This document discusses how web 2.0 technologies are beginning to be adopted in government and public services in ways that could fundamentally change how they operate. It provides examples of peer-to-patent, a wiki for cross-agency collaboration, and a law firm's use of enterprise 2.0 tools. Web 2.0 allows for more open, collaborative approaches that leverage collective intelligence and user participation. While the impacts are still incremental, the scale of adoption online could lead to disruptive changes in how public services are delivered and how citizens engage.
Overview of why and how web2.0 matters for eGovernment. Presented at EU ministerial conference on eGovernment (download it at www.egov2007.gov.pt).
NEW REPORT on this available at www.jrc.es
Collective Intelligence
- Introduction
- Collective Intelligence
- Creative Research Practices
- Why you should take the course
- Assignment 1
- Feedback
Copy of presentation made at Comcast on social media that looks at trends in SBI and how social media listening & engagement can be used to solve simple and complex problems.
Overview of why and how web2.0 matters for eGovernment. Presented at EU ministerial conference on eGovernment (download it at www.egov2007.gov.pt).
NEW REPORT on this available at www.jrc.es
Collective Intelligence
- Introduction
- Collective Intelligence
- Creative Research Practices
- Why you should take the course
- Assignment 1
- Feedback
Copy of presentation made at Comcast on social media that looks at trends in SBI and how social media listening & engagement can be used to solve simple and complex problems.
Social Change: Social Media's role in BusinessMichael Murray
This is a presentation on using change management best practices to encourage social media adoption within organizations. It begins with a "Social Media 101" section, then explains Enterprise 2.0 as the 'other' social media. The presentation then presents change management as a vehicle for encouraging social media adoption. Finally a case study and basic social media strategies provide readers with some tangible suggestions for how to get started.
This is a presentation developed by Julia Loughran, ThoughtLink, Inc. for the Washington DC Chapter of the Society for Technical Communication (STC). It was presented on Thursday, March 26, 2009 in Silver Spring, MD.
BLOOM Social Media: Navigating the Social Technology LandscapeDifferent Spin
Report author: Miranda Man, Social Business Strategist at BLOOM. Are you confused by social technology? Do you know your social media listening tools from your engagement tools? What is the difference between Yammer and Jive? How can I use these tools in my business?
To help, we are pleased to announce that we have written a report that provides an overview of a number of social tools. In this report, we have outlined use cases, case studies and key functionality. We will be looking at technology in the context of Social Business Intelligence (the progression from Social Media Marketing) and Enterprise 2.0.
The presentation touches on what social media is and its potential uses in increasing communication, collaboration and public participation in local government agencies.
Mobile Age: Open Data Mobile Apps to Support Independent LivingMobile Age Project
We present design insights for developing mobile services for senior citizens which have emerged through substantive engagement with end users and other stakeholders. We describe the aims of the Mobile Age project, and the ideas and rationale for applications that have emerged through a co-creation process. A trusted data platform is proposed along with apps that bring open data and mobile technology to work for an underserved population.
Christopher N. Bull
Will Simm
Bran Knowles
Oliver Bates
Nigel Davies
School of Computing and
Communications,
Lancaster University,
Lancaster, UK
c.bull@lancaster.ac.uk
branknowles9@gmail.com
w.simm@lancaster.ac.uk
o.bates@lancaster.ac.uk
n.a.davies@lancaster.ac.uk
Anindita Banerjee
Lucas Introna
Niall Hayes
Centre for the Study of Technology
and Organisation,
Lancaster University,
Lancaster, UK
a.banerjee2@lancaster.ac.uk
n.hayes@lancaster.ac.uk
l.introna@lancaster.ac.uk
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other
uses, contact the Owner/Author.
Copyright is held by the owner/author(s).
CHI'17 Extended Abstracts, May 06-11, 2017, Denver, CO, USA
ACM 978-1-4503-4656-6/17/05.
http://dx.doi.org/10.1145/3027063.3053244
Social Media: an Obligation, an Opportunity, or a ThreatNinetyTen
Is online social media really a threat, or a great opportunity.
This presentation aims to:
1) Discuss the social media landscape as it stands with reference to public networks and common conceptions
2) Show how a social network resonates as a model for associations and their goals
3) Look at how private and public social networks can become a threat to an association, with examples
4) Cover using a private social network for an association and how to get the best from it
5) Show how to use the best of both (private & public social networks)
Case studies from outside of the membership sector will include:
- Channel 4
- Nokia
Social Change: Social Media's role in BusinessMichael Murray
This is a presentation on using change management best practices to encourage social media adoption within organizations. It begins with a "Social Media 101" section, then explains Enterprise 2.0 as the 'other' social media. The presentation then presents change management as a vehicle for encouraging social media adoption. Finally a case study and basic social media strategies provide readers with some tangible suggestions for how to get started.
This is a presentation developed by Julia Loughran, ThoughtLink, Inc. for the Washington DC Chapter of the Society for Technical Communication (STC). It was presented on Thursday, March 26, 2009 in Silver Spring, MD.
BLOOM Social Media: Navigating the Social Technology LandscapeDifferent Spin
Report author: Miranda Man, Social Business Strategist at BLOOM. Are you confused by social technology? Do you know your social media listening tools from your engagement tools? What is the difference between Yammer and Jive? How can I use these tools in my business?
To help, we are pleased to announce that we have written a report that provides an overview of a number of social tools. In this report, we have outlined use cases, case studies and key functionality. We will be looking at technology in the context of Social Business Intelligence (the progression from Social Media Marketing) and Enterprise 2.0.
The presentation touches on what social media is and its potential uses in increasing communication, collaboration and public participation in local government agencies.
Mobile Age: Open Data Mobile Apps to Support Independent LivingMobile Age Project
We present design insights for developing mobile services for senior citizens which have emerged through substantive engagement with end users and other stakeholders. We describe the aims of the Mobile Age project, and the ideas and rationale for applications that have emerged through a co-creation process. A trusted data platform is proposed along with apps that bring open data and mobile technology to work for an underserved population.
Christopher N. Bull
Will Simm
Bran Knowles
Oliver Bates
Nigel Davies
School of Computing and
Communications,
Lancaster University,
Lancaster, UK
c.bull@lancaster.ac.uk
branknowles9@gmail.com
w.simm@lancaster.ac.uk
o.bates@lancaster.ac.uk
n.a.davies@lancaster.ac.uk
Anindita Banerjee
Lucas Introna
Niall Hayes
Centre for the Study of Technology
and Organisation,
Lancaster University,
Lancaster, UK
a.banerjee2@lancaster.ac.uk
n.hayes@lancaster.ac.uk
l.introna@lancaster.ac.uk
Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other
uses, contact the Owner/Author.
Copyright is held by the owner/author(s).
CHI'17 Extended Abstracts, May 06-11, 2017, Denver, CO, USA
ACM 978-1-4503-4656-6/17/05.
http://dx.doi.org/10.1145/3027063.3053244
Social Media: an Obligation, an Opportunity, or a ThreatNinetyTen
Is online social media really a threat, or a great opportunity.
This presentation aims to:
1) Discuss the social media landscape as it stands with reference to public networks and common conceptions
2) Show how a social network resonates as a model for associations and their goals
3) Look at how private and public social networks can become a threat to an association, with examples
4) Cover using a private social network for an association and how to get the best from it
5) Show how to use the best of both (private & public social networks)
Case studies from outside of the membership sector will include:
- Channel 4
- Nokia
Presentation 1: Web 2.0 - Leading Applications in Government
Presenters:
Eric Bristow - Senior Manager, Deloitte Consulting
Doug Shoupp – Principal, Deloitte Consulting
Energy and Climate – Dynamic Decision Tool Catalog and Community of Practice: Current implementations, Gap AnalysisOpen EI and energy.data.gov, Robert Bectel, DOE
A panoply of data, models, visualizations, analyses, software and decision tools of all sort exist across the –Verse. The problem is that many of these are not accessible, transparent, “open”, distributable, mobile, location aware, up-to-date, or even licensed for use outside of their single use development environment. Developers of these solutions, whether they are a Government Agency, NGO, or other interested group insist on building their solution within their zone of control with visibility and access available only through their single destination site.
OpenEI.org is an open source wiki media platform that leverages crowd sourcing to build an ecosystem for the transmission, storage, analysis and distribution of energy data and information. The system provides mapping and other visualization tools to transform that raw data into understanding.
By building an open, crowd sourced catalog of highly interactive resources and an engaged community of solution providers, OpenEI and Data.gov bring powerful distribution engines for use by anyone. Capable of connecting to virtually any data or Content source and conveying that access to other destinations, they transform understanding and access to knowledge and resources which otherwise would be inaccessible or at best diffused across the –Verse in such a way as to be nearly impossible to find.
This interactive conversation will focus on why we need to build open source, transparent and highly distributable solution sets; What value we can derive from the use of distribution accelerators like OpenEI and Data.Gov and; What the continued development of single destination sites based on the outdated theory of “If I build it they will come” means for those individuals, groups or Agencies attempting to assess the risks associated with energy related projects.
Reply and Hinchcliffe & Company signed an agreement for the exclusive delivery of Web 2.0 University™, the education solution developed by Hinchcliffe & Company, in strategic partnership with O’Reilly Media
Maruthi Prithivirajan, Head of ASEAN & IN Solution Architecture, Neo4j
Get an inside look at the latest Neo4j innovations that enable relationship-driven intelligence at scale. Learn more about the newest cloud integrations and product enhancements that make Neo4j an essential choice for developers building apps with interconnected data and generative AI.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Albert Hoitingh
In this session I delve into the encryption technology used in Microsoft 365 and Microsoft Purview. Including the concepts of Customer Key and Double Key Encryption.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Climate Impact of Software Testing at Nordic Testing DaysKari Kakkonen
My slides at Nordic Testing Days 6.6.2024
Climate impact / sustainability of software testing discussed on the talk. ICT and testing must carry their part of global responsibility to help with the climat warming. We can minimize the carbon footprint but we can also have a carbon handprint, a positive impact on the climate. Quality characteristics can be added with sustainability, and then measured continuously. Test environments can be used less, and in smaller scale and on demand. Test techniques can be used in optimizing or minimizing number of tests. Test automation can be used to speed up testing.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
4. So far ICT has not fundamentally
changed government
• 1990s: ICT expected
to make government
more transparent,
efficient and user
oriented
• 2005+: disillusion as
ICT failed to drive real
change in government
4
5. The e-ruptive growth of web2.0
70 M blogs, YouTube traffic: 100M views/day
doubling every 6 months
Peer-to-peer largest
Wikipedia: 2M articles
source of IP traffic
Source: Technorati, Alexa, Wikipedia, Cachelogic 5
6. Viral adoption also in public services,
and not only by government
Source: own elaboration of IPTS PS20 project: see www.epractice.eu/communities/ps20
7. Relevant for key government
activities
Back office Front office
Regulation Service delivery
Cross-agency collaboration eParticipation
Knowledge management Law enforcement
Interoperability Public sector information
Human resources mgmt Public communication
Public procurement Transparency and accountability
source: “Web 2.0 in Government: Why and How? www.jrc.es 7
9. Peer-to-patent: an inside look
Governance
• Partnership of US Patent Office with business and academia (NY
Law school)
• Self-appointed experts, but participants ensure relevance and quality
by tagging, ranking prior art, ranking other reviewers
• Desire of recognition as participation driver
• Weak authentication: blog style
Usage: Started June 07. 2000 users, 32 submission in first month.
Benefits
• Faster processes, backlog reduction
• Better informed decisions
Other applications:
• Functions where governments have “to make complex decisions 9
10. Cross agency collaboration case:
• Based on Wikipedia software: collaborative drafting of joint reports
Governance
• Used by 16 US security agencies – on a super-secure intranet (not public)
• Flat, informal cooperation.
• Risks: too much information sharing. BUT it’s “worth it”: quot;the key is risk
management, not risk avoidance.“
Usage: fast take-up, two thirds of analysts use it to co-produce reports
Benefits
• Avoiding silos effects (post 9-11)
• Better decisions by reducing information bottlenecks
Other applications:
• Social services for homeless (Canada, Alaska)
• Inter-agency consultation
• Environmental protection and disaster management (US-EPA, earthquake in
Japan)
10
11. Knowledge management case:
Allen and Overy
Answering key questions…
…by using “Enterprise 2.0” tools:
• Which articles do managers think are • Blogs and wikis for discussion and
important this morning? collaboration
• Which newsfeeds do my favorite • Collaborative filtering of information,
colleagues use? recommendation systems, bookmarks
sharing (tags, RSS feeds)
• What discussion topics are hot in a
project team (things you can’t
• On top of this: algorithms applied to
users’ attention data and behaviour
anticipate)?
• Who is expert/working on this
specific topic/tag?
Not yet spread in companies – but used by individual workers
11
12. Allen and Overy: an inside look
Governance
• Pilot launched on small collaborative groups – then upscaled
• Fast, iterative delivery (not big IT project approach)
• Strong authentication (integrated with company SSO)
• Kept the wiki spirit, low control (non sensitive content)
Usage: became internal standard for collaboration and sharing
Benefits
• Increased awareness of what others are doing – less duplication of effort
• Reduction in internal e-mail sent
• Better learning and knowledge creation
Other applications
• All knowledge-intensive areas of government
12
16. Web 2.0 is about values,
not technology
User as producer, Collective intelligence,
Values
Long tail, Perpetual beta, Extreme ease of use
Blog, Wiki, Podcast, RSS, Tagging, Social
Applications
networks, Search engine, MPOGames
Ajax, XML, Open API, Microformats, Flash/
Technologies
Flex, Peer-to-Peer
Source: Author’s elaboration based on Forrester
16
17. It’s an incremental, yet
disruptive innovation
• Technologic: minor improvements, especially in user-
friendliness
• Social: diffusion of set of values which were already
there (hacker’s culture)
• Economic: new business models based on advertising
and open source -> lower cost barriers!
• Web 1.0: 200.000 personal webpages (Geocities),
web 2.0: 70 million blogs
• It’s a difference of SCALE
17
18. quot;the brilliance of social-software applications
like Flickr, Delicious, and Technorati is that
they recognize that computers are really good
at doing certain things, like working with
gigantic quantities of data, and really bad at,
for example, understanding the different
meanings of certain words, like 'depression.'
They devote computing resources in ways
that basically enhance communication,
collaboration, and thinking rather than trying
to substitute for them”.
19. It’s not about “total citizens”
1.Producing content
peer-to-patent
2.Providing ratings, reviews
patientopinion.org
3.Using user-generated content
4.Providing attention, taste data
delaware.gov
3% 10% 40% 100% of Internet users (50% of EU population)
Source: IPTS estimation based on Eurostat, IPSOS-MORI, Forrester
19
21. Implications for public services
• A new WAY to innovate public services
– Exploiting the unique knowledge and skills of
networked individual users:learners, teachers,
parents, employees…
– Continuous and incremental,
– Open and non hierarchical, difficult to control
– Lowering costs of failure and of trial and error
– Building on voluntary engagement and free tools
Not only by government: civil society, citizens, civil
servants
21
22. Implications for public services /2
• A new effective DRIVER to address the challenges of
innovating public services
– citizens’ ratings and reviews: reducing information asymmetries,
exposing inefficiencies through citizen-to-citizen exchanges of
information
– easier creation of pressure groups to make new needs emerge
Based on:
– a wider availability of free IT tools for citizens, civil servants, civil
society (blogs, collaboration tools, geographical applications…)
– a culture of public speaking, and increased expectations of openness
and transparency
22
24. • Peer-to-patent: an inside look
Eighty-nine (89) percent of participating patent examiners thought the presentation of prior art that the
received from the Peer-to-Patent community was clear and well formatted. Ninety-two (92) percent re
Usage and impact
ported that they would welcome examining another application with public participation.
•
• Self-regulated: need examiners want to see Peer-to-Patent implemented as reg
Seventy-three (73) percent ofcontrol
critical mass to participating
office “bad apples”
practice.
• 2000(21) percent of participating examiners stated that prior art submitted by the Peer-to-Pate
users
•
• 9/23 applications used
Twenty-one
community was “inaccessible” by the USPTO.
by USPTO
• • 73% of USPTO the
The USPTO received one third-party prior art submission for every 500 applications published in 2007. Pe
examiners endorse
Patent reviewers have provided an average of almost 5 prior art references for each application in the p
project
• pilot being extended
and adopted in Japan
“We’re very pleased with this initial outcome. Patents of questionable merit are of little value to
anyone. We much prefer that the best prior art be identified so that the resulting patent is truly
bulletproof. This is precisely why we eagerly agreed to sponsor this project and other patent
quality initiatives. We are proud of this result, which validates the concept of Peer-to-Patent,
and can only improve the quality of patents produced by the patent system.”
— Manny Schecter, Associate General Counsel for Intellectual Property, IBM 24
25. Patient Opinion: an inside look
Usage: 3000 comments in first 9 months, 38 health providers subscribed
Benefits of ratings/reviews
• Enabling informed choices (for citizens)
• Understanding users needs (for hospitals)
• Monitoring quality compliance for service improvement (for health funders)
• “Does feedback actually work”?
25
Source: PatientOpinion blog
27. Are these services used?
• in the back-office, yes
• in the front-office, not too much: few
thousand users as an average
• still: this is much more than before!
• some (petty) specific causes have viral take-
up (mobile phones fees, road tax charge
schemes)
• very low costs of experimentation
27
28. Impact on effectiveness, not
efficiency
• Some time savings: reduced e-mail congestion
• Better peripheral awareness, better relevance
• Bryolfsson: “access to information strongly
predicts the number of projects completed
by each individual and the amount of revenue
that person generates”
28
29. Why?
Because it does not impose change (e-gov 1.0) but
acts on leverages, drivers and incentives:
• building on unique and specific knowledge of users: the
“cognitive surplus”
• the power of visualization
• reducing information and power asymmetries
• peer recognition rather than hierarchy
• reducing the cost of collective action
• changing the expectations of citizens
29
30. “it’s about pressure points, chinks
in the armour where
improvements might be possible,
whether with the consent of
government or not”
Tom Steinberg
director mySociety
31. “A problem shared
is a problem halved
...and a pressure group created”
Dr. Paul Hodgkin
director PatientOpinion.org
32. Why? /2
• Citizens (and employees) already use web 2.0:
no action ≠ no risks
• Likely to stay as it is linked to underlying
societal trends
- Today’s teenagers = future users and employees
- Empowered customers
- Creative knowledge workers
- From hierarchy to network-based organizations
- Non linear-innovation models
- Consumerization of ICT
32
33. A new e-government vision?
Providing services online
through portals
Exposing web services for
re-intermediation
Robinson et al.: “Government Data and
the Invisible Hand “
Gartner:
“The Real Future of E-Government: From
Joined-Up to Mashed-Up”
33
34. A new flagship goal IMPACT:
of eGovernment? Better
government
high
eGov2.0
Reusable data
INPUT: IT low high
investment
eGov1.0
Online services
low 34
37. It’s just another hype
• Web 2.0 business model is
not solid, too reliant on
advertising
• Online advertising is highly
sensitive to GDP growth:
bubble 2.0 in waiting
• Startups failing to deliver
profits: Skype, Vonage
Source: IPTS elaboration of U.S Census, IAB
38. Few users are proactive –
and we are reaching the peak
• Only 3% of citizens blogs, and growth
of blogs and wikis is slowing down
Source:
Robert A.
Rohde,
wikipedia
administrator
• In public services, citizens are even
less interested in participating/
discussing
39. It’s doesn’t matter
What matters is competence and high-quality services, rather than “conversations”
• In business, commercial success does not need openness (e.g. Zune
developers blog while I-Pod developers are secretive)
• In politics, success in the blogosphere does not translate in success in elections
(e.g. Howard Dean, Barak Obama),
• In public services provision, spontaneous cooperation (as “barcamp”) only
rarely delivers after the initial enthusiasm (e.g. Italian Tourism Portal).
• Bloggers approach is not always constructive: “the philosophers have only
interpreted the world. The point is to complain about it”
41. Creating inefficiencies
• Civil servants time diverted
to non-core activities
• Web2.0 applications are
cheap, but are human-
resource-intensive: against
the government trend to “do
less, buy more”
• Excessive social control
leading to increased risk
aversion and immobilisation
in the public sector
42. Undermining institutional credibility
• Opening confrontations, rather
than dialogue and increasing
distrust between government
and citizens
• Government held accountable
for bad/offensive user-generated
content on the website
• Blogging is not for government
(UK minister discussing the
pension reform)
43. Damaging societal value
• Risk of populistic outcome,
focus on short-term issues
(beppegrillo, road tax
charge)
• Citizens organize anti social
behaviour, and government
react through increased
control
• Excessive social control, no
privacy
• Balkanisation of society
• Increased exclusion:
services 2.0 only for the elite
45. Suggestions from web 2.0
experts
• Open your data, make them available for re-use
• Start from back office: knowledge intensive,
collaborative culture teams
• Evaluate existing usage by your employees
• Subsidiarity: Partner with civil society and existing
initiatives
• Provide governance, but soft: policies and guidance
• Listen and follow-up on users’ feedback
• But no ready recipes: don’t embrace, experiment!
(it’s cheap!)
45
46. Common mistakes
• “Build it and they will come”: beta testing, trial and
error necessary
• Launching “your own” large scale web 2.0 mega-
project
• Opening up without soft governance of key
challenges:
- privacy
- individual vs institutional role
- destructive participation
• Adopting only the technology with traditional top-
down attitude
46
47. Thank you
david.osimo@tech4i2.com
Further information:
Osimo, 2008. Web2.0 in government: why and how? www.jrc.es
Osimo, 2008. Benchmarking e-government in the web 2.0 era: what to
measure, and how. www.epracticejournal.eu , August 2008.
Aral, Brynjolfsson,Van Alstyne, 2007, “Productivity Effects of Information
Diffusion in Networks”, digital.mit.edu
http://egov20.wordpress.com
47