SlideShare a Scribd company logo
38 www.e-enm.org
Endocrinol Metab 2016;31:38-44
http://dx.doi.org/10.3803/EnM.2016.31.1.38
pISSN 2093-596X · eISSN 2093-5978
Review
Article
How to Establish Clinical Prediction Models
Yong-ho Lee1, Heejung Bang2, Dae Jung Kim3
1Department of Internal Medicine, Yonsei University College of
Medicine, Seoul, Korea; 2Division of Biostatistics, Department
of Public Health Sciences, University of California Davis
School of Medicine, Davis, CA, USA; 3Department of
Endocrinology
and Metabolism, Ajou University School of Medicine, Suwon,
Korea
A clinical prediction model can be applied to several
challenging clinical scenarios: screening high-risk individuals
for asymp-
tomatic disease, predicting future events such as disease or
death, and assisting medical decision-making and health
education.
Despite the impact of clinical prediction models on practice,
prediction modeling is a complex process requiring careful
statisti-
cal analyses and sound clinical judgement. Although there is no
definite consensus on the best methodology for model develop-
ment and validation, a few recommendations and checklists
have been proposed. In this review, we summarize five steps for
de-
veloping and validating a clinical prediction model: preparation
for establishing clinical prediction models; dataset selection;
handling variables; model generation; and model evaluation and
validation. We also review several studies that detail methods
for developing clinical prediction models with comparable
examples from real practice. After model development and
vigorous
validation in relevant settings, possibly with evaluation of
utility/usability and fine-tuning, good models can be ready for
the use
in practice. We anticipate that this framework will revitalize the
use of predictive or prognostic research in endocrinology,
leading
to active applications in real clinical practice.
Keywords: Clinical prediction model; Development; Validation;
Clinical usefulness
INTRODUCTION
Hippocrates emphasized prognosis as a principal component of
medicine [1]. Nevertheless, current medical investigation
mostly focuses on etiological and therapeutic research, rather
than prognostic methods such as the development of clinical
prediction models. Numerous studies have investigated wheth-
er a single variable (e.g., biomarkers or novel clinicobiochemi -
cal parameters) can predict or is associated with certain out-
comes, whereas establishing clinical prediction models by in-
corporating multiple variables is rather complicated, as it re-
quires a multi-step and multivariable/multifactorial approach to
design and analysis [1].
Clinical prediction models can inform patients and their
physicians or other healthcare providers of the patient’s proba -
bility of having or developing a certain disease and help them
with associated decision-making (e.g., facilitating patient-doc-
tor communication based on more objective information). Ap-
Received: 9 January 2016, Revised: 14 January 2016,
Accepted: 27 January 2016
Corresponding authors: Dae Jung Kim
Department of Endocrinology and Metabolism, Ajou University
School of
Medicine, 164 World cup-ro, Yeongtong-gu, Suwon 16499,
Korea
Tel: +82-31-219-5128, Fax: +82-31-219-4497, E-mail:
[email protected]
Yong-ho Lee
Department of Internal Medicine, Yonsei University College of
Medicine, 50-1
Yonsei-ro, Seodaemun-gu, Seoul 03722, Korea
Tel: +82-2-2228-1943, Fax: +82-2-393-6884, E-mail:
[email protected]
Copyright © 2016 Korean Endocrine Society
This is an Open Access article distributed under the terms of the
Creative Com-
mons Attribution Non-Commercial License
(http://creativecommons.org/
licenses/by-nc/4.0/) which permits unrestricted non-commercial
use, distribu-
tion, and reproduction in any medium, provided the original
work is properly
cited.
http://crossmark.crossref.org/dialog/?doi=10.3803/EnM.2016.31
.1.38&domain=pdf&date_stamp=2016-03-16
Clinical Prediction Models
Copyright © 2016 Korean Endocrine Society www.e-enm.org 39
Endocrinol Metab 2016;31:38-44
http://dx.doi.org/10.3803/EnM.2016.31.1.38
pISSN 2093-596X · eISSN 2093-5978
plying a model to a real world problem can help with detection
or screening in undiagnosed high-risk subjects, which improves
the ability to prevent developing diseases with early interven-
tions. Furthermore, in some instances, certain models can pre-
dict the possibility of having future disease or provide a prog-
nosis for disease (e.g., complication or mortality). This review
will concisely describe how to establish clinical prediction
models, including the principles and processes for conducting
multivariable prognostic studies and developing and validating
clinical prediction models.
CONCEPT OF CLINICAL PREDICTION
MODELS
In the era of personalized medicine, prediction of prevalent or
incident diseases (diagnosis) or outcomes for future disease
course (prognosis) became more important for patient manage-
ment by health-care personnel. Clinical prediction models are
used to investigate the relationship between future or unknown
outcomes (endpoints) and baseline health states (starting point)
among people with specific conditions [2]. They generally
combine multiple parameters to provide insight into the relative
impacts of individual predictors in the model. Evidence-based
medicine requires the strongest scientific evidence, including
findings from randomized controlled trials, meta-analyses, and
systematic reviews [3]. Although clinical prediction models are
partly based on evidence-based medicine, the user must also
adopt practicality and an artistic approach to establish clinically
relevant and meaningful models for targeted users.
Models should predict specific events accurately and be rela -
tively simple and easy to use. If a prediction model provides
inaccurate estimates of future-event occurrences, it will mislead
healthcare professionals to provide insufficient management of
patients or resources. On the other hand, if a model has high
predictability power but is difficult to apply (e.g., with compli -
cated calculation or unfamiliar question/item or unit), time con-
suming, costly [4] or less relevant (e.g., European model for
Koreans, event too far away), it will not be commonly used.
For example, a diabetes prediction model developed by Lim et
al. [5] has a relatively high area under the receiver operating
curve (AUC, 0.77), while blood tests that measure hemoglobin
A1c, high density lipoprotein cholesterol, and triglyceride are
included in the risk score, which would generally require clini -
cian’s involvement so could be a major barrier for use in com-
munity settings. When prediction models consist of complicat-
ed mathematical equations [6,7], a web-based application can
enhance implementation (e.g., calculating 10-year and lifetime
risk for atherosclerotic cardiovascular disease [CVD] is avail-
able at http://tools.acc.org/ASCVD-Risk-Estimator/). There-
fore, achieving a balance between predictability and simplicity
is a key to a good clinical prediction model.
STEPS TO DEVELOPING CLINICAL
PREDICTION MODELS
There are several reports [1,8-13] and a textbook [14] that de-
tail methods to develop clinical prediction models. Although
there is currently no consensus on the ideal construction meth-
od for prediction models, the Prognosis Research Strategy
(PROGRESS) group has proposed a number of methods to im-
prove the quality and impact of model development [2,15]. Re-
cently, investigators on the Transparent Reporting of a multi -
variable prediction model for Individual Prognosis Or Diagno-
sis (TRIPOD) study have established a checklist of recommen-
dations for reporting on prediction or prognostic models [16].
This review will summarize the analytic process for developing
clinical prediction models into five stages.
Stage 1: preparation for establishing clinical prediction
models
The aim of prediction modeling is to develop an accurate and
useful clinical prediction model with multiple variables using
comprehensive datasets. First, we have to articulate several im-
portant research questions that affect database selection and the
approach of model generation. (1) What is the target outcome
(event or disease) to predict (e.g., diabetes, CVD, or fracture)?
(2) Who is the target patient of the model (e.g., general popula-
tion, elderly population ≥65 years or patients with type 2 dia-
betes)? (3) Who is the target user of the prediction model (e.g.,
layperson, doctor or health-related organization)? Depending
on the answers to the above questions, researchers can choose
the proper datasets for the model. The category of target users
will determine the selection and handling process of multiple
variables, which will affect the structure of the clinical predic -
tion model. For example, if researchers want to make a predic-
tion model for laypersons, a simple model with not many user-
friendly questions in only a few categories (e.g., yes vs. no)
could be ideal.
Stage 2: dataset selection
The dataset is one of the most important components of the
clinical prediction model—often not under investigators’ con-
Lee YH, et al.
40 www.e-enm.org Copyright © 2016 Korean Endocrine Society
trol—and ultimately determines its quality and credibility;
however, there are no general rules for assessing the quality of
data [9]. Yet, there is no such thing as perfect data and prefect
model. It would be reasonable to search for best-suited dataset.
Oftentimes, secondary or administrative data sources must be
utilized because a primary dataset with the study endpoint and
all of key predictors is not available. Researchers should use
different types of datasets, depending on the purpose of the
prediction model. For example, a model for screening high-risk
individuals with undiagnosed condition/disease can be devel -
oped using cross-sectional cohort data. However, such models
may have relatively low power for predicting future incidence
of disease when different risk factors come into play. Accord-
ingly, longitudinal or prospective cohort datasets should be
used for prediction models for future events (Table 1). Models
for prevalent events are useful for predicting asymptomatic
diseases, such as diabetes or chronic kidney disease, by screen-
ing undiagnosed cases, whereas models for incident events are
useful for predicting the incidence of relatively severe diseases,
such as CVD, stroke, and cancer.
A universal clinical prediction model for disease does not
exist; thus, separate specific models that can individually as -
sess the role of ethnicity, nationality, sex, or age on disease risk
are warranted. For example, the Framingham coronary heart
disease (CHD) risk score is generated by one of the most com-
monly used clinical prediction models; however, it tends to
overestimate CHD risk by approximately 5-fold in Asian popu-
lations [17,18]. This indicates that models derived from one
ethnicity sample may not be directly applied to populations of
other ethnicities. Other specific characteristics of study popula -
tions beside ethnicity (e.g., obesity- or culture-related vari-
ables) could be important.
There is no absolute consensus on the minimal requirement
for dataset sample size. Generally, large representative, contem-
porary datasets that closely reflect the characteristics of their
target population are ideal for modeling and can enhance the
relevance, reproducibility, and generalizability of the model.
Moreover, two types of datasets are generally needed: a devel -
opment dataset and a validation dataset. A clinical prediction
model is first derived from analyses of the development dataset
and its predictive performance should be assessed in different
populations based on the validation dataset. It is highly recom-
mended to use validation datasets from external study popula-
tions or cohorts, whenever available [19,20]; however, if it is
not possible to find appropriate external datasets, an internal
validation dataset can be formed by randomly splitting the orig-
inal cohort into two datasets (if sample size is large) or statisti -
cal techniques such as jackknife or bootstrap resampling (if not)
[21]. The splitting ratio can vary depending on the researchers’
particular goals, but generally, more subjects should be allocat-
ed to the development dataset than to the validation dataset.
Stage 3: handling variables
Since cohort datasets contain more variables than can reason-
ably be used in a prediction model, evaluation and selection of
the most predictive and sensible predictors should be done.
Generally, inclusion of more than 10 variables/questions may
decrease the efficiency, feasibility and convenience of predic-
tion models, but expert’s judgment that could be somewhat
subjective is required to assess the need for each situation. Pre -
dictors that were previously found to be significant should nor -
mally be considered as candidate variables (e.g., family history
of diabetes in diabetes risk score). It should be noted that not
all significant predictors need to be included in the final model
(e.g., P<0.05); predictor selection must be always guided by
clinical relevance/judgement to prevent nonsensical or less rel -
evant or user-unfriendly variables (e.g., socioeconomic status-
related) or possible false-positive associations. Additionally,
Table 1. Characteristics of Different Clinical Prediction Models
according to Their Purpose
Characteristic Prevalent/concurrent events Incident/future
events
Data type Cross-sectional data Longitudinal/prospective cohort
data
Application Useful for asymptomatic diseases for screening
undiagnosed cases (e.g., diabetes, CKD)
Useful for predicting the incidence of diseases
(e.g., CVD, stroke, cancer)
Aim of the model Detection Prevention
Simplicity in model and use More important Less important
Example Korean Diabetes Score [34] ACC/AHA ASCVD risk
equation [7]
CKD, chronic kidney disease; CVD, cardiovascular disease;
ACC/AHA, American College of Cardiology/American Heart
Association; ASCVD,
atherosclerotic cardiovascular disease.
Clinical Prediction Models
Copyright © 2016 Korean Endocrine Society www.e-enm.org 41
variables which are highly correlated with others may be ex-
cluded because they contribute little unique information [22].
On the other hand, variables not statistically significant or with
small effect size may still contribute to the model [23]. De-
pending on researcher discretion, different models that analyze
different variables may be developed for targeting distinct us -
ers. For example, a simple clinical prediction model that does
not require laboratory variables and a comprehensive model
that does could both be designed for laypersons and health care
providers, respectively [19].
With regard to variable coding, categorical and continuous
variables should be managed differently [8]. For ordered cate -
gorical variables, infrequent categories can be merged and sim-
ilar variables may be combined/grouped. For example, past and
current smoker categories can be merged if numbers of sub-
jects who report being a past or current smoker are relatively
small and variable unification does not alter the statistical sig-
nificance of the model materially. Although continuous param-
eters are usually included in a regression model, assuming lin-
earity, researchers should consider the possibility of non-linear
associations such as J- or U-shaped distributions [24]. Further-
more, the relative effect of a continuous variable is determined
by the measurement scale used in the model [8]. For example,
the impact of fasting glucose levels on the risk of CVD may be
interpreted as having a stronger influence when scaled per 10
mg/dL than per 1 mg/dL.
Researchers often emphasize the importance of not dichoto-
mizing continuous variables in the initial stage of model devel -
opment because valuable predictive information can be lost
during categorization [24]. However, prediction models—is
not the same thing as regression models—with continuous pa-
rameters may be complex and hard to use or be understood by
laypersons, because they have to calculate their risk scores by
themselves. A web or computer-based platform is usually re-
quired for the implementation of these models. Otherwise, in a
later phase, researchers may transform the model into a user -
friendly format by categorizing some predictors, if the predic-
tive capacity of the model is retained [8,19,25].
Finally, missing data is a chronic problem in most data anal -
yses. Missing data can occur various reasons, including uncol -
lected (e.g., by design), not available or not applicable, refusal
by respondent, dropout, or “don’t know.” To handle this issue,
researchers may consider imputation technique, dichotomizing
the answer into yes versus others, or allow “unknown” as a
separate category as in http://www.cancer.gov/bcrisktool/.
Stage 4: model generation
Although there are no consensus guidelines for choosing vari-
ables and determining structures to develop the final prediction
model, various strategies with statistical tools are available
[8,9]. Regression analyses, including linear, logistic, and Cox
models are widely used depending on the model and its intend-
ed purpose. First, the full model approach is to include all the
candidate variables in the model; the benefit of this approach is
to avoid overfitting and selection bias [9]. However, it can be
impractical to pre-specify all predictors and previously signifi-
cant predictors may not be in a new population/sample. Sec-
ond, a backward elimination approach or stepwise selection
method can be applied to remove a number of insignificant
candidate variables. To check for overfitting of the model,
Akaike information criterion (AIC) [26], an index of model fit-
ting that charges a penalty against larger models, may be useful
[19]. Lower AIC values indicate a better model fit. Some inter -
pret that AIC addresses explanation and Bayesian information
criterion (BIC) addresses prediction, where BIC may be con-
sidered a Bayesian counterpart [27].
If researchers prefer algorithm modeling culture instead of
data modeling culture, e.g., formula-based regression [28], a
classification and regression tree analysis or recursive parti -
tioning could be considered [28-30].
With regard to determining scores for each predictor in the
generation of simplified models, researchers using expert judg-
ment may create a weighted scoring system by converting β
coefficients [19] or odds ratios [20] from the final model to in-
teger values, while preserving monotonicity and simplicity. For
example, from the logistic regression model built by Lee et al.
[19], β coefficients <0.6, 0.7 to 1.3, 1.4 to 2.0, and >2.1 were
assigned scores of 1, 2, 3, and 4, respectively.
Stage 5: model evaluation and validation (internal/
external)
After model generation, researchers should evaluate the predic-
tive power of their proposed model using an independent datas-
et, where truly external dataset is preferred whenever available.
There are several standard performance measures that capture
different aspects: two key components are calibration and dis -
crimination [8,9,31]. Calibration can be assessed by plotting the
observed proportions of events against the predicted probabili -
ties for groups defined by ranges of individual predicted risk
[9,10]. For example, a common method is to categorize 10 risk
groups of equal size (deciles) and then conduct the calibration
process [32]. The most ideal calibration plot would show a 45°
Lee YH, et al.
42 www.e-enm.org Copyright © 2016 Korean Endocrine Society
line, which indicates that the observed proportions of events
and predicted probabilities completely overlap over the entire
range of probabilities [9]. However, this is not guaranteed when
external validation is conducted with a different sample. Dis -
crimination is defined as the ability to distinguish events versus
non-events (e.g., dead vs. alive) [8]. The most common dis-
crimination measure is the AUC or, equivalently, concordance
(c)-statistic. The AUC is equal to the probability that, given two
individuals randomly selected—one who will develop an event
and another who will not—the model will assign a higher prob-
ability of an event to the former [10]. A c-statistic value of 0.5
indicates a random chance (i.e., flip of a coin). The usual c-sta-
tistic range for a prediction model is 0.6 to 0.85; this range can
be affected by target-event characteristics (disease) or the study
population. A model with a c-statistic ranging from 0.70 to 0.80
has an adequate power of discrimination; a range of 0.80 to 0.90
is considered excellent. Table 2 shows several common statisti -
cal measures for model evaluation.
As usual, selection, application and interpretation of any sta-
tistical method and results need great care as virtually all meth-
ods entail assumptions and limited capacity. Let us review
some here. Predictive values depend on the disease prevalence
so direct comparison for different diseases may not be valid.
When sample size is very large, P value can be impressively
small even for a practically meaningless difference. Net reclas -
sification index and integrated discrimination improvement are
known to lead to non-proper scoring and vulnerable to miscali-
brated or overfit problems [33]. AUC and R2 are often hard to
increase by a new predictor, even with large odds ratio. Despite
similar names, AIC and BIC address slightly different issues
and
information in BIC can be decreased with sample size increases.
The Hosmer-Lemeshow test is highly sensitive when sample
size is large, which is not an ideal property as a goodness-fit
sta-
tistic. Calibration plot can easily provide a high correlation
coef-
ficient (>0.9), simply because they are computed for predicted
versus observed values on grouped data (without random vari -
ability). Finally, AUC also needs caution: a high value (e.g.,
>0.9) may mean excellent discrimination but it can also reflect
the situation where prediction is not so relevant: (1) the task is
closer to diagnostic or early onset rather than prediction; (2)
cas-
es vs. non-cases are fundamentally different with minimal over-
lap; or (3) predictors and endpoints are virtually the same things
(e.g., current blood pressure vs. future blood pressure).
Despite the long list provided above, we do not think this is
a discouraging news to researchers. We may tell us no method
is perfect and “one size does not fit all” is also true to statistical
methods; thus blinded or automated application can be danger -
ous.
It is crucial to separate internal and external validation and
to conduct the previously mentioned analyses on both datasets
to finalize the research findings (see the following for example
reports [19,20,34]). Internal validation can be done using a ran-
dom subsample or different years from the development dataset
or by conducting bootstrap resampling [22]. This approach can
particularly assess the stability of selected predictors, as well as
prediction quality. Subsequently, external validation should be
performed on an independent dataset from that which was pre-
viously used to develop the model. For example, datasets can
be obtained from populations from other hospitals or centers
(see geographic validation [19]) or a more recently collected
cohort population (temporal validation [34]). This process is
often considered to be a more powerful test for prediction mod-
els than internal validation because it evaluates transportability,
generalizability and true replication, rather than reproducibility
[8]. Poor model performance may occur after use of an external
dataset due to differences in healthcare systems, measurement
methods/definitions of predictors and/or endpoint, subject
characteristics or context (e.g., high vs. low risk).
CONCLUSIONS
For patient-centered perspectives, clinical prediction models
are useful for several purposes: to screen high-risk individuals
Table 2. Statistical Measures for Model Evaluation
Sensitivity and specificity
Discrimination (ROC/AUC)
Predictive values: positive, negative
Likelihood ratio: positive, negative
Accuracy: Youden index, Brier score
Number needed to treat or screen
Calibration: Calibration plot, Hosmer-Lemeshow test
Model determination: R2
Statistical significance: P value (e.g., likelihood ratio test)
Magnitude of association, e.g., β coefficient, odds ratio
Model quality: AIC/BIC
Net reclassification index and integrated discrimination
improvement
Net benefit
Cost-effectiveness
ROC, receiver operating characteristic; AUC, area under the
curve;
AIC, Akaike information criterion; BIC, Bayesian information
criterion.
Clinical Prediction Models
Copyright © 2016 Korean Endocrine Society www.e-enm.org 43
for asymptomatic disease, to predict future events of disease or
death, and to assist medical decision-making. Herein, we sum-
marized five steps for developing a clinical prediction model.
Prediction models are continuously designed but few have had
their predictive performance validated with an external popula-
tion. Because model development is complex, consultation
with statistical experts can improve the validity and quality of
rigorous prediction model research. After developing the mod-
el, vigorous validation with multiple external datasets and ef-
fective dissemination to interested parties should occur before
using the model in practice [35]. Web or smartphone-based ap-
plications can be good routes for advertisement and delivery of
clinical prediction models to the public. For example, Korean
risk models for diabetes, fatty liver, CVD, and osteoporosis are
readily available at http://cmerc.yuhs.ac/mobileweb/. Simple
model may be translated into a one page checklist for patient’s
self-assessment (e.g., equipped in waiting room in clinic). We
anticipate that the framework that we provide/summarize,
along with additional assistance from related references or text-
books, will help predictive or prognostic research in endocri-
nology; this will lead to active application of these practices in
real world settings. In light of the personalized- and precision-
medicine era, further research is needed to attain individual -
level predictions, where genetic or novel biomarkers can play
bigger roles, as well as simple generalized predictions which
can further help patient-centered care.
CONFLICTS OF INTEREST
No potential conflict of interest relevant to this article was re -
ported.
ACKNOWLEDGMENTS
This study was supported by a grant from the Korea Healthcare
Technology R&D Project, Ministry of Health and Welfare, Re-
public of Korea (No. HI14C2476). H.B. was partly supported
by the National Center for Advancing Translational Sciences,
National Institutes of Health, through grant UL1 TR 000002.
D.K. was partly supported by a grant of the Korean Health
Technology R&D Project, Ministry of Health and Welfare, Re-
public of Korea (HI13C0715).
ORCID
Yong-ho Lee http://orcid.org/0000-0002-6219-4942
Dae Jung Kim http://orcid.org/0000-0003-1025-2044
REFERENCES
1. Moons KG, Royston P, Vergouwe Y, Grobbee DE, Altman
DG. Prognosis and prognostic research: what, why, and how?
BMJ 2009;338:b375.
2. Hemingway H, Croft P, Perel P, Hayden JA, Abrams K,
Timmis A, et al. Prognosis research strategy (PROGRESS)
1: a framework for researching clinical outcomes. BMJ
2013;346:e5595.
3. Sackett DL, Rosenberg WM, Gray JA, Haynes RB, Rich-
ardson WS. Evidence based medicine: what it is and what it
isn’t. BMJ 1996;312:71-2.
4. Greenland S. The need for reorientation toward cost-effective
prediction: comments on ‘Evaluating the added predictive
ability of a new marker. From area under the ROC curve to re-
classification and beyond’ by M. J. Pencina et al., Statistics i n
Medicine (DOI: 10.1002/sim.2929). Stat Med 2008;27:199-
206.
5. Lim NK, Park SH, Choi SJ, Lee KS, Park HY. A risk score
for predicting the incidence of type 2 diabetes in a middle-
aged Korean cohort: the Korean genome and epidemiology
study. Circ J 2012;76:1904-10.
6. Griffin SJ, Little PS, Hales CN, Kinmonth AL, Wareham NJ.
Diabetes risk score: towards earlier detection of type 2 diabe -
tes in general practice. Diabetes Metab Res Rev 2000;16:164-
71.
7. Goff DC Jr, Lloyd-Jones DM, Bennett G, Coady S,
D’Agostino RB, Gibbons R, et al. 2013 ACC/AHA guideline
on the assessment of cardiovascular risk: a report of the
American College of Cardiology/American Heart Associa-
tion Task Force on Practice Guidelines. Circulation 2014;129
(25 Suppl 2):S49-73.
8. Steyerberg EW, Vergouwe Y. Towards better clinical pre-
diction models: seven steps for development and an ABCD
for validation. Eur Heart J 2014;35:1925-31.
9. Royston P, Moons KG, Altman DG, Vergouwe Y. Prognosis
and prognostic research: developing a prognostic model.
BMJ 2009;338:b604.
10. Altman DG, Vergouwe Y, Royston P, Moons KG. Progno-
sis and prognostic research: validating a prognostic model.
BMJ 2009;338:b605.
11. Moons KG, Altman DG, Vergouwe Y, Royston P. Prognosis
and prognostic research: application and impact of prog-
nostic models in clinical practice. BMJ 2009;338:b606.
http://orcid.org/0000-0002-6219-4942
http://orcid.org/0000-0003-1025-2044
Lee YH, et al.
44 www.e-enm.org Copyright © 2016 Korean Endocrine Society
12. Laupacis A, Sekar N, Stiell IG. Clinical prediction rules. A
review and suggested modifications of methodological
standards. JAMA 1997;277:488-94.
13. Altman DG, Royston P. What do we mean by validating a
prognostic model? Stat Med 2000;19:453-73.
14. Steyerberg EW. Clinical prediction models: a practical ap-
proach to development, validation, and updating. New
York: Springer; 2009.
15. Steyerberg EW, Moons KG, van der Windt DA, Hayden
JA, Perel P, Schroter S, et al. Prognosis Research Strategy
(PROGRESS) 3: prognostic model research. PLoS Med
2013;10:e1001381.
16. Collins GS, Reitsma JB, Altman DG, Moons KG. Transpar-
ent Reporting of a multivariable prediction model for Indi -
vidual Prognosis or Diagnosis (TRIPOD): the TRIPOD
statement. Ann Intern Med 2015;162:55-63.
17. Liu J, Hong Y, D’Agostino RB Sr, Wu Z, Wang W, Sun J, et
al. Predictive value for the Chinese population of the Fram-
ingham CHD risk assessment tool compared with the Chi-
nese Multi-Provincial Cohort Study. JAMA 2004;291:2591-
9.
18. Jee SH, Jang Y, Oh DJ, Oh BH, Lee SH, Park SW, et al. A
coronary heart disease prediction model: the Korean Heart
Study. BMJ Open 2014;4:e005025.
19. Lee YH, Bang H, Park YM, Bae JC, Lee BW, Kang ES, et
al.
Non-laboratory-based self-assessment screening score for
non-alcoholic fatty liver disease: development, validation and
comparison with other scores. PLoS One 2014;9:e107584.
20. Bang H, Edwards AM, Bomback AS, Ballantyne CM, Bril-
lon D, Callahan MA, et al. Development and validation of a
patient self-assessment score for diabetes risk. Ann Intern
Med 2009;151:775-83.
21. Kotronen A, Peltonen M, Hakkarainen A, Sevastianova K,
Bergholm R, Johansson LM, et al. Prediction of non-alco-
holic fatty liver disease and liver fat using metabolic and
genetic factors. Gastroenterology 2009;137:865-72.
22. Harrell FE Jr. Regression modeling strategies: with applica-
tions to linear models, logistic regression, and survival
analysis. New York: Springer; 2001.
23. Sun GW, Shook TL, Kay GL. Inappropriate use of bivari-
able analysis to screen risk factors for use in multivariable
analysis. J Clin Epidemiol 1996;49:907-16.
24. Royston P, Altman DG, Sauerbrei W. Dichotomizing con-
tinuous predictors in multiple regression: a bad idea. Stat
Med 2006;25:127-41.
25. Boersma E, Poldermans D, Bax JJ, Steyerberg EW, Thom-
son IR, Banga JD, et al. Predictors of cardiac events after
major vascular surgery: role of clinical characteristics, dobu-
tamine echocardiography, and beta-blocker therapy. JAMA
2001;285:1865-73.
26. Sauerbrei W. The use of resampling methods to simplify re-
gression models in medical statistics. J R Stat Soc Ser C
Appl Stat 1999;48:313-29.
27. Shmueli G. To explain or to predict? Stat Sci 2010:289-310.
28. Heikes KE, Eddy DM, Arondekar B, Schlessinger L. Diabe-
tes risk calculator: a simple tool for detecting undiagnosed
diabetes and pre-diabetes. Diabetes Care 2008;31:1040-5.
29. Breiman L, Friedman J, Stone CJ, Olshen RA. Classifica-
tion and regression trees. Belmont: Wadsworth Internation-
al Group; 1984.
30. Breiman L. Statistical modeling: the two cultures (with
com-
ments and a rejoinder by the author). Statist Sci 2001;16:199-
231.
31. Steyerberg EW, Vickers AJ, Cook NR, Gerds T, Gonen M,
Obuchowski N, et al. Assessing the performance of predic-
tion models: a framework for traditional and novel mea-
sures. Epidemiology 2010;21:128-38.
32. Meffert PJ, Baumeister SE, Lerch MM, Mayerle J, Kratzer
W, Volzke H. Development, external validation, and com-
parative assessment of a new diagnostic score for hepatic
steatosis. Am J Gastroenterol 2014;109:1404-14.
33. Hilden J. Commentary: on NRI, IDI, and “good-looking”
sta-
tistics with nothing underneath. Epidemiology 2014;25:265-
7.
34. Lee YH, Bang H, Kim HC, Kim HM, Park SW, Kim DJ. A
simple screening score for diabetes for the Korean popula-
tion: development, validation, and comparison with other
scores. Diabetes Care 2012;35:1723-30.
35. Wyatt JC, Altman DG. Commentary: Prognostic models:
clinically useful or quickly forgotten? BMJ 1995;311:1539.
Criminal Justice Policy Review
Journal indexing and metrics
Top of Form
Bottom of Form
Restricted access
Research article
First published September 2006
Contextualizing the Criminal Justice Policy-Making Process
Karim IsmailiView all authors and affiliations
Volume 17, Issue 3
https://doi.org/10.1177/0887403405281559
·
·
·
Get access
·
·
Cite article
·
Share options
·
Information, rights and permissions
·
Metrics and citations
·
Related content
Similar articles:
·
Restricted access
Crime, Justice and Systems Analysis: Two Decades Later
Book Reviews : Kriminologie by Hans Joachim Schneider.
Berlin: Walter de Gruyter, 1986. 1, 117 pages, cloth
Criminal Justice System Reform and Wrongful Conviction: A
Research Agenda
·
SAGE recommends:
·
SAGE Knowledge
Book chapter
Criminology and Public Policy
SAGE Knowledge
Book chapter
Introduction
SAGE Knowledge
Book chapter
Critical Criminology
·
Abstract
This article is an attempt at improving the knowledge base on
the criminal justice policy-making process. As the
criminological subfield of crime policy leads more
criminologists to engage in policy analysis, understanding the
policy-making environment in all of its complexity becomes
more central to criminology. This becomes an important step
toward theorizing the policy process. To advance this
enterprise, policy-oriented criminologists might look to
theoretical and conceptual frameworks that have established
histories in the political and policy sciences. This article
presents a contextual approach to examine the criminal justice
policy-making environment and its accompanying process. The
principal benefit of this approach is its emphasis on addressing
the complexity inherent to policy contexts. For research on the
policy process to advance, contextually sensitive methods of
policy inquiry must be formulated and should illuminate the
social reality of criminal justice policy making through the
accumulation of knowledge both of and in the policy process.
Get full access to this article
View all access and purchase options for this article.
References
Atkinson, M., & Coleman, W. D. (1992). Policy networks,
policy communities and problems of governance.
Governance: An International Journal of Policy and
Administration, 5, 155-180.
Google Scholar
Beckett, K. (1997).
Making crime pay: Law and order in contemporary
American politics. New York: Oxford University Press.
Google Scholar
Bobrow, D., & Dryzek, J. (1987).
Policy analysis by design. Pittsburgh, PA: University of
Pittsburgh Press.
Google Scholar
Brunner, R. D. (1991). The policy movement as a policy
problem.
Policy Sciences, 24, 65-98.
Google Scholar
Christie, N. (1993).
Crime control as industry: Towards gulags, Western
style? London: Rou
image1.wmf
Politics and Governance (ISSN: 2183–2463)
2018, Volume 6, Issue 2, Pages 5–12
DOI: 10.17645/pag.v6i2.1335
Article
Privatizing Political Authority: Cybersecurity, Public-Private
Partnerships,
and the Reproduction of Liberal Political Order
Daniel R. McCarthy
School of Social and Political Sciences, University of
Melbourne, 3051 Melbourne, Australia;
E-Mail: [email protected]
Submitted: 30 December 2017 | Accepted: 28 February 2018 |
Published: 11 June 2018
Abstract
Cybersecurity sits at the intersection of public security concerns
about critical infrastructure protection and private secu-
rity concerns around the protection of property rights and civil
liberties. Public-private partnerships have been embraced
as the best way to meet the challenge of cybersecurity, enabling
cooperation between private and public sectors to meet
shared challenges. While the cybersecurity literature has
focused on the practical dilemmas of providing a public good, it
has been less effective in reflecting on the role of cybersecurity
in the broader constitution of political order. Unpacking
three accepted conceptual divisions between public and private,
state and market, and the political and economic, it is
possible to locate how this set of theoretical assumptions
shortcut reflection on these larger issues. While public-private
partnerships overstep boundaries between public authority and
private right, in doing so they reconstitute these divisions
at another level in the organization of political economy of
liberal democratic societies.
Keywords
capitalism; critical infrastructure protection; critical theory;
cybersecurity; public-private partnerships
Issue
This article is part of the issue “Global Cybersecurity:
NewDirections in Theory andMethods”, edited by Tim Stevens
(King’s
College London, UK).
© 2018 by the author; licensee Cogitatio (Lisbon, Portugal).
This article is licensed under a Creative Commons Attribu-
tion 4.0 International License (CC BY).
1. Introduction
The politics of infrastructure are central to the gover-
nance of modern societies. Large Technical Systems (LTS)
shape all aspects of our everyday lives, in ways both visi -
ble and hidden. The ubiquity of infrastructures and their
capacity tomediate relations between different social ac-
tors demand careful analytical attention and the develop-
ment of conceptual frameworks appropriate to capture
the complex social, political and economic processes that
drive their development and reproduction. As a practi -
cal political issue this task is important; clarifying where
the power to shape modern life lies is central to under -
standing how our world is made, illuminating issues of
political and moral responsibility that surround the poli -
tics of technology.
As this thematic issuemakes clear, studies of cyberse-
curity require further theoretical and conceptual ground-
clearing to produce these insights. By and large, the lit-
erature on critical infrastructure protection and cyber-
security has remained within a problem-solving frame-
work, in which the existing social order forms the back-
ground premises within which a problem is posed (Cox,
1981; Dunn Cavelty, 2013, p. 106). The provision of cyber -
security has been studied within a relatively narrow set
of assumptions, with questions central to security stud-
ies, and politics more broadly, circumscribed. This is par -
ticularly evident in the literature on public-private part-
nerships (PPPs) as a route to the provision of cybersecu-
rity in liberal democracies. Building on an emerging lit-
erature that seeks to sharpen the analytical focus of an
often vague or underspecified set of issues (Carr, 2016;
Dunn Cavelty, 2014), the starting point for this article is a
rather simple question: what is cybersecurity and critical
infrastructure protection for?
Answering this question, while not straightforward,
can be clarified by problematising a set of common-
sense assumptions apparent within studies of PPPs
Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12 5
about how political life can and should be organized. The
literature on cybersecurity and critical infrastructure pro-
tection needs to be theoretically ‘deepened’ to clarify a
broader grasp of what cybersecurity is for, and to high-
light potential political alternatives. Considering what cy-
bersecurity is for requiresmoving beyond a narrow issue-
specific focus to consider how cybersecurity practices re-
late to existing social formations. To foreshadow the ar -
gument developed below, the central move in this arti-
cle is an interrogation of the conceptual separation of
the political and the economic, and its related binaries
of public/private and state/market, in the field of cyber -
security. Once we being to question the seeming natural-
ness of this divide it becomes possible to articulate the
wider stakes of cybersecurity with greater clarity.
This article will proceed as follows. First, it will set
out the dominant approach that views cybersecurity as
a public good, and thereby frames its provision as a col -
lective action problem. The United States will serve as
the empirical referent point. Understood in these terms,
everyone benefits from cybersecurity. Second, it will dis-
cuss the conceptual binaries, noted above, that form the
starting point for these analyses. These sections will dis-
cuss how the assumption of state autonomy in collec-
tive action models underpins the conceptual divisions
between public and private, state and market, and pol -
itics and economics. Schematic in nature, these sections
nevertheless draw attention to a series of problematic
theoretical assumptions around these binaries. Finally, it
will argue that assuming a division between these var-
ious spheres of social life obscures the role of PPPs in
(re)producing the specific forms of liberal political order.
PPPs are a method of collaboration designed to repro-
duce the privatization of political power that character -
izes modern liberal capitalist society. This article thereby
contributes a growing literature seeking to clarify how
relations of power and accountability operate in cyber-
security PPPs, outlining the limits liberalism itself sets on
making certain forms of social power accountable.
2. Public-Private Partnerships, Public Goods, and
Problem Solving Theories
Provision of security, physical or otherwise, is classically
the function of the state. Whether applied to national
security or domestic policing, in modern liberal capitalist
societies it is the state that has been tasked to carry out
these duties. So central is the state to the provision of se-
curity that the shift away from this liberal norm, evident
in the greater use of private military and security con-
tractors (PMSCs) globally, has generated substantial an-
alytical and political attention (Abrahamsen & Williams,
2010; Avant, 2005). Privatizing the provision of security
has generated concern around private firms’ potential
conflicts of interests, with PMSCs accountable to both
public authorities and their shareholders.
Cybersecurity, by contrast, does not centre on the pri-
vatization of existing security functions. Concerns about
the outsourcing of cybersecurity are largely misplaced;
states are not contracting out security functions to the
private sector, and thus security is not being privatized
in the same manner as it is for other security issues
(Eichensehr, 2017, pp. 471–473; cf. Carr, 2016). Cyber-
security and critical infrastructure protection policies at-
tempt to secure infrastructures owned by both the pub-
lic and private sectors. The objects of protection in this
space—from critical infrastructures to information and
data—are overwhelmingly in private hands, with over
90% of critical infrastructures in the United States owned
by the private sector (Singer & Friedman, 2014, p. 19).
This includes hardware and software infrastructures as
they extend inside the homes of ordinary Americans; cur-
rent estimates place internet penetration rates at 88%,
an indication of how broadly the problem of cybersecu-
rity extends (Pew Research Center, 2017). Cybersecurity
requires private citizens, corporations, and the state to
contribute to the provision of security for the networks
on which they depend. Indeed, successive American ad-
ministrations have stressed this point, emphasizing the
need for ‘awareness raising’ to promote better ‘cyber hy-
giene’, using public health metaphors to emphasize the
shared nature of the challenge (Stevens & Betz, 2013;
United States Department of Homeland Security, 2017).
Cybersecurity, like national security more broadly,
thereby appears to have the character of a public good:
it is non-rivalrous and non-excludable (Assaf, 2008, p. 13;
Shore, Du, & Zeadally, 2011). Rational choice approaches
to politics suggest that public goods should be provided
by the state, as private actors incentive structure pushes
them to free ride, inducing market failure. However,
state provision of cybersecurity is not a straightforward
option. Dunn Cavelty and Suter (2009, p. 179) high-
light the contradictions at the heart of critical infrastruc-
ture protection:
[Privatization policies] have put a large part of the crit-
ical infrastructure in the hands of private enterprise.
This creates a situation in which market forces alone
are not sufficient to provide security in most of the
CI [Critical Infrastructure] ‘sectors’. At the same time,
the state is incapable of providing the public good of
security on its own, since overly intrusive market in-
tervention is not a valid option either; the same in-
frastructures that the state aims to protect due to na-
tional security considerations are also the foundation
of the competitiveness and prosperity of a nation.
The problem for governments is how to provide the pub-
lic good of cybersecurity in a context in which interven-
tion in economic decision-making presents its own dis-
tinct risks. Caught between the Scylla of market failure
in cybersecurity provision and the Charybdis of state
planning, policymakers face a difficult decision: too lit-
tle intervention and the required public good will not
be provided; but too much and other facets of national
security are undermined. Navigating these dilemmas is
Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12 6
thereby understood as the central political task faced
by policymakers.
PPPs present themselves as an effective middle way,
allowing the state to engage in ex ante decisions regard-
ing cybersecurity outcomes in careful consultation with
the private sector. This combination of planning with
market-led flexibility is embraced by policymakers as a
central rationale for promoting PPPs (United States Na-
tional Science and Technology Council, 2011). While co-
operation is not straightforward, there are shared inter -
ests at work here, even if the precise motivations behind
those interests are distinct. As Eichensehr notes, cooper-
ation allows government to control public expenditure
costs and avoid private sector interference with crucial
state functions, while helping the private sector secure
its intellectual property and, relatedly, its business repu-
tation (Carr, 2016, p. 55; Eichensehr, 2017, pp. 500–504).
The devil is, of course, in the details.Working out how
to make these partnerships function effectively, both in
the United States and elsewhere, has been the focus of
sustained analysis (Carr, 2016; Givens & Busch, 2013;
Harknett & Stever, 2011). Analysis revolves around de-
termining the institutional forms, policy processes, and
levels of state intervention through which PPPs canmost
effectively provide security. These problems have been
largely (but not exclusively) understood as collective ac-
tion problems—everyone has an interest in the provi-
sion of cybersecurity, but everyone also has an incen-
tive to free ride if possible.
Solution
s to these problems
seek ways to alter these incentive structures through,
for instance, institutions designed to share information,
such as the United States Department of Homeland
Security’s Cyber Information Sharing and Collaboration
Programme (CISCP), or via the creation of trust build-
ing mechanisms between firms and between firms and
the state.
Practical and normative questions are inevitably
raised when considering PPPs in cybersecurity, in keep-
ing with the broader literature on PPPs (Brinkerhoff &
Brinkerhoff, 2011; Linder, 1999). Defining the scope of
private sector authority and responsibility for cybersecu-
rity, particularly as it impacts upon other aspects of na-
tional security such as intelligence collection, has gener -
ated both policy-centred proposals, such as those noted
above, and more abstract reflection on the appropri-
ate level of political authority assumed by private actors.
Practically, it has involved attempts to parse apart the re-
sponsibilities of different sets of cybersecurity actors in
order to develop clear rules around the scope of respon-
sibility for the public and private sector. Understanding
who has power to affect change, and how this occurs, is
important for this task.
Normative discussion has focused upon issues of po-
litical authority and accountability. This last aspect be-
gins to hint at the larger political issues posed by PPPs as
a solution to cybersecurity provision. Carr (2016, p. 60)
notes that ‘If responsibility and accountability can be de-
volved to private actors, the central principle that polit-
ical leaders and governments are held to account is un-
dermined’. Aswith the literature on PMSCs, concern over
the conflicting interests of private firms has led analysts
to caution against any easy recourse to market-led cyber-
security frameworks (Assaf, 2008; Carr, 2016, p. 62). Mul-
tiple lines of accountability may, it is suggested, under-
mine the responsiveness of PPPs to the public.
Steps in this direction are important to deepening
the study of cybersecurity. Yet, to date, this not resulted
in consideration of how cybersecurity policies relate to
political order. Questions of where political responsibil -
ity can and should lie—with the state, the private sec-
tor, or a combination of these—are constituted by the
specific institutional order of modern liberal capitalism
and its attendant social imaginaries. Accepting a series
of divisions between the private and the public, the state
and the market, and the political and the economic lim-
its our view of how these options are produced and re-
produced. Achieving a more holistic view of the relation-
ship between cybersecurity practices and political order
requires ‘deepening’ our approach to cybersecurity. It is
to this task that we now turn.
3. Security for Whom? Deepening Cybersecurity
Studies
Often confused with a ‘levels-of-analysis’ problem, in
which identifying the object of security as either the in-
dividual, state, or international system is the central fo-
cus, deepening security studies requires embedding the
study of securitywithin amore fundamental political the-
ory, from which concerns about ‘security’ and its opera-
tion are derived (Booth, 2007, p. 157). In Booth’s (2007,
p. 155) terms, ‘Deepening, therefore,means understand-
ing security as an epiphenomenon, and so accepting the
task of drilling down to explore its origins in the most
basic question of political theory’. Drilling down in this
context requires that we examine the fundamental as-
sumptions about politics as they exist in the literature
on PPPs in cybersecurity and critical infrastructure pro-
tection. Three conceptual divisions structure this litera-
ture and its subsequent analysis of cybersecurity: (1) the
distinction between the public and private and subse-
quently, (2) between states and markets; (3) the division
between public political power and private economic
power generated by the separation of the political and
the economic in liberal capitalist societies.
First, and most obviously, the literature on PPPs and
critical infrastructure protection and cybersecurity ac-
cepts, as its analytical starting point, the division be-
tween the public and the private in liberal societies.
Viewing PPPs as requisite to grapple with complex gov-
ernance challenges has been described as a ‘truism’
(Brinkerhoff & Brinkerhoff, 2011, p. 2). Like most tru-
isms, however, it is revealing for the truth-conditions
it contains. For the most part the nature of this divide,
its historical constitution, and the role that it plays in
structuring an historically specific form of political or -
Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12 7
der are not considered.1 This is not to suggest that the
shifting divides between greater public or greater pri -
vate involvement in the management of critical infras-
tructure and information technologies is ignored. Privati-
zation of telecommunications and critical infrastructure
protection often forms the background to analysis of the
present (e.g. Carr, 2016; Dunn Cavelty, 2013). This offers
an important insight, one ignored in themost straightfor-
ward problem solving approaches. Nevertheless, these
potted histories trace vacillations in the scope of pub-
lic or private governance, not the constitution of these
divisions as they are embedded within liberal order as
such. Taking the existing division between the public and
the private as given, much of the cybersecurity litera-
ture treats the public-private divide in the register of
problem-solving theory, in Cox’s (1981, p. 129) sense:
it takes the world as it is and seeks to make it work as
smoothly as possible. This allows for a fine-grained anal-
ysis of specific problems, as this literature has demon-
strated, but at the cost of a more holistic considera-
tion of how cybersecurity policies relate to, and help
(re)produce, forms of political order writ large.
In conceptualizing cybersecurity and critical infras-
tructure protection as a public good the analytical accep-
tance of the division between the public and the private
is already operative. This becomes apparent when we
consider how the state is viewed in these frameworks.
Analyses of PPPs, particularly those derived from a ra-
tional choice perspective, often treat the state as a uni -
tary actor (Christensen & Petersen, 2017; Dunn Cavelty
& Suter, 2009, p. 181; cf. Givens & Busch, 2013). Seem-
ingly innocuous, conceptualizing the state as a unitary ac-
tor carries with it a series of analytical implications. First,
the state is distinguished from other actors in, for exam-
ple, American society; it is one actor among a field of ac-
tors, each with their own aims and purposes.2 The state
and other actors in civil society thereby appear to be ex-
ternally related to each other; as we shall see, this un-
derstanding of the state can only partially grasp the re-
lationship between states and markets. Second, suggest-
ing that there are clearly defined boundaries between
state and society implies that the interests of the state
are derived from its position as a state as such, rather
than from its embeddedness within a society whose so-
cial forces shapes it policies.
This view of state and society makes it difficult to
understand the purposes of cybersecurity PPPs. Treat-
ing the state as distinct from society lends itself to func-
tionalist treatments. Functionalism portrays the aims of
state policy as pre-given by its social function; the pur-
pose of the state is to provide the conditions for the re-
production of social order. In the literature on PPPs the
state is assumed to play this functional role in social or-
ganization in that its purpose is to provide public goods.
That is, the role of the state is the generic provision of
public goods, to the benefit of society as a whole (Dunn
Cavelty, 2014; cf. Carnoy, 1984, pp. 39–40; Olson, 1971,
pp. 98–102). Whereas other concepts of the state, such
as instrumental or institutional approaches, view state
policy as the product of struggles between competing
interest groups, in functionalist approaches the security
aims of the state are assumed a priori. Christensen and
Petersen (2017, p. 1437), argue that ‘Since its forma-
tion, the nation-state has been considered responsible
for the provision of national security: the protection of
national borders and the maintenance of internal order’.
Similarly, Carr (2016, p. 62), focuses on the effectiveness
and limits of PPPs in providing national security as such.
From this starting point, one can outline better or worse
ways for the state to achieve its generic aims of cyber -
security, but the substantive social content of this end-
point is less clear.
This is a thin understanding of cybersecurity, in which
a generic goal—national security—is emptied of substan-
tive content: what kind of internal order is sought? To
whose benefit, or cost, within that society? Answering
these questions entails a substantive analysis of the form
and content of political order that are being secured. As
Michael C. Williams notes, the separation of the pub-
lic from the private is central to the modernist project
of liberal societies (2011). It sets out both the publ icly
contestable terrain of politics and the private terrain in
which decisions can be taken without the input of the
state or the wider community. The institutional division
between public and private within liberal order is de-
signed to preserve a private sphere of liberty and to pre-
vent violence over the most contested political, moral,
and religious values by removing them from public con-
testation. A functionalist role for the state, inwhich it pro-
vides security in as ‘thin’ amanner as possible, its neutral-
ity allowing for political pluralism, is part of the conscious
project of liberalism. In these terms, state functions can
be judged as more or less effective, but only because the
purpose of the state has been set.
The divide between the public and the private sets
out the scope of accountability in liberal societies, deter -
mining which issues and actors may be held accountable
and to whom. Cybersecurity PPPs, which blur the lines
between the public and the private, are problematic pre-
cisely because they appear to undermine the neutrality
of the state in the provision of security as a public good.
PPPs do not, then,merely solve problems of efficient gov-
ernance. While the state is nominally considered to be
accountable to the public, PPPs represent an encroach-
ment of private unaccountability into the public sphere.
Understood in these terms, questions around account-
ability in PPPs touch upon the heart of liberal political
order itself.
1 Forrer, Kee, Newcomer and Boyer (2010, p. 475) suggest that
PPPs date back to the Roman Empire. Similarly, Wettenhall
(2003, as cited in Carr, 2016,
pp. 48–49), has asserted that PPPs date back to biblical times,
and, at the very least, to the era of British privateers fighting
against the Spanish in the
late 16th century. These historical claims are anachronistic, and
obscure questions around the role of PPPs in contemporary
political ordering.
2 This view is not uniform—Eichensehr (2017) treats state
managers as possessing their own set of interests, akin to
Weberian state theory.
Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12 8
4. Cybersecurity, States and Markets, and Property
Rights
If the division between the public and the private, and
the subsequent appearance of the state as autonomous
from civil society and themarket, is an ongoing historical
product, it is important to understand how this division
is produced and maintained. Maintaining that the state
itself, as an actor, reproduces this separation assumes
what needs to be explained. To avoid hypostatizing the
state, and the public-private divide that liberal states ac-
tively constitute, requires engaging concepts of the state
that can grasp the historically concrete process whereby
state policy is shaped by domestic interest groups. This
allows us to study the particularity of different states and
how they are formed, rather than treating the state as an
entity with naturally given functions.
States are not naturally liberal, of course, but re-
quire that the social forces that dominate the state are
themselves liberal and shape the state to perform this
role, as opposed to potential alternative roles. A range
of work in security studies and International Relations,
from a variety of perspectives, has stressed the cen-
tral importance of domestic social forces in constituting
the national security interests of states (Homolar, 2010;
Moravcsik, 1997, p. 518, passim; Teschke, 2003). In con-
trast to the public goods approach, the state in this work
is viewed as an institution that mediates between differ-
ent social forces within society (Jessop, 2008). State form
is not neutral; instead, the form of the state shapes po-
litical outcomes, favouring the interests of some actors
over others. Rather than merely occupying a sphere de-
noted as ‘public’, state power, operationalized by differ -
ent groups in civil society, constitutes this division in the
first place. Liberal states are liberal because liberalsmake
them this way.
Understood in these terms, the idea that the state
provides neutral public goods, or that states and firms or
markets can be considered as separate without difficulty,
becomes tricky. Viewing the state as an institution draws
attention to the various interest groups that occupy the
state apparatuses. Analyticall y, political struggles that fo-
cus on controlling the apparatus of the state to realize
the distinct aims of different interest groups are brought
into relief, with the distinct political strategies the form
of the state enables clarified. Furthermore, viewing the
state as an institution highlights how the state and mar-
ket are not opposed to each other. Instead, liberal state
institutions are used to create the conditions for themar -
ket to operate. A range of tasks, such as protecting and
enforcing property rights, providing basic research and
development for technological innovation, and correct-
ing market-failures when they arise, as in the provision
of cybersecurity, are undertaken because specific inter -
est groups that control the state apparatus view these
policies as valuable, necessary or desirable. To give one
example, there was a clear distinction between the view
of state intervention into the field of cybersecurity pro-
vision between the Bush and Obama administrations.
The Bush administration viewed public intervention into
private markets as inevitably disruptive and inefficient;
by contrast, the Obama administration, with its differ-
ent political constituency and worldview, supported a
strong role for the state in organizing critical infrastruc-
ture protection and cybersecurity. Similarly, while the
private sector is often treated in uniform terms in the
literature, there are divisions and distinctions between
them, as illustrated in the Net Neutrality debates that of-
ten pitted telecommunications companies against soft-
ware providers. Which set of policies the state pursues is
shaped by which of these interest groups can use state
power to enact its political strategies.
How cybersecurity PPPs seek to maintain liberal po-
litical order, and where along the spectrum of possible
divisions of responsibility between public and private cy-
bersecurity policy ultimately lies, is determined by the
shifting control of the state by domestic interests. Liber-
als fearful of the growth of unaccountable power may
draw this line differently than those focused on economic
growth powered by unfettered markets. For our pur-
poses, the central point is that, while cybersecurity PPPs
blur the public-private distinction at the level of security
provision, they seek to maintain this in the wider politi-
cal order. They represent one political strategy to solve
the problem of cybersecurity, shaped by the liberal form
of the state and liberal social forces.3 In concrete terms,
PPPs aim to reproduce existing liberal political order by se-
curing central institutional features of liberal capitalist so-
cieties, such as the protection intellectual property rights
(IPRs). William Lynn III (2010), echoing United States gov-
ernment policy, highlights intellectual property theft as
the most significant cybersecurity threat
Although the threat to intellectual property is less dra-
matic than the threat to critical national infrastruc-
ture, it may be the most significant cyberthreat that
the United States will face over the long term….Asmil-
itary strength ultimately depends on economic vital-
ity, sustained intellectual property losses could erode
both the United States’ military effectiveness and its
competitiveness in the global economy.
The protection of IPRs is linked here to the provision of
national security, but of a specific kind, in which the pub-
lic sphere of the state is differentiated from the private
sphere of the market via the political institution of prop-
erty. State-coordinated programs of information sharing
about threats and intrusions aim to combat threats to
the integrity of property rights. PPPs involve the coop-
eration of the public and private sectors, or the state
and the market, but this blurs the separation of these
spheres only at the issue specific level of security provi-
3 Comparison to non-liberal states makes this clear—non-liberal
states do not face the same set of contradictions generated by
PPPs in the United States
or the United Kingdom (Carr, 2016, p. 62).
Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12 9
sion. Viewed holistically, the protection of IPRs through
PPPs operates to secure these divides in the wider so-
cial formation.
Thus, while critical infrastructure protection once re-
ferred to publicly-owned and operated infrastructures,
such as power plants orwaterworks, it increasingly refers
to private infrastructures (Aradau, 2010, p. 507). Dunn
Cavelty has noted that (2014, p. 707) cybersecurity and
critical infrastructure protection secures a wider political
economy that distributes economic benefits unequally:
‘It is not a given, then, that cyber-security is truly a pub-
lic good. Quite the opposite: the type of security that
emerges mainly benefits a few and already powerful en-
tities and has no, or even negative effects for the rest’.
The content of security—what cybersecurity and critical
infrastructure protection is for—is the reproduction of a
specific liberal political economy.
In the United States, for example, cybersecurity and
critical infrastructure protection directly benefits the ma-
terial interests of the large firms that participate in, for ex-
ample, the Department of Homeland Security’s Critical In-
frastructure Partnership Advisory Council (CIPAC) (United
States Department of Homeland Security, 2017). The lev-
els of wealth found among the private sector partners
of cybersecurity are substantial: Google’s Sergy Brin and
Larry Page areworth approximately $23billion each (Dyer-
Witherford, 2015), while Bill Gates net-worth is some
$90 billion dollars (Kroll & Dolan, 2017). Dyer-Witherford
(2015, pp. 141–142) draws attention to the larger struc-
tural impact of cybersecurity policy when he highlights
the place of ICTs in contemporary capitalist order, arguing
that ‘this is not the most important measure of the im-
portance of cybernetics to capital…The real significance
of ICT capital is what it has done for capital in general’.
The share of national income going to labour has declined
in tandem with the diffusion of information technologies
throughout the American economy. ICTs have enabled
increased levels of automation, the downsizing and out-
sourcing of manufacturing industry, and the creation of
a vast surplus of unemployed and underemployed work-
ers in the United States economy, all undermining the bar-
gaining power of unions (Kristal, 2013; Rotman, 2014). Job
market insecurity and precarity characterize this techno-
logically underpinned settlement. Cybersecurity and crit-
ical infrastructure protection policies aim to reproduce
the process of ‘class-biased technological change’ (Kristal,
2013), designed to protect intellectual property and to en-
able market-led technological innovation. The provision
of this public good secures and reproduces the unequal
distribution of income in American society based upon
property ownership. That cybersecurity is a public good
does not mean its benefits are equally distributed; this is
not what liberal cybersecurity is for.
5. Cybersecurity and the Privatization of Political Power
Securing IPRs facilitates the reproduction of contempo-
rary high technology capitalism, with its attendant con-
sequences for the unequal distribution of wealth. The re-
production of the division between the public and the
private is equally important for determining how differ-
ent forms of social power are, or are not, made account-
able to the public. Public and private power within lib-
eral societies substantively maps onto the institutional
separation between the political and the economic that
characterizes capitalism. As Wood (1981) notes, the in-
terlinked division between the public, private, political,
and economic, effectively privatized what had previously
been constituted as public political power. Pre-capitalist
social formations united political power and economic
appropriation—the right to appropriate the output of
others depended on one’s political position in society.
Under capitalism, by contrast, the right to appropriate
the wealth of others is divorced from political roles;
when politicians use their office for private economic
gain this is identified as corruption and punished. Eco-
nomic actors have the right to goods produced by virtue
of private property ownership. Capitalism privatizes a
form of social power previously considered ‘political’,
and thereby subject to norms of accountability.
This takes two forms. First, it confers onto capital-
ists the right to direct and organize the labour process.
Private property rights, underwritten by the judicial and
coercive apparatus of the state and reproduced, in the
context of cybersecurity and critical infrastructure pro-
tection, through the cooperation of PPPs, give firms the
right, and ability, to direct the activity of others. Cap-
italists exercise significant power in shaping the every-
day lives of their employees—they decide how prod-
ucts (including software) will be produced, allocate re-
sources including labour, set work targets, organize the
process of production, and oversee the production pro-
cess in general.
Second, and most significantly for our purposes, se-
curing private property rights via cybersecurity PPPs se-
cures the right of private actors to direct the design and
development of new hardware and software infrastruc-
tures as they see fit. This enables the continuation of
market-led technological innovation, a significant source
of social power. Technological infrastructures are thema-
terialization of the norms and values of their designers.
In Andrew Feenberg’s (1991, p. 14) terms, ‘it stands at
the intersection between ideology and technique where
the two come together to control human beings and re-
sources’. Conferring this right on private actors allows
them to shape political orders in the long-term, as the
path dependency of technology structures social life. For,
in this infrastructure, the United States government is
not merely talking about the security of its economy, its
military and defence, or its critical public infrastructure.
Increasingly, what is being secured is the way of life of
Americans themselves in their full digital articulation.
When the privatization of political power is consid-
ered in these terms, the concerns over the role of the
private sector in cybersecurity and critical infrastructure
protection via PPPs is complicated. As clear lines of ac-
Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12
10
countability are demanded of the private sector partici -
pation in public sector functions, it is possible to press
this further to ask how and why boundaries around pri-
vate sector accountability for the development of infras-
tructures, within the scope of their authority in the mar-
ket, are set and maintained.
6. Conclusion
Taking the full measure of cybersecurity and critical in-
frastructure protection policies requires analysis of their
place in reproducing specific forms of political order. Re-
orienting our conceptual lenses to consider the deeper
political theory within which security thinking is rooted
is one small step in this direction. A range of theoreti -
cal positions are compatible with this aim. While the ap-
proach favoured here is rooted in Critical Theory and his-
torical materialism, this does not exhaust a programme
of ‘deepening’ cybersecurity studies. Asking for a deeper
analysis is merely a request to clarify the foundational as-
sumptions that shape our inquiries. Cybersecurity stud-
ies informed by a plurality of theoretical frameworks can
only be a positive development.
Nevertheless, the analysis presented above favours
Critical Theory as the most fruitful way to pursue this
project. Space prevents a full discussion its epistemolog-
ical, ontological, and methodological dimensions; three
central claims will suffice. First, Critical Theory is interdis -
ciplinary in nature. As we know, cybersecurity is a com-
plex and multifaceted issue. While no single study could
possibly capture this complexity, a research programme
attending to the breadth of its varied aspects—the politi-
cal economy of cybersecurity, its normative suppositions
and impact, the discursive representations that inform
and support these—can provide a more comprehensive
reconstruction of the challenge of cybersecurity.
Second, Critical Theory (tempered by historical ma-
terialism) is historically sensitive. Recognizing the public-
private divide as an historically produced outcome of
liberal orders opens our conceptual and political hori -
zons. In turn, it emphasizes how structural pressures,
such as those imposed by markets, condition forms of
power available to various social forces in specific con-
texts. To this extent, the analysis above cannot be easily
generalized to non-liberal societies. Indeed, the use of cy-
bersecurity PPPs to meet broader political aims may be
pursued quite differently in different contexts. The nor-
mative commitment to PPPs in the United States, with
the ideological weight around property and liberty that
underpins them, may differ substantially from a merely
instrumental use in non-liberal states. Stressing an his-
torical understanding allows for nuanced treatment of
how various social forces—in liberal and illiberal states—
shape the plurality of approaches to cybersecurity we
witness in world politics.
Finally, Critical Theory draws attention to the ques-
tion that implicitly structures the concerns over private
sector accountability in the literature: democracy. Fear
of unaccountable power is central to existing criticism of
cybersecurity PPPs. As a normative aim, a Critical Theory
approach to cybersecurity is committed to the democra-
tization science and technology as a vehicle for greater
social and political equality. To give just one example,
greater democratic participation in defining how cyber-
security risks are determined, proceeding along the lines
of similar consultative exercises around food standards
in the United Kingdom (Jasanoff, 2003, pp. 237–238),
could provide a different account of how cybersecurity
risks are defined and to whose benefit. Answering the
question of what cybersecurity is both an analytical task
and a practical question in need of democratically de-
rived answers.
Acknowledgments
I would like to thank the anonymous reviewers for their
helpful comments on themanuscript and Tim Stevens for
his editorial guidance, particularly during the initial for-
mulation of this article.
Conflict of Interests
The author declares no conflict of interests.
References
Abrahamsen, R., & Williams, M. C. (2010). Security be-
yond the state: Private security in international pol-
itics. Cambridge: Cambridge University Press.
Aradau, C. (2010). Security that matters: Critical infras-
tructure and objects of protection. Security Dialogue,
41(5), 491–515.
Assaf, D. (2008). Models of critical infrastructure protec-
tion. International Journal of Critical Infrastructure
Protection, 1, 6–14.
Avant, D. (2005). Themarket for force: The consequences
of privatizing security. Cambridge: CambridgeUniver-
sity Press.
Booth, K. (2007). Theory of world security. Cambridge:
Cambridge University Press.
Brinkerhoff, D. W., & Brinkerhoff, J. M. (2011). Public-
private partnerships: Perspectives on purposes, pub-
licness, and good governance. Public Administration
and Development, 32, 2–14.
Carnoy, M. (1984). The state and political theory. Prince-
ton, NJ: Princeton University Press.
Carr, M. (2016). Public-private partnerships in national
cyber-security strategies. International Affairs, 92(1),
43–62.
Christensen, K. K., & Petersen, K. L. (2017). Public-private
partnerships on cybersecurity: A practice of loyalty.
International Affairs, 93(6), 1435–1452.
Cox, R. W. (1981). Social forces, states and world orders:
Beyond international relations theory. Millennium:
Journal of International Studies, 10(2), 126–155.
Dunn Cavelty, M. (2013). From cyber-bombs to politi-
Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12
11
cal fallout: Threat representations with an impact
in the cyber-security discourse. International Studies
Review, 15(1), 105–122.
Dunn Cavelty, M. (2014). Breaking the cyber-security
dilemma: Aligning security needs and removing vul-
nerabilities. Science and Engineering Ethics, 20(3),
701–715.
Dunn Cavelty, M., & Suter, M. (2009). Public-private part-
nerships are no silver bullet: An expanded gover-
nance model for critical infrastructure protection. In-
ternational Journal of Critical Infrastructure Protec-
tion, 2(4), 179–187.
Dyer-Witherford, N. (2015). Cyber-proletariat: Global
labour in the digital vortex. London: Pluto Press.
Eichensehr, K. E. (2017). Public-private cybersecurity.
Texas Law Review, 95, 467–538.
Feenberg, A. (1991). Critical theory of technology. Ox-
ford: Oxford University Press.
Forrer, J., Kee, J. E., Newcomer, K. E., & Boyer, E. (2010).
Public-private partnerships and the public account-
ability question. Public Administration Review, 70(3),
475–484.
Givens, A. D., & Busch, N. E. (2013). Realizing the promise
of public-private partnerships in U.S. critical infras-
tructure protection. International Journal of Critical
Infrastructure Protection, 6(1), 39–50.
Harknett, R. J., & Stever, J. A. (2011). The new policy
world of cybersecurity. Public Administration Review,
71(3), 455–460.
Homolar, A. (2010). The political economy of national
security. Review of International Political Economy,
17(2), 410–423.
Jasanoff, S. (2003). Technologies of humility: Citizen
participation in governing science. Minerva, 41(3),
223–244.
Jessop, B. (2008). State power. Cambridge: Polity.
Kristal, T. (2013). The capitalist machine: Computeriza-
tion, workers’ power, and the decline of labor’s share
within U.S. industries. American Sociological Review,
78(3), 361–389.
Kroll, L., & Dolan, K. A. (2017). Forbes 2017 billionaires
list: Meet the richest people on the planet. Forbes.
Retrieved from https://www.forbes.com/sites/sites/
sites/kerryadolan/2017/03/20/forbes-2017-billion
aires-list-meet-the-richest-people-on-the-planet/#6b
ee40c862ff
Linder, S. H. (1999). Coming to terms with the public-
private partnership. American Behavioral Scientist,
43(1), 35–51.
Lynn III, W. J. (2010). Defending a new domain: The
Pentagon’s cyberstrategy. Foreign Affairs. Retrieved
from https://www.foreignaffairs.com/articles/united
-states/2010-09-01/defending-new-domain
Moravcsik, A. (1997). Taking preferences seriously: A lib-
eral theory of international politics. International Or-
ganization, 51(4), 513–553.
Olson, M. (1971). The logic of collective action. Cam-
bridge, MA: Harvard University Press.
Pew Research Center. (2017). Internet use over time.
Retrieved from http://www.pewinternet.org/fact-
sheet/internet-broadband
Rotman, D. (2014). Technology and inequality: The dis-
parity between the rich and everyone else is larger
than ever in the United States and increasing inmuch
of Europe. Why? MIT Technology Review. Retrieved
from https://www.technologyreview.com/s/531726
/technology-and-inequality
Shore, M., Du, Y., & Zeadally, S. (2011). A public-private
partnership model for national cybersecurity. Policy
& Internet, 3(2), 1–23.
Singer, P., & Friedman, A. (2014). Cybersecurity and cy-
berwar: What everyone needs to know. Oxford: Ox-
ford University Press.
Stevens, T., & Betz, D. (2013). Analogical reasoning and
cybersecurity. Security Dialogue, 44(2), 147–164.
Teschke, B. (2003). The myth of 1648. London: Verso.
United States Department of Homeland Security. (2017).
Information technology sector: Council charters and
members. Retrieved from https://www.dhs.gov/
information-technology-sector-council-charters-and-
membership
United States National Science and Technology Council.
(2011). Trustworthy cyberspace: Strategic plan for
the federal cybersecurity research and development
program. Retrieved from https://obamawhitehouse.
archives.gov/sites/default/files/microsites/ostp/fed_
cybersecurity_rd_strategic_plan_2011.pdf
Williams, M. C. (2011). The public, the private, and
the evolution of security studies. Security Dialogue,
41(6), 623–630.
Wood, E. M. (1981). The separation of the political and
the economic in capitalism. New Left Review, I/127,
66–95.
About the Author
Daniel R. McCarthy is Lecturer in International Relations at the
University of Melbourne. He is author
of Power, Information Technology and International Relations
Theory (Palgrave 2015) and editor of
Technology and World Politics: An Introduction (Routledge
2017). His work has appeared in Review of
International Studies,Millennium, and the European Journal of
International Relations.
Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12
12
The Tyranny of Data? The Bright and Dark Sides of Data-
Driven Decision-Making for Social Good
· May 2017
DOI:
10.1007/978-3-319-54024-5_1
· In book:
Transparent Data Mining for Big and Small Data (pp.3-
24)
Authors:
Bruno Lepri
·
Fondazione Bruno Kessler
Jacopo Staiano
·
Università degli Studi di Trento
David Sangokoya
Emmanuel Francis Letouzé
·
Massachusetts Institute of Technology
Show all 5 authors
Download full-text PDFRead full-text
Download full-text PDF
Read full-text
Download citation
Citations (64)
References (116)
Figures (2)
Abstract and Figures
The unprecedented availability of large-scale human behavioral
data is profoundly changing the world we live in. Researchers,
companies, governments, financial institutions, non-
governmental organizations and also citizen groups are actively
experimenting, innovating and adapting algorithmic decision-
making tools to understand global patterns of human behavior
and provide decision support to tackle problems of societal
importance. In this chapter, we focus our attention on social
good decision-making algorithms, that is algorithms strongly
influencing decision-making and resource optimization of
public goods, such as public health, safety, access to finance
and fair employment. Through an analysis of specific use cases
and approaches, we highlight both the positive opportunities
that are created through data-driven algorithmic decision-
making, and the potential negative consequences that
practitioners should be aware of and address in order to truly
realize the potential of this emergent field. We elaborate on the
need for these algorithms to provide transparency and
accountability, preserve privacy and be tested and evaluated in
context, by means of living lab approaches involving citizens.
Finally, we turn to the requirements which would make it
possible to leverage the predictive power of data-driven human
behavior analysis while ensuring transparency, accountability,
and civic participation.
Requirements summary for positive data-driven disruption.
…
Summary table for the literature discussed in Section 2.
…
Figures - uploaded by
Nuria Oliver
Author content
Content may be subject to copyright.
Discover the world's research
· 20+ million members
· 135+ million publications
· 700k+ research projects
Join for free
Content uploaded by
Nuria Oliver
Author content
Content may be subject to copyright.
The Tyranny of Data?
The Bright and Dark Sides of
Data-Driven Decision-Making for
Social Good
Bruno Lepri, Jacopo Staiano, David Sangokoya, Emmanuel
Letouz´e and
Nuria Oliver
Abstract The unprecedented availability of large-scale human
behavioral
data is profoundly changing the world we live in. Researchers,
companies,
governments, financial institutions, non-governmental
organizations and also
citizen groups are actively experimenting, innovating and
adapting algorith-
mic decision-making tools to understand global patterns of
human behavior
and provide decision support to tackle problems of societal
importance. In this
chapter, we focus our attention on social good decision-making
algorithms,
that is algorithms strongly influencing decision-making and
resource opti-
mization of public goods, such as public health, safety, access
to finance and
fair employment. Through an analysis of specific use cases and
approaches,
we highlight both the positive opportunities that are created
through data-
driven algorithmic decision-making, and the potential negative
consequences
that practitioners should be aware of and address in order to
truly realize
the potential of this emergent field. We elaborate on the need
for these algo-
rithms to provide transparency and accountability, preserve
privacy and be
tested and evaluated in context, by means of living lab
approaches involving
citizens. Finally, we turn to the requirements which would make
it possible to
leverage the predictive power of data-driven human behavior
analysis while
ensuring transparency, accountability, and civic participation.
Bruno Lepri
Fondazione Bruno Kessler e-mail: [email protected]
Jacopo Staiano
Fortia Financial
38 www.e-enm.orgEndocrinol Metab 2016;3138-44httpdx.

More Related Content

Similar to 38 www.e-enm.orgEndocrinol Metab 2016;3138-44httpdx.

Principles of Cancer Screening
Principles of Cancer ScreeningPrinciples of Cancer Screening
Principles of Cancer Screening
JohnJulie1
 
Principles of Cancer Screening
Principles of Cancer ScreeningPrinciples of Cancer Screening
Principles of Cancer Screening
AnonIshanvi
 
Principles of Cancer Screening
Principles of Cancer ScreeningPrinciples of Cancer Screening
Principles of Cancer Screening
EditorSara
 
Principles of Cancer Screening
Principles of Cancer ScreeningPrinciples of Cancer Screening
Principles of Cancer Screening
NainaAnon
 
Application of artificial intelligence techniques in the intensive care unit
Application of artificial intelligence techniques in the intensive  care unitApplication of artificial intelligence techniques in the intensive  care unit
Application of artificial intelligence techniques in the intensive care unit
International Journal of Reconfigurable and Embedded Systems
 
System for Recommending Drugs Based on Machine Learning Sentiment Analysis of...
System for Recommending Drugs Based on Machine Learning Sentiment Analysis of...System for Recommending Drugs Based on Machine Learning Sentiment Analysis of...
System for Recommending Drugs Based on Machine Learning Sentiment Analysis of...
IRJET Journal
 
Principles of Cancer Screening
Principles of Cancer ScreeningPrinciples of Cancer Screening
Principles of Cancer Screening
daranisaha
 
Principles of Cancer Screening
Principles of Cancer ScreeningPrinciples of Cancer Screening
Principles of Cancer Screening
semualkaira
 
Principles of Cancer Screening
Principles of Cancer ScreeningPrinciples of Cancer Screening
Principles of Cancer Screening
semualkaira
 
826 Unertl et al., Describing and Modeling WorkflowResearch .docx
826 Unertl et al., Describing and Modeling WorkflowResearch .docx826 Unertl et al., Describing and Modeling WorkflowResearch .docx
826 Unertl et al., Describing and Modeling WorkflowResearch .docx
evonnehoggarth79783
 
College Writing II Synthesis Essay Assignment Summer Semester 2017.docx
College Writing II Synthesis Essay Assignment Summer Semester 2017.docxCollege Writing II Synthesis Essay Assignment Summer Semester 2017.docx
College Writing II Synthesis Essay Assignment Summer Semester 2017.docx
clarebernice
 
How to establish and evaluate clinical prediction models - Statswork
How to establish and evaluate clinical prediction models - StatsworkHow to establish and evaluate clinical prediction models - Statswork
How to establish and evaluate clinical prediction models - Statswork
Stats Statswork
 
1. appl. statist. (2015)
1. appl. statist. (2015)1. appl. statist. (2015)
1. appl. statist. (2015)
Gitanambiar
 
Clinical oncology-can-observational-research-impact-clinical-decision-making
Clinical oncology-can-observational-research-impact-clinical-decision-makingClinical oncology-can-observational-research-impact-clinical-decision-making
Clinical oncology-can-observational-research-impact-clinical-decision-making
smithjgrace
 
Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...
daranisaha
 
Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...
eshaasini
 
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
semualkaira
 
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
semualkaira
 
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
semualkaira
 
Intensive Care Unit Scoring Systems
Intensive Care Unit Scoring SystemsIntensive Care Unit Scoring Systems
Intensive Care Unit Scoring Systems
Apollo Hospitals
 

Similar to 38 www.e-enm.orgEndocrinol Metab 2016;3138-44httpdx. (20)

Principles of Cancer Screening
Principles of Cancer ScreeningPrinciples of Cancer Screening
Principles of Cancer Screening
 
Principles of Cancer Screening
Principles of Cancer ScreeningPrinciples of Cancer Screening
Principles of Cancer Screening
 
Principles of Cancer Screening
Principles of Cancer ScreeningPrinciples of Cancer Screening
Principles of Cancer Screening
 
Principles of Cancer Screening
Principles of Cancer ScreeningPrinciples of Cancer Screening
Principles of Cancer Screening
 
Application of artificial intelligence techniques in the intensive care unit
Application of artificial intelligence techniques in the intensive  care unitApplication of artificial intelligence techniques in the intensive  care unit
Application of artificial intelligence techniques in the intensive care unit
 
System for Recommending Drugs Based on Machine Learning Sentiment Analysis of...
System for Recommending Drugs Based on Machine Learning Sentiment Analysis of...System for Recommending Drugs Based on Machine Learning Sentiment Analysis of...
System for Recommending Drugs Based on Machine Learning Sentiment Analysis of...
 
Principles of Cancer Screening
Principles of Cancer ScreeningPrinciples of Cancer Screening
Principles of Cancer Screening
 
Principles of Cancer Screening
Principles of Cancer ScreeningPrinciples of Cancer Screening
Principles of Cancer Screening
 
Principles of Cancer Screening
Principles of Cancer ScreeningPrinciples of Cancer Screening
Principles of Cancer Screening
 
826 Unertl et al., Describing and Modeling WorkflowResearch .docx
826 Unertl et al., Describing and Modeling WorkflowResearch .docx826 Unertl et al., Describing and Modeling WorkflowResearch .docx
826 Unertl et al., Describing and Modeling WorkflowResearch .docx
 
College Writing II Synthesis Essay Assignment Summer Semester 2017.docx
College Writing II Synthesis Essay Assignment Summer Semester 2017.docxCollege Writing II Synthesis Essay Assignment Summer Semester 2017.docx
College Writing II Synthesis Essay Assignment Summer Semester 2017.docx
 
How to establish and evaluate clinical prediction models - Statswork
How to establish and evaluate clinical prediction models - StatsworkHow to establish and evaluate clinical prediction models - Statswork
How to establish and evaluate clinical prediction models - Statswork
 
1. appl. statist. (2015)
1. appl. statist. (2015)1. appl. statist. (2015)
1. appl. statist. (2015)
 
Clinical oncology-can-observational-research-impact-clinical-decision-making
Clinical oncology-can-observational-research-impact-clinical-decision-makingClinical oncology-can-observational-research-impact-clinical-decision-making
Clinical oncology-can-observational-research-impact-clinical-decision-making
 
Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...
 
Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use ...
 
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
 
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
 
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
Systematic Review and Meta-Analysis of the Association between β-Blocker Use...
 
Intensive Care Unit Scoring Systems
Intensive Care Unit Scoring SystemsIntensive Care Unit Scoring Systems
Intensive Care Unit Scoring Systems
 

More from dessiechisomjj4

Project 2 Research Paper Compendium                               .docx
Project 2 Research Paper Compendium                               .docxProject 2 Research Paper Compendium                               .docx
Project 2 Research Paper Compendium                               .docx
dessiechisomjj4
 
Project 1 Interview Essay Conduct a brief interview with an Asian.docx
Project 1 Interview Essay Conduct a brief interview with an Asian.docxProject 1 Interview Essay Conduct a brief interview with an Asian.docx
Project 1 Interview Essay Conduct a brief interview with an Asian.docx
dessiechisomjj4
 
Project 1 Scenario There is a Top Secret intelligence report.docx
Project 1 Scenario There is a Top Secret intelligence report.docxProject 1 Scenario There is a Top Secret intelligence report.docx
Project 1 Scenario There is a Top Secret intelligence report.docx
dessiechisomjj4
 
Project #1 Personal Reflection (10)Consider an opinion that you .docx
Project #1 Personal Reflection (10)Consider an opinion that you .docxProject #1 Personal Reflection (10)Consider an opinion that you .docx
Project #1 Personal Reflection (10)Consider an opinion that you .docx
dessiechisomjj4
 
Project 1 Chinese Dialect Exploration and InterviewYou will nee.docx
Project 1 Chinese Dialect Exploration and InterviewYou will nee.docxProject 1 Chinese Dialect Exploration and InterviewYou will nee.docx
Project 1 Chinese Dialect Exploration and InterviewYou will nee.docx
dessiechisomjj4
 
Project 1 (1-2 pages)What are the employee workplace rights mand.docx
Project 1 (1-2 pages)What are the employee workplace rights mand.docxProject 1 (1-2 pages)What are the employee workplace rights mand.docx
Project 1 (1-2 pages)What are the employee workplace rights mand.docx
dessiechisomjj4
 
PROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docx
PROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docxPROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docx
PROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docx
dessiechisomjj4
 
Program must have these things Format currency, total pieces & e.docx
Program must have these things Format currency, total pieces & e.docxProgram must have these things Format currency, total pieces & e.docx
Program must have these things Format currency, total pieces & e.docx
dessiechisomjj4
 
Professors Comments1) Only the three body paragraphs were require.docx
Professors Comments1) Only the three body paragraphs were require.docxProfessors Comments1) Only the three body paragraphs were require.docx
Professors Comments1) Only the three body paragraphs were require.docx
dessiechisomjj4
 
Program EssayPlease answer essay prompt in a separate 1-page file..docx
Program EssayPlease answer essay prompt in a separate 1-page file..docxProgram EssayPlease answer essay prompt in a separate 1-page file..docx
Program EssayPlease answer essay prompt in a separate 1-page file..docx
dessiechisomjj4
 
Program Computing Project 4 builds upon CP3 to develop a program to .docx
Program Computing Project 4 builds upon CP3 to develop a program to .docxProgram Computing Project 4 builds upon CP3 to develop a program to .docx
Program Computing Project 4 builds upon CP3 to develop a program to .docx
dessiechisomjj4
 
Project 1 Resource Research and ReviewNo directly quoted material.docx
Project 1 Resource Research and ReviewNo directly quoted material.docxProject 1 Resource Research and ReviewNo directly quoted material.docx
Project 1 Resource Research and ReviewNo directly quoted material.docx
dessiechisomjj4
 
Professionalism Assignment I would like for you to put together yo.docx
Professionalism Assignment I would like for you to put together yo.docxProfessionalism Assignment I would like for you to put together yo.docx
Professionalism Assignment I would like for you to put together yo.docx
dessiechisomjj4
 
Professor Drebins Executive MBA students were recently discussing t.docx
Professor Drebins Executive MBA students were recently discussing t.docxProfessor Drebins Executive MBA students were recently discussing t.docx
Professor Drebins Executive MBA students were recently discussing t.docx
dessiechisomjj4
 
Professional Legal Issues with Medical and Nursing Professionals  .docx
Professional Legal Issues with Medical and Nursing Professionals  .docxProfessional Legal Issues with Medical and Nursing Professionals  .docx
Professional Legal Issues with Medical and Nursing Professionals  .docx
dessiechisomjj4
 
Prof Washington, ScenarioHere is another assignment I need help wi.docx
Prof Washington, ScenarioHere is another assignment I need help wi.docxProf Washington, ScenarioHere is another assignment I need help wi.docx
Prof Washington, ScenarioHere is another assignment I need help wi.docx
dessiechisomjj4
 
Prof James Kelvin onlyIts just this one and simple question 1.docx
Prof James Kelvin onlyIts just this one and simple question 1.docxProf James Kelvin onlyIts just this one and simple question 1.docx
Prof James Kelvin onlyIts just this one and simple question 1.docx
dessiechisomjj4
 
Product life cycle for album and single . sales vs time ( 2 pa.docx
Product life cycle for album and single . sales vs time ( 2 pa.docxProduct life cycle for album and single . sales vs time ( 2 pa.docx
Product life cycle for album and single . sales vs time ( 2 pa.docx
dessiechisomjj4
 
Produce the following components as the final draft of your health p.docx
Produce the following components as the final draft of your health p.docxProduce the following components as the final draft of your health p.docx
Produce the following components as the final draft of your health p.docx
dessiechisomjj4
 
Produce a preparedness proposal the will recommend specific steps th.docx
Produce a preparedness proposal the will recommend specific steps th.docxProduce a preparedness proposal the will recommend specific steps th.docx
Produce a preparedness proposal the will recommend specific steps th.docx
dessiechisomjj4
 

More from dessiechisomjj4 (20)

Project 2 Research Paper Compendium                               .docx
Project 2 Research Paper Compendium                               .docxProject 2 Research Paper Compendium                               .docx
Project 2 Research Paper Compendium                               .docx
 
Project 1 Interview Essay Conduct a brief interview with an Asian.docx
Project 1 Interview Essay Conduct a brief interview with an Asian.docxProject 1 Interview Essay Conduct a brief interview with an Asian.docx
Project 1 Interview Essay Conduct a brief interview with an Asian.docx
 
Project 1 Scenario There is a Top Secret intelligence report.docx
Project 1 Scenario There is a Top Secret intelligence report.docxProject 1 Scenario There is a Top Secret intelligence report.docx
Project 1 Scenario There is a Top Secret intelligence report.docx
 
Project #1 Personal Reflection (10)Consider an opinion that you .docx
Project #1 Personal Reflection (10)Consider an opinion that you .docxProject #1 Personal Reflection (10)Consider an opinion that you .docx
Project #1 Personal Reflection (10)Consider an opinion that you .docx
 
Project 1 Chinese Dialect Exploration and InterviewYou will nee.docx
Project 1 Chinese Dialect Exploration and InterviewYou will nee.docxProject 1 Chinese Dialect Exploration and InterviewYou will nee.docx
Project 1 Chinese Dialect Exploration and InterviewYou will nee.docx
 
Project 1 (1-2 pages)What are the employee workplace rights mand.docx
Project 1 (1-2 pages)What are the employee workplace rights mand.docxProject 1 (1-2 pages)What are the employee workplace rights mand.docx
Project 1 (1-2 pages)What are the employee workplace rights mand.docx
 
PROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docx
PROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docxPROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docx
PROGRAM 1 Favorite Show!Write an HLA Assembly program that displa.docx
 
Program must have these things Format currency, total pieces & e.docx
Program must have these things Format currency, total pieces & e.docxProgram must have these things Format currency, total pieces & e.docx
Program must have these things Format currency, total pieces & e.docx
 
Professors Comments1) Only the three body paragraphs were require.docx
Professors Comments1) Only the three body paragraphs were require.docxProfessors Comments1) Only the three body paragraphs were require.docx
Professors Comments1) Only the three body paragraphs were require.docx
 
Program EssayPlease answer essay prompt in a separate 1-page file..docx
Program EssayPlease answer essay prompt in a separate 1-page file..docxProgram EssayPlease answer essay prompt in a separate 1-page file..docx
Program EssayPlease answer essay prompt in a separate 1-page file..docx
 
Program Computing Project 4 builds upon CP3 to develop a program to .docx
Program Computing Project 4 builds upon CP3 to develop a program to .docxProgram Computing Project 4 builds upon CP3 to develop a program to .docx
Program Computing Project 4 builds upon CP3 to develop a program to .docx
 
Project 1 Resource Research and ReviewNo directly quoted material.docx
Project 1 Resource Research and ReviewNo directly quoted material.docxProject 1 Resource Research and ReviewNo directly quoted material.docx
Project 1 Resource Research and ReviewNo directly quoted material.docx
 
Professionalism Assignment I would like for you to put together yo.docx
Professionalism Assignment I would like for you to put together yo.docxProfessionalism Assignment I would like for you to put together yo.docx
Professionalism Assignment I would like for you to put together yo.docx
 
Professor Drebins Executive MBA students were recently discussing t.docx
Professor Drebins Executive MBA students were recently discussing t.docxProfessor Drebins Executive MBA students were recently discussing t.docx
Professor Drebins Executive MBA students were recently discussing t.docx
 
Professional Legal Issues with Medical and Nursing Professionals  .docx
Professional Legal Issues with Medical and Nursing Professionals  .docxProfessional Legal Issues with Medical and Nursing Professionals  .docx
Professional Legal Issues with Medical and Nursing Professionals  .docx
 
Prof Washington, ScenarioHere is another assignment I need help wi.docx
Prof Washington, ScenarioHere is another assignment I need help wi.docxProf Washington, ScenarioHere is another assignment I need help wi.docx
Prof Washington, ScenarioHere is another assignment I need help wi.docx
 
Prof James Kelvin onlyIts just this one and simple question 1.docx
Prof James Kelvin onlyIts just this one and simple question 1.docxProf James Kelvin onlyIts just this one and simple question 1.docx
Prof James Kelvin onlyIts just this one and simple question 1.docx
 
Product life cycle for album and single . sales vs time ( 2 pa.docx
Product life cycle for album and single . sales vs time ( 2 pa.docxProduct life cycle for album and single . sales vs time ( 2 pa.docx
Product life cycle for album and single . sales vs time ( 2 pa.docx
 
Produce the following components as the final draft of your health p.docx
Produce the following components as the final draft of your health p.docxProduce the following components as the final draft of your health p.docx
Produce the following components as the final draft of your health p.docx
 
Produce a preparedness proposal the will recommend specific steps th.docx
Produce a preparedness proposal the will recommend specific steps th.docxProduce a preparedness proposal the will recommend specific steps th.docx
Produce a preparedness proposal the will recommend specific steps th.docx
 

Recently uploaded

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
EduSkills OECD
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
PedroFerreira53928
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
Celine George
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
Celine George
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
PedroFerreira53928
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
GeoBlogs
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 

Recently uploaded (20)

Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......Ethnobotany and Ethnopharmacology ......
Ethnobotany and Ethnopharmacology ......
 
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptxStudents, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
Students, digital devices and success - Andreas Schleicher - 27 May 2024..pptx
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
PART A. Introduction to Costumer Service
PART A. Introduction to Costumer ServicePART A. Introduction to Costumer Service
PART A. Introduction to Costumer Service
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
How to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS ModuleHow to Split Bills in the Odoo 17 POS Module
How to Split Bills in the Odoo 17 POS Module
 
How to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERPHow to Create Map Views in the Odoo 17 ERP
How to Create Map Views in the Odoo 17 ERP
 
Basic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumersBasic phrases for greeting and assisting costumers
Basic phrases for greeting and assisting costumers
 
Fish and Chips - have they had their chips
Fish and Chips - have they had their chipsFish and Chips - have they had their chips
Fish and Chips - have they had their chips
 
2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 

38 www.e-enm.orgEndocrinol Metab 2016;3138-44httpdx.

  • 1. 38 www.e-enm.org Endocrinol Metab 2016;31:38-44 http://dx.doi.org/10.3803/EnM.2016.31.1.38 pISSN 2093-596X · eISSN 2093-5978 Review Article How to Establish Clinical Prediction Models Yong-ho Lee1, Heejung Bang2, Dae Jung Kim3 1Department of Internal Medicine, Yonsei University College of Medicine, Seoul, Korea; 2Division of Biostatistics, Department of Public Health Sciences, University of California Davis School of Medicine, Davis, CA, USA; 3Department of Endocrinology and Metabolism, Ajou University School of Medicine, Suwon, Korea A clinical prediction model can be applied to several challenging clinical scenarios: screening high-risk individuals for asymp- tomatic disease, predicting future events such as disease or death, and assisting medical decision-making and health education. Despite the impact of clinical prediction models on practice, prediction modeling is a complex process requiring careful statisti- cal analyses and sound clinical judgement. Although there is no definite consensus on the best methodology for model develop- ment and validation, a few recommendations and checklists
  • 2. have been proposed. In this review, we summarize five steps for de- veloping and validating a clinical prediction model: preparation for establishing clinical prediction models; dataset selection; handling variables; model generation; and model evaluation and validation. We also review several studies that detail methods for developing clinical prediction models with comparable examples from real practice. After model development and vigorous validation in relevant settings, possibly with evaluation of utility/usability and fine-tuning, good models can be ready for the use in practice. We anticipate that this framework will revitalize the use of predictive or prognostic research in endocrinology, leading to active applications in real clinical practice. Keywords: Clinical prediction model; Development; Validation; Clinical usefulness INTRODUCTION Hippocrates emphasized prognosis as a principal component of medicine [1]. Nevertheless, current medical investigation mostly focuses on etiological and therapeutic research, rather than prognostic methods such as the development of clinical prediction models. Numerous studies have investigated wheth- er a single variable (e.g., biomarkers or novel clinicobiochemi - cal parameters) can predict or is associated with certain out- comes, whereas establishing clinical prediction models by in- corporating multiple variables is rather complicated, as it re- quires a multi-step and multivariable/multifactorial approach to design and analysis [1]. Clinical prediction models can inform patients and their physicians or other healthcare providers of the patient’s proba -
  • 3. bility of having or developing a certain disease and help them with associated decision-making (e.g., facilitating patient-doc- tor communication based on more objective information). Ap- Received: 9 January 2016, Revised: 14 January 2016, Accepted: 27 January 2016 Corresponding authors: Dae Jung Kim Department of Endocrinology and Metabolism, Ajou University School of Medicine, 164 World cup-ro, Yeongtong-gu, Suwon 16499, Korea Tel: +82-31-219-5128, Fax: +82-31-219-4497, E-mail: [email protected] Yong-ho Lee Department of Internal Medicine, Yonsei University College of Medicine, 50-1 Yonsei-ro, Seodaemun-gu, Seoul 03722, Korea Tel: +82-2-2228-1943, Fax: +82-2-393-6884, E-mail: [email protected] Copyright © 2016 Korean Endocrine Society This is an Open Access article distributed under the terms of the Creative Com- mons Attribution Non-Commercial License (http://creativecommons.org/ licenses/by-nc/4.0/) which permits unrestricted non-commercial use, distribu- tion, and reproduction in any medium, provided the original work is properly cited. http://crossmark.crossref.org/dialog/?doi=10.3803/EnM.2016.31 .1.38&domain=pdf&date_stamp=2016-03-16 Clinical Prediction Models
  • 4. Copyright © 2016 Korean Endocrine Society www.e-enm.org 39 Endocrinol Metab 2016;31:38-44 http://dx.doi.org/10.3803/EnM.2016.31.1.38 pISSN 2093-596X · eISSN 2093-5978 plying a model to a real world problem can help with detection or screening in undiagnosed high-risk subjects, which improves the ability to prevent developing diseases with early interven- tions. Furthermore, in some instances, certain models can pre- dict the possibility of having future disease or provide a prog- nosis for disease (e.g., complication or mortality). This review will concisely describe how to establish clinical prediction models, including the principles and processes for conducting multivariable prognostic studies and developing and validating clinical prediction models. CONCEPT OF CLINICAL PREDICTION MODELS In the era of personalized medicine, prediction of prevalent or incident diseases (diagnosis) or outcomes for future disease course (prognosis) became more important for patient manage- ment by health-care personnel. Clinical prediction models are used to investigate the relationship between future or unknown outcomes (endpoints) and baseline health states (starting point) among people with specific conditions [2]. They generally combine multiple parameters to provide insight into the relative impacts of individual predictors in the model. Evidence-based medicine requires the strongest scientific evidence, including findings from randomized controlled trials, meta-analyses, and systematic reviews [3]. Although clinical prediction models are partly based on evidence-based medicine, the user must also adopt practicality and an artistic approach to establish clinically relevant and meaningful models for targeted users. Models should predict specific events accurately and be rela -
  • 5. tively simple and easy to use. If a prediction model provides inaccurate estimates of future-event occurrences, it will mislead healthcare professionals to provide insufficient management of patients or resources. On the other hand, if a model has high predictability power but is difficult to apply (e.g., with compli - cated calculation or unfamiliar question/item or unit), time con- suming, costly [4] or less relevant (e.g., European model for Koreans, event too far away), it will not be commonly used. For example, a diabetes prediction model developed by Lim et al. [5] has a relatively high area under the receiver operating curve (AUC, 0.77), while blood tests that measure hemoglobin A1c, high density lipoprotein cholesterol, and triglyceride are included in the risk score, which would generally require clini - cian’s involvement so could be a major barrier for use in com- munity settings. When prediction models consist of complicat- ed mathematical equations [6,7], a web-based application can enhance implementation (e.g., calculating 10-year and lifetime risk for atherosclerotic cardiovascular disease [CVD] is avail- able at http://tools.acc.org/ASCVD-Risk-Estimator/). There- fore, achieving a balance between predictability and simplicity is a key to a good clinical prediction model. STEPS TO DEVELOPING CLINICAL PREDICTION MODELS There are several reports [1,8-13] and a textbook [14] that de- tail methods to develop clinical prediction models. Although there is currently no consensus on the ideal construction meth- od for prediction models, the Prognosis Research Strategy (PROGRESS) group has proposed a number of methods to im- prove the quality and impact of model development [2,15]. Re- cently, investigators on the Transparent Reporting of a multi - variable prediction model for Individual Prognosis Or Diagno- sis (TRIPOD) study have established a checklist of recommen- dations for reporting on prediction or prognostic models [16].
  • 6. This review will summarize the analytic process for developing clinical prediction models into five stages. Stage 1: preparation for establishing clinical prediction models The aim of prediction modeling is to develop an accurate and useful clinical prediction model with multiple variables using comprehensive datasets. First, we have to articulate several im- portant research questions that affect database selection and the approach of model generation. (1) What is the target outcome (event or disease) to predict (e.g., diabetes, CVD, or fracture)? (2) Who is the target patient of the model (e.g., general popula- tion, elderly population ≥65 years or patients with type 2 dia- betes)? (3) Who is the target user of the prediction model (e.g., layperson, doctor or health-related organization)? Depending on the answers to the above questions, researchers can choose the proper datasets for the model. The category of target users will determine the selection and handling process of multiple variables, which will affect the structure of the clinical predic - tion model. For example, if researchers want to make a predic- tion model for laypersons, a simple model with not many user- friendly questions in only a few categories (e.g., yes vs. no) could be ideal. Stage 2: dataset selection The dataset is one of the most important components of the clinical prediction model—often not under investigators’ con- Lee YH, et al. 40 www.e-enm.org Copyright © 2016 Korean Endocrine Society trol—and ultimately determines its quality and credibility; however, there are no general rules for assessing the quality of
  • 7. data [9]. Yet, there is no such thing as perfect data and prefect model. It would be reasonable to search for best-suited dataset. Oftentimes, secondary or administrative data sources must be utilized because a primary dataset with the study endpoint and all of key predictors is not available. Researchers should use different types of datasets, depending on the purpose of the prediction model. For example, a model for screening high-risk individuals with undiagnosed condition/disease can be devel - oped using cross-sectional cohort data. However, such models may have relatively low power for predicting future incidence of disease when different risk factors come into play. Accord- ingly, longitudinal or prospective cohort datasets should be used for prediction models for future events (Table 1). Models for prevalent events are useful for predicting asymptomatic diseases, such as diabetes or chronic kidney disease, by screen- ing undiagnosed cases, whereas models for incident events are useful for predicting the incidence of relatively severe diseases, such as CVD, stroke, and cancer. A universal clinical prediction model for disease does not exist; thus, separate specific models that can individually as - sess the role of ethnicity, nationality, sex, or age on disease risk are warranted. For example, the Framingham coronary heart disease (CHD) risk score is generated by one of the most com- monly used clinical prediction models; however, it tends to overestimate CHD risk by approximately 5-fold in Asian popu- lations [17,18]. This indicates that models derived from one ethnicity sample may not be directly applied to populations of other ethnicities. Other specific characteristics of study popula - tions beside ethnicity (e.g., obesity- or culture-related vari- ables) could be important. There is no absolute consensus on the minimal requirement for dataset sample size. Generally, large representative, contem- porary datasets that closely reflect the characteristics of their target population are ideal for modeling and can enhance the relevance, reproducibility, and generalizability of the model.
  • 8. Moreover, two types of datasets are generally needed: a devel - opment dataset and a validation dataset. A clinical prediction model is first derived from analyses of the development dataset and its predictive performance should be assessed in different populations based on the validation dataset. It is highly recom- mended to use validation datasets from external study popula- tions or cohorts, whenever available [19,20]; however, if it is not possible to find appropriate external datasets, an internal validation dataset can be formed by randomly splitting the orig- inal cohort into two datasets (if sample size is large) or statisti - cal techniques such as jackknife or bootstrap resampling (if not) [21]. The splitting ratio can vary depending on the researchers’ particular goals, but generally, more subjects should be allocat- ed to the development dataset than to the validation dataset. Stage 3: handling variables Since cohort datasets contain more variables than can reason- ably be used in a prediction model, evaluation and selection of the most predictive and sensible predictors should be done. Generally, inclusion of more than 10 variables/questions may decrease the efficiency, feasibility and convenience of predic- tion models, but expert’s judgment that could be somewhat subjective is required to assess the need for each situation. Pre - dictors that were previously found to be significant should nor - mally be considered as candidate variables (e.g., family history of diabetes in diabetes risk score). It should be noted that not all significant predictors need to be included in the final model (e.g., P<0.05); predictor selection must be always guided by clinical relevance/judgement to prevent nonsensical or less rel - evant or user-unfriendly variables (e.g., socioeconomic status- related) or possible false-positive associations. Additionally, Table 1. Characteristics of Different Clinical Prediction Models according to Their Purpose Characteristic Prevalent/concurrent events Incident/future
  • 9. events Data type Cross-sectional data Longitudinal/prospective cohort data Application Useful for asymptomatic diseases for screening undiagnosed cases (e.g., diabetes, CKD) Useful for predicting the incidence of diseases (e.g., CVD, stroke, cancer) Aim of the model Detection Prevention Simplicity in model and use More important Less important Example Korean Diabetes Score [34] ACC/AHA ASCVD risk equation [7] CKD, chronic kidney disease; CVD, cardiovascular disease; ACC/AHA, American College of Cardiology/American Heart Association; ASCVD, atherosclerotic cardiovascular disease. Clinical Prediction Models Copyright © 2016 Korean Endocrine Society www.e-enm.org 41 variables which are highly correlated with others may be ex- cluded because they contribute little unique information [22]. On the other hand, variables not statistically significant or with small effect size may still contribute to the model [23]. De- pending on researcher discretion, different models that analyze different variables may be developed for targeting distinct us - ers. For example, a simple clinical prediction model that does
  • 10. not require laboratory variables and a comprehensive model that does could both be designed for laypersons and health care providers, respectively [19]. With regard to variable coding, categorical and continuous variables should be managed differently [8]. For ordered cate - gorical variables, infrequent categories can be merged and sim- ilar variables may be combined/grouped. For example, past and current smoker categories can be merged if numbers of sub- jects who report being a past or current smoker are relatively small and variable unification does not alter the statistical sig- nificance of the model materially. Although continuous param- eters are usually included in a regression model, assuming lin- earity, researchers should consider the possibility of non-linear associations such as J- or U-shaped distributions [24]. Further- more, the relative effect of a continuous variable is determined by the measurement scale used in the model [8]. For example, the impact of fasting glucose levels on the risk of CVD may be interpreted as having a stronger influence when scaled per 10 mg/dL than per 1 mg/dL. Researchers often emphasize the importance of not dichoto- mizing continuous variables in the initial stage of model devel - opment because valuable predictive information can be lost during categorization [24]. However, prediction models—is not the same thing as regression models—with continuous pa- rameters may be complex and hard to use or be understood by laypersons, because they have to calculate their risk scores by themselves. A web or computer-based platform is usually re- quired for the implementation of these models. Otherwise, in a later phase, researchers may transform the model into a user - friendly format by categorizing some predictors, if the predic- tive capacity of the model is retained [8,19,25]. Finally, missing data is a chronic problem in most data anal - yses. Missing data can occur various reasons, including uncol - lected (e.g., by design), not available or not applicable, refusal by respondent, dropout, or “don’t know.” To handle this issue, researchers may consider imputation technique, dichotomizing
  • 11. the answer into yes versus others, or allow “unknown” as a separate category as in http://www.cancer.gov/bcrisktool/. Stage 4: model generation Although there are no consensus guidelines for choosing vari- ables and determining structures to develop the final prediction model, various strategies with statistical tools are available [8,9]. Regression analyses, including linear, logistic, and Cox models are widely used depending on the model and its intend- ed purpose. First, the full model approach is to include all the candidate variables in the model; the benefit of this approach is to avoid overfitting and selection bias [9]. However, it can be impractical to pre-specify all predictors and previously signifi- cant predictors may not be in a new population/sample. Sec- ond, a backward elimination approach or stepwise selection method can be applied to remove a number of insignificant candidate variables. To check for overfitting of the model, Akaike information criterion (AIC) [26], an index of model fit- ting that charges a penalty against larger models, may be useful [19]. Lower AIC values indicate a better model fit. Some inter - pret that AIC addresses explanation and Bayesian information criterion (BIC) addresses prediction, where BIC may be con- sidered a Bayesian counterpart [27]. If researchers prefer algorithm modeling culture instead of data modeling culture, e.g., formula-based regression [28], a classification and regression tree analysis or recursive parti - tioning could be considered [28-30]. With regard to determining scores for each predictor in the generation of simplified models, researchers using expert judg- ment may create a weighted scoring system by converting β coefficients [19] or odds ratios [20] from the final model to in- teger values, while preserving monotonicity and simplicity. For example, from the logistic regression model built by Lee et al. [19], β coefficients <0.6, 0.7 to 1.3, 1.4 to 2.0, and >2.1 were assigned scores of 1, 2, 3, and 4, respectively.
  • 12. Stage 5: model evaluation and validation (internal/ external) After model generation, researchers should evaluate the predic- tive power of their proposed model using an independent datas- et, where truly external dataset is preferred whenever available. There are several standard performance measures that capture different aspects: two key components are calibration and dis - crimination [8,9,31]. Calibration can be assessed by plotting the observed proportions of events against the predicted probabili - ties for groups defined by ranges of individual predicted risk [9,10]. For example, a common method is to categorize 10 risk groups of equal size (deciles) and then conduct the calibration process [32]. The most ideal calibration plot would show a 45° Lee YH, et al. 42 www.e-enm.org Copyright © 2016 Korean Endocrine Society line, which indicates that the observed proportions of events and predicted probabilities completely overlap over the entire range of probabilities [9]. However, this is not guaranteed when external validation is conducted with a different sample. Dis - crimination is defined as the ability to distinguish events versus non-events (e.g., dead vs. alive) [8]. The most common dis- crimination measure is the AUC or, equivalently, concordance (c)-statistic. The AUC is equal to the probability that, given two individuals randomly selected—one who will develop an event and another who will not—the model will assign a higher prob- ability of an event to the former [10]. A c-statistic value of 0.5 indicates a random chance (i.e., flip of a coin). The usual c-sta- tistic range for a prediction model is 0.6 to 0.85; this range can be affected by target-event characteristics (disease) or the study population. A model with a c-statistic ranging from 0.70 to 0.80 has an adequate power of discrimination; a range of 0.80 to 0.90
  • 13. is considered excellent. Table 2 shows several common statisti - cal measures for model evaluation. As usual, selection, application and interpretation of any sta- tistical method and results need great care as virtually all meth- ods entail assumptions and limited capacity. Let us review some here. Predictive values depend on the disease prevalence so direct comparison for different diseases may not be valid. When sample size is very large, P value can be impressively small even for a practically meaningless difference. Net reclas - sification index and integrated discrimination improvement are known to lead to non-proper scoring and vulnerable to miscali- brated or overfit problems [33]. AUC and R2 are often hard to increase by a new predictor, even with large odds ratio. Despite similar names, AIC and BIC address slightly different issues and information in BIC can be decreased with sample size increases. The Hosmer-Lemeshow test is highly sensitive when sample size is large, which is not an ideal property as a goodness-fit sta- tistic. Calibration plot can easily provide a high correlation coef- ficient (>0.9), simply because they are computed for predicted versus observed values on grouped data (without random vari - ability). Finally, AUC also needs caution: a high value (e.g., >0.9) may mean excellent discrimination but it can also reflect the situation where prediction is not so relevant: (1) the task is closer to diagnostic or early onset rather than prediction; (2) cas- es vs. non-cases are fundamentally different with minimal over- lap; or (3) predictors and endpoints are virtually the same things (e.g., current blood pressure vs. future blood pressure). Despite the long list provided above, we do not think this is a discouraging news to researchers. We may tell us no method is perfect and “one size does not fit all” is also true to statistical methods; thus blinded or automated application can be danger -
  • 14. ous. It is crucial to separate internal and external validation and to conduct the previously mentioned analyses on both datasets to finalize the research findings (see the following for example reports [19,20,34]). Internal validation can be done using a ran- dom subsample or different years from the development dataset or by conducting bootstrap resampling [22]. This approach can particularly assess the stability of selected predictors, as well as prediction quality. Subsequently, external validation should be performed on an independent dataset from that which was pre- viously used to develop the model. For example, datasets can be obtained from populations from other hospitals or centers (see geographic validation [19]) or a more recently collected cohort population (temporal validation [34]). This process is often considered to be a more powerful test for prediction mod- els than internal validation because it evaluates transportability, generalizability and true replication, rather than reproducibility [8]. Poor model performance may occur after use of an external dataset due to differences in healthcare systems, measurement methods/definitions of predictors and/or endpoint, subject characteristics or context (e.g., high vs. low risk). CONCLUSIONS For patient-centered perspectives, clinical prediction models are useful for several purposes: to screen high-risk individuals Table 2. Statistical Measures for Model Evaluation Sensitivity and specificity Discrimination (ROC/AUC) Predictive values: positive, negative Likelihood ratio: positive, negative
  • 15. Accuracy: Youden index, Brier score Number needed to treat or screen Calibration: Calibration plot, Hosmer-Lemeshow test Model determination: R2 Statistical significance: P value (e.g., likelihood ratio test) Magnitude of association, e.g., β coefficient, odds ratio Model quality: AIC/BIC Net reclassification index and integrated discrimination improvement Net benefit Cost-effectiveness ROC, receiver operating characteristic; AUC, area under the curve; AIC, Akaike information criterion; BIC, Bayesian information criterion. Clinical Prediction Models Copyright © 2016 Korean Endocrine Society www.e-enm.org 43 for asymptomatic disease, to predict future events of disease or death, and to assist medical decision-making. Herein, we sum- marized five steps for developing a clinical prediction model.
  • 16. Prediction models are continuously designed but few have had their predictive performance validated with an external popula- tion. Because model development is complex, consultation with statistical experts can improve the validity and quality of rigorous prediction model research. After developing the mod- el, vigorous validation with multiple external datasets and ef- fective dissemination to interested parties should occur before using the model in practice [35]. Web or smartphone-based ap- plications can be good routes for advertisement and delivery of clinical prediction models to the public. For example, Korean risk models for diabetes, fatty liver, CVD, and osteoporosis are readily available at http://cmerc.yuhs.ac/mobileweb/. Simple model may be translated into a one page checklist for patient’s self-assessment (e.g., equipped in waiting room in clinic). We anticipate that the framework that we provide/summarize, along with additional assistance from related references or text- books, will help predictive or prognostic research in endocri- nology; this will lead to active application of these practices in real world settings. In light of the personalized- and precision- medicine era, further research is needed to attain individual - level predictions, where genetic or novel biomarkers can play bigger roles, as well as simple generalized predictions which can further help patient-centered care. CONFLICTS OF INTEREST No potential conflict of interest relevant to this article was re - ported. ACKNOWLEDGMENTS This study was supported by a grant from the Korea Healthcare Technology R&D Project, Ministry of Health and Welfare, Re- public of Korea (No. HI14C2476). H.B. was partly supported by the National Center for Advancing Translational Sciences, National Institutes of Health, through grant UL1 TR 000002.
  • 17. D.K. was partly supported by a grant of the Korean Health Technology R&D Project, Ministry of Health and Welfare, Re- public of Korea (HI13C0715). ORCID Yong-ho Lee http://orcid.org/0000-0002-6219-4942 Dae Jung Kim http://orcid.org/0000-0003-1025-2044 REFERENCES 1. Moons KG, Royston P, Vergouwe Y, Grobbee DE, Altman DG. Prognosis and prognostic research: what, why, and how? BMJ 2009;338:b375. 2. Hemingway H, Croft P, Perel P, Hayden JA, Abrams K, Timmis A, et al. Prognosis research strategy (PROGRESS) 1: a framework for researching clinical outcomes. BMJ 2013;346:e5595. 3. Sackett DL, Rosenberg WM, Gray JA, Haynes RB, Rich- ardson WS. Evidence based medicine: what it is and what it isn’t. BMJ 1996;312:71-2. 4. Greenland S. The need for reorientation toward cost-effective prediction: comments on ‘Evaluating the added predictive ability of a new marker. From area under the ROC curve to re- classification and beyond’ by M. J. Pencina et al., Statistics i n Medicine (DOI: 10.1002/sim.2929). Stat Med 2008;27:199- 206. 5. Lim NK, Park SH, Choi SJ, Lee KS, Park HY. A risk score for predicting the incidence of type 2 diabetes in a middle- aged Korean cohort: the Korean genome and epidemiology study. Circ J 2012;76:1904-10.
  • 18. 6. Griffin SJ, Little PS, Hales CN, Kinmonth AL, Wareham NJ. Diabetes risk score: towards earlier detection of type 2 diabe - tes in general practice. Diabetes Metab Res Rev 2000;16:164- 71. 7. Goff DC Jr, Lloyd-Jones DM, Bennett G, Coady S, D’Agostino RB, Gibbons R, et al. 2013 ACC/AHA guideline on the assessment of cardiovascular risk: a report of the American College of Cardiology/American Heart Associa- tion Task Force on Practice Guidelines. Circulation 2014;129 (25 Suppl 2):S49-73. 8. Steyerberg EW, Vergouwe Y. Towards better clinical pre- diction models: seven steps for development and an ABCD for validation. Eur Heart J 2014;35:1925-31. 9. Royston P, Moons KG, Altman DG, Vergouwe Y. Prognosis and prognostic research: developing a prognostic model. BMJ 2009;338:b604. 10. Altman DG, Vergouwe Y, Royston P, Moons KG. Progno- sis and prognostic research: validating a prognostic model. BMJ 2009;338:b605. 11. Moons KG, Altman DG, Vergouwe Y, Royston P. Prognosis and prognostic research: application and impact of prog- nostic models in clinical practice. BMJ 2009;338:b606. http://orcid.org/0000-0002-6219-4942 http://orcid.org/0000-0003-1025-2044 Lee YH, et al. 44 www.e-enm.org Copyright © 2016 Korean Endocrine Society
  • 19. 12. Laupacis A, Sekar N, Stiell IG. Clinical prediction rules. A review and suggested modifications of methodological standards. JAMA 1997;277:488-94. 13. Altman DG, Royston P. What do we mean by validating a prognostic model? Stat Med 2000;19:453-73. 14. Steyerberg EW. Clinical prediction models: a practical ap- proach to development, validation, and updating. New York: Springer; 2009. 15. Steyerberg EW, Moons KG, van der Windt DA, Hayden JA, Perel P, Schroter S, et al. Prognosis Research Strategy (PROGRESS) 3: prognostic model research. PLoS Med 2013;10:e1001381. 16. Collins GS, Reitsma JB, Altman DG, Moons KG. Transpar- ent Reporting of a multivariable prediction model for Indi - vidual Prognosis or Diagnosis (TRIPOD): the TRIPOD statement. Ann Intern Med 2015;162:55-63. 17. Liu J, Hong Y, D’Agostino RB Sr, Wu Z, Wang W, Sun J, et al. Predictive value for the Chinese population of the Fram- ingham CHD risk assessment tool compared with the Chi- nese Multi-Provincial Cohort Study. JAMA 2004;291:2591- 9. 18. Jee SH, Jang Y, Oh DJ, Oh BH, Lee SH, Park SW, et al. A coronary heart disease prediction model: the Korean Heart Study. BMJ Open 2014;4:e005025. 19. Lee YH, Bang H, Park YM, Bae JC, Lee BW, Kang ES, et al. Non-laboratory-based self-assessment screening score for non-alcoholic fatty liver disease: development, validation and
  • 20. comparison with other scores. PLoS One 2014;9:e107584. 20. Bang H, Edwards AM, Bomback AS, Ballantyne CM, Bril- lon D, Callahan MA, et al. Development and validation of a patient self-assessment score for diabetes risk. Ann Intern Med 2009;151:775-83. 21. Kotronen A, Peltonen M, Hakkarainen A, Sevastianova K, Bergholm R, Johansson LM, et al. Prediction of non-alco- holic fatty liver disease and liver fat using metabolic and genetic factors. Gastroenterology 2009;137:865-72. 22. Harrell FE Jr. Regression modeling strategies: with applica- tions to linear models, logistic regression, and survival analysis. New York: Springer; 2001. 23. Sun GW, Shook TL, Kay GL. Inappropriate use of bivari- able analysis to screen risk factors for use in multivariable analysis. J Clin Epidemiol 1996;49:907-16. 24. Royston P, Altman DG, Sauerbrei W. Dichotomizing con- tinuous predictors in multiple regression: a bad idea. Stat Med 2006;25:127-41. 25. Boersma E, Poldermans D, Bax JJ, Steyerberg EW, Thom- son IR, Banga JD, et al. Predictors of cardiac events after major vascular surgery: role of clinical characteristics, dobu- tamine echocardiography, and beta-blocker therapy. JAMA 2001;285:1865-73. 26. Sauerbrei W. The use of resampling methods to simplify re- gression models in medical statistics. J R Stat Soc Ser C Appl Stat 1999;48:313-29. 27. Shmueli G. To explain or to predict? Stat Sci 2010:289-310.
  • 21. 28. Heikes KE, Eddy DM, Arondekar B, Schlessinger L. Diabe- tes risk calculator: a simple tool for detecting undiagnosed diabetes and pre-diabetes. Diabetes Care 2008;31:1040-5. 29. Breiman L, Friedman J, Stone CJ, Olshen RA. Classifica- tion and regression trees. Belmont: Wadsworth Internation- al Group; 1984. 30. Breiman L. Statistical modeling: the two cultures (with com- ments and a rejoinder by the author). Statist Sci 2001;16:199- 231. 31. Steyerberg EW, Vickers AJ, Cook NR, Gerds T, Gonen M, Obuchowski N, et al. Assessing the performance of predic- tion models: a framework for traditional and novel mea- sures. Epidemiology 2010;21:128-38. 32. Meffert PJ, Baumeister SE, Lerch MM, Mayerle J, Kratzer W, Volzke H. Development, external validation, and com- parative assessment of a new diagnostic score for hepatic steatosis. Am J Gastroenterol 2014;109:1404-14. 33. Hilden J. Commentary: on NRI, IDI, and “good-looking” sta- tistics with nothing underneath. Epidemiology 2014;25:265- 7. 34. Lee YH, Bang H, Kim HC, Kim HM, Park SW, Kim DJ. A simple screening score for diabetes for the Korean popula- tion: development, validation, and comparison with other scores. Diabetes Care 2012;35:1723-30. 35. Wyatt JC, Altman DG. Commentary: Prognostic models: clinically useful or quickly forgotten? BMJ 1995;311:1539.
  • 22. Criminal Justice Policy Review Journal indexing and metrics Top of Form Bottom of Form Restricted access Research article First published September 2006 Contextualizing the Criminal Justice Policy-Making Process Karim IsmailiView all authors and affiliations Volume 17, Issue 3 https://doi.org/10.1177/0887403405281559 · · · Get access · · Cite article · Share options · Information, rights and permissions · Metrics and citations · Related content Similar articles: · Restricted access Crime, Justice and Systems Analysis: Two Decades Later
  • 23. Book Reviews : Kriminologie by Hans Joachim Schneider. Berlin: Walter de Gruyter, 1986. 1, 117 pages, cloth Criminal Justice System Reform and Wrongful Conviction: A Research Agenda · SAGE recommends: · SAGE Knowledge Book chapter Criminology and Public Policy SAGE Knowledge Book chapter Introduction SAGE Knowledge Book chapter Critical Criminology · Abstract This article is an attempt at improving the knowledge base on the criminal justice policy-making process. As the criminological subfield of crime policy leads more criminologists to engage in policy analysis, understanding the policy-making environment in all of its complexity becomes more central to criminology. This becomes an important step toward theorizing the policy process. To advance this enterprise, policy-oriented criminologists might look to theoretical and conceptual frameworks that have established histories in the political and policy sciences. This article presents a contextual approach to examine the criminal justice policy-making environment and its accompanying process. The principal benefit of this approach is its emphasis on addressing the complexity inherent to policy contexts. For research on the
  • 24. policy process to advance, contextually sensitive methods of policy inquiry must be formulated and should illuminate the social reality of criminal justice policy making through the accumulation of knowledge both of and in the policy process. Get full access to this article View all access and purchase options for this article. References Atkinson, M., & Coleman, W. D. (1992). Policy networks, policy communities and problems of governance. Governance: An International Journal of Policy and Administration, 5, 155-180. Google Scholar Beckett, K. (1997). Making crime pay: Law and order in contemporary American politics. New York: Oxford University Press. Google Scholar Bobrow, D., & Dryzek, J. (1987). Policy analysis by design. Pittsburgh, PA: University of Pittsburgh Press. Google Scholar Brunner, R. D. (1991). The policy movement as a policy problem. Policy Sciences, 24, 65-98. Google Scholar Christie, N. (1993). Crime control as industry: Towards gulags, Western style? London: Rou image1.wmf
  • 25. Politics and Governance (ISSN: 2183–2463) 2018, Volume 6, Issue 2, Pages 5–12 DOI: 10.17645/pag.v6i2.1335 Article Privatizing Political Authority: Cybersecurity, Public-Private Partnerships, and the Reproduction of Liberal Political Order Daniel R. McCarthy School of Social and Political Sciences, University of Melbourne, 3051 Melbourne, Australia; E-Mail: [email protected] Submitted: 30 December 2017 | Accepted: 28 February 2018 | Published: 11 June 2018 Abstract Cybersecurity sits at the intersection of public security concerns about critical infrastructure protection and private secu- rity concerns around the protection of property rights and civil liberties. Public-private partnerships have been embraced as the best way to meet the challenge of cybersecurity, enabling cooperation between private and public sectors to meet shared challenges. While the cybersecurity literature has focused on the practical dilemmas of providing a public good, it has been less effective in reflecting on the role of cybersecurity in the broader constitution of political order. Unpacking three accepted conceptual divisions between public and private, state and market, and the political and economic, it is possible to locate how this set of theoretical assumptions shortcut reflection on these larger issues. While public-private partnerships overstep boundaries between public authority and
  • 26. private right, in doing so they reconstitute these divisions at another level in the organization of political economy of liberal democratic societies. Keywords capitalism; critical infrastructure protection; critical theory; cybersecurity; public-private partnerships Issue This article is part of the issue “Global Cybersecurity: NewDirections in Theory andMethods”, edited by Tim Stevens (King’s College London, UK). © 2018 by the author; licensee Cogitatio (Lisbon, Portugal). This article is licensed under a Creative Commons Attribu- tion 4.0 International License (CC BY). 1. Introduction The politics of infrastructure are central to the gover- nance of modern societies. Large Technical Systems (LTS) shape all aspects of our everyday lives, in ways both visi - ble and hidden. The ubiquity of infrastructures and their capacity tomediate relations between different social ac- tors demand careful analytical attention and the develop- ment of conceptual frameworks appropriate to capture the complex social, political and economic processes that drive their development and reproduction. As a practi - cal political issue this task is important; clarifying where the power to shape modern life lies is central to under - standing how our world is made, illuminating issues of political and moral responsibility that surround the poli - tics of technology. As this thematic issuemakes clear, studies of cyberse-
  • 27. curity require further theoretical and conceptual ground- clearing to produce these insights. By and large, the lit- erature on critical infrastructure protection and cyber- security has remained within a problem-solving frame- work, in which the existing social order forms the back- ground premises within which a problem is posed (Cox, 1981; Dunn Cavelty, 2013, p. 106). The provision of cyber - security has been studied within a relatively narrow set of assumptions, with questions central to security stud- ies, and politics more broadly, circumscribed. This is par - ticularly evident in the literature on public-private part- nerships (PPPs) as a route to the provision of cybersecu- rity in liberal democracies. Building on an emerging lit- erature that seeks to sharpen the analytical focus of an often vague or underspecified set of issues (Carr, 2016; Dunn Cavelty, 2014), the starting point for this article is a rather simple question: what is cybersecurity and critical infrastructure protection for? Answering this question, while not straightforward, can be clarified by problematising a set of common- sense assumptions apparent within studies of PPPs Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12 5 about how political life can and should be organized. The literature on cybersecurity and critical infrastructure pro- tection needs to be theoretically ‘deepened’ to clarify a broader grasp of what cybersecurity is for, and to high- light potential political alternatives. Considering what cy- bersecurity is for requiresmoving beyond a narrow issue- specific focus to consider how cybersecurity practices re- late to existing social formations. To foreshadow the ar -
  • 28. gument developed below, the central move in this arti- cle is an interrogation of the conceptual separation of the political and the economic, and its related binaries of public/private and state/market, in the field of cyber - security. Once we being to question the seeming natural- ness of this divide it becomes possible to articulate the wider stakes of cybersecurity with greater clarity. This article will proceed as follows. First, it will set out the dominant approach that views cybersecurity as a public good, and thereby frames its provision as a col - lective action problem. The United States will serve as the empirical referent point. Understood in these terms, everyone benefits from cybersecurity. Second, it will dis- cuss the conceptual binaries, noted above, that form the starting point for these analyses. These sections will dis- cuss how the assumption of state autonomy in collec- tive action models underpins the conceptual divisions between public and private, state and market, and pol - itics and economics. Schematic in nature, these sections nevertheless draw attention to a series of problematic theoretical assumptions around these binaries. Finally, it will argue that assuming a division between these var- ious spheres of social life obscures the role of PPPs in (re)producing the specific forms of liberal political order. PPPs are a method of collaboration designed to repro- duce the privatization of political power that character - izes modern liberal capitalist society. This article thereby contributes a growing literature seeking to clarify how relations of power and accountability operate in cyber- security PPPs, outlining the limits liberalism itself sets on making certain forms of social power accountable. 2. Public-Private Partnerships, Public Goods, and Problem Solving Theories
  • 29. Provision of security, physical or otherwise, is classically the function of the state. Whether applied to national security or domestic policing, in modern liberal capitalist societies it is the state that has been tasked to carry out these duties. So central is the state to the provision of se- curity that the shift away from this liberal norm, evident in the greater use of private military and security con- tractors (PMSCs) globally, has generated substantial an- alytical and political attention (Abrahamsen & Williams, 2010; Avant, 2005). Privatizing the provision of security has generated concern around private firms’ potential conflicts of interests, with PMSCs accountable to both public authorities and their shareholders. Cybersecurity, by contrast, does not centre on the pri- vatization of existing security functions. Concerns about the outsourcing of cybersecurity are largely misplaced; states are not contracting out security functions to the private sector, and thus security is not being privatized in the same manner as it is for other security issues (Eichensehr, 2017, pp. 471–473; cf. Carr, 2016). Cyber- security and critical infrastructure protection policies at- tempt to secure infrastructures owned by both the pub- lic and private sectors. The objects of protection in this space—from critical infrastructures to information and data—are overwhelmingly in private hands, with over 90% of critical infrastructures in the United States owned by the private sector (Singer & Friedman, 2014, p. 19). This includes hardware and software infrastructures as they extend inside the homes of ordinary Americans; cur- rent estimates place internet penetration rates at 88%, an indication of how broadly the problem of cybersecu- rity extends (Pew Research Center, 2017). Cybersecurity requires private citizens, corporations, and the state to contribute to the provision of security for the networks
  • 30. on which they depend. Indeed, successive American ad- ministrations have stressed this point, emphasizing the need for ‘awareness raising’ to promote better ‘cyber hy- giene’, using public health metaphors to emphasize the shared nature of the challenge (Stevens & Betz, 2013; United States Department of Homeland Security, 2017). Cybersecurity, like national security more broadly, thereby appears to have the character of a public good: it is non-rivalrous and non-excludable (Assaf, 2008, p. 13; Shore, Du, & Zeadally, 2011). Rational choice approaches to politics suggest that public goods should be provided by the state, as private actors incentive structure pushes them to free ride, inducing market failure. However, state provision of cybersecurity is not a straightforward option. Dunn Cavelty and Suter (2009, p. 179) high- light the contradictions at the heart of critical infrastruc- ture protection: [Privatization policies] have put a large part of the crit- ical infrastructure in the hands of private enterprise. This creates a situation in which market forces alone are not sufficient to provide security in most of the CI [Critical Infrastructure] ‘sectors’. At the same time, the state is incapable of providing the public good of security on its own, since overly intrusive market in- tervention is not a valid option either; the same in- frastructures that the state aims to protect due to na- tional security considerations are also the foundation of the competitiveness and prosperity of a nation. The problem for governments is how to provide the pub- lic good of cybersecurity in a context in which interven- tion in economic decision-making presents its own dis- tinct risks. Caught between the Scylla of market failure in cybersecurity provision and the Charybdis of state
  • 31. planning, policymakers face a difficult decision: too lit- tle intervention and the required public good will not be provided; but too much and other facets of national security are undermined. Navigating these dilemmas is Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12 6 thereby understood as the central political task faced by policymakers. PPPs present themselves as an effective middle way, allowing the state to engage in ex ante decisions regard- ing cybersecurity outcomes in careful consultation with the private sector. This combination of planning with market-led flexibility is embraced by policymakers as a central rationale for promoting PPPs (United States Na- tional Science and Technology Council, 2011). While co- operation is not straightforward, there are shared inter - ests at work here, even if the precise motivations behind those interests are distinct. As Eichensehr notes, cooper- ation allows government to control public expenditure costs and avoid private sector interference with crucial state functions, while helping the private sector secure its intellectual property and, relatedly, its business repu- tation (Carr, 2016, p. 55; Eichensehr, 2017, pp. 500–504). The devil is, of course, in the details.Working out how to make these partnerships function effectively, both in the United States and elsewhere, has been the focus of sustained analysis (Carr, 2016; Givens & Busch, 2013; Harknett & Stever, 2011). Analysis revolves around de- termining the institutional forms, policy processes, and levels of state intervention through which PPPs canmost effectively provide security. These problems have been
  • 32. largely (but not exclusively) understood as collective ac- tion problems—everyone has an interest in the provi- sion of cybersecurity, but everyone also has an incen- tive to free ride if possible. Solution s to these problems seek ways to alter these incentive structures through, for instance, institutions designed to share information, such as the United States Department of Homeland Security’s Cyber Information Sharing and Collaboration Programme (CISCP), or via the creation of trust build- ing mechanisms between firms and between firms and the state. Practical and normative questions are inevitably raised when considering PPPs in cybersecurity, in keep- ing with the broader literature on PPPs (Brinkerhoff & Brinkerhoff, 2011; Linder, 1999). Defining the scope of private sector authority and responsibility for cybersecu- rity, particularly as it impacts upon other aspects of na- tional security such as intelligence collection, has gener - ated both policy-centred proposals, such as those noted above, and more abstract reflection on the appropri- ate level of political authority assumed by private actors.
  • 33. Practically, it has involved attempts to parse apart the re- sponsibilities of different sets of cybersecurity actors in order to develop clear rules around the scope of respon- sibility for the public and private sector. Understanding who has power to affect change, and how this occurs, is important for this task. Normative discussion has focused upon issues of po- litical authority and accountability. This last aspect be- gins to hint at the larger political issues posed by PPPs as a solution to cybersecurity provision. Carr (2016, p. 60) notes that ‘If responsibility and accountability can be de- volved to private actors, the central principle that polit- ical leaders and governments are held to account is un- dermined’. Aswith the literature on PMSCs, concern over the conflicting interests of private firms has led analysts to caution against any easy recourse to market-led cyber- security frameworks (Assaf, 2008; Carr, 2016, p. 62). Mul- tiple lines of accountability may, it is suggested, under- mine the responsiveness of PPPs to the public. Steps in this direction are important to deepening the study of cybersecurity. Yet, to date, this not resulted in consideration of how cybersecurity policies relate to
  • 34. political order. Questions of where political responsibil - ity can and should lie—with the state, the private sec- tor, or a combination of these—are constituted by the specific institutional order of modern liberal capitalism and its attendant social imaginaries. Accepting a series of divisions between the private and the public, the state and the market, and the political and the economic lim- its our view of how these options are produced and re- produced. Achieving a more holistic view of the relation- ship between cybersecurity practices and political order requires ‘deepening’ our approach to cybersecurity. It is to this task that we now turn. 3. Security for Whom? Deepening Cybersecurity Studies Often confused with a ‘levels-of-analysis’ problem, in which identifying the object of security as either the in- dividual, state, or international system is the central fo- cus, deepening security studies requires embedding the study of securitywithin amore fundamental political the- ory, from which concerns about ‘security’ and its opera- tion are derived (Booth, 2007, p. 157). In Booth’s (2007, p. 155) terms, ‘Deepening, therefore,means understand- ing security as an epiphenomenon, and so accepting the
  • 35. task of drilling down to explore its origins in the most basic question of political theory’. Drilling down in this context requires that we examine the fundamental as- sumptions about politics as they exist in the literature on PPPs in cybersecurity and critical infrastructure pro- tection. Three conceptual divisions structure this litera- ture and its subsequent analysis of cybersecurity: (1) the distinction between the public and private and subse- quently, (2) between states and markets; (3) the division between public political power and private economic power generated by the separation of the political and the economic in liberal capitalist societies. First, and most obviously, the literature on PPPs and critical infrastructure protection and cybersecurity ac- cepts, as its analytical starting point, the division be- tween the public and the private in liberal societies. Viewing PPPs as requisite to grapple with complex gov- ernance challenges has been described as a ‘truism’ (Brinkerhoff & Brinkerhoff, 2011, p. 2). Like most tru- isms, however, it is revealing for the truth-conditions it contains. For the most part the nature of this divide, its historical constitution, and the role that it plays in structuring an historically specific form of political or -
  • 36. Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12 7 der are not considered.1 This is not to suggest that the shifting divides between greater public or greater pri - vate involvement in the management of critical infras- tructure and information technologies is ignored. Privati- zation of telecommunications and critical infrastructure protection often forms the background to analysis of the present (e.g. Carr, 2016; Dunn Cavelty, 2013). This offers an important insight, one ignored in themost straightfor- ward problem solving approaches. Nevertheless, these potted histories trace vacillations in the scope of pub- lic or private governance, not the constitution of these divisions as they are embedded within liberal order as such. Taking the existing division between the public and the private as given, much of the cybersecurity litera- ture treats the public-private divide in the register of problem-solving theory, in Cox’s (1981, p. 129) sense: it takes the world as it is and seeks to make it work as smoothly as possible. This allows for a fine-grained anal- ysis of specific problems, as this literature has demon- strated, but at the cost of a more holistic considera- tion of how cybersecurity policies relate to, and help
  • 37. (re)produce, forms of political order writ large. In conceptualizing cybersecurity and critical infras- tructure protection as a public good the analytical accep- tance of the division between the public and the private is already operative. This becomes apparent when we consider how the state is viewed in these frameworks. Analyses of PPPs, particularly those derived from a ra- tional choice perspective, often treat the state as a uni - tary actor (Christensen & Petersen, 2017; Dunn Cavelty & Suter, 2009, p. 181; cf. Givens & Busch, 2013). Seem- ingly innocuous, conceptualizing the state as a unitary ac- tor carries with it a series of analytical implications. First, the state is distinguished from other actors in, for exam- ple, American society; it is one actor among a field of ac- tors, each with their own aims and purposes.2 The state and other actors in civil society thereby appear to be ex- ternally related to each other; as we shall see, this un- derstanding of the state can only partially grasp the re- lationship between states and markets. Second, suggest- ing that there are clearly defined boundaries between state and society implies that the interests of the state are derived from its position as a state as such, rather than from its embeddedness within a society whose so- cial forces shapes it policies.
  • 38. This view of state and society makes it difficult to understand the purposes of cybersecurity PPPs. Treat- ing the state as distinct from society lends itself to func- tionalist treatments. Functionalism portrays the aims of state policy as pre-given by its social function; the pur- pose of the state is to provide the conditions for the re- production of social order. In the literature on PPPs the state is assumed to play this functional role in social or- ganization in that its purpose is to provide public goods. That is, the role of the state is the generic provision of public goods, to the benefit of society as a whole (Dunn Cavelty, 2014; cf. Carnoy, 1984, pp. 39–40; Olson, 1971, pp. 98–102). Whereas other concepts of the state, such as instrumental or institutional approaches, view state policy as the product of struggles between competing interest groups, in functionalist approaches the security aims of the state are assumed a priori. Christensen and Petersen (2017, p. 1437), argue that ‘Since its forma- tion, the nation-state has been considered responsible for the provision of national security: the protection of national borders and the maintenance of internal order’. Similarly, Carr (2016, p. 62), focuses on the effectiveness and limits of PPPs in providing national security as such.
  • 39. From this starting point, one can outline better or worse ways for the state to achieve its generic aims of cyber - security, but the substantive social content of this end- point is less clear. This is a thin understanding of cybersecurity, in which a generic goal—national security—is emptied of substan- tive content: what kind of internal order is sought? To whose benefit, or cost, within that society? Answering these questions entails a substantive analysis of the form and content of political order that are being secured. As Michael C. Williams notes, the separation of the pub- lic from the private is central to the modernist project of liberal societies (2011). It sets out both the publ icly contestable terrain of politics and the private terrain in which decisions can be taken without the input of the state or the wider community. The institutional division between public and private within liberal order is de- signed to preserve a private sphere of liberty and to pre- vent violence over the most contested political, moral, and religious values by removing them from public con- testation. A functionalist role for the state, inwhich it pro- vides security in as ‘thin’ amanner as possible, its neutral- ity allowing for political pluralism, is part of the conscious project of liberalism. In these terms, state functions can
  • 40. be judged as more or less effective, but only because the purpose of the state has been set. The divide between the public and the private sets out the scope of accountability in liberal societies, deter - mining which issues and actors may be held accountable and to whom. Cybersecurity PPPs, which blur the lines between the public and the private, are problematic pre- cisely because they appear to undermine the neutrality of the state in the provision of security as a public good. PPPs do not, then,merely solve problems of efficient gov- ernance. While the state is nominally considered to be accountable to the public, PPPs represent an encroach- ment of private unaccountability into the public sphere. Understood in these terms, questions around account- ability in PPPs touch upon the heart of liberal political order itself. 1 Forrer, Kee, Newcomer and Boyer (2010, p. 475) suggest that PPPs date back to the Roman Empire. Similarly, Wettenhall (2003, as cited in Carr, 2016, pp. 48–49), has asserted that PPPs date back to biblical times, and, at the very least, to the era of British privateers fighting against the Spanish in the late 16th century. These historical claims are anachronistic, and
  • 41. obscure questions around the role of PPPs in contemporary political ordering. 2 This view is not uniform—Eichensehr (2017) treats state managers as possessing their own set of interests, akin to Weberian state theory. Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12 8 4. Cybersecurity, States and Markets, and Property Rights If the division between the public and the private, and the subsequent appearance of the state as autonomous from civil society and themarket, is an ongoing historical product, it is important to understand how this division is produced and maintained. Maintaining that the state itself, as an actor, reproduces this separation assumes what needs to be explained. To avoid hypostatizing the state, and the public-private divide that liberal states ac- tively constitute, requires engaging concepts of the state that can grasp the historically concrete process whereby state policy is shaped by domestic interest groups. This
  • 42. allows us to study the particularity of different states and how they are formed, rather than treating the state as an entity with naturally given functions. States are not naturally liberal, of course, but re- quire that the social forces that dominate the state are themselves liberal and shape the state to perform this role, as opposed to potential alternative roles. A range of work in security studies and International Relations, from a variety of perspectives, has stressed the cen- tral importance of domestic social forces in constituting the national security interests of states (Homolar, 2010; Moravcsik, 1997, p. 518, passim; Teschke, 2003). In con- trast to the public goods approach, the state in this work is viewed as an institution that mediates between differ- ent social forces within society (Jessop, 2008). State form is not neutral; instead, the form of the state shapes po- litical outcomes, favouring the interests of some actors over others. Rather than merely occupying a sphere de- noted as ‘public’, state power, operationalized by differ - ent groups in civil society, constitutes this division in the first place. Liberal states are liberal because liberalsmake them this way. Understood in these terms, the idea that the state
  • 43. provides neutral public goods, or that states and firms or markets can be considered as separate without difficulty, becomes tricky. Viewing the state as an institution draws attention to the various interest groups that occupy the state apparatuses. Analyticall y, political struggles that fo- cus on controlling the apparatus of the state to realize the distinct aims of different interest groups are brought into relief, with the distinct political strategies the form of the state enables clarified. Furthermore, viewing the state as an institution highlights how the state and mar- ket are not opposed to each other. Instead, liberal state institutions are used to create the conditions for themar - ket to operate. A range of tasks, such as protecting and enforcing property rights, providing basic research and development for technological innovation, and correct- ing market-failures when they arise, as in the provision of cybersecurity, are undertaken because specific inter - est groups that control the state apparatus view these policies as valuable, necessary or desirable. To give one example, there was a clear distinction between the view of state intervention into the field of cybersecurity pro- vision between the Bush and Obama administrations. The Bush administration viewed public intervention into private markets as inevitably disruptive and inefficient;
  • 44. by contrast, the Obama administration, with its differ- ent political constituency and worldview, supported a strong role for the state in organizing critical infrastruc- ture protection and cybersecurity. Similarly, while the private sector is often treated in uniform terms in the literature, there are divisions and distinctions between them, as illustrated in the Net Neutrality debates that of- ten pitted telecommunications companies against soft- ware providers. Which set of policies the state pursues is shaped by which of these interest groups can use state power to enact its political strategies. How cybersecurity PPPs seek to maintain liberal po- litical order, and where along the spectrum of possible divisions of responsibility between public and private cy- bersecurity policy ultimately lies, is determined by the shifting control of the state by domestic interests. Liber- als fearful of the growth of unaccountable power may draw this line differently than those focused on economic growth powered by unfettered markets. For our pur- poses, the central point is that, while cybersecurity PPPs blur the public-private distinction at the level of security provision, they seek to maintain this in the wider politi- cal order. They represent one political strategy to solve the problem of cybersecurity, shaped by the liberal form
  • 45. of the state and liberal social forces.3 In concrete terms, PPPs aim to reproduce existing liberal political order by se- curing central institutional features of liberal capitalist so- cieties, such as the protection intellectual property rights (IPRs). William Lynn III (2010), echoing United States gov- ernment policy, highlights intellectual property theft as the most significant cybersecurity threat Although the threat to intellectual property is less dra- matic than the threat to critical national infrastruc- ture, it may be the most significant cyberthreat that the United States will face over the long term….Asmil- itary strength ultimately depends on economic vital- ity, sustained intellectual property losses could erode both the United States’ military effectiveness and its competitiveness in the global economy. The protection of IPRs is linked here to the provision of national security, but of a specific kind, in which the pub- lic sphere of the state is differentiated from the private sphere of the market via the political institution of prop- erty. State-coordinated programs of information sharing about threats and intrusions aim to combat threats to the integrity of property rights. PPPs involve the coop- eration of the public and private sectors, or the state
  • 46. and the market, but this blurs the separation of these spheres only at the issue specific level of security provi- 3 Comparison to non-liberal states makes this clear—non-liberal states do not face the same set of contradictions generated by PPPs in the United States or the United Kingdom (Carr, 2016, p. 62). Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12 9 sion. Viewed holistically, the protection of IPRs through PPPs operates to secure these divides in the wider so- cial formation. Thus, while critical infrastructure protection once re- ferred to publicly-owned and operated infrastructures, such as power plants orwaterworks, it increasingly refers to private infrastructures (Aradau, 2010, p. 507). Dunn Cavelty has noted that (2014, p. 707) cybersecurity and critical infrastructure protection secures a wider political economy that distributes economic benefits unequally: ‘It is not a given, then, that cyber-security is truly a pub- lic good. Quite the opposite: the type of security that
  • 47. emerges mainly benefits a few and already powerful en- tities and has no, or even negative effects for the rest’. The content of security—what cybersecurity and critical infrastructure protection is for—is the reproduction of a specific liberal political economy. In the United States, for example, cybersecurity and critical infrastructure protection directly benefits the ma- terial interests of the large firms that participate in, for ex- ample, the Department of Homeland Security’s Critical In- frastructure Partnership Advisory Council (CIPAC) (United States Department of Homeland Security, 2017). The lev- els of wealth found among the private sector partners of cybersecurity are substantial: Google’s Sergy Brin and Larry Page areworth approximately $23billion each (Dyer- Witherford, 2015), while Bill Gates net-worth is some $90 billion dollars (Kroll & Dolan, 2017). Dyer-Witherford (2015, pp. 141–142) draws attention to the larger struc- tural impact of cybersecurity policy when he highlights the place of ICTs in contemporary capitalist order, arguing that ‘this is not the most important measure of the im- portance of cybernetics to capital…The real significance of ICT capital is what it has done for capital in general’. The share of national income going to labour has declined in tandem with the diffusion of information technologies
  • 48. throughout the American economy. ICTs have enabled increased levels of automation, the downsizing and out- sourcing of manufacturing industry, and the creation of a vast surplus of unemployed and underemployed work- ers in the United States economy, all undermining the bar- gaining power of unions (Kristal, 2013; Rotman, 2014). Job market insecurity and precarity characterize this techno- logically underpinned settlement. Cybersecurity and crit- ical infrastructure protection policies aim to reproduce the process of ‘class-biased technological change’ (Kristal, 2013), designed to protect intellectual property and to en- able market-led technological innovation. The provision of this public good secures and reproduces the unequal distribution of income in American society based upon property ownership. That cybersecurity is a public good does not mean its benefits are equally distributed; this is not what liberal cybersecurity is for. 5. Cybersecurity and the Privatization of Political Power Securing IPRs facilitates the reproduction of contempo- rary high technology capitalism, with its attendant con- sequences for the unequal distribution of wealth. The re- production of the division between the public and the
  • 49. private is equally important for determining how differ- ent forms of social power are, or are not, made account- able to the public. Public and private power within lib- eral societies substantively maps onto the institutional separation between the political and the economic that characterizes capitalism. As Wood (1981) notes, the in- terlinked division between the public, private, political, and economic, effectively privatized what had previously been constituted as public political power. Pre-capitalist social formations united political power and economic appropriation—the right to appropriate the output of others depended on one’s political position in society. Under capitalism, by contrast, the right to appropriate the wealth of others is divorced from political roles; when politicians use their office for private economic gain this is identified as corruption and punished. Eco- nomic actors have the right to goods produced by virtue of private property ownership. Capitalism privatizes a form of social power previously considered ‘political’, and thereby subject to norms of accountability. This takes two forms. First, it confers onto capital- ists the right to direct and organize the labour process. Private property rights, underwritten by the judicial and coercive apparatus of the state and reproduced, in the
  • 50. context of cybersecurity and critical infrastructure pro- tection, through the cooperation of PPPs, give firms the right, and ability, to direct the activity of others. Cap- italists exercise significant power in shaping the every- day lives of their employees—they decide how prod- ucts (including software) will be produced, allocate re- sources including labour, set work targets, organize the process of production, and oversee the production pro- cess in general. Second, and most significantly for our purposes, se- curing private property rights via cybersecurity PPPs se- cures the right of private actors to direct the design and development of new hardware and software infrastruc- tures as they see fit. This enables the continuation of market-led technological innovation, a significant source of social power. Technological infrastructures are thema- terialization of the norms and values of their designers. In Andrew Feenberg’s (1991, p. 14) terms, ‘it stands at the intersection between ideology and technique where the two come together to control human beings and re- sources’. Conferring this right on private actors allows them to shape political orders in the long-term, as the path dependency of technology structures social life. For, in this infrastructure, the United States government is
  • 51. not merely talking about the security of its economy, its military and defence, or its critical public infrastructure. Increasingly, what is being secured is the way of life of Americans themselves in their full digital articulation. When the privatization of political power is consid- ered in these terms, the concerns over the role of the private sector in cybersecurity and critical infrastructure protection via PPPs is complicated. As clear lines of ac- Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12 10 countability are demanded of the private sector partici - pation in public sector functions, it is possible to press this further to ask how and why boundaries around pri- vate sector accountability for the development of infras- tructures, within the scope of their authority in the mar- ket, are set and maintained. 6. Conclusion Taking the full measure of cybersecurity and critical in-
  • 52. frastructure protection policies requires analysis of their place in reproducing specific forms of political order. Re- orienting our conceptual lenses to consider the deeper political theory within which security thinking is rooted is one small step in this direction. A range of theoreti - cal positions are compatible with this aim. While the ap- proach favoured here is rooted in Critical Theory and his- torical materialism, this does not exhaust a programme of ‘deepening’ cybersecurity studies. Asking for a deeper analysis is merely a request to clarify the foundational as- sumptions that shape our inquiries. Cybersecurity stud- ies informed by a plurality of theoretical frameworks can only be a positive development. Nevertheless, the analysis presented above favours Critical Theory as the most fruitful way to pursue this project. Space prevents a full discussion its epistemolog- ical, ontological, and methodological dimensions; three central claims will suffice. First, Critical Theory is interdis - ciplinary in nature. As we know, cybersecurity is a com- plex and multifaceted issue. While no single study could possibly capture this complexity, a research programme attending to the breadth of its varied aspects—the politi- cal economy of cybersecurity, its normative suppositions and impact, the discursive representations that inform
  • 53. and support these—can provide a more comprehensive reconstruction of the challenge of cybersecurity. Second, Critical Theory (tempered by historical ma- terialism) is historically sensitive. Recognizing the public- private divide as an historically produced outcome of liberal orders opens our conceptual and political hori - zons. In turn, it emphasizes how structural pressures, such as those imposed by markets, condition forms of power available to various social forces in specific con- texts. To this extent, the analysis above cannot be easily generalized to non-liberal societies. Indeed, the use of cy- bersecurity PPPs to meet broader political aims may be pursued quite differently in different contexts. The nor- mative commitment to PPPs in the United States, with the ideological weight around property and liberty that underpins them, may differ substantially from a merely instrumental use in non-liberal states. Stressing an his- torical understanding allows for nuanced treatment of how various social forces—in liberal and illiberal states— shape the plurality of approaches to cybersecurity we witness in world politics. Finally, Critical Theory draws attention to the ques- tion that implicitly structures the concerns over private
  • 54. sector accountability in the literature: democracy. Fear of unaccountable power is central to existing criticism of cybersecurity PPPs. As a normative aim, a Critical Theory approach to cybersecurity is committed to the democra- tization science and technology as a vehicle for greater social and political equality. To give just one example, greater democratic participation in defining how cyber- security risks are determined, proceeding along the lines of similar consultative exercises around food standards in the United Kingdom (Jasanoff, 2003, pp. 237–238), could provide a different account of how cybersecurity risks are defined and to whose benefit. Answering the question of what cybersecurity is both an analytical task and a practical question in need of democratically de- rived answers. Acknowledgments I would like to thank the anonymous reviewers for their helpful comments on themanuscript and Tim Stevens for his editorial guidance, particularly during the initial for- mulation of this article. Conflict of Interests
  • 55. The author declares no conflict of interests. References Abrahamsen, R., & Williams, M. C. (2010). Security be- yond the state: Private security in international pol- itics. Cambridge: Cambridge University Press. Aradau, C. (2010). Security that matters: Critical infras- tructure and objects of protection. Security Dialogue, 41(5), 491–515. Assaf, D. (2008). Models of critical infrastructure protec- tion. International Journal of Critical Infrastructure Protection, 1, 6–14. Avant, D. (2005). Themarket for force: The consequences of privatizing security. Cambridge: CambridgeUniver- sity Press. Booth, K. (2007). Theory of world security. Cambridge: Cambridge University Press. Brinkerhoff, D. W., & Brinkerhoff, J. M. (2011). Public-
  • 56. private partnerships: Perspectives on purposes, pub- licness, and good governance. Public Administration and Development, 32, 2–14. Carnoy, M. (1984). The state and political theory. Prince- ton, NJ: Princeton University Press. Carr, M. (2016). Public-private partnerships in national cyber-security strategies. International Affairs, 92(1), 43–62. Christensen, K. K., & Petersen, K. L. (2017). Public-private partnerships on cybersecurity: A practice of loyalty. International Affairs, 93(6), 1435–1452. Cox, R. W. (1981). Social forces, states and world orders: Beyond international relations theory. Millennium: Journal of International Studies, 10(2), 126–155. Dunn Cavelty, M. (2013). From cyber-bombs to politi- Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12 11
  • 57. cal fallout: Threat representations with an impact in the cyber-security discourse. International Studies Review, 15(1), 105–122. Dunn Cavelty, M. (2014). Breaking the cyber-security dilemma: Aligning security needs and removing vul- nerabilities. Science and Engineering Ethics, 20(3), 701–715. Dunn Cavelty, M., & Suter, M. (2009). Public-private part- nerships are no silver bullet: An expanded gover- nance model for critical infrastructure protection. In- ternational Journal of Critical Infrastructure Protec- tion, 2(4), 179–187. Dyer-Witherford, N. (2015). Cyber-proletariat: Global labour in the digital vortex. London: Pluto Press. Eichensehr, K. E. (2017). Public-private cybersecurity. Texas Law Review, 95, 467–538. Feenberg, A. (1991). Critical theory of technology. Ox- ford: Oxford University Press.
  • 58. Forrer, J., Kee, J. E., Newcomer, K. E., & Boyer, E. (2010). Public-private partnerships and the public account- ability question. Public Administration Review, 70(3), 475–484. Givens, A. D., & Busch, N. E. (2013). Realizing the promise of public-private partnerships in U.S. critical infras- tructure protection. International Journal of Critical Infrastructure Protection, 6(1), 39–50. Harknett, R. J., & Stever, J. A. (2011). The new policy world of cybersecurity. Public Administration Review, 71(3), 455–460. Homolar, A. (2010). The political economy of national security. Review of International Political Economy, 17(2), 410–423. Jasanoff, S. (2003). Technologies of humility: Citizen participation in governing science. Minerva, 41(3), 223–244. Jessop, B. (2008). State power. Cambridge: Polity. Kristal, T. (2013). The capitalist machine: Computeriza-
  • 59. tion, workers’ power, and the decline of labor’s share within U.S. industries. American Sociological Review, 78(3), 361–389. Kroll, L., & Dolan, K. A. (2017). Forbes 2017 billionaires list: Meet the richest people on the planet. Forbes. Retrieved from https://www.forbes.com/sites/sites/ sites/kerryadolan/2017/03/20/forbes-2017-billion aires-list-meet-the-richest-people-on-the-planet/#6b ee40c862ff Linder, S. H. (1999). Coming to terms with the public- private partnership. American Behavioral Scientist, 43(1), 35–51. Lynn III, W. J. (2010). Defending a new domain: The Pentagon’s cyberstrategy. Foreign Affairs. Retrieved from https://www.foreignaffairs.com/articles/united -states/2010-09-01/defending-new-domain Moravcsik, A. (1997). Taking preferences seriously: A lib- eral theory of international politics. International Or- ganization, 51(4), 513–553.
  • 60. Olson, M. (1971). The logic of collective action. Cam- bridge, MA: Harvard University Press. Pew Research Center. (2017). Internet use over time. Retrieved from http://www.pewinternet.org/fact- sheet/internet-broadband Rotman, D. (2014). Technology and inequality: The dis- parity between the rich and everyone else is larger than ever in the United States and increasing inmuch of Europe. Why? MIT Technology Review. Retrieved from https://www.technologyreview.com/s/531726 /technology-and-inequality Shore, M., Du, Y., & Zeadally, S. (2011). A public-private partnership model for national cybersecurity. Policy & Internet, 3(2), 1–23. Singer, P., & Friedman, A. (2014). Cybersecurity and cy- berwar: What everyone needs to know. Oxford: Ox- ford University Press. Stevens, T., & Betz, D. (2013). Analogical reasoning and cybersecurity. Security Dialogue, 44(2), 147–164.
  • 61. Teschke, B. (2003). The myth of 1648. London: Verso. United States Department of Homeland Security. (2017). Information technology sector: Council charters and members. Retrieved from https://www.dhs.gov/ information-technology-sector-council-charters-and- membership United States National Science and Technology Council. (2011). Trustworthy cyberspace: Strategic plan for the federal cybersecurity research and development program. Retrieved from https://obamawhitehouse. archives.gov/sites/default/files/microsites/ostp/fed_ cybersecurity_rd_strategic_plan_2011.pdf Williams, M. C. (2011). The public, the private, and the evolution of security studies. Security Dialogue, 41(6), 623–630. Wood, E. M. (1981). The separation of the political and the economic in capitalism. New Left Review, I/127, 66–95. About the Author
  • 62. Daniel R. McCarthy is Lecturer in International Relations at the University of Melbourne. He is author of Power, Information Technology and International Relations Theory (Palgrave 2015) and editor of Technology and World Politics: An Introduction (Routledge 2017). His work has appeared in Review of International Studies,Millennium, and the European Journal of International Relations. Politics and Governance, 2018, Volume 6, Issue 2, Pages 5–12 12 The Tyranny of Data? The Bright and Dark Sides of Data- Driven Decision-Making for Social Good · May 2017 DOI: 10.1007/978-3-319-54024-5_1 · In book: Transparent Data Mining for Big and Small Data (pp.3- 24) Authors: Bruno Lepri ·
  • 63. Fondazione Bruno Kessler Jacopo Staiano · Università degli Studi di Trento David Sangokoya Emmanuel Francis Letouzé · Massachusetts Institute of Technology Show all 5 authors Download full-text PDFRead full-text Download full-text PDF Read full-text Download citation Citations (64) References (116) Figures (2) Abstract and Figures The unprecedented availability of large-scale human behavioral data is profoundly changing the world we live in. Researchers, companies, governments, financial institutions, non-
  • 64. governmental organizations and also citizen groups are actively experimenting, innovating and adapting algorithmic decision- making tools to understand global patterns of human behavior and provide decision support to tackle problems of societal importance. In this chapter, we focus our attention on social good decision-making algorithms, that is algorithms strongly influencing decision-making and resource optimization of public goods, such as public health, safety, access to finance and fair employment. Through an analysis of specific use cases and approaches, we highlight both the positive opportunities that are created through data-driven algorithmic decision- making, and the potential negative consequences that practitioners should be aware of and address in order to truly realize the potential of this emergent field. We elaborate on the need for these algorithms to provide transparency and accountability, preserve privacy and be tested and evaluated in context, by means of living lab approaches involving citizens. Finally, we turn to the requirements which would make it possible to leverage the predictive power of data-driven human behavior analysis while ensuring transparency, accountability, and civic participation.
  • 65. Requirements summary for positive data-driven disruption. … Summary table for the literature discussed in Section 2. … Figures - uploaded by Nuria Oliver Author content Content may be subject to copyright. Discover the world's research · 20+ million members · 135+ million publications · 700k+ research projects Join for free Content uploaded by Nuria Oliver Author content Content may be subject to copyright. The Tyranny of Data?
  • 66. The Bright and Dark Sides of Data-Driven Decision-Making for Social Good Bruno Lepri, Jacopo Staiano, David Sangokoya, Emmanuel Letouz´e and Nuria Oliver Abstract The unprecedented availability of large-scale human behavioral data is profoundly changing the world we live in. Researchers, companies, governments, financial institutions, non-governmental organizations and also citizen groups are actively experimenting, innovating and adapting algorith- mic decision-making tools to understand global patterns of human behavior and provide decision support to tackle problems of societal importance. In this chapter, we focus our attention on social good decision-making algorithms, that is algorithms strongly influencing decision-making and resource opti- mization of public goods, such as public health, safety, access to finance and fair employment. Through an analysis of specific use cases and
  • 67. approaches, we highlight both the positive opportunities that are created through data- driven algorithmic decision-making, and the potential negative consequences that practitioners should be aware of and address in order to truly realize the potential of this emergent field. We elaborate on the need for these algo- rithms to provide transparency and accountability, preserve privacy and be tested and evaluated in context, by means of living lab approaches involving citizens. Finally, we turn to the requirements which would make it possible to leverage the predictive power of data-driven human behavior analysis while ensuring transparency, accountability, and civic participation. Bruno Lepri Fondazione Bruno Kessler e-mail: [email protected] Jacopo Staiano Fortia Financial