex Systems and .docx
15 minutes agoKalyan Pradyumna Peddinti Complex Systems and .docx15 minutes agoKalyan Pradyumna Peddinti Complex Systems and .docx
15 minutes agoKalyan Pradyumna Peddinti Complex Systems and .docxaulasnilda
 
eGovernance Research Grand Challenges
eGovernance Research Grand ChallengeseGovernance Research Grand Challenges
eGovernance Research Grand ChallengesYannis Charalabidis
 
Running head TECHNOLOGIES AND TOOLS FOR POLICY MAKING 4TECHN.docx
Running head TECHNOLOGIES AND TOOLS FOR POLICY MAKING  4TECHN.docxRunning head TECHNOLOGIES AND TOOLS FOR POLICY MAKING  4TECHN.docx
Running head TECHNOLOGIES AND TOOLS FOR POLICY MAKING 4TECHN.docxjeanettehully
 
Do not blame it on the algorithm an empirical assessment of multiple recommen...
Do not blame it on the algorithm an empirical assessment of multiple recommen...Do not blame it on the algorithm an empirical assessment of multiple recommen...
Do not blame it on the algorithm an empirical assessment of multiple recommen...Tel-Aviv Journalists' Association
 
E-Governance Model-unit-2.pptx
E-Governance Model-unit-2.pptxE-Governance Model-unit-2.pptx
E-Governance Model-unit-2.pptxRajkumarrawal2
 
Bayesian Model Fusion for Forecasting Civil Unrest
Bayesian Model Fusion for Forecasting Civil UnrestBayesian Model Fusion for Forecasting Civil Unrest
Bayesian Model Fusion for Forecasting Civil UnrestParang Saraf
 
Modelling the Media Logic of Software Systems
Modelling the Media Logic of Software SystemsModelling the Media Logic of Software Systems
Modelling the Media Logic of Software SystemsJan Schmidt
 
The AI Now Report The Social and Economic Implications of Artificial Intelli...
The AI Now Report  The Social and Economic Implications of Artificial Intelli...The AI Now Report  The Social and Economic Implications of Artificial Intelli...
The AI Now Report The Social and Economic Implications of Artificial Intelli...Willy Marroquin (WillyDevNET)
 
Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...eSAT Journals
 
Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...eSAT Publishing House
 
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docxRUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docxanhlodge
 
Assembling-Accountability.pdf
Assembling-Accountability.pdfAssembling-Accountability.pdf
Assembling-Accountability.pdfssusere0ee1d
 
Virtual customer communities
Virtual customer communitiesVirtual customer communities
Virtual customer communitiesMiia Kosonen
 
Challenges in Implementing Information Systems Abroad
Challenges in Implementing Information Systems AbroadChallenges in Implementing Information Systems Abroad
Challenges in Implementing Information Systems AbroadSteven Mairs, MPA
 
Need Response 1The subcomponent of crowdsourcing ICT platform.docx
Need Response 1The subcomponent of crowdsourcing ICT platform.docxNeed Response 1The subcomponent of crowdsourcing ICT platform.docx
Need Response 1The subcomponent of crowdsourcing ICT platform.docxvannagoforth
 

Similar to 1) Values in Computational Models RevaluedComputational mode.docx (20)

Od2010 osimo v2
Od2010 osimo v2Od2010 osimo v2
Od2010 osimo v2
 
Crowdsourcing the Policy Cycle - Collective Intelligence 2014 Araz Taeihagh ...
Crowdsourcing the Policy Cycle - Collective Intelligence 2014 Araz  Taeihagh ...Crowdsourcing the Policy Cycle - Collective Intelligence 2014 Araz  Taeihagh ...
Crowdsourcing the Policy Cycle - Collective Intelligence 2014 Araz Taeihagh ...
 
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docxRunning head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING        .docx
Running head USING IT TO MODEL BEHAVIOR FOR POLICY MAKING .docx
 
15 minutes agoKalyan Pradyumna Peddinti Complex Systems and .docx
15 minutes agoKalyan Pradyumna Peddinti Complex Systems and .docx15 minutes agoKalyan Pradyumna Peddinti Complex Systems and .docx
15 minutes agoKalyan Pradyumna Peddinti Complex Systems and .docx
 
eGovernance Research Grand Challenges
eGovernance Research Grand ChallengeseGovernance Research Grand Challenges
eGovernance Research Grand Challenges
 
Running head TECHNOLOGIES AND TOOLS FOR POLICY MAKING 4TECHN.docx
Running head TECHNOLOGIES AND TOOLS FOR POLICY MAKING  4TECHN.docxRunning head TECHNOLOGIES AND TOOLS FOR POLICY MAKING  4TECHN.docx
Running head TECHNOLOGIES AND TOOLS FOR POLICY MAKING 4TECHN.docx
 
Do not blame it on the algorithm an empirical assessment of multiple recommen...
Do not blame it on the algorithm an empirical assessment of multiple recommen...Do not blame it on the algorithm an empirical assessment of multiple recommen...
Do not blame it on the algorithm an empirical assessment of multiple recommen...
 
E-Governance Model-unit-2.pptx
E-Governance Model-unit-2.pptxE-Governance Model-unit-2.pptx
E-Governance Model-unit-2.pptx
 
Bayesian Model Fusion for Forecasting Civil Unrest
Bayesian Model Fusion for Forecasting Civil UnrestBayesian Model Fusion for Forecasting Civil Unrest
Bayesian Model Fusion for Forecasting Civil Unrest
 
Modelling the Media Logic of Software Systems
Modelling the Media Logic of Software SystemsModelling the Media Logic of Software Systems
Modelling the Media Logic of Software Systems
 
Knowing your public
Knowing your publicKnowing your public
Knowing your public
 
Ce4201528546
Ce4201528546Ce4201528546
Ce4201528546
 
The AI Now Report The Social and Economic Implications of Artificial Intelli...
The AI Now Report  The Social and Economic Implications of Artificial Intelli...The AI Now Report  The Social and Economic Implications of Artificial Intelli...
The AI Now Report The Social and Economic Implications of Artificial Intelli...
 
Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...
 
Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...Multi agent paradigm for cognitive parameter based feature similarity for soc...
Multi agent paradigm for cognitive parameter based feature similarity for soc...
 
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docxRUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
RUNNING HEADER Analytics Ecosystem1Analytics Ecosystem4.docx
 
Assembling-Accountability.pdf
Assembling-Accountability.pdfAssembling-Accountability.pdf
Assembling-Accountability.pdf
 
Virtual customer communities
Virtual customer communitiesVirtual customer communities
Virtual customer communities
 
Challenges in Implementing Information Systems Abroad
Challenges in Implementing Information Systems AbroadChallenges in Implementing Information Systems Abroad
Challenges in Implementing Information Systems Abroad
 
Need Response 1The subcomponent of crowdsourcing ICT platform.docx
Need Response 1The subcomponent of crowdsourcing ICT platform.docxNeed Response 1The subcomponent of crowdsourcing ICT platform.docx
Need Response 1The subcomponent of crowdsourcing ICT platform.docx
 

More from monicafrancis71118

1. Discuss Blockchains potential application in compensation system.docx
1. Discuss Blockchains potential application in compensation system.docx1. Discuss Blockchains potential application in compensation system.docx
1. Discuss Blockchains potential application in compensation system.docxmonicafrancis71118
 
1. Describe the characteristics of the aging process. Explain how so.docx
1. Describe the characteristics of the aging process. Explain how so.docx1. Describe the characteristics of the aging process. Explain how so.docx
1. Describe the characteristics of the aging process. Explain how so.docxmonicafrancis71118
 
1. Dis. 7Should we continue to collect data on race and .docx
1. Dis. 7Should we continue to collect data on race and .docx1. Dis. 7Should we continue to collect data on race and .docx
1. Dis. 7Should we continue to collect data on race and .docxmonicafrancis71118
 
1. Differentiate crisis intervention from other counseling therapeut.docx
1. Differentiate crisis intervention from other counseling therapeut.docx1. Differentiate crisis intervention from other counseling therapeut.docx
1. Differentiate crisis intervention from other counseling therapeut.docxmonicafrancis71118
 
1. Despite our rational nature, our ability to reason well is ofte.docx
1. Despite our rational nature, our ability to reason well is ofte.docx1. Despite our rational nature, our ability to reason well is ofte.docx
1. Despite our rational nature, our ability to reason well is ofte.docxmonicafrancis71118
 
1. Describe the ethical challenges faced by organizations operating .docx
1. Describe the ethical challenges faced by organizations operating .docx1. Describe the ethical challenges faced by organizations operating .docx
1. Describe the ethical challenges faced by organizations operating .docxmonicafrancis71118
 
1. Describe in your own words the anatomy of a muscle.  This sho.docx
1. Describe in your own words the anatomy of a muscle.  This sho.docx1. Describe in your own words the anatomy of a muscle.  This sho.docx
1. Describe in your own words the anatomy of a muscle.  This sho.docxmonicafrancis71118
 
1. Describe how your attitude of including aspects of health literac.docx
1. Describe how your attitude of including aspects of health literac.docx1. Describe how your attitude of including aspects of health literac.docx
1. Describe how your attitude of including aspects of health literac.docxmonicafrancis71118
 
1. Choose a behavior (such as overeating, shopping, Internet use.docx
1. Choose a behavior (such as overeating, shopping, Internet use.docx1. Choose a behavior (such as overeating, shopping, Internet use.docx
1. Choose a behavior (such as overeating, shopping, Internet use.docxmonicafrancis71118
 
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docxmonicafrancis71118
 
1. Cryptography is used to protect confidential data in many areas. .docx
1. Cryptography is used to protect confidential data in many areas. .docx1. Cryptography is used to protect confidential data in many areas. .docx
1. Cryptography is used to protect confidential data in many areas. .docxmonicafrancis71118
 
1. Compare and contrast steganography and cryptography.2. Why st.docx
1. Compare and contrast steganography and cryptography.2. Why st.docx1. Compare and contrast steganography and cryptography.2. Why st.docx
1. Compare and contrast steganography and cryptography.2. Why st.docxmonicafrancis71118
 
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
1. Date September 13, 2017 – September 15, 2017 2. Curr.docxmonicafrancis71118
 
1. compare and contrast predictive analytics with prescriptive and d.docx
1. compare and contrast predictive analytics with prescriptive and d.docx1. compare and contrast predictive analytics with prescriptive and d.docx
1. compare and contrast predictive analytics with prescriptive and d.docxmonicafrancis71118
 
1. Creating and maintaining relationships between home and schoo.docx
1. Creating and maintaining relationships between home and schoo.docx1. Creating and maintaining relationships between home and schoo.docx
1. Creating and maintaining relationships between home and schoo.docxmonicafrancis71118
 
1. Compare and contrast Strategic and Tactical Analysis and its .docx
1. Compare and contrast Strategic and Tactical Analysis and its .docx1. Compare and contrast Strategic and Tactical Analysis and its .docx
1. Compare and contrast Strategic and Tactical Analysis and its .docxmonicafrancis71118
 
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
1. Coalition ProposalVaccination Policy for Infectious Disease P.docxmonicafrancis71118
 
1. Company Description and Backgrounda. Weight Watchers was cr.docx
1. Company Description and Backgrounda. Weight Watchers was cr.docx1. Company Description and Backgrounda. Weight Watchers was cr.docx
1. Company Description and Backgrounda. Weight Watchers was cr.docxmonicafrancis71118
 
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docxmonicafrancis71118
 
1. Choose a case for the paper that interests you. Most choose a .docx
1. Choose a case for the paper that interests you.  Most choose a .docx1. Choose a case for the paper that interests you.  Most choose a .docx
1. Choose a case for the paper that interests you. Most choose a .docxmonicafrancis71118
 

More from monicafrancis71118 (20)

1. Discuss Blockchains potential application in compensation system.docx
1. Discuss Blockchains potential application in compensation system.docx1. Discuss Blockchains potential application in compensation system.docx
1. Discuss Blockchains potential application in compensation system.docx
 
1. Describe the characteristics of the aging process. Explain how so.docx
1. Describe the characteristics of the aging process. Explain how so.docx1. Describe the characteristics of the aging process. Explain how so.docx
1. Describe the characteristics of the aging process. Explain how so.docx
 
1. Dis. 7Should we continue to collect data on race and .docx
1. Dis. 7Should we continue to collect data on race and .docx1. Dis. 7Should we continue to collect data on race and .docx
1. Dis. 7Should we continue to collect data on race and .docx
 
1. Differentiate crisis intervention from other counseling therapeut.docx
1. Differentiate crisis intervention from other counseling therapeut.docx1. Differentiate crisis intervention from other counseling therapeut.docx
1. Differentiate crisis intervention from other counseling therapeut.docx
 
1. Despite our rational nature, our ability to reason well is ofte.docx
1. Despite our rational nature, our ability to reason well is ofte.docx1. Despite our rational nature, our ability to reason well is ofte.docx
1. Despite our rational nature, our ability to reason well is ofte.docx
 
1. Describe the ethical challenges faced by organizations operating .docx
1. Describe the ethical challenges faced by organizations operating .docx1. Describe the ethical challenges faced by organizations operating .docx
1. Describe the ethical challenges faced by organizations operating .docx
 
1. Describe in your own words the anatomy of a muscle.  This sho.docx
1. Describe in your own words the anatomy of a muscle.  This sho.docx1. Describe in your own words the anatomy of a muscle.  This sho.docx
1. Describe in your own words the anatomy of a muscle.  This sho.docx
 
1. Describe how your attitude of including aspects of health literac.docx
1. Describe how your attitude of including aspects of health literac.docx1. Describe how your attitude of including aspects of health literac.docx
1. Describe how your attitude of including aspects of health literac.docx
 
1. Choose a behavior (such as overeating, shopping, Internet use.docx
1. Choose a behavior (such as overeating, shopping, Internet use.docx1. Choose a behavior (such as overeating, shopping, Internet use.docx
1. Choose a behavior (such as overeating, shopping, Internet use.docx
 
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
1. Case 3-4 Franklin Industries’ Whistleblowing (a GVV Case)Natali.docx
 
1. Cryptography is used to protect confidential data in many areas. .docx
1. Cryptography is used to protect confidential data in many areas. .docx1. Cryptography is used to protect confidential data in many areas. .docx
1. Cryptography is used to protect confidential data in many areas. .docx
 
1. Compare and contrast steganography and cryptography.2. Why st.docx
1. Compare and contrast steganography and cryptography.2. Why st.docx1. Compare and contrast steganography and cryptography.2. Why st.docx
1. Compare and contrast steganography and cryptography.2. Why st.docx
 
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
1. Date September 13, 2017 – September 15, 2017 2. Curr.docx
 
1. compare and contrast predictive analytics with prescriptive and d.docx
1. compare and contrast predictive analytics with prescriptive and d.docx1. compare and contrast predictive analytics with prescriptive and d.docx
1. compare and contrast predictive analytics with prescriptive and d.docx
 
1. Creating and maintaining relationships between home and schoo.docx
1. Creating and maintaining relationships between home and schoo.docx1. Creating and maintaining relationships between home and schoo.docx
1. Creating and maintaining relationships between home and schoo.docx
 
1. Compare and contrast Strategic and Tactical Analysis and its .docx
1. Compare and contrast Strategic and Tactical Analysis and its .docx1. Compare and contrast Strategic and Tactical Analysis and its .docx
1. Compare and contrast Strategic and Tactical Analysis and its .docx
 
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
1. Coalition ProposalVaccination Policy for Infectious Disease P.docx
 
1. Company Description and Backgrounda. Weight Watchers was cr.docx
1. Company Description and Backgrounda. Weight Watchers was cr.docx1. Company Description and Backgrounda. Weight Watchers was cr.docx
1. Company Description and Backgrounda. Weight Watchers was cr.docx
 
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
1. Come up with TWO movie ideas -- as in for TWO screenplays that .docx
 
1. Choose a case for the paper that interests you. Most choose a .docx
1. Choose a case for the paper that interests you.  Most choose a .docx1. Choose a case for the paper that interests you.  Most choose a .docx
1. Choose a case for the paper that interests you. Most choose a .docx
 

Recently uploaded

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxJiesonDelaCerna
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersSabitha Banu
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 

Recently uploaded (20)

Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
CELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptxCELL CYCLE Division Science 8 quarter IV.pptx
CELL CYCLE Division Science 8 quarter IV.pptx
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
DATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginnersDATA STRUCTURE AND ALGORITHM for beginners
DATA STRUCTURE AND ALGORITHM for beginners
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 

1) Values in Computational Models RevaluedComputational mode.docx

  • 1. 1) Values in Computational Models Revalued Computational models are mathematical representations that are designed to study the behaviour of complex systems. Systems under study are usually nonlinear and complex to the extent that conventional analytics cannot be used. Scholars have tried to establish the role played by trust and values in the use of such models in the analysis of public administration. Public decision-making is itself a complex endeavour that involves the input of multiple stakeholders. Usually, there are a lot of conflicting interests that influence the final outcome of such decision-making processes (Klabunde & Willekens, 2016). In a computational model, a number of factors equally influence the outcome of the process. One of them is the number of actors involved –the presence of more actors normally implies increased mistrust. Another factor is the amount of trust that already exists among the decision makers. In cases where the group is homogenous, there is likely to be more trust and thus, less concern about the number of actors involved. Given the importance of these two factors, the designer of any such model bears the largest burden in assuring the value of the model. He or she can choose to implement agency by humans or by technology depending on the number of actors and trust among them. Also, model designer determines the margins of error from each scenario while modelling (Gershman, Markman & Otto, 2014). Since in conventional decision-making processes different actors have different roles, the model designer may decide to accord different levels of authority to different actors. Nevertheless, they must ensure that such a decision does not affect the trust of the system. Overall, what values are sought from a computational model in a public decision-making
  • 2. context? References Gershman, S. J., Markman, A. B., & Otto, A. R. (2014). Retrospective revaluation in sequential decision making: A tale of two systems. Journal of Experimental Psychology: General , 143 (1), 182-194. Klabunde, A., & Willekens, F. (2016). Decision-making in agent-based models of migration: state of the art and challenges. European Journal of Population , 32 (1), 73-97. 2) Active and Passive Crowdsourcing in Government The authors of the article “Active and Passive Crowdsourcing in Government” discuss the application of the idea of crowdsourcing by public agencies. It leverages Web-based platforms to gather information from a large number of individuals for solving intricate problems (Loukis and Charalabidis 284). The scholars revealed that the concept of crowdsourcing was first adopted by organizations in the private sector, especially creative and design firms. Later on, state agencies began to determine how to leverage crowdsourcing to obtain “collective wisdom” from citizens aimed at informing the
  • 3. formulation and implementation of public policies. Active and passive approaches to crowdsourcing are similar as they are both directed at creating innovative solutions based on the knowledge, thoughts, and insights of members of the public. They are highly automated and contain application programming interfaces (API) (Loukis and Charalabidis 264). In addition, the two models involve the use of Web 2.0 technologies such as blogs, online forums, and news sharing sites for data collection. However, they differ in their ICT infrastructure. Active crowdsourcing platform has a task management function for adding multimedia and starting campaigns. It also contains a contribution management component for processing content from citizens. Conversely, passive crowdsourcing platform does not have functions for analyzing information from users. The researchers assert that the crowdsourcing methods they recommend for state agencies should be aligned with the special needs of users (Loukis and Charalabidis 261). They conducted extensive research to indicate that public institutions should improve the application of process models in gathering information from citizens. Notably, the government is still experimenting on the use of the crowdsourcing methods that are discussed in the article. Consequently, it is necessary to ask the following question: In what ways can the government realize the real-life application of crowdsourcing models?