YourLastName2
Nepali2
Name: Shrijana Nepali
Professor: Mark Shepherd
ENGL-1301-51009
LGBT Social Acceptance and Inclusivity
The transgender issue is most common problem in our society. The number of transgenders in our society are increasing gradually but we fail to accept them for our narrow vision. It is very shameful to us that in the time of modern culture we are breaking many old concepts and accepting new concept. Let's seek to grasp the term-transgender meaning. There are individuals who differ from their birth sex by their sexual identity or gender expression. The research reviewed concentrated mainly on transgender people's key concerns and public acceptance. The M. Ed focusing on curriculum is important because this is the professional and mostly filed based work as a teacher educator. If we emphasize M. Ed's transgender term. Curriculum then teacher trainer will be easily useful for transgender empowerment. Although over the past two decades a significant body of LGBT health information has been established, much remains to be explored. What can we do to empower LGBT rights? What are the priorities for a research agenda to address these gaps?
Some say LGBT community should be treated with equal rights as everyone, while others say marriages between same-sex couples should not be recognized by the law as valid. The LGBT community is also being criminalized and sentenced.
What Richard did to Sasha as seen in the 57 Bus story is clear reflection of what is happening in our society today. There is a lot of violence against people of different sexual orientations and gender identities, some nations go as far as giving people the death penalty or incarceration. We must therefore ask ourselves whether there is a connection between the level of lesbian, gay, bisexual and transgender (LGBT) acceptance and the level of inclusiveness of the laws of a country. According to Sasha, gender is "the term for what people feel about themselves, how they feel inside," and it does not automatically correspond with the biological sex at birth (Slater).
Community values are reflected in the school’s curriculum, and teachers could bridge the divide between privileged and marginalized students by honoring their identities. Traditional curricula that rely on whole-class topics that privilege heteronormative expectations do a great disservice to diverse learners. These topics isolate students. However, topics with LGBT representation normalize LGBT students, creating a safe space for academic and emotional growth. Scholars are beginning to develop models for understanding LGBT integration in education, but the role of religion in encouraging or hindering LGBT inclusion has been theorized (Revelle, Carol and Anna Waugh).
Beyond bridging literature on the political sociology of LGBT rights and religion and the culture wars, against this backdrop of legal vulnerability, Legislators who oppose same-sex marriage and recent moves to advance transgender equalit ...
HELLO EVERYONE, THIS PRESENTATION IS BRIEFLY DISCUSSING ABOUT THE LGBT COMMUNITY, STATUS, CAUSES, EFFECTS, CHALLENGES, LEGAL PROVISIONS, INATTENTIVE OF N.G.O, CRITICISM, SUGGESTIONS AND ROLL OF SOCIAL WORKERS .
Per the text, computers are playing an increasingly important role i.docxodiliagilby
Per the text, computers are playing an increasingly important role in the practice of law. Successful paralegals must be comfortable with using electronic databases and research tools.
Write a two to three (2-3) page paper in which you:
Discuss a paralegal’s ethical obligation to conduct competent electronic research. Provide two (2) examples of the potential consequences of inept electronic research practices.
Determine whether or not traditional reference materials (e.g., State and Federal Reporters, West’s Encyclopedia, etc.) can be as current as electronic resources. Provide two (2) advantages and two (2) disadvantages to using traditional resource materials.
Use at least two (2) quality references.
Note:
Wikipedia and other Websites do not qualify as academic resources.
THIS IS PART 1.
.
Pennsylvania was the leader in sentencing and correctional reform .docxodiliagilby
Pennsylvania was the leader in sentencing and correctional reform in the early history of the United States. Discuss what groups were associated with this reform.
Why did they want the reform?
Examine whether it was successful and if the reform brought forth further changes.
What influences does the system have on the correctional system today?
What influences have changed? Why?
Use the Internet, library, and any other resources available to research your answer. Submit a 4 page paper (double-spaced) to your instructor. Support your reasoning with outside sources. Be sure to reference all sources using APA style.
The following will be the grading criteria for this assignment:
20%:
Discuss what groups were associated with this reform.
10%:
Why did they want the reform?
20%:
Examine whether it was successful and if the reform brought forth further changes.
25%:
What direct influences do you see the Pennsylvania system in the correctional systems used today?
25%:
What influences have changed? Why?
4 pages. APA format. No plagerism. 5 sources referenced throughout the paper. Reference Page and Abstract.
.
Penetration testing is a simulated cyberattack against a computer or.docxodiliagilby
Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:
What is penetration testing
Testing Stages
Testing Methods
Testing, web applications and firewalls
Your paper should meet the following requirements:
Be approximately four to six pages in length, not including the required cover page and reference page.
Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
.
HELLO EVERYONE, THIS PRESENTATION IS BRIEFLY DISCUSSING ABOUT THE LGBT COMMUNITY, STATUS, CAUSES, EFFECTS, CHALLENGES, LEGAL PROVISIONS, INATTENTIVE OF N.G.O, CRITICISM, SUGGESTIONS AND ROLL OF SOCIAL WORKERS .
Per the text, computers are playing an increasingly important role i.docxodiliagilby
Per the text, computers are playing an increasingly important role in the practice of law. Successful paralegals must be comfortable with using electronic databases and research tools.
Write a two to three (2-3) page paper in which you:
Discuss a paralegal’s ethical obligation to conduct competent electronic research. Provide two (2) examples of the potential consequences of inept electronic research practices.
Determine whether or not traditional reference materials (e.g., State and Federal Reporters, West’s Encyclopedia, etc.) can be as current as electronic resources. Provide two (2) advantages and two (2) disadvantages to using traditional resource materials.
Use at least two (2) quality references.
Note:
Wikipedia and other Websites do not qualify as academic resources.
THIS IS PART 1.
.
Pennsylvania was the leader in sentencing and correctional reform .docxodiliagilby
Pennsylvania was the leader in sentencing and correctional reform in the early history of the United States. Discuss what groups were associated with this reform.
Why did they want the reform?
Examine whether it was successful and if the reform brought forth further changes.
What influences does the system have on the correctional system today?
What influences have changed? Why?
Use the Internet, library, and any other resources available to research your answer. Submit a 4 page paper (double-spaced) to your instructor. Support your reasoning with outside sources. Be sure to reference all sources using APA style.
The following will be the grading criteria for this assignment:
20%:
Discuss what groups were associated with this reform.
10%:
Why did they want the reform?
20%:
Examine whether it was successful and if the reform brought forth further changes.
25%:
What direct influences do you see the Pennsylvania system in the correctional systems used today?
25%:
What influences have changed? Why?
4 pages. APA format. No plagerism. 5 sources referenced throughout the paper. Reference Page and Abstract.
.
Penetration testing is a simulated cyberattack against a computer or.docxodiliagilby
Penetration testing is a simulated cyberattack against a computer or network that checks for exploitable vulnerabilities. Pen tests can involve attempting to breach application systems, APIs, servers, inputs, and code injection attacks to reveal vulnerabilities. In a well-written, highly-detailed research paper, discuss the following:
What is penetration testing
Testing Stages
Testing Methods
Testing, web applications and firewalls
Your paper should meet the following requirements:
Be approximately four to six pages in length, not including the required cover page and reference page.
Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.
Support your answers with the readings from the course and at least two scholarly journal articles to support your positions, claims, and observations, in addition to your textbook. The UC Library is a great place to find resources.
Be clearly and well-written, concise, and logical, using excellent grammar and style techniques. You are being graded in part on the quality of your writing.
.
Perform an analysis of the social demographic, technological, econ.docxodiliagilby
Perform an analysis of the social / demographic, technological, economic, environmental / geographic, and political/legal / governmental segments to understand the general environment facing Union Pacific.
Descri
be how Union Pacific will be affected by each of these external factors.
this is a strategic mangement course business 499.
.
Perform research and discuss whether text messaging is cheaper or mo.docxodiliagilby
Perform research and discuss whether text messaging is cheaper or more expensive than voice. Explain how text messaging works.
Perform research and discuss how an audio CD and an audio DVD compare. Find out why it is said that a vinyl long play record produces sounds much better. Are we going backwards with digital technology in music recording? Explain.
.
People in developed nations are fond of warning people in developing.docxodiliagilby
People in developed nations are fond of warning people in developing nations to stop
destroying rainforest.
People of developing nations often respond that this is hypocritical,
because the developed nations became wealthy by deforesting their land and exploiting its
resources in the past.
What would you say to the president of a developing nation, such as
Indonesia, in which a great deal of forest is being cleared?
.
Pease read and incorporate the following articles from the EBSCO h.docxodiliagilby
Pease read and incorporate the following articles from the EBSCO host database into your paper:
Deakin, A. (2004, November). Finding your organization's hidden treasure.
Behavioral Health Management
, 24(6), 27-29.
Droppa, D., & Luczak, R. (2004, January). Collaboration, technology,
and outcomes—A recipe to improve service delivery.
Behavioral Health Management
, 24(1), 41-44.
To complete the research paper, you will need to include an introduction and conclusion section as well as a title page and reference section. The title of the research paper will be the
Current Issues in the Behavioral Healthcare System
.
Your final paper is due for submission. The paper should adhere to the following guidelines:
The length of the paper should be eight to ten double-spaced pages (not including the title and reference pages).
The main sections should have a:
Title page
Introduction
Body of the paper (with subheadings)
Conclusion
Reference page(s)
The paper must use the APA format for citing sources and references.
Your final paper introduction (one page) should include the following points:
An overview of the research paper
The purpose or objective of the research paper
The body of the paper (five to six pages) should address each of the following topics using information learned in the course, in combination with outside references:
Based on your previous assignments and review of the literature, what are some of the major issues faced by today’s behavioral healthcare system? How have the current and future trends that are evolving in the industry addressed some of those issues?
Do you think there is a difference between the changing trends taking place in the private sector and that of public behavioral healthcare inpatient facilities? Based on your understanding about behavioral health services and the populations being served by them, do you agree that both private and public organizations are able to provide the necessary clinical services? Provide a rationale in support of your response.
In behavioral healthcare, outcomes are the established norm for measuring the success or lack of services. What are some of the major challenges in collecting the data needed to support and report behavioral health outcomes? Provide a rationale for your response.
Quality of care and services is an important part of an outcome-based strategy. The objective behind maintaining and improving quality is to provide competent and efficient services to consumers. In your opinion, do the current regulatory and accreditation standards for the behavioral health industry help to meet that objective? How?
Your conclusion (one to two pages) should include the following points:
What conclusions can you draw from your research that would demonstrate the role played by behavioral health in the healthcare industry?
What changes would you like to bring to today's behavioral healthcare system in order to resolve the current issues identified?
Based on your literature rev.
Peer Review Journal Paper Overview of assignment due 17 April 2014 I.docxodiliagilby
Peer Review Journal Paper Overview of assignment due 17 April 2014 I want you to find a peer review article that falls into our time frame: world history from the emergence of humanity to 1500 CE. I want you to present the thesis [argument] the author is putting forward. I want you then to find two other sources on the same subject and determine if those sources agree or disagree with your original source. The theme here is peer review and the notion of historiography; whether or not how we look at an event or theme of history changes over time? The choice of topic is up to you but please let me know what you are doing by email and let me know what your peer review source is so I can be sure it is appropriate for the course. If you want some help in finding an article; please let me or a librarian know what you might be interested in. I really need to know what your article is before you start so you have something good to start with and send me a link to your article, so that I can approve it.
1. Find a peer review article on some aspect of history associated with this course.
2. Explain the thesis that author is putting forth.
3. Find two secondary sources, they need not be peer review which relate to the main article you are presenting. Do these sources compliment or contrast the thesis being put forth by the original author?
4. Leave some time & space at the end to present your perspective and opinion on the thesis as well.
5. 5-7 pages; typed doubled spaced standard borders & fonts. Please use citation; APA, MLA, Chicago are all acceptable.
The requirement of the paper starts at the middle of the 3rd page that I attached here.
We can discuss more later.
.
Perception is all EXCEPT [removed] [removed]Structuring and orga.docxodiliagilby
Perception is all EXCEPT
[removed]
[removed]Structuring and organizing incoming impulses (information)
[removed]a prognosis (guess) about what is being received
[removed]the reconstruction of reality by our brain
[removed]the transduction of incoming stimuli
[removed]a process which takes time
.
Performance Based Factors and Measures for Quality AssessmentWri.docxodiliagilby
Performance Based Factors and Measures for Quality Assessment
Write a 700- to 1,000-word paper about the Performance Based Factors and Measures for Quality Assessment. Include the following in your paper:
For any health care activity, three performance factors can be measured: structure, process, and outcome. Identify one structure measure, one process measure, and one outcome measure that could be used to evaluate the following hospital admission process:
Upon arrival, the patient reports to the hospital registration or admitting area. The patient completes paperwork and provides an insurance identification card, if insured. Often, patients register before the date of hospital admission to facilitate the registration process. An identification bracelet including the patient’s name and doctor’s name is placed around the patient’s wrist. Before any procedure is performed or any form of medical care is provided, the patient is asked to sign a consent form. If the patient is not feeling well, a family member or caregiver can help the patient complete the admission process.
Include a minimum of three peer-reviewed references, not including the textbook.
Format your paper consistent with APA 6th guidelines.
.
People. I need some help with this assignment that needs to be done .docxodiliagilby
People. I need some help with this assignment that needs to be done in Excel
Problem 1:
Oregon Surplus Inc. qualifies to use the installment-sales method for tax purposes and sold an investment on an installment basis. The total gain of $75000 was reported for financial reporting purposes in the period of sale. The installment period is 3 years; one-third of the sale price is collected in 2014 and the rest in 2015 and 2016. The tax rate was 35% in 2014, 30% in 2015, and 30% in 2016. The enacted tax rates of 2015 and 2016 are not known until 2015.
The accounting and tax data are shown below.
Financial Accounting
Tax Return
2014 (35% tax rate)
Income before temporary difference
$
175,000
$
175,000
Temporary difference
$
75,000
$
25,000
Income
$
250,000
$
200,000
2015 (30% tax rate)
Income before temporary difference
$
200,000
$
200,000
Temporary difference
$
-
$
25,000
Income
$
200,000
$
225,000
2016 (30% tax rate)
Income before temporary difference
$
180,000
$
180,000
Temporary difference
$
-
$
25,000
Income
$
180,000
$
205,000
Required:
1)
Prepare the journal entries to record the income tax expense, deferred income taxes, and the income taxes payable for 2014, 2015, and 2016. No deferred income taxes existed at the beginning of 2012.
2)
Explain how the deferred taxes will appear on the balance sheet at the end of each year. (Assume Installment Accounts Receivable is classified as a current asset.)
3)
Show the income tax expense section of the income statement for each year, beginning with “Income before income taxes.”
Problem 2:
Philadelphia Co. incurred a net operating loss of $850,000 in 2014. Combined income of 2012 and 2013 was $650,000. The tax rate for all years is 30%. Trenton elects the carry back option.
Required:
a.
Prepare the journal entries to record the benefit of loss carry back and loss carry forward option.
b.
Assuming that it is more likely than not that the entire net operating loss carry forward will not be realized in future years, prepare all the journal entries necessary at the end of 2014.
.
Perceptions and Causes of Psychopathology PaperPrepare a 1,0.docxodiliagilby
Perceptions and Causes of Psychopathology
Paper
Prepare
a 1,050- to 1,400-word paper in which you discuss causes of psychopathology.
Address
the following:
Provide a brief overview of how culture is a factor determining the expression of psychopathology.
Examine causes of psychopathology by using either the biopsychosocial or the diathesis-stress models.
Explain the changes in society’s perception of psychopathology as a function of historical time period.
Cite
at least two peer-reviewed sources.
Format
your paper consistent with APA guidelines.
Click
the Assignment Files tab to submit your assignment
.
People are attracted to occupations that complement their personalit.docxodiliagilby
People are attracted to occupations that complement their personalities. In a Word doc, compose a 500 word essay naming and describing the six personality types identified by John Holland. Give an example of a vocational choice for each. Then
analyze how dualistic and relativistic thinking
contribute to our vocational choices and discuss the role of commitment within relativistic thinking.
.
Perception of Pleasure and Pain Presentation3 slides- An explanati.docxodiliagilby
Perception of Pleasure and Pain Presentation
3 slides- An explanation of the role of the somatosensory cortex in the perception of pleasure and pain
3 slides- A description of how the damage to the cutaneous system can affect the quality of life
- Include 1 peer reviewed source
- APA Format
-Include speaker notes please
Need on time by 12pm Eastern May 4th, 2015. Thanks.
.
Pennsylvania v. MarkMark Davis has been charged with Driving W.docxodiliagilby
Pennsylvania v. Mark
Mark Davis has been
charged
with Driving While Intoxicated (DWI) for reckless driving, speeding, four counts of felony assault, and one count of involuntary manslaughter as the result of a crash that occurred on a night out with his friends. Mark has been out on bail and pleaded not guilty when he was arraigned. The Judge set a date for Mark's trial and his defense team has been working to collect information about the technology used by the Highway Patrol to reconstruct the crash.
District Attorney O'Malley offered Mark a plea bargain, but Mark chose to take his chances at trial. Mark's attorney, Mr. Chen Long, advised Mark that accepting the plea offer was completely up to Mark, although Mr. Long advised against accepting it because the defense planned to highlight mistakes made by law enforcement during the investigation that could create reasonable doubt in the minds of the jurors.
The trial begins and during the voir dire of potential jurors, several individuals are excused because they have previous knowledge of Mark's case from the media. Two individuals stated that they could not be impartial because they had loved ones
killed
in alcohol related crashes as well. Eventually, two men and ten women were seated in Mark's trial.
District Attorney O'Malley presented the State's case clearly and concisely depicting a night on the town full of heavy drinking, which ultimately resulted in Mark's actions causing the death of one individual and injuring four others. Highway Patrolman Green explained to the jury that he immediately suspected alcohol when he arrived on scene because Mark appeared to be intoxicated when they spoke. Following the Judge ruling that it was admissible and not prejudicial, Sergeant Rodney Monroe, from the Highway Patrol Reconstruction Team presented their reconstruction complete with a high-tech computer animated reenactment of the crash. During the cross examination, Defense Attorney Long challenged the reconstruction because the Defense Crash Reconstruction Expert had discovered errors in the mathematical calculations for vehicle speed. The jury appeared to have liked the reconstruction very much regardless of the errors highlighted by the defense.
Mark was convicted of DWI, four counts of felony assault, and one count of involuntary manslaughter; however, he was acquitted of reckless driving and speeding. The Jury said they could not convict Mark of those offenses because of the mistakes made by law enforcement officers during the investigation.
Because Mark pleads not guilty, but was convicted during trial and had two prior DWI offenses, he was sentenced to ten years in the State Prison. Defense Attorney Long immediately notified the court of an impending appeal that would be filed by the defendant. In a report, using external sources to support your claims, answer the following:
Compare and contrast the roles of the Judge, Jury, District Attorney (Prosecutor), and Defense Attorney. What ar.
PBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docxodiliagilby
PBAD201-1501A-02 Public Administration
Task Name:
Phase 3 Individual Project
Deliverable Length:
750–1,000 words; Tabular budget
Details:
Weekly tasks or assignments (Individual or Group Projects) will be due
by
Monday and late submissions will be assigned a late penalty in accordance with the late penalty policy found in the syllabus. NOTE: All submission posting times are based on midnight Central Time.
Concern among the public sector is the demand for public organizations to be transparent about their budgets and spending habits. You have been scheduled to conduct a presentation for the State Budgeting Committee about the type of budget that the organization operates under. Identify the type of public organization for which you work, as well as what types of services, goods, or activities the organization provides to the public. Identify the size and scope of the organization.
Construct a budget using Excel that will provide a breakdown of the various budget items. Copy and paste the Excel spreadsheet of your budget into a Word document. Finally, explain how the budget is made available to the public for review. For example, is the budget made available at public meetings, on a special request, published in a newsletter, on the organization’s premises during regular business hours, via the organization’s Web site, or by some other means? If the budget is not available for the public to review, explain why. Furthermore, are there any provisions in place regarding the budget being made available for public view? Explain in detail.
Assignment Guidelines
Address the following in 750–1,000 words:
Identify the type of public organization for which you work, as well as what types of services, goods, or activities the organization provides to the public. Identify the size and scope of the organization.
Construct a budget using Excel that will provide a breakdown of the various organizational budget items.
Copy and paste the Excel spreadsheet of your budget into a Word document.
Is the budget made available to the public for review?
If yes, explain how in detail.
If no, explain in detail why it is not.
Are there any types of provisions in place regarding the budget being made available for public view? Identify and explain.
Be sure to reference all sources using APA style.
.
Part1 Q1. Classify each of the following as- (i)qual.docxodiliagilby
Part1
Q1. Classify each of the following as:-
(i)
qualitative or quantitative
(ii)
nominal, ordinal, interval or ratio scale.
a.
Times for swimmers to complete a 50meters race.
b.
Months of the year: Meskerem, Tikimit, Hidat, ---.
c.
Region numbers of Riyadh: 1, 2, 3, 4, ---.
d.
Pollen counts provided as numbers between 1 and 10 where 1 means there is almost no pollen and 10 means that it is rampant, but for which the values do not represent an actual count of grains of pollen.
e.
Packages in the city of Cleveland telephone book.
f.
Rankings of tennis players.
g.
Weights of air conditioners.
h.
Personal ID numbers
i.
Telephone numbers
j.
Temperatures inside 10 refrigerators.
k.
Salaries of the top five CEOs in the United States.
l.
Ratings of eight local plays ( poor, fair, good, excellent)
m.
Times required for mechanics to do a tune up.
n.
Ages of students in a classroom.
o.
Marital Status of patients in a physician’s office.
p.
Horsepower of tractor engines.
q.
Colors of baseball caps in a store.
r.
Classification of kids at a day care (infant, toddler, pre-school)
Q2. The following are the grades which 40 students obtained in a certain course in 1997E.C. here in Mekelle University of the Arid Campus.
75 89 66 52 90 68 83 94 77 60 38 47 87 65 97 49 65 72 73 81 63 77 31 88 74 37 85 76 74 63 69 72 91 87 76 58 63 70 72 65
a. Construct an absolute frequency distribution.
b. Convert the distribution obtained in (a) into a Relative & Percentage distribution.
c. Convert the distribution in (a) into a “Less than” &
a “More than” cumulative distribution
d. Construct a histogram, frequency polygon and ogive curve
Q3. The following distribution shows that the result obtained by 100 accounting students in the final examination of statistics in
Saudi Electronic University.
Mark of students.
0-10
10-20
20-30
30-40
40-50
No. of students
14
f1
28
f2
15
If the median mark of students is 22.5, compute:-
i.
The missing frequencies, f1 and f2.
ii.
the mode, and
iii.
the arithmetic mean
iv.
variance
Part 2
Q1.
a. (Smoking and Coffee Drinking)
Coffee
No Coffee
Total
Smoker
60
40
100
Non-Smoker
115
85
200
Total
175
125
300
What is the probability that a randomly selected person from the sample either smokes or drinks coffee.
Q1. b. What is the probability that I flip a coin and get a Head, Roll a die and get a 4 or a 6, and then pull the king of Spades and a diamond from a deck of cards.
Q2: The random variable X has the following probability distribution:
X
0
1
2
3
Total
P(x)
0.22
0.38
0.1
0.3
1
Find the expected value (E(x)) & the Variance.
Q3: A radar unit is used to measure speeds of cars on a highway. The speeds are
normally
distributed with a mean of 90 km/hr and a standard deviation of 10 km/hr. What is the probability that a car picked at random is travelling at:
a-
More than 100 km/hr?
b-
Less than 85 Km/hr?
c-
Between them?
Part 3
Q-1..
Paul’s Letter to the EphesiansThe First Letter of PeterThe Fir.docxodiliagilby
Paul’s Letter to the Ephesians
The First Letter of Peter
The First Letter to Timothy
For each document above; Identify specific content, features, or themes which permit classifying each text early Catholic in character.
At least one credible source
one and half pages
.
Past and FuturePlease respond to the followingImagine back .docxodiliagilby
"Past and Future"
Please respond to the following:
Imagine back in time to pre-Internet days. Describe how you would have established communications for international trade in these time periods: 1935 and 1977.
Imagine it is now 2050. Predict the ease and speed of international trade communications and how it will occur.
2-
"Backtracking from Globalization"
Please respond to the following:
From the e-Activity, illustrate with two examples how the U.S. has restrained trade over the past 60 years and state why you think that happened.
Some believe these restraints have been deleterious to national economic prosperity. In your estimation, speculate as to how these restraints have affected national economic prosperity.
.
Partisan considerations have increasingly influenced the selection.docxodiliagilby
Partisan considerations have increasingly influenced the selection of federal judges. Interest groups on the right and the left have insisted on the appointment of judges who hold compatible views. Presidents and members of Congress have also increasingly sought appointees who will decide issues in ways they prefer. What is your view? Should politics play such a large role in judicial appointments? Or should merit be given greater weight?
Does a merit based system favor ONLY those with money and the connections? needs to be at least 200 words APA
.
Password protect the database you created for your individual assign.docxodiliagilby
Password protect the database you created for your individual assignment in Week Three.
Create
a CRUD matrix to indicate the permissions (read, insert, delete, modify) you would grant to different users of your database.
Create
at least two different users and implement their permissions using SQL statements.
Submit
the following deliverables to your instructor:
The command(s) to protect your entire SQL Server database
The matrix (categories of users are rows, categories of data are columns, and R, I, D, and/or M in the cells)
The SQL code for creating logins and 2 specific users from your matrix
The SQL code for granting appropriate permissions to your 2 new users
.
Part ThreeUsing the theory or model that you selected in Wee.docxodiliagilby
Part Three
Using
the theory or model that you selected in Week Four, develop an intervention thataddresses one of the levels of prevention for your aggregate.
Describe
the intervention plan and how it may be actualized. Include the following:
Formulate one outcome goal and various objectives (as appropriate) and explain why these are appropriate
Explain the intervention plan (including the steps and resources needed)
Identify organizations within the community that may be able to assist with the intervention and explain why they are appropriate to partner with.
Explain how you plan to evaluate the intervention. Include methods and why they are appropriate
.
Part OneIdentify 4 ways that you can convey professionalism in y.docxodiliagilby
Part One
Identify 4 ways that you can convey professionalism in your appearance, attitude, or confidence.
Part Two
Include a list of at least 2 websites that further discuss reading comprehension and / or fluency.
List the titles of the websites, Web addresses, names of the specific Web pages within the websites, etc.
Provide a brief summary of the website and why you believe it is a good resource.
Part Three
Explain why comprehension and fluency are so important to successful reading.
.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
Perform an analysis of the social demographic, technological, econ.docxodiliagilby
Perform an analysis of the social / demographic, technological, economic, environmental / geographic, and political/legal / governmental segments to understand the general environment facing Union Pacific.
Descri
be how Union Pacific will be affected by each of these external factors.
this is a strategic mangement course business 499.
.
Perform research and discuss whether text messaging is cheaper or mo.docxodiliagilby
Perform research and discuss whether text messaging is cheaper or more expensive than voice. Explain how text messaging works.
Perform research and discuss how an audio CD and an audio DVD compare. Find out why it is said that a vinyl long play record produces sounds much better. Are we going backwards with digital technology in music recording? Explain.
.
People in developed nations are fond of warning people in developing.docxodiliagilby
People in developed nations are fond of warning people in developing nations to stop
destroying rainforest.
People of developing nations often respond that this is hypocritical,
because the developed nations became wealthy by deforesting their land and exploiting its
resources in the past.
What would you say to the president of a developing nation, such as
Indonesia, in which a great deal of forest is being cleared?
.
Pease read and incorporate the following articles from the EBSCO h.docxodiliagilby
Pease read and incorporate the following articles from the EBSCO host database into your paper:
Deakin, A. (2004, November). Finding your organization's hidden treasure.
Behavioral Health Management
, 24(6), 27-29.
Droppa, D., & Luczak, R. (2004, January). Collaboration, technology,
and outcomes—A recipe to improve service delivery.
Behavioral Health Management
, 24(1), 41-44.
To complete the research paper, you will need to include an introduction and conclusion section as well as a title page and reference section. The title of the research paper will be the
Current Issues in the Behavioral Healthcare System
.
Your final paper is due for submission. The paper should adhere to the following guidelines:
The length of the paper should be eight to ten double-spaced pages (not including the title and reference pages).
The main sections should have a:
Title page
Introduction
Body of the paper (with subheadings)
Conclusion
Reference page(s)
The paper must use the APA format for citing sources and references.
Your final paper introduction (one page) should include the following points:
An overview of the research paper
The purpose or objective of the research paper
The body of the paper (five to six pages) should address each of the following topics using information learned in the course, in combination with outside references:
Based on your previous assignments and review of the literature, what are some of the major issues faced by today’s behavioral healthcare system? How have the current and future trends that are evolving in the industry addressed some of those issues?
Do you think there is a difference between the changing trends taking place in the private sector and that of public behavioral healthcare inpatient facilities? Based on your understanding about behavioral health services and the populations being served by them, do you agree that both private and public organizations are able to provide the necessary clinical services? Provide a rationale in support of your response.
In behavioral healthcare, outcomes are the established norm for measuring the success or lack of services. What are some of the major challenges in collecting the data needed to support and report behavioral health outcomes? Provide a rationale for your response.
Quality of care and services is an important part of an outcome-based strategy. The objective behind maintaining and improving quality is to provide competent and efficient services to consumers. In your opinion, do the current regulatory and accreditation standards for the behavioral health industry help to meet that objective? How?
Your conclusion (one to two pages) should include the following points:
What conclusions can you draw from your research that would demonstrate the role played by behavioral health in the healthcare industry?
What changes would you like to bring to today's behavioral healthcare system in order to resolve the current issues identified?
Based on your literature rev.
Peer Review Journal Paper Overview of assignment due 17 April 2014 I.docxodiliagilby
Peer Review Journal Paper Overview of assignment due 17 April 2014 I want you to find a peer review article that falls into our time frame: world history from the emergence of humanity to 1500 CE. I want you to present the thesis [argument] the author is putting forward. I want you then to find two other sources on the same subject and determine if those sources agree or disagree with your original source. The theme here is peer review and the notion of historiography; whether or not how we look at an event or theme of history changes over time? The choice of topic is up to you but please let me know what you are doing by email and let me know what your peer review source is so I can be sure it is appropriate for the course. If you want some help in finding an article; please let me or a librarian know what you might be interested in. I really need to know what your article is before you start so you have something good to start with and send me a link to your article, so that I can approve it.
1. Find a peer review article on some aspect of history associated with this course.
2. Explain the thesis that author is putting forth.
3. Find two secondary sources, they need not be peer review which relate to the main article you are presenting. Do these sources compliment or contrast the thesis being put forth by the original author?
4. Leave some time & space at the end to present your perspective and opinion on the thesis as well.
5. 5-7 pages; typed doubled spaced standard borders & fonts. Please use citation; APA, MLA, Chicago are all acceptable.
The requirement of the paper starts at the middle of the 3rd page that I attached here.
We can discuss more later.
.
Perception is all EXCEPT [removed] [removed]Structuring and orga.docxodiliagilby
Perception is all EXCEPT
[removed]
[removed]Structuring and organizing incoming impulses (information)
[removed]a prognosis (guess) about what is being received
[removed]the reconstruction of reality by our brain
[removed]the transduction of incoming stimuli
[removed]a process which takes time
.
Performance Based Factors and Measures for Quality AssessmentWri.docxodiliagilby
Performance Based Factors and Measures for Quality Assessment
Write a 700- to 1,000-word paper about the Performance Based Factors and Measures for Quality Assessment. Include the following in your paper:
For any health care activity, three performance factors can be measured: structure, process, and outcome. Identify one structure measure, one process measure, and one outcome measure that could be used to evaluate the following hospital admission process:
Upon arrival, the patient reports to the hospital registration or admitting area. The patient completes paperwork and provides an insurance identification card, if insured. Often, patients register before the date of hospital admission to facilitate the registration process. An identification bracelet including the patient’s name and doctor’s name is placed around the patient’s wrist. Before any procedure is performed or any form of medical care is provided, the patient is asked to sign a consent form. If the patient is not feeling well, a family member or caregiver can help the patient complete the admission process.
Include a minimum of three peer-reviewed references, not including the textbook.
Format your paper consistent with APA 6th guidelines.
.
People. I need some help with this assignment that needs to be done .docxodiliagilby
People. I need some help with this assignment that needs to be done in Excel
Problem 1:
Oregon Surplus Inc. qualifies to use the installment-sales method for tax purposes and sold an investment on an installment basis. The total gain of $75000 was reported for financial reporting purposes in the period of sale. The installment period is 3 years; one-third of the sale price is collected in 2014 and the rest in 2015 and 2016. The tax rate was 35% in 2014, 30% in 2015, and 30% in 2016. The enacted tax rates of 2015 and 2016 are not known until 2015.
The accounting and tax data are shown below.
Financial Accounting
Tax Return
2014 (35% tax rate)
Income before temporary difference
$
175,000
$
175,000
Temporary difference
$
75,000
$
25,000
Income
$
250,000
$
200,000
2015 (30% tax rate)
Income before temporary difference
$
200,000
$
200,000
Temporary difference
$
-
$
25,000
Income
$
200,000
$
225,000
2016 (30% tax rate)
Income before temporary difference
$
180,000
$
180,000
Temporary difference
$
-
$
25,000
Income
$
180,000
$
205,000
Required:
1)
Prepare the journal entries to record the income tax expense, deferred income taxes, and the income taxes payable for 2014, 2015, and 2016. No deferred income taxes existed at the beginning of 2012.
2)
Explain how the deferred taxes will appear on the balance sheet at the end of each year. (Assume Installment Accounts Receivable is classified as a current asset.)
3)
Show the income tax expense section of the income statement for each year, beginning with “Income before income taxes.”
Problem 2:
Philadelphia Co. incurred a net operating loss of $850,000 in 2014. Combined income of 2012 and 2013 was $650,000. The tax rate for all years is 30%. Trenton elects the carry back option.
Required:
a.
Prepare the journal entries to record the benefit of loss carry back and loss carry forward option.
b.
Assuming that it is more likely than not that the entire net operating loss carry forward will not be realized in future years, prepare all the journal entries necessary at the end of 2014.
.
Perceptions and Causes of Psychopathology PaperPrepare a 1,0.docxodiliagilby
Perceptions and Causes of Psychopathology
Paper
Prepare
a 1,050- to 1,400-word paper in which you discuss causes of psychopathology.
Address
the following:
Provide a brief overview of how culture is a factor determining the expression of psychopathology.
Examine causes of psychopathology by using either the biopsychosocial or the diathesis-stress models.
Explain the changes in society’s perception of psychopathology as a function of historical time period.
Cite
at least two peer-reviewed sources.
Format
your paper consistent with APA guidelines.
Click
the Assignment Files tab to submit your assignment
.
People are attracted to occupations that complement their personalit.docxodiliagilby
People are attracted to occupations that complement their personalities. In a Word doc, compose a 500 word essay naming and describing the six personality types identified by John Holland. Give an example of a vocational choice for each. Then
analyze how dualistic and relativistic thinking
contribute to our vocational choices and discuss the role of commitment within relativistic thinking.
.
Perception of Pleasure and Pain Presentation3 slides- An explanati.docxodiliagilby
Perception of Pleasure and Pain Presentation
3 slides- An explanation of the role of the somatosensory cortex in the perception of pleasure and pain
3 slides- A description of how the damage to the cutaneous system can affect the quality of life
- Include 1 peer reviewed source
- APA Format
-Include speaker notes please
Need on time by 12pm Eastern May 4th, 2015. Thanks.
.
Pennsylvania v. MarkMark Davis has been charged with Driving W.docxodiliagilby
Pennsylvania v. Mark
Mark Davis has been
charged
with Driving While Intoxicated (DWI) for reckless driving, speeding, four counts of felony assault, and one count of involuntary manslaughter as the result of a crash that occurred on a night out with his friends. Mark has been out on bail and pleaded not guilty when he was arraigned. The Judge set a date for Mark's trial and his defense team has been working to collect information about the technology used by the Highway Patrol to reconstruct the crash.
District Attorney O'Malley offered Mark a plea bargain, but Mark chose to take his chances at trial. Mark's attorney, Mr. Chen Long, advised Mark that accepting the plea offer was completely up to Mark, although Mr. Long advised against accepting it because the defense planned to highlight mistakes made by law enforcement during the investigation that could create reasonable doubt in the minds of the jurors.
The trial begins and during the voir dire of potential jurors, several individuals are excused because they have previous knowledge of Mark's case from the media. Two individuals stated that they could not be impartial because they had loved ones
killed
in alcohol related crashes as well. Eventually, two men and ten women were seated in Mark's trial.
District Attorney O'Malley presented the State's case clearly and concisely depicting a night on the town full of heavy drinking, which ultimately resulted in Mark's actions causing the death of one individual and injuring four others. Highway Patrolman Green explained to the jury that he immediately suspected alcohol when he arrived on scene because Mark appeared to be intoxicated when they spoke. Following the Judge ruling that it was admissible and not prejudicial, Sergeant Rodney Monroe, from the Highway Patrol Reconstruction Team presented their reconstruction complete with a high-tech computer animated reenactment of the crash. During the cross examination, Defense Attorney Long challenged the reconstruction because the Defense Crash Reconstruction Expert had discovered errors in the mathematical calculations for vehicle speed. The jury appeared to have liked the reconstruction very much regardless of the errors highlighted by the defense.
Mark was convicted of DWI, four counts of felony assault, and one count of involuntary manslaughter; however, he was acquitted of reckless driving and speeding. The Jury said they could not convict Mark of those offenses because of the mistakes made by law enforcement officers during the investigation.
Because Mark pleads not guilty, but was convicted during trial and had two prior DWI offenses, he was sentenced to ten years in the State Prison. Defense Attorney Long immediately notified the court of an impending appeal that would be filed by the defendant. In a report, using external sources to support your claims, answer the following:
Compare and contrast the roles of the Judge, Jury, District Attorney (Prosecutor), and Defense Attorney. What ar.
PBAD201-1501A-02 Public AdministrationTask NamePhase 3 Individu.docxodiliagilby
PBAD201-1501A-02 Public Administration
Task Name:
Phase 3 Individual Project
Deliverable Length:
750–1,000 words; Tabular budget
Details:
Weekly tasks or assignments (Individual or Group Projects) will be due
by
Monday and late submissions will be assigned a late penalty in accordance with the late penalty policy found in the syllabus. NOTE: All submission posting times are based on midnight Central Time.
Concern among the public sector is the demand for public organizations to be transparent about their budgets and spending habits. You have been scheduled to conduct a presentation for the State Budgeting Committee about the type of budget that the organization operates under. Identify the type of public organization for which you work, as well as what types of services, goods, or activities the organization provides to the public. Identify the size and scope of the organization.
Construct a budget using Excel that will provide a breakdown of the various budget items. Copy and paste the Excel spreadsheet of your budget into a Word document. Finally, explain how the budget is made available to the public for review. For example, is the budget made available at public meetings, on a special request, published in a newsletter, on the organization’s premises during regular business hours, via the organization’s Web site, or by some other means? If the budget is not available for the public to review, explain why. Furthermore, are there any provisions in place regarding the budget being made available for public view? Explain in detail.
Assignment Guidelines
Address the following in 750–1,000 words:
Identify the type of public organization for which you work, as well as what types of services, goods, or activities the organization provides to the public. Identify the size and scope of the organization.
Construct a budget using Excel that will provide a breakdown of the various organizational budget items.
Copy and paste the Excel spreadsheet of your budget into a Word document.
Is the budget made available to the public for review?
If yes, explain how in detail.
If no, explain in detail why it is not.
Are there any types of provisions in place regarding the budget being made available for public view? Identify and explain.
Be sure to reference all sources using APA style.
.
Part1 Q1. Classify each of the following as- (i)qual.docxodiliagilby
Part1
Q1. Classify each of the following as:-
(i)
qualitative or quantitative
(ii)
nominal, ordinal, interval or ratio scale.
a.
Times for swimmers to complete a 50meters race.
b.
Months of the year: Meskerem, Tikimit, Hidat, ---.
c.
Region numbers of Riyadh: 1, 2, 3, 4, ---.
d.
Pollen counts provided as numbers between 1 and 10 where 1 means there is almost no pollen and 10 means that it is rampant, but for which the values do not represent an actual count of grains of pollen.
e.
Packages in the city of Cleveland telephone book.
f.
Rankings of tennis players.
g.
Weights of air conditioners.
h.
Personal ID numbers
i.
Telephone numbers
j.
Temperatures inside 10 refrigerators.
k.
Salaries of the top five CEOs in the United States.
l.
Ratings of eight local plays ( poor, fair, good, excellent)
m.
Times required for mechanics to do a tune up.
n.
Ages of students in a classroom.
o.
Marital Status of patients in a physician’s office.
p.
Horsepower of tractor engines.
q.
Colors of baseball caps in a store.
r.
Classification of kids at a day care (infant, toddler, pre-school)
Q2. The following are the grades which 40 students obtained in a certain course in 1997E.C. here in Mekelle University of the Arid Campus.
75 89 66 52 90 68 83 94 77 60 38 47 87 65 97 49 65 72 73 81 63 77 31 88 74 37 85 76 74 63 69 72 91 87 76 58 63 70 72 65
a. Construct an absolute frequency distribution.
b. Convert the distribution obtained in (a) into a Relative & Percentage distribution.
c. Convert the distribution in (a) into a “Less than” &
a “More than” cumulative distribution
d. Construct a histogram, frequency polygon and ogive curve
Q3. The following distribution shows that the result obtained by 100 accounting students in the final examination of statistics in
Saudi Electronic University.
Mark of students.
0-10
10-20
20-30
30-40
40-50
No. of students
14
f1
28
f2
15
If the median mark of students is 22.5, compute:-
i.
The missing frequencies, f1 and f2.
ii.
the mode, and
iii.
the arithmetic mean
iv.
variance
Part 2
Q1.
a. (Smoking and Coffee Drinking)
Coffee
No Coffee
Total
Smoker
60
40
100
Non-Smoker
115
85
200
Total
175
125
300
What is the probability that a randomly selected person from the sample either smokes or drinks coffee.
Q1. b. What is the probability that I flip a coin and get a Head, Roll a die and get a 4 or a 6, and then pull the king of Spades and a diamond from a deck of cards.
Q2: The random variable X has the following probability distribution:
X
0
1
2
3
Total
P(x)
0.22
0.38
0.1
0.3
1
Find the expected value (E(x)) & the Variance.
Q3: A radar unit is used to measure speeds of cars on a highway. The speeds are
normally
distributed with a mean of 90 km/hr and a standard deviation of 10 km/hr. What is the probability that a car picked at random is travelling at:
a-
More than 100 km/hr?
b-
Less than 85 Km/hr?
c-
Between them?
Part 3
Q-1..
Paul’s Letter to the EphesiansThe First Letter of PeterThe Fir.docxodiliagilby
Paul’s Letter to the Ephesians
The First Letter of Peter
The First Letter to Timothy
For each document above; Identify specific content, features, or themes which permit classifying each text early Catholic in character.
At least one credible source
one and half pages
.
Past and FuturePlease respond to the followingImagine back .docxodiliagilby
"Past and Future"
Please respond to the following:
Imagine back in time to pre-Internet days. Describe how you would have established communications for international trade in these time periods: 1935 and 1977.
Imagine it is now 2050. Predict the ease and speed of international trade communications and how it will occur.
2-
"Backtracking from Globalization"
Please respond to the following:
From the e-Activity, illustrate with two examples how the U.S. has restrained trade over the past 60 years and state why you think that happened.
Some believe these restraints have been deleterious to national economic prosperity. In your estimation, speculate as to how these restraints have affected national economic prosperity.
.
Partisan considerations have increasingly influenced the selection.docxodiliagilby
Partisan considerations have increasingly influenced the selection of federal judges. Interest groups on the right and the left have insisted on the appointment of judges who hold compatible views. Presidents and members of Congress have also increasingly sought appointees who will decide issues in ways they prefer. What is your view? Should politics play such a large role in judicial appointments? Or should merit be given greater weight?
Does a merit based system favor ONLY those with money and the connections? needs to be at least 200 words APA
.
Password protect the database you created for your individual assign.docxodiliagilby
Password protect the database you created for your individual assignment in Week Three.
Create
a CRUD matrix to indicate the permissions (read, insert, delete, modify) you would grant to different users of your database.
Create
at least two different users and implement their permissions using SQL statements.
Submit
the following deliverables to your instructor:
The command(s) to protect your entire SQL Server database
The matrix (categories of users are rows, categories of data are columns, and R, I, D, and/or M in the cells)
The SQL code for creating logins and 2 specific users from your matrix
The SQL code for granting appropriate permissions to your 2 new users
.
Part ThreeUsing the theory or model that you selected in Wee.docxodiliagilby
Part Three
Using
the theory or model that you selected in Week Four, develop an intervention thataddresses one of the levels of prevention for your aggregate.
Describe
the intervention plan and how it may be actualized. Include the following:
Formulate one outcome goal and various objectives (as appropriate) and explain why these are appropriate
Explain the intervention plan (including the steps and resources needed)
Identify organizations within the community that may be able to assist with the intervention and explain why they are appropriate to partner with.
Explain how you plan to evaluate the intervention. Include methods and why they are appropriate
.
Part OneIdentify 4 ways that you can convey professionalism in y.docxodiliagilby
Part One
Identify 4 ways that you can convey professionalism in your appearance, attitude, or confidence.
Part Two
Include a list of at least 2 websites that further discuss reading comprehension and / or fluency.
List the titles of the websites, Web addresses, names of the specific Web pages within the websites, etc.
Provide a brief summary of the website and why you believe it is a good resource.
Part Three
Explain why comprehension and fluency are so important to successful reading.
.
Normal Labour/ Stages of Labour/ Mechanism of LabourWasim Ak
Normal labor is also termed spontaneous labor, defined as the natural physiological process through which the fetus, placenta, and membranes are expelled from the uterus through the birth canal at term (37 to 42 weeks
How to Add Chatter in the odoo 17 ERP ModuleCeline George
In Odoo, the chatter is like a chat tool that helps you work together on records. You can leave notes and track things, making it easier to talk with your team and partners. Inside chatter, all communication history, activity, and changes will be displayed.
This slide is special for master students (MIBS & MIFB) in UUM. Also useful for readers who are interested in the topic of contemporary Islamic banking.
This presentation includes basic of PCOS their pathology and treatment and also Ayurveda correlation of PCOS and Ayurvedic line of treatment mentioned in classics.
Safalta Digital marketing institute in Noida, provide complete applications that encompass a huge range of virtual advertising and marketing additives, which includes search engine optimization, virtual communication advertising, pay-per-click on marketing, content material advertising, internet analytics, and greater. These university courses are designed for students who possess a comprehensive understanding of virtual marketing strategies and attributes.Safalta Digital Marketing Institute in Noida is a first choice for young individuals or students who are looking to start their careers in the field of digital advertising. The institute gives specialized courses designed and certification.
for beginners, providing thorough training in areas such as SEO, digital communication marketing, and PPC training in Noida. After finishing the program, students receive the certifications recognised by top different universitie, setting a strong foundation for a successful career in digital marketing.
MATATAG CURRICULUM: ASSESSING THE READINESS OF ELEM. PUBLIC SCHOOL TEACHERS I...NelTorrente
In this research, it concludes that while the readiness of teachers in Caloocan City to implement the MATATAG Curriculum is generally positive, targeted efforts in professional development, resource distribution, support networks, and comprehensive preparation can address the existing gaps and ensure successful curriculum implementation.
Delivering Micro-Credentials in Technical and Vocational Education and TrainingAG2 Design
Explore how micro-credentials are transforming Technical and Vocational Education and Training (TVET) with this comprehensive slide deck. Discover what micro-credentials are, their importance in TVET, the advantages they offer, and the insights from industry experts. Additionally, learn about the top software applications available for creating and managing micro-credentials. This presentation also includes valuable resources and a discussion on the future of these specialised certifications.
For more detailed information on delivering micro-credentials in TVET, visit this https://tvettrainer.com/delivering-micro-credentials-in-tvet/
Thinking of getting a dog? Be aware that breeds like Pit Bulls, Rottweilers, and German Shepherds can be loyal and dangerous. Proper training and socialization are crucial to preventing aggressive behaviors. Ensure safety by understanding their needs and always supervising interactions. Stay safe, and enjoy your furry friends!
Executive Directors Chat Leveraging AI for Diversity, Equity, and InclusionTechSoup
Let’s explore the intersection of technology and equity in the final session of our DEI series. Discover how AI tools, like ChatGPT, can be used to support and enhance your nonprofit's DEI initiatives. Participants will gain insights into practical AI applications and get tips for leveraging technology to advance their DEI goals.
Introduction to AI for Nonprofits with Tapp NetworkTechSoup
Dive into the world of AI! Experts Jon Hill and Tareq Monaur will guide you through AI's role in enhancing nonprofit websites and basic marketing strategies, making it easy to understand and apply.
1. YourLastName2
Nepali2
Name: Shrijana Nepali
Professor: Mark Shepherd
ENGL-1301-51009
LGBT Social Acceptance and Inclusivity
The transgender issue is most common problem in our society.
The number of transgenders in our society are increasing
gradually but we fail to accept them for our narrow vision. It is
very shameful to us that in the time of modern culture we are
breaking many old concepts and accepting new concept. Let's
seek to grasp the term-transgender meaning. There are
individuals who differ from their birth sex by their sexual
identity or gender expression. The research reviewed
concentrated mainly on transgender people's key concerns and
public acceptance. The M. Ed focusing on curriculum is
important because this is the professional and mostly filed
based work as a teacher educator. If we emphasize M. Ed's
transgender term. Curriculum then teacher trainer will be easily
useful for transgender empowerment. Although over the past
two decades a significant body of LGBT health information has
been established, much remains to be explored. What can we do
to empower LGBT rights? What are the priorities for a research
agenda to address these gaps?
Some say LGBT community should be treated with equal rights
as everyone, while others say marriages between same-sex
couples should not be recognized by the law as valid. The
LGBT community is also being criminalized and sentenced.
What Richard did to Sasha as seen in the 57 Bus story is clear
reflection of what is happening in our society today. There is a
lot of violence against people of different sexual orientations
2. and gender identities, some nations go as far as giving people
the death penalty or incarceration. We must therefore ask
ourselves whether there is a connection between the level of
lesbian, gay, bisexual and transgender (LGBT) acceptance and
the level of inclusiveness of the laws of a country. According to
Sasha, gender is "the term for what people feel about
themselves, how they feel inside," and it does not automatically
correspond with the biological sex at birth (Slater).
Community values are reflected in the school’s curriculum, and
teachers could bridge the divide between privileged and
marginalized students by honoring their identities. Traditional
curricula that rely on whole-class topics that privilege
heteronormative expectations do a great disservice to diverse
learners. These topics isolate students. However, topics with
LGBT representation normalize LGBT students, creating a safe
space for academic and emotional growth. Scholars are
beginning to develop models for understanding LGBT
integration in education, but the role of religion in encouraging
or hindering LGBT inclusion has been theorized (Revelle, Carol
and Anna Waugh).
Beyond bridging literature on the political sociology of LGBT
rights and religion and the culture wars, against this backdrop
of legal vulnerability, Legislators who oppose same-sex
marriage and recent moves to advance transgender equality have
brought an anti-LGBT charge, pushing for and often succeeding
in obtaining new laws that impose religious exemptions on
individuals who claim that compliance with specific laws
interferes with their religious or moral convictions. Although
LGBT equality is not the only area in which exemptions were
debated, especially as lawmakers sought to dramatically extend
exemptions for sexual and reproductive healthcare. (Flores and
Barcklay, 43-56)
Dashka Slater's The 57 Bus chronicles events of terrible crime
and subsequent healing, but it also serves as a guidebook for
understanding key LGBT issues and concerns (lesbian, gay,
bisexual, transgender, and queer). Individuals with transgender
3. are marginalized in our society today as we tend to assume that
LGBT people are gay and that was the same reason why Richard
thought Sasha was homosexual in the 57 Bus story. Yet Sasha
wasn't gay, and this common confusion is just one of many
misunderstandings of LGBT dissipated within our culture. The
close friend of Sasha, Andrew, was born to a girl biologically
but now lives his life as a transgender man. He knew he wasn't a
girl, and that wasn't who he was at all, according to Andrew. He
had deep questions about his gender identity, however, he was
sure he didn't feel feminine. Nemo, another close friend of
Sasha, identifies as the fluid of gender. According to Nemo,
"Gender fluid means that at any time I have the potential to be
anything, any gender." Nemo, who also uses his pronoun,
identifies as both male and female, and as such "can be male,
female, male, female, either." Each of these gender identities
highlights the differences within the LGBT community across
the gender spectrum.
As the laws of each country evolve from no inclusion to fuller
inclusion, the legal changes follow one of two paths. Some
countries are moving from the decriminalization of same-sex
behavior to the adoption of laws relating to discrimination in
economic activities, such as employment and public housing,
and some countries are moving from decriminalization to the
adoption of family recognition and parenting laws. These
approaches will contribute to more inclusive legal inclusion
where policies include LGBT citizens in workplace non-
discrimination laws and public housing, family recognition
policies like legal recognition and adoption of same-sex
couples, and military service.
On the other hand, supportive public attitudes and protective
government policies can support improved development
outcomes for LGBT people. Up to date, 63 countries have sex-
oriented non-discrimination laws. It is the aim of many
development agencies to protect LGBT people from violence
and discrimination, pursue full recognition of LGBT people's
human rights, and fight against social exclusion which hinders
4. the full realization of human rights.
According to Political Research Quarterly, vol. 69, Analysis of
the data reveals that the level of social acceptance correlates
with level of legal inclusiveness. The more accepting countries
are, the greater the probability that the country has more
inclusive LGB policies. Figure 1 shows the relationship between
acceptance and probability that a country has no LGB inclusion
or has the fullest LGB inclusion, as described by the policy
environment in Table 2. At the lowest level of acceptance
(GAI=0), there is a 0.9 probability that countries have no
policies inclusive of LGBT people. As acceptance increases,
this probability decreases. At the highest level of acceptance
(GAI=10), countries have less than a one in 100 chance of
having no policy inclusion. Likewise, the probability that
countries have the fullest LGBT policy inclusion is virtually
non-existent at the lowest levels of acceptance but becomes
extremely likely as countries are more accepting. There is a 0.8
probability that the policy environment is the most inclusive at
the highest levels of acceptance.
Of course, the LGBT unique gender and sexual identity does not
mean that they do not also experience meaningful relationships.
However, as seen in the 57 Bus book, Sasha and Nemo
“complement each other,” becoming the other’s “most important
person.” Sasha describes Nemo as "a soul mate, perhaps, but not
in the romantic sense." While Sasha also points out that they are
not with Nemo simply because they both identify as non-binary
gender (gender is simply "another thing they have in common"),
Slater closely examines LGBT identities highlights the diversity
that exists within the gender spectrum and implicitly advocates
for more thoughtful and nuanced consideration of these
differences.
In conclusion, we need to understand that sex is what we are
born with, gender is what we recognize, and sexuality is what
we discover. We, therefore, need a working platform to
introduce the term about transgender into the gender equality
and inclusivity. The skipping of transgender reflects that those
5. curriculums are gender biased. This type of negligence in our
curriculums can create the knowledge gap about transgender
into the teacher educator and cannot provide positive
information into the society for upliftment of many
transgenders.
Works Cited
Flores, Andrew R., and Scott Barclay. “Backlash, Consensus,
Legitimacy, or Polarization: The Effect of Same-Sex Marriage
Policy on Mass Attitudes.” Political Research Quarterly, vol.
69, no. 1, 2016, pp. 43–56., www.jstor.org/stable/44018528.
Ghosh, Priyabrata. "M. Ed. Curriculum followed in Indian
Central Universities: An analytical study with reference to
Transgender Empowerment."
Juárez-Chávez, Elisa, et al. "Violence experiences in childhood
and adolescence among gay men and transgender women living
in Perú: a qualitative exploration." Journal of interpersonal
violence (2018): 0886260518787811.
Page, Michelle L. "Teaching in the cracks: Using familiar
pedagogy to advance LGBTQ‐inclusive curriculum." Journal of
Adolescent & Adult Literacy 60.6 (2017): 677-685.
Revelle, Carol and Anna Waugh. "Sounds of Silence: Patterns
of Censorship and Resources for Change With LGBTQ+ Texts."
Incorporating LGBTQ+ Identities in K-12 Curriculum and
Policy. IGI Global, 2020. 223-251. Web. 29 Nov. 2019.
6. doi:10.4018/978-1-7998-1404-7.ch008
SLATER, DASHKA. 57 Bus: A True Story of Two Teenagers
and the Crime That Changed Their Lives. Place of publication
not identified: FABER AND FABER, 2019. Print
Public Administration and Information
Technology
Volume 10
Series Editor
Christopher G. Reddick
San Antonio, Texas, USA
[email protected]
More information about this series at
http://www.springer.com/series/10796
[email protected]
Marijn Janssen • Maria A. Wimmer
Ameneh Deljoo
Editors
Policy Practice and Digital
8. Publisher, whether the whole or part of the
material is concerned, specifically the rights of translation,
reprinting, reuse of illustrations, recitation,
broadcasting, reproduction on microfilms or in any other
physical way, and transmission or information
storage and retrieval, electronic adaptation, computer software,
or by similar or dissimilar methodology
now known or hereafter developed.
The use of general descriptive names, registered names,
trademarks, service marks, etc. in this publication
does not imply, even in the absence of a specific statement, that
such names are exempt from the relevant
protective laws and regulations and therefore free for general
use.
The publisher, the authors and the editors are safe to assume
that the advice and information in this book
are believed to be true and accurate at the date of publication.
Neither the publisher nor the authors or the
editors give a warranty, express or implied, with respect to the
material contained herein or for any errors
or omissions that may have been made.
Printed on acid-free paper
Springer is part of Springer Science+Business Media
(www.springer.com)
[email protected]
Preface
The last economic and financial crisis has heavily threatened
European and other
economies around the globe. Also, the Eurozone crisis, the
9. energy and climate
change crises, challenges of demographic change with high
unemployment rates,
and the most recent conflicts in the Ukraine and the near East or
the Ebola virus
disease in Africa threaten the wealth of our societies in
different ways. The inability
to predict or rapidly deal with dramatic changes and negative
trends in our economies
and societies can seriously hamper the wealth and prosperity of
the European Union
and its Member States as well as the global networks. These
societal and economic
challenges demonstrate an urgent need for more effective and
efficient processes of
governance and policymaking, therewith specifically addressing
crisis management
and economic/welfare impact reduction.
Therefore, investing in the exploitation of innovative
information and commu-
nication technology (ICT) in the support of good governance
and policy modeling
has become a major effort of the European Union to position
itself and its Member
States well in the global digital economy. In this realm, the
European Union has
laid out clear strategic policy objectives for 2020 in the Europe
2020 strategy1: In
a changing world, we want the EU to become a smart,
sustainable, and inclusive
economy. These three mutually reinforcing priorities should
help the EU and the
Member States deliver high levels of employment, productivity,
and social cohesion.
Concretely, the Union has set five ambitious objectives—on
10. employment, innovation,
education, social inclusion, and climate/energy—to be reached
by 2020. Along with
this, Europe 2020 has established four priority areas—smart
growth, sustainable
growth, inclusive growth, and later added: A strong and
effective system of eco-
nomic governance—designed to help Europe emerge from the
crisis stronger and to
coordinate policy actions between the EU and national levels.
To specifically support European research in strengthening
capacities, in overcom-
ing fragmented research in the field of policymaking, and in
advancing solutions for
1 Europe 2020 http://ec.europa.eu/europe2020/index_en.htm
v
[email protected]
vi Preface
ICT supported governance and policy modeling, the European
Commission has co-
funded an international support action called eGovPoliNet2. The
overall objective
of eGovPoliNet was to create an international, cross-
disciplinary community of re-
searchers working on ICT solutions for governance and policy
modeling. In turn,
the aim of this community was to advance and sustain research
and to share the
11. insights gleaned from experiences in Europe and globally. To
achieve this, eGovPo-
liNet established a dialogue, brought together experts from
distinct disciplines, and
collected and analyzed knowledge assets (i.e., theories,
concepts, solutions, findings,
and lessons on ICT solutions in the field) from different
research disciplines. It built
on case material accumulated by leading actors coming from
distinct disciplinary
backgrounds and brought together the innovative knowledge in
the field. Tools, meth-
ods, and cases were drawn from the academic community, the
ICT sector, specialized
policy consulting firms as well as from policymakers and
governance experts. These
results were assembled in a knowledge base and analyzed in
order to produce com-
parative analyses and descriptions of cases, tools, and scientific
approaches to enrich
a common knowledge base accessible via www.policy-
community.eu.
This book, entitled “Policy Practice and Digital Science—
Integrating Complex
Systems, Social Simulation, and Public Administration in Policy
Research,” is one
of the exciting results of the activities of eGovPoliNet—fusing
community building
activities and activities of knowledge analysis. It documents
findings of comparative
analyses and brings in experiences of experts from academia
and from case descrip-
tions from all over the globe. Specifically, it demonstrates how
the explosive growth
in data, computational power, and social media creates new
12. opportunities for policy-
making and research. The book provides a first comprehensive
look on how to take
advantage of the development in the digital world with new
approaches, concepts,
instruments, and methods to deal with societal and
computational complexity. This
requires the knowledge traditionally found in different
disciplines including public
administration, policy analyses, information systems, complex
systems, and com-
puter science to work together in a multidisciplinary fashion
and to share approaches.
This book provides the foundation for strongly multidisciplinary
research, in which
the various developments and disciplines work together from a
comprehensive and
holistic policymaking perspective. A wide range of aspects for
social and professional
networking and multidisciplinary constituency building along
the axes of technol-
ogy, participative processes, governance, policy modeling,
social simulation, and
visualization are tackled in the 19 papers.
With this book, the project makes an effective contribution to
the overall objec-
tives of the Europe 2020 strategy by providing a better
understanding of different
approaches to ICT enabled governance and policy modeling, and
by overcoming the
fragmented research of the past. This book provides impressive
insights into various
theories, concepts, and solutions of ICT supported policy
modeling and how stake-
holders can be more actively engaged in public policymaking. It
13. draws conclusions
2 eGovPoliNet is cofunded under FP 7, Call identifier FP7-ICT-
2011-7, URL: www.policy-
community.eu
[email protected]
Preface vii
of how joint multidisciplinary research can bring more effective
and resilient find-
ings for better predicting dramatic changes and negative trends
in our economies and
societies.
It is my great pleasure to provide the preface to the book
resulting from the
eGovPoliNet project. This book presents stimulating research by
researchers coming
from all over Europe and beyond. Congratulations to the project
partners and to the
authors!—Enjoy reading!
Thanassis Chrissafis
Project officer of eGovPoliNet
European Commission
DG CNECT, Excellence in Science, Digital Science
[email protected]
Contents
14. 1 Introduction to Policy-Making in the Digital Age . . . . . . . . . .
. . . . . . . 1
Marijn Janssen and Maria A. Wimmer
2 Educating Public Managers and Policy Analysts
in an Era of Informatics . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . 15
Christopher Koliba and Asim Zia
3 The Quality of Social Simulation: An Example from Research
Policy Modelling . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . 35
Petra Ahrweiler and Nigel Gilbert
4 Policy Making and Modelling in a Complex World . . . . . . . .
. . . . . . . . 57
Wander Jager and Bruce Edmonds
5 From Building a Model to Adaptive Robust Decision Making
Using Systems Modeling . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . 75
Erik Pruyt
6 Features and Added Value of Simulation Models Using
Different
Modelling Approaches Supporting Policy-Making: A
Comparative
Analysis . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . . 95
Dragana Majstorovic, Maria A.Wimmer, Roy Lay-Yee, Peter
Davis
and Petra Ahrweiler
7 A Comparative Analysis of Tools and Technologies
for Policy Making . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
15. . . . . . . . . . . . 125
Eleni Kamateri, Eleni Panopoulou, Efthimios Tambouris,
Konstantinos Tarabanis, Adegboyega Ojo, Deirdre Lee
and David Price
8 Value Sensitive Design of Complex Product Systems . . . . . . .
. . . . . . . . 157
Andreas Ligtvoet, Geerten van de Kaa, Theo Fens, Cees van
Beers,
Paulier Herder and Jeroen van den Hoven
ix
[email protected]
x Contents
9 Stakeholder Engagement in Policy Development: Observations
and Lessons from International Experience . . . . . . . . . . . . . . . .
. . . . . . 177
Natalie Helbig, Sharon Dawes, Zamira Dzhusupova, Bram
Klievink
and Catherine Gerald Mkude
10 Values in Computational Models Revalued . . . . . . . . . . . . .
. . . . . . . . . . 205
Rebecca Moody and Lasse Gerrits
11 The Psychological Drivers of Bureaucracy: Protecting
the Societal Goals of an Organization . . . . . . . . . . . . . . . . . . .
. . . . . . . . . 221
Tjeerd C. Andringa
12 Active and Passive Crowdsourcing in Government . . . . . . . .
16. . . . . . . . . 261
Euripidis Loukis and Yannis Charalabidis
13 Management of Complex Systems: Toward Agent-Based
Gaming for Policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . . . 291
Wander Jager and Gerben van der Vegt
14 The Role of Microsimulation in the Development of Public
Policy . . . 305
Roy Lay-Yee and Gerry Cotterell
15 Visual Decision Support for Policy Making: Advancing
Policy
Analysis with Visualization . . . . . . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . . . 321
Tobias Ruppert, Jens Dambruch, Michel Krämer, Tina Balke,
Marco
Gavanelli, Stefano Bragaglia, Federico Chesani, Michela
Milano
and Jörn Kohlhammer
16 Analysis of Five Policy Cases in the Field of Energy Policy .
. . . . . . . . 355
Dominik Bär, Maria A.Wimmer, Jozef Glova, Anastasia
Papazafeiropoulou and Laurence Brooks
17 Challenges to Policy-Making in Developing Countries
and the Roles of Emerging Tools, Methods and Instruments:
Experiences from Saint Petersburg . . . . . . . . . . . . . . . . . . . . . .
. . . . . . . . 379
Dmitrii Trutnev, Lyudmila Vidyasova and Andrei Chugunov
18 Sustainable Urban Development, Governance and Policy:
A Comparative Overview of EU Policies and Projects . . . . . . . .
. . . . . 393
17. Diego Navarra and Simona Milio
19 eParticipation, Simulation Exercise and Leadership Training
in Nigeria: Bridging the Digital Divide . . . . . . . . . . . . . . . . . .
. . . . . . . . . 417
Tanko Ahmed
[email protected]
Contributors
Tanko Ahmed National Institute for Policy and Strategic Studies
(NIPSS), Jos,
Nigeria
Petra Ahrweiler EA European Academy of Technology and
Innovation Assess-
ment GmbH, Bad Neuenahr-Ahrweiler, Germany
Tjeerd C. Andringa University College Groningen, Institute of
Artificial In-
telligence and Cognitive Engineering (ALICE), University of
Groningen, AB,
Groningen, the Netherlands
Tina Balke University of Surrey, Surrey, UK
Dominik Bär University of Koblenz-Landau, Koblenz, Germany
Cees van Beers Faculty of Technology, Policy, and
Management, Delft University
of Technology, Delft, The Netherlands
Stefano Bragaglia University of Bologna, Bologna, Italy
18. Laurence Brooks Brunel University, Uxbridge, UK
Yannis Charalabidis University of the Aegean, Samos, Greece
Federico Chesani University of Bologna, Bologna, Italy
Andrei Chugunov ITMO University, St. Petersburg, Russia
Gerry Cotterell Centre of Methods and Policy Application in the
Social Sciences
(COMPASS Research Centre), University of Auckland,
Auckland, New Zealand
Jens Dambruch Fraunhofer Institute for Computer Graphics
Research, Darmstadt,
Germany
Peter Davis Centre of Methods and Policy Application in the
Social Sciences
(COMPASS Research Centre), University of Auckland,
Auckland, New Zealand
Sharon Dawes Center for Technology in Government,
University at Albany,
Albany, New York, USA
xi
[email protected]
xii Contributors
Zamira Dzhusupova Department of Public Administration and
19. Development Man-
agement, United Nations Department of Economic and Social
Affairs (UNDESA),
NewYork, USA
Bruce Edmonds Manchester Metropolitan University,
Manchester, UK
Theo Fens Faculty of Technology, Policy, and Management,
Delft University of
Technology, Delft, The Netherlands
Marco Gavanelli University of Ferrara, Ferrara, Italy
Lasse Gerrits Department of Public Administration, Erasmus
University
Rotterdam, Rotterdam, The Netherlands
Nigel Gilbert University of Surrey, Guildford, UK
Jozef Glova Technical University Kosice, Kosice, Slovakia
Natalie Helbig Center for Technology in Government,
University at Albany,
Albany, New York, USA
Paulier Herder Faculty of Technology, Policy, and Management,
Delft University
of Technology, Delft, The Netherlands
Jeroen van den Hoven Faculty of Technology, Policy, and
Management, Delft
University of Technology, Delft, The Netherlands
Wander Jager Groningen Center of Social Complexity Studies,
University of
20. Groningen, Groningen, The Netherlands
Marijn Janssen Faculty of Technology, Policy, and
Management, Delft University
of Technology, Delft, The Netherlands
Geerten van de Kaa Faculty of Technology, Policy, and
Management, Delft
University of Technology, Delft, The Netherlands
Eleni Kamateri Information Technologies Institute, Centre for
Research &
Technology—Hellas, Thessaloniki, Greece
Bram Klievink Faculty of Technology, Policy and Management,
Delft University
of Technology, Delft, The Netherlands
Jörn Kohlhammer GRIS, TU Darmstadt & Fraunhofer IGD,
Darmstadt, Germany
Christopher Koliba University of Vermont, Burlington, VT,
USA
Michel Krämer Fraunhofer Institute for Computer Graphics
Research, Darmstadt,
Germany
Roy Lay-Yee Centre of Methods and Policy Application in the
Social Sciences
(COMPASS Research Centre), University of Auckland,
Auckland, New Zealand
Deirdre Lee INSIGHT Centre for Data Analytics, NUIG,
Galway, Ireland
21. [email protected]
Contributors xiii
Andreas Ligtvoet Faculty of Technology, Policy, and
Management, Delft Univer-
sity of Technology, Delft, The Netherlands
Euripidis Loukis University of the Aegean, Samos, Greece
Dragana Majstorovic University of Koblenz-Landau, Koblenz,
Germany
Michela Milano University of Bologna, Bologna, Italy
Simona Milio London School of Economics, Houghton Street,
London, UK
Catherine Gerald Mkude Institute for IS Research, University of
Koblenz-Landau,
Koblenz, Germany
Rebecca Moody Department of Public Administration, Erasmus
University
Rotterdam, Rotterdam, The Netherlands
Diego Navarra Studio Navarra, London, UK
Adegboyega Ojo INSIGHT Centre for Data Analytics, NUIG,
Galway, Ireland
Eleni Panopoulou Information Technologies Institute, Centre
for Research &
Technology—Hellas, Thessaloniki, Greece
22. Anastasia Papazafeiropoulou Brunel University, Uxbridge, UK
David Price Thoughtgraph Ltd, Somerset, UK
Erik Pruyt Faculty of Technology, Policy, and Management,
Delft University of
Technology, Delft, The Netherlands; Netherlands Institute for
Advanced Study,
Wassenaar, The Netherlands
Tobias Ruppert Fraunhofer Institute for Computer Graphics
Research, Darmstadt,
Germany
Efthimios Tambouris Information Technologies Institute, Centre
for Research &
Technology—Hellas, Thessaloniki, Greece; University of
Macedonia, Thessaloniki,
Greece
Konstantinos Tarabanis Information Technologies Institute,
Centre for Research
& Technology—Hellas, Thessaloniki, Greece; University of
Macedonia, Thessa-
loniki, Greece
Dmitrii Trutnev ITMO University, St. Petersburg, Russia
Gerben van der Vegt Faculty of Economics and Business,
University of Groningen,
Groningen, The Netherlands
Lyudmila Vidyasova ITMO University, St. Petersburg, Russia
Maria A. Wimmer University of Koblenz-Landau, Koblenz,
23. Germany
Asim Zia University of Vermont, Burlington, VT, USA
[email protected]
Chapter 1
Introduction to Policy-Making in the Digital Age
Marijn Janssen and Maria A. Wimmer
We are running the 21st century using 20th century systems on
top of 19th century political structures. . . .
John Pollock, contributing editor MIT technology review
Abstract The explosive growth in data, computational power,
and social media
creates new opportunities for innovating governance and policy-
making. These in-
formation and communications technology (ICT) developments
affect all parts of
the policy-making cycle and result in drastic changes in the way
policies are devel-
oped. To take advantage of these developments in the digital
world, new approaches,
concepts, instruments, and methods are needed, which are able
to deal with so-
cietal complexity and uncertainty. This field of research is
sometimes depicted
as e-government policy, e-policy, policy informatics, or data
science. Advancing
our knowledge demands that different scientific communities
collaborate to create
practice-driven knowledge. For policy-making in the digital age
25. 2 M. Janssen and M. A. Wimmer
take advantage of these developments in the digital world, new
approaches, con-
cepts, instruments, and methods are needed, which are able to
deal with societal and
computational complexity. This requires the use of knowledge
which is traditionally
found in different disciplines, including (but not limited to)
public administration,
policy analyses, information systems, complex systems, and
computer science. All
these knowledge areas are needed for policy-making in the
digital age. The aim of
this book is to provide a foundation for this new
interdisciplinary field in which
various traditional disciplines are blended.
Both policy-makers and those in charge of policy
implementations acknowledge
that ICT is becoming more and more important and is changing
the policy-making
process, resulting in a next generation policy-making based on
ICT support. The field
of policy-making is changing driven by developments such as
open data, computa-
tional methods for processing data, opinion mining, simulation,
and visualization of
rich data sets, all combined with public engagement, social
media, and participatory
tools. In this respect Web 2.0 and even Web 3.0 point to the
specific applications of
social networks and semantically enriched and linked data
which are important for
26. policy-making. In policy-making vast amount of data are used
for making predictions
and forecasts. This should result in improving the outcomes of
policy-making.
Policy-making is confronted with an increasing complexity and
uncertainty of the
outcomes which results in a need for developing policy models
that are able to deal
with this. To improve the validity of the models policy-makers
are harvesting data to
generate evidence. Furthermore, they are improving their
models to capture complex
phenomena and dealing with uncertainty and limited and
incomplete information.
Despite all these efforts, there remains often uncertainty
concerning the outcomes of
policy interventions. Given the uncertainty, often multiple
scenarios are developed
to show alternative outcomes and impact. A condition for this is
the visualization of
policy alternatives and its impact. Visualization can ensure
involvement of nonexpert
and to communicate alternatives. Furthermore, games can be
used to let people gain
insight in what can happen, given a certain scenario. Games
allow persons to interact
and to experience what happens in the future based on their
interventions.
Policy-makers are often faced with conflicting solutions to
complex problems,
thus making it necessary for them to test out their assumptions,
interventions, and
resolutions. For this reason policy-making organizations
introduce platforms facili-
27. tating policy-making and citizens engagements and enabling the
processing of large
volumes of data. There are various participative platforms
developed by government
agencies (e.g., De Reuver et al. 2013; Slaviero et al. 2010;
Welch 2012). Platforms
can be viewed as a kind of regulated environment that enable
developers, users, and
others to interact with each other, share data, services, and
applications, enable gov-
ernments to more easily monitor what is happening and
facilitate the development
of innovative solutions (Janssen and Estevez 2013). Platforms
should provide not
only support for complex policy deliberations with citizens but
should also bring to-
gether policy-modelers, developers, policy-makers, and other
stakeholders involved
in policy-making. In this way platforms provide an information-
rich, interactive
[email protected]
1 Introduction to Policy-Making in the Digital Age 3
environment that brings together relevant stakeholders and in
which complex phe-
nomena can be modeled, simulated, visualized, discussed, and
even the playing of
games can be facilitated.
1.2 Complexity and Uncertainty in Policy-Making
Policy-making is driven by the need to solve societal problems
28. and should result in
interventions to solve these societal problems. Examples of
societal problems are
unemployment, pollution, water quality, safety, criminality,
well-being, health, and
immigration. Policy-making is an ongoing process in which
issues are recognized
as a problem, alternative courses of actions are formulated,
policies are affected,
implemented, executed, and evaluated (Stewart et al. 2007).
Figure 1.1 shows the
typical stages of policy formulation, implementation, execution,
enforcement, and
evaluation. This process should not be viewed as linear as many
interactions are
necessary as well as interactions with all kind of stakeholders.
In policy-making
processes a vast amount of stakeholders are always involved,
which makes policy-
making complex.
Once a societal need is identified, a policy has to be formulated.
Politicians,
members of parliament, executive branches, courts, and interest
groups may be
involved in these formulations. Often contradictory proposals
are made, and the
impact of a proposal is difficult to determine as data is missing,
models cannot
citizen
s
Policy formulation
Policy
30. capture the complexity, and the results of policy models are
difficult to interpret and
even might be interpreted in an opposing way. This is further
complicated as some
proposals might be good but cannot be implemented or are too
costly to implement.
There is a large uncertainty concerning the outcomes.
Policy implementation is done by organizations other than those
that formulated
the policy. They often have to interpret the policy and have to
make implemen-
tation decisions. Sometimes IT can block quick implementation
as systems have
to be changed. Although policy-making is the domain of the
government, private
organizations can be involved to some extent, in particular in
the execution of policies.
Once all things are ready and decisions are made, policies need
to be executed.
During the execution small changes are typically made to fine
tune the policy formu-
lation, implementation decisions might be more difficult to
realize, policies might
bring other benefits than intended, execution costs might be
higher and so on. Typ-
ically, execution is continually changing. Evaluation is part of
the policy-making
process as it is necessary to ensure that the policy-execution
solved the initial so-
cietal problem. Policies might become obsolete, might not work,
have unintended
affects (like creating bureaucracy) or might lose its support
among elected officials,
31. or other alternatives might pop up that are better.
Policy-making is a complex process in which many stakeholders
play a role. In
the various phases of policy-making different actors are
dominant and play a role.
Figure 1.1 shows only some actors that might be involved, and
many of them are not
included in this figure. The involvement of so many actors
results in fragmentation
and often actors are even not aware of the decisions made by
other actors. This makes
it difficult to manage a policy-making process as each actor has
other goals and might
be self-interested.
Public values (PVs) are a way to try to manage complexity and
give some guidance.
Most policies are made to adhere to certain values. Public value
management (PVM)
represents the paradigm of achieving PVs as being the primary
objective (Stoker
2006). PVM refers to the continuous assessment of the actions
performed by public
officials to ensure that these actions result in the creation of PV
(Moore 1995). Public
servants are not only responsible for following the right
procedure, but they also have
to ensure that PVs are realized. For example, civil servants
should ensure that garbage
is collected. The procedure that one a week garbage is collected
is secondary. If it is
necessary to collect garbage more (or less) frequently to ensure
a healthy environment
then this should be done. The role of managers is not only to
ensure that procedures
32. are followed but they should be custodians of public assets and
maximize a PV.
There exist a wide variety of PVs (Jørgensen and Bozeman
2007). PVs can be
long-lasting or might be driven by contemporary politics. For
example, equal access
is a typical long-lasting value, whereas providing support for
students at universities
is contemporary, as politicians might give more, less, or no
support to students. PVs
differ over times, but also the emphasis on values is different in
the policy-making
cycle as shown in Fig. 1.2. In this figure some of the values
presented by Jørgensen
and Bozeman (2007) are mapped onto the four policy-making
stages. Dependent on
the problem at hand other values might play a role that is not
included in this figure.
[email protected]
1 Introduction to Policy-Making in the Digital Age 5
Policy
formulation
Policy
implementation
Policy
execution
Policy
34. robust
honesty
fair
timelessness
reliable
flexible
fair
Fig. 1.2 Public values in the policy cycle
Policy is often formulated by politicians in consultation with
experts. In the PVM
paradigm, public administrations aim at creating PVs for society
and citizens. This
suggests a shift from talking about what citizens expect in
creating a PV. In this view
public officials should focus on collaborating and creating a
dialogue with citizens
in order to determine what constitutes a PV.
1.3 Developments
There is an infusion of technology that changes policy processes
at both the individual
and group level. There are a number of developments that
influence the traditional
way of policy-making, including social media as a means to
interact with the public
(Bertot et al. 2012), blogs (Coleman and Moss 2008), open data
(Janssen et al. 2012;
35. Zuiderwijk and Janssen 2013), freedom of information (Burt
2011), the wisdom
of the crowds (Surowiecki 2004), open collaboration and
transparency in policy
simulation (Wimmer et al. 2012a, b), agent-based simulation
and hybrid modeling
techniques (Koliba and Zia 2012) which open new ways of
innovative policy-making.
Whereas traditional policy-making is executed by experts, now
the public is involved
to fulfill requirements of good governance according to open
government principles.
[email protected]
6 M. Janssen and M. A. Wimmer
Also, the skills and capabilities of crowds can be explored and
can lead to better and
more transparent democratic policy decisions. All these
developments can be used for
enhancing citizen’s engagement and to involve citizens better in
the policy-making
process. We want to emphasize three important developments.
1.3.1 The Availability of Big and Open Linked Data (BOLD)
Policy-making heavily depends on data about existing policies
and situations to
make decisions. Both public and private organizations are
opening their data for use
by others. Although information could be requested for in the
past, governments
have changed their strategy toward actively publishing open
36. data in formats that are
readily and easily accessible (for example,
European_Commission 2003; Obama
2009). Multiple perspectives are needed to make use of and
stimulate new practices
based on open data (Zuiderwijk et al. 2014). New applications
and innovations can
be based solely on open data, but often open data are enriched
with data from other
sources. As data can be generated and provided in huge
amounts, specific needs for
processing, curation, linking, visualization, and maintenance
appear. The latter is
often denoted with big data in which the value is generated by
combining different
datasets (Janssen et al. 2014). Current advances in processing
power and memory
allows for the processing of a huge amount of data. BOLD
allows for analyzing
policies and the use of these data in models to better predict the
effect of new policies.
1.3.2 Rise of Hybrid Simulation Approaches
In policy implementation and execution, many actors are
involved and there are a
huge number of factors influencing the outcomes; this
complicates the prediction
of the policy outcomes. Simulation models are capable of
capturing the interdepen-
dencies between the many factors and can include stochastic
elements to deal with
the variations and uncertainties. Simulation is often used in
policy-making as an
instrument to gain insight in the impact of possible policies
which often result in
37. new ideas for policies. Simulation allows decision-makers to
understand the essence
of a policy, to identify opportunities for change, and to evaluate
the effect of pro-
posed changes in key performance indicators (Banks 1998; Law
and Kelton 1991).
Simulation heavily depends on data and as such can benefit
from big and open data.
Simulation models should capture the essential aspects of
reality. Simulation
models do not rely heavily on mathematical abstraction and are
therefore suitable
for modeling complex systems (Pidd 1992). Already the
development of a model
can raise discussions about what to include and what factors are
of influence, in this
way contributing to a better understanding of the situation at
hand. Furthermore,
experimentation using models allows one to investigate
different settings and the
influence of different scenarios in time on the policy outcomes.
[email protected]
1 Introduction to Policy-Making in the Digital Age 7
The effects of policies are hard to predict and dealing with
uncertainty is a key
aspect in policy modeling. Statistical representation of real-
world uncertainties is
an integral part of simulation models (Law and Kelton 1991).
The dynamics asso-
ciated with many factors affecting policy-making, the
38. complexity associated with
the interdependencies between individual parts, and the
stochastic elements asso-
ciated with the randomness and unpredictable behavior of
transactions complicates
the simulations. Computer simulations for examining,
explaining, and predicting so-
cial processes and relationships as well as measuring the
possible impact of policies
has become an important part of policy-making. Traditional
models are not able to
address all aspects of complex policy interactions, which
indicates the need for the
development of hybrid simulation models consisting of a
combinatory set of models
built on different modeling theories (Koliba and Zia 2012). In
policy-making it can
be that multiple models are developed, but it is also possible to
combine various
types of simulation in a single model. For this purpose agent-
based modeling and
simulation approaches can be used as these allow for combining
different type of
models in a single simulation.
1.3.3 Ubiquitous User Engagement
Efforts to design public policies are confronted with
considerable complexity, in
which (1) a large number of potentially relevant factors needs to
be considered, (2) a
vast amount of data needs to be processed, (3) a large degree of
uncertainty may exist,
and (4) rapidly changing circumstances need to be dealt with.
Utilizing computational
methods and various types of simulation and modeling methods
39. is often key to
solving these kinds of problems (Koliba and Zia 2012). The
open data and social
media movements are making large quantities of new data
available. At the same time
enhancements in computational power have expanded the
repertoire of instruments
and tools available for studying dynamic systems and their
interdependencies. In
addition, sophisticated techniques for data gathering,
visualization, and analysis have
expanded our ability to understand, display, and disseminate
complex, temporal, and
spatial information to diverse audiences. These problems can
only be addressed from
a complexity science perspective and with a multitude of views
and contributions
from different disciplines. Insights and methods of complexity
science should be
applied to assist policy-makers as they tackle societal problems
in policy areas such
as environmental protection, economics, energy, security, or
public safety and health.
This demands user involvement which is supported by
visualization techniques and
which can be actively involved by employing (serious) games.
These methods can
show what hypothetically will happen when certain policies are
implemented.
[email protected]
8 M. Janssen and M. A. Wimmer
40. 1.4 Combining Disciplines in E-government Policy-Making
This new field has been shaped using various names, including
e-policy-making,
digital policy science, computational intelligence, digital
sciences, data sciences,
and policy informatics (Dawes and Janssen 2013). The essence
of this field it that it
is
1. Practice-driven
2. Employs modeling techniques
3. Needs the knowledge coming from various disciplines
4. It focused on governance and policy-making
This field is practice-driven by taking as a starting point the
public policy problem and
defining what information is relevant for addressing the
problem under study. This
requires understanding of public administration and policy-
making processes. Next,
it is a key to determine how to obtain, store, retrieve, process,
model, and interpret the
results. This is the field of e-participation, policy-modeling,
social simulation, and
complex systems. Finally, it should be agreed upon how to
present and disseminate
the results so that other researchers, decision-makers, and
practitioners can use it.
This requires in-depth knowledge of practice, of structures of
public administration
and constitutions, political cultures, processes and culture and
policy-making.
Based on the ideas, the FP7 project EgovPoliNet project has
created an inter-
41. national community in ICT solutions for governance and policy-
modeling. The
“policy-making 2.0” LinkedIn community has a large number of
members from dif-
ferent disciplines and backgrounds representing practice and
academia. This book
is the product of this project in which a large number of persons
from various dis-
ciplines and representing a variety of communities were
involved. The book shows
experiences and advances in various areas of policy-making.
Furthermore, it contains
comparative analyses and descriptions of cases, tools, and
scientific approaches from
the knowledge base created in this project. Using this book,
practices and knowl-
edge in this field is shared among researchers. Furthermore, this
book provides the
foundations in this area. The covered expertise include a wide
range of aspects for so-
cial and professional networking and multidisciplinary
constituency building along
the axes of technology, participative processes, governance,
policy-modeling, social
simulation, and visualization. In this way eGovPoliNet has
advanced the way re-
search, development, and practice is performed worldwide in
using ICT solutions
for governance and policy-modeling.
Although in Europe the term “e-government policy” or “e-
policy,” for short, is
often used to refer to these types of phenomena, whereas in the
USA often the term
“policy informatics” is used. This is similar to that in the USA
the term digital
42. government is often used, whereas in Europe the term e-
government is preferred.
Policy informatics is defined as “the study of how information
is leveraged and efforts
are coordinated towards solving complex public policy
problems” (Krishnamurthy
et al. 2013, p. 367). These authors view policy informatics as an
emerging research
space to navigate through the challenges of complex layers of
uncertainty within
[email protected]
1 Introduction to Policy-Making in the Digital Age 9
governance processes. Policy informatics community has
created Listserv called
Policy Informatics Network (PIN-L).
E-government policy-making is closely connected to “data
science.” Data science
is the ability to find answers from larger volumes of
(un)structured data (Davenport
and Patil 2012). Data scientists find and interpret rich data
sources, manage large
amounts of data, create visualizations to aid in understanding
data, build mathemat-
ical models using the data, present and communicate the data
insights/findings to
specialists and scientists in their team, and if required to a
nonexpert audience. These
are activities which are at the heart of policy-making.
1.5 Overview of Chapters
43. In total 54 different authors were involved in the creation of
this book. Some chapters
have a single author, but most of the chapters have multiple
authors. The authors rep-
resent a wide range of disciplines as shown in Fig. 1.2. The
focus has been on targeting
five communities that make up the core field for ICT-enabled
policy-making. These
communities include e-government/e-participation, information
systems, complex
systems, public administration, and policy research and social
simulation. The com-
bination of these disciplines and communities are necessary to
tackle policy problems
in new ways. A sixth category was added for authors not
belonging to any of these
communities, such as philosophy and economics. Figure 1.3
shows that the authors
are evenly distributed among the communities, although this is
less with the chapter.
Most of the authors can be classified as belonging to the e-
government/e-participation
community, which is by nature interdisciplinary.
Foundation The first part deals with the foundations of the
book. In their Chap. 2
Chris Koliba and Asim Zia start with a best practice to be
incorporated in public
administration educational programs to embrace the new
developments sketched in
EGOV
IS
44. Complex Systems
Public Administration and
Policy Research
Social Simulation
other (philosophy, energy,
economics, )
Fig. 1.3 Overview of the disciplinary background of the authors
[email protected]
10 M. Janssen and M. A. Wimmer
this chapter. They identify two types of public servants that
need to be educated.
The policy informatics include the savvy public manager and
the policy informatics
analyst. This chapter can be used as a basis to adopt
interdisciplinary approaches and
include policy informatics in the public administration
curriculum.
Petra Ahrweiler and Nigel Gilbert discuss the need for the
quality of simulation
modeling in their Chap. 3. Developing simulation is always
based on certain as-
sumptions and a model is as good as the developer makes it.
The user community is
proposed to assess the quality of a policy-modeling exercise.
Communicative skills,
patience, willingness to compromise on both sides, and
45. motivation to bridge the
formal world of modelers and the narrative world of policy-
makers are suggested as
key competences. The authors argue that user involvement is
necessary in all stages
of model development.
Wander Jager and Bruce Edmonds argue that due to the
complexity that many
social systems are unpredictable by nature in their Chap. 4.
They discuss how some
insights and tools from complexity science can be used in
policy-making. In particular
they discuss the strengths and weaknesses of agent-based
modeling as a way to gain
insight in the complexity and uncertainty of policy-making.
In the Chap. 5, Erik Pruyt sketches the future in which different
systems modeling
schools and modeling methods are integrated. He shows that
elements from policy
analysis, data science, machine learning, and computer science
need to be combined
to deal with the uncertainty in policy-making. He demonstrates
the integration of
various modeling and simulation approaches and related
disciplines using three cases.
Modeling approaches are compared in the Chap. 6 authored by
Dragana Majs-
torovic, Maria A. Wimmer, Roy Lay-Yee, Peter Davis,and Petra
Ahrweiler. Like in
the previous chapter they argue that none of the theories on its
own is able to address
all aspects of complex policy interactions, and the need for
hybrid simulation models
46. is advocated.
The next chapter is complimentary to the previous chapter and
includes a com-
parison of ICT tools and technologies. The Chap. 7 is authored
by Eleni Kamateri,
Eleni Panopoulou, Efthimios Tambouris, Konstantinos
Tarabanis, Adegboyega Ojo,
Deirdre Lee, and David Price. This chapter can be used as a
basis for tool selecting
and includes visualization, argumentation, e-participation,
opinion mining, simula-
tion, persuasive, social network analysis, big data analytics,
semantics, linked data
tools, and serious games.
Social Aspects, Stakeholders and Values Although much
emphasis is put on mod-
eling efforts, the social aspects are key to effective policy-
making. The role of values
is discussed in the Chap. 8 authored by Andreas Ligtvoet,
Geerten van de Kaa, Theo
Fens, Cees van Beers, Paulien Herder, and Jeroen van den
Hoven. Using the case of
the design of smart meters in energy networks they argue that
policy-makers would
do well by not only addressing functional requirements but also
by taking individual
stakeholder and PVs into consideration.
In policy-making a wide range of stakeholders are involved in
various stages
of the policy-making process. Natalie Helbig, Sharon Dawes,
Zamira Dzhusupova,
Bram Klievink, and Catherine Gerald Mkude analyze five case
studies of stakeholder
47. [email protected]
1 Introduction to Policy-Making in the Digital Age 11
engagement in policy-making in their Chap. 9. Various
engagement tools are dis-
cussed and factors identified which support the effective use of
particular tools and
technologies.
The Chap. 10 investigates the role of values and trust in
computational models in
the policy process. This chapter is authored by Rebecca Moody
and Lasse Gerrits. The
authors found that a large diversity exists in values within the
cases. By the authors
important explanatory factors were found including (1) the role
of the designer of
the model, (2) the number of different actors (3) the level of
trust already present,
and (4) and the limited control of decision-makers over the
models.
Bureaucratic organizations are often considered to be inefficient
and not customer
friendly. Tjeerd Andringa presents and discusses a
multidisciplinary framework con-
taining the drivers and causes of bureaucracy in the Chap. 11.
He concludes that the
reduction of the number of rules and regulations is important,
but that motivating
workers to understand their professional roles and to learn to
oversee the impact of
48. their activities is even more important.
Crowdsourcing has become an important policy instrument to
gain access to
expertise (“wisdom”) outside own boundaries. In the Chap. 12,
Euripids Loukis
and Yannis Charalabidis discuss Web 2.0 social media for
crowdsourcing. Passive
crowdsourcing exploits the content generated by users, whereas
active crowdsourcing
stimulates content postings and idea generation by users.
Synergy can be created by
combining both approaches. The results of passive
crowdsourcing can be used for
guiding active crowdsourcing to avoid asking users for similar
types of input.
Policy, Collaboration and Games Agent-based gaming (ABG) is
used as a tool
to explore the possibilities to manage complex systems in the
Chap. 13 by Wander
Jager and Gerben van der Vegt. ABG allows for modeling a
virtual and autonomous
population in a computer game setting to exploit various
management and leadership
styles. In this way ABG contribute to the development of the
required knowledge on
how to manage social complex behaving systems.
Micro simulation focuses on modeling individual units and the
micro-level pro-
cesses that affect their development. The concepts of micro
simulation are explained
by Roy Lay-Yee and Gerry Cotterell in the Chap. 14. Micro
simulation for pol-
icy development is useful to combine multiple sources of
49. information in a single
contextualized model to answer “what if” questions on complex
social phenomena.
Visualization is essential to communicate the model and the
results to a variety
of stakeholders. These aspects are discussed in the Chap. 15 by
Tobias Ruppert,
Jens Dambruch, Michel Krämer, Tina Balke, Marco Gavanelli,
Stefano Bragaglia,
Federico Chesani, Michela Milano, and Jörn Kohlhammer. They
argue that despite
the significance to use evidence in policy-making, this is
seldom realized. Three
case studies that have been conducted in two European research
projects for policy-
modeling are presented. In all the cases access for nonexperts to
the computational
models by information visualization technologies was realized.
[email protected]
12 M. Janssen and M. A. Wimmer
Applications and Practices Different projects have been
initiated to study the best
suitable transition process towards renewable energy. In the
Chap. 16 by Dominik
Bär, Maria A. Wimmer, Jozef Glova, Anastasia
Papazafeiropoulou,and Laurence
Brooks five of these projects are analyzed and compared. They
please for transferring
models from one country to other countries to facilitate
learning.
50. Lyudmila Vidyasova, Andrei Chugunov, and Dmitrii Trutnev
present experiences
from Russia in their Chap. 17. They argue that informational,
analytical, and fore-
casting activities for the processes of socioeconomic
development are an important
element in policy-making. The authors provide a brief overview
of the history, the
current state of the implementation of information processing
techniques, and prac-
tices for the purpose of public administration in the Russian
Federation. Finally, they
provide a range of recommendations to proceed.
Urban policy for sustainability is another important area which
is directly linked
to the first chapter in this section. In the Chap. 18, Diego
Navarra and Simona Milio
demonstrate a system dynamics model to show how urban policy
and governance in
the future can support ICT projects in order to reduce energy
usage, rehabilitate the
housing stock, and promote sustainability in the urban
environment. This chapter
contains examples of sustainable urban development policies as
well as case studies.
In the Chap. 19, Tanko Ahmed discusses the digital divide
which is blocking
online participation in policy-making processes. Structuration,
institutional and
actor-network theories are used to analyze a case study of
political zoning. The
author recommends stronger institutionalization of ICT support
and legislation for
51. enhancing participation in policy-making and bridging the
digital divide.
1.6 Conclusions
This book is the first comprehensive book in which the various
development and disci-
plines are covered from the policy-making perspective driven by
ICT developments.
A wide range of aspects for social and professional networking
and multidisciplinary
constituency building along the axes of technology,
participative processes, gover-
nance, policy-modeling, social simulation, and visualization are
investigated. Policy-
making is a complex process in which many stakeholders are
involved. PVs can be
used to guide policy-making efforts and to ensure that the many
stakeholders have
an understanding of the societal value that needs to be created.
There is an infusion
of technology resulting in changing policy processes and
stakeholder involvement.
Technologies like social media provides a means to interact
with the public, blogs
can be used to express opinions, big and open data provide
input for evidence-based
policy-making, the integration of various types of modeling and
simulation tech-
niques (hybrid models) can provide much more insight and
reliable outcomes, gam-
ing in which all kind of stakeholders are involved open new
ways of innovative policy-
making. In addition trends like the freedom of information, the
wisdom of the crowds,
and open collaboration changes the landscape further. The
52. policy-making landscape
is clearly changing and this demands a strong need for
interdisciplinary research.
[email protected]
1 Introduction to Policy-Making in the Digital Age 13
References
Banks J (1998) Handbook of simulation: principles,
methodology, advances, applications, and
practice. Wiley, New York
Bertot JC, Jaeger PT, Hansen D (2012) The impact of polices on
government social media usage:
Issues, challenges, and recommendations. Gov Inform Q 29:30–
40
Burt E (2011) Introduction to the freedom of information
special edition: emerging perspectives,
critical reflections, and the need for further research. Inform
Polit 16(2):91–92.
Coleman S, Moss G (2008) Governing at a distance—politicians
in the blogosphere. Inform Polit
12(1–2):7–20.
Davenport TH, Patil DJ (2012) Data scientist: the sexiest job of
the 21st century. Harv Bus Rev
90(10):70–76
Dawes SS, Janssen M (2013) Policy informatics: addressing
complex problems with rich data, com-
53. putational tools, and stakeholder engagement. Paper presented
at the 14th annual international
conference on digital government research, Quebec City,
Canada
De Reuver M, Stein S, Hampe F (2013) From eparticipation to
mobile participation: designing a
service platform and business model for mobile participation.
Inform Polit 18(1):57–73
European_Commission (2003) Directive 2003/98/EC of the
European Parliament and of the coun-
cil of 17 November 2003 on the re-use of public sector
information. http://ec.europa.eu/
information_society/policy/psi/rules/eu/index_en.htm. Accessed
12 Dec 2012
Janssen M, Estevez E (2013) Lean government and platform-
based governance—doing more with
less. Gov Inform Quert 30(suppl 1):S1–S8
Janssen M, Charalabidis Y, Zuiderwijk A (2012) Benefits,
adoption barriers and myths of open data
and open government. Inform Syst Manage 29(4):258–268
Janssen M, Estevez E, Janowski T (2014) Interoperability in
big, open, and linked data—
organizational maturity, capabilities, and data portfolios.
Computer 47(10):26–31
Jørgensen TB, Bozeman B (2007) Public values: an inventory.
Adm Soc 39(3):354–381
Koliba C, Zia A (2012) Governance Informatics: using
computer simulation models to deepen
situational awareness and governance design considerations
54. policy informatics. MIT Press,
Cambridge.
Krishnamurthy R, Bhagwatwar A, Johnston EW, Desouza KC
(2013) A glimpse into policy in-
formatics: the case of participatory platforms that generate
synthetic empathy. Commun Assoc
Inform Syst 33(Article 21):365–380.
Law AM, Kelton WD (1991) Simulation modeling and analysis
2nd ed. McGraw-Hill, New York
Moore MH (1995) Creating public value: strategic management
in government. Harvard University
Press, Cambridge
Obama B (2009) Memorandum for the Heads of executive
Departments and Agencies: trans-
parency and open government. Retrieved February 21, 2013,
from http://www.whitehouse.gov/
the_press_office/Transparency_and_Open_Government
Pidd M (1992) Computer simulation in management science, 3rd
ed. John Wiley, Chichester
Slaviero C, Maciel C, Alencar F, Santana E, Souza P (2010)
Designing a platform to facilitate
the development of virtual e-participation environments. Paper
presented at the ICEGOV ’10
proceedings of the 4th international conference on theory and
practice of electronic governance,
Beijing
Stewart JJ, Hedge DM, Lester JP (2007) Public policy: an
evolutionary approach 3rd edn. Cengage
Learning, Wadsworth
55. Stoker G (2006) Public value management: a new narrative for
networked governance? Am Rev
Public Adm 3(1):41–57
Surowiecki J (2004) The wisdom of crowds: why the many are
smarter than the few and how
collective wisdom shapes business economies, societies and
nations. Doubleday
Welch EW (2012) The rise of participative technologies in
government. In: Shareef MA, Archer N,
Dwivedi YK, Mishra A, Pandey SK (eds) Transformational
government through eGov practice:
socioeconomic, cultural, and technological issues. Emerald
Group Publishing Limited
[email protected]
http://ec.europa.eu/information_society/policy/psi/rules/eu/inde
x_en.htm.
http://ec.europa.eu/information_society/policy/psi/rules/eu/inde
x_en.htm.
http://www.whitehouse.gov/theprotect LY1extunderscore
pressprotect LY1extunderscore office/Transparencyprotect
LY1extunderscore andprotect LY1extunderscore Openprotect
LY1extunderscore Government
http://www.whitehouse.gov/theprotect LY1extunderscore
pressprotect LY1extunderscore office/Transparencyprotect
LY1extunderscore andprotect LY1extunderscore Openprotect
LY1extunderscore Government
14 M. Janssen and M. A. Wimmer
Wimmer MA, Furdik K, Bicking M, Mach M, Sabol T, Butka P
56. (2012a) Open collaboration in
policy development: concept and architecture to integrate
scenario development and formal
policy modelling. In: Charalabidis Y, Koussouris S (eds)
Empowering open and collaborative
governance. Technologies and methods for online citizen
engagement in public policy making.
Springer, Berlin, pp 199–219
Wimmer MA, Scherer S, Moss S, Bicking M (2012b) Method
and tools to support stakeholder
engagement in policy development the OCOPOMO project. Int J
Electron Gov Res (IJEGR)
8(3):98–119
Zuiderwijk A, Janssen M (2013) A coordination theory
perspective to improve the use of open data
in policy-making. Paper presented at the 12th conference on
Electronic Government (EGOV),
Koblenz
Zuiderwijk A, Helbig N, Gil-García JR, Janssen M (2014)
Innovation through open data—a review
of the state-of-the-art and an emerging research agenda. J Theor
Appl Electron Commer Res
9(2):I–XIII.
[email protected]
Chapter 2
Educating Public Managers and Policy Analysts
in an Era of Informatics
Christopher Koliba and Asim Zia
57. Abstract In this chapter, two ideal types of practitioners who
may use or cre-
ate policy informatics projects, programs, or platforms are
introduced: the policy
informatics-savvy public manager and the policy informatics
analyst. Drawing from
our experiences in teaching an informatics-friendly graduate
curriculum, we dis-
cuss the range of learning competencies needed for traditional
public managers and
policy informatics-oriented analysts to thrive in an era of
informatics. The chapter
begins by describing the two different types of students who
are, or can be touched
by, policy informatics-friendly competencies, skills, and
attitudes. Competencies
ranging from those who may be users of policy informatics and
sponsors of policy
informatics projects and programs to those analysts designing
and executing policy
informatics projects and programs will be addressed. The
chapter concludes with
an illustration of how one Master of Public Administration
(MPA) program with a
policy informatics-friendly mission, a core curriculum that
touches on policy infor-
matics applications, and a series of program electives that
allows students to develop
analysis and modeling skills, designates its informatics-oriented
competencies.
2.1 Introduction
The range of policy informatics opportunities highlighted in this
volume will require
59. Drawing from our experiences in teaching an informatics-
friendly graduate curricu-
lum, we discuss the range of learning competencies needed for
traditional public
managers and policy informatics-oriented analysts to thrive in
an era of informatics.
The chapter begins by describing the two different types of
students who are, or can
be touched by, policy informatics-friendly competencies, skills,
and attitudes. Com-
petencies ranging from those who may be users of policy
informatics and sponsors of
policy informatics projects and programs to those analysts
designing and executing
policy informatics projects and programs will be addressed. The
chapter concludes
with an illustration of how one MPA program with a policy
informatics-friendly
mission, a core curriculum that touches on policy informatics
applications, and a
series of program electives that allows students to develop
analysis and modeling
skills, designates its informatics-oriented competencies.
2.2 Two Types of Practitioner Orientations to Policy
Informatics
Drawn from our experience, we find that there are two “ideal
types” of policy infor-
matics practitioner, each requiring greater and greater levels of
technical mastery of
analytics techniques and approaches. These ideal types are:
policy informatics-savvy
public managers and policy informatics analysts.
A policy informatics-savvy public manager may take on one of
60. two possible roles
relative to policy informatics projects, programs, or platforms.
They may play instru-
mental roles in catalyzing and implementing informatics
initiatives on behalf of their
organizations, agencies, or institutions. In the manner, they may
work with technical
experts (analysts) to envision possible uses for data,
visualizations, simulations, and
the like. Public managers may also be in the role of using policy
informatics projects,
programs, or platforms. They may be in positions to use these
initiatives to ground
decision making, allocate resources, and otherwise guide the
performance of their
organizations.
A policy informatics analyst is a person who is positioned to
actually execute
a policy informatics initiative. They may be referred to as
analysts, researchers,
modelers, or programmers and provide the technical assistance
needed to analyze
databases, build and run models, simulations, and otherwise
construct useful and
effective policy informatics projects, programs, or platforms.
To succeed in either and both roles, managers and analysts will
require a certain set
of skills, knowledge, or competencies. Drawing on some of the
prevailing literature
and our own experiences, we lay out an initial list of potential
competencies for
consideration.
[email protected]
61. 2 Educating Public Managers and Policy Analysts in an Era of
Informatics 17
2.2.1 Policy Informatics-Savvy Public Managers
To successfully harness policy informatics, public managers
will likely not need to
know how to explicitly build models or manipulate big data.
Instead, they will need
to know what kinds of questions that policy informatics projects
or programs can
answer or not answer. They will need to know how to contract
with and/or manage
data managers, policy analysts, and modelers. They will need to
be savvy consumers
of data analysis and computational models, but not necessarily
need to know how to
technically execute them. Policy informatics projects, programs,
and platforms are
designed and executed in some ways, as any large-scale,
complex project.
In writing about the stages of informatics project development
using “big data,”
DeSouza lays out project development along three stages:
planning, execution, and
postimplementation. Throughout the project life cycle, he
emphasizes the role of
understanding the prevailing policy and legal environment, the
need to venture into
coalition building, the importance of communicating the broader
opportunities af-
forded by the project, the need to develop performance
62. indicators, and the importance
of lining up adequate financial and human resources (2014).
Framing what traditional public managers need to know and do
to effectively
interface with policy informatics projects and programs requires
an ability to be a
“systems thinker,” an effective evaluator, a capacity to integrate
informatics into
performance and financial management systems, effective
communication skills,
and a capacity to draw on social media, information technology,
and e-governance
approaches to achieve common objectives. We briefly review
each of these capacities
below.
Systems Thinking Knowing the right kinds of questions that
may be asked through
policy informatics projects and programs requires public
managers to possess a “sys-
tems” view. Much has been written about the importance of
“systems thinking” for
public managers (Katz and Kahn 1978; Stacey 2001; Senge
1990; Korton 2001).
Taking a systems perspective allows public managers to
understand the relationship
between the “whole” and the “parts.” Systems-oriented public
managers will possess
a level of situational awareness (Endsley 1995) that allows them
to see and under-
stand patterns of interaction and anticipate future events and
orientations. Situational
awareness allows public mangers to understand and evaluate
where data are coming
from, how best data are interpreted, and the kinds of
63. assumptions being used in
specific interpretations (Koliba et al. 2011). The concept of
system thinking laid out
here can be associated with the notion of transition management
(Loorbach 2007).
Process Orientations to Public Policy The capacity to view the
policy making and
implementation process as a process that involves certain levels
of coordination
and conflict between policy actors is of critical importance for
policy informatics-
savvy public managers and analysts. Understanding how data
are used to frame
problems and policy solutions, how complex governance
arrangements impact policy
implementation (Koliba et al. 2010), and how data visualization
can be used to
[email protected]
18 C. Koliba and A. Zia
facilitate the setting of policy agendas and open policy windows
(Kingdon 1984) is
of critical importance for public management and policy
analysts alike.
Research Methodologies Another basic competency needed for
any public manager
using policy informatics is a foundational understanding of
research methods, par-
ticularly quantitative reasoning and methodologies. A
foundational understanding of
64. data validity, analytical rigor and relevance, statistical
significance, and the like are
needed to be effective consumers of informatics. That said,
traditional public man-
agers should also be exposed to qualitative methods as well,
refining their powers of
observation, understanding how symbols, stories, and numbers
are used to govern,
and how data and data visualization and computer simulations
play into these mental
models.
Performance Management A key feature of systems thinking as
applied to policy
informatics is the importance of understanding how data and
analysis are to be
used and who the intended users of the data are (Patton 2008).
The integration of
policy informatics into strategic planning (Bryson 2011),
performance management
systems (Moynihan 2008), and ultimately woven into an
organization’s capacity to
learn, adapt, and evolve (Argyis and Schön 1996) are critically
important in this
vein. As policy informatics trends evolve, public managers will
likely need to be
exposed to uses of decision support tools, dashboards, and other
computationally
driven models and visualizations to support organizational
performance.
Financial Management Since the first systemic budgeting
systems were put in place,
public managers have been urged to use the budgeting process
as a planning and eval-
uation tool (Willoughby 1918). This approach was formally
65. codified in the 1960s
with the planning–programming–budgeting (PPB) system with
its focus on plan-
ning, managerial, and operational control (Schick 1966) and
later adopted into more
contemporary approaches to budgeting (Caiden 1981). Using
informative projects,
programs, or platforms to make strategic resource allocation
decisions is a necessary
given and a capacity that effective public managers must
master. Likewise, the pol-
icy analyst will likely need to integrate financial resource flows
and costs into their
projects.
Collaborative and Cooperative Capacity Building The
development and use of pol-
icy informatics projects, programs, or platforms is rarely, if
ever, undertaken as
an individual, isolated endeavor. It is more likely that such
initiatives will require
interagency, interorganizational, or intergroup coordination. It
is also likely that
content experts will need to be partnered with analysts and
programmers to com-
plete tasks and execute designs. The public manager and policy
analyst must both
possess the capacity to facilitate collaborative management
functions (O’Leary and
Bingham 2009).
Basic Communication Skills This perhaps goes without saying,
but the heart of any
informatics project lies in the ability to effectively
communicate findings and ideas
through the analysis of data.
66. [email protected]
2 Educating Public Managers and Policy Analysts in an Era of
Informatics 19
Social Media, Information Technology, and e-Governance
Awareness A final com-
petency concerns public managers’ capacity to deepen their
understanding of how
social media, Web-based tools, and related information
technologies are being em-
ployed to foster various e-government, e-governance, and
related initiatives (Mergel
2013). Placing policy informatics projects and programs within
the context of these
larger trends and uses is something that public managers must
be exposed to.
Within our MPA program, we have operationalized these
capacities within a four-
point rubric that outlines what a student needs to do to
demonstrate meeting these
standards. The rubric below highlights 8 of our program’s 18
capacities. All 18 of
these capacities are situated under 1 of the 5 core competencies
tied to the accred-
itation standards of the Network of Schools of Public Affairs
and Administration
(NASPAA), the professional accrediting association in the USA,
and increasingly in
other countries as well, for MPA and MPP programs. A
complete list of these core
competencies and the 18 capacities nested under them are
67. provided in Appendix of
this chapter.
The eight capacities that we have singled out as being the most
salient to the role
of policy informatics in public administration are provided in
Table 2.1. The rubric
follows a four-point scale, ranging from “does not meet
standard,” “approaches
standard,” “meets standard,” and “exceeds standard.”
2.2.2 Policy Informatics Analysts
A second type of practitioner to be considered is what we are
referring to as a “policy
informatics analyst.” When considering the kinds of
competencies that policy infor-
matics analysts need to be successful, we first assume that the
basic competencies
outlined in the prior section apply here as well. In other words,
effective policy in-
formatics analysts must be systems thinkers in order to place
data and their analysis
into context, be cognizant of current uses of decision support
systems (and related
platforms) to enable organizational learning, performance, and
strategic planning,
and possess an awareness of e-governance and e-government
initiatives and how they
are transforming contemporary public management and policy
planning practices.
In addition, policy analysts must possess a capacity to
understand policy systems:
How policies are made and implemented? This baseline
understanding can then be
used to consider the placement, purpose, and design of policy
68. informatics projects
or programs. We lay out more specific analyst capacities below.
Advanced Research Methods of Information Technology
Applications In many in-
stances, policy informatics analysts will need to move beyond
meeting the standard.
This is particularly true in the area of exceeding the public
manager standards for re-
search methods and utilization of information technology. It is
assumed that effective
policy informatics analysts will have a strong foundation in
quantitative methodolo-
gies and applications. To obtain these skills, policy analysts
will need to move beyond
basic surveys of research methods into more advanced research
methods curriculum.
[email protected]
20 C. Koliba and A. Zia
T
ab
le
2.
1
P
ub
li
220. fo
rm
at
io
n
te
ch
no
lo
gy
[email protected]
2 Educating Public Managers and Policy Analysts in an Era of
Informatics 23
Competencies in advanced quantitative methods in which
students learn to clean and
manage large databases, perform advanced statistical tests,
develop linear regression
models to describe causal relationship, and the like are needed.
Capacity to work
across software platforms such as Excel, Statistical Package for
the Social Sciences
(SPSS), Analytica, and the like are important. Increasingly, the
capacity to triangu-
late different methods, including qualitative approaches such as
interviews, focus
groups, participant observations is needed.
221. Data Visualization and Design Not only must analysts be aware
of how these meth-
ods and decision support platforms may be used by practitioners
but also they must
know how to design and implement them. Therefore, we suggest
that policy infor-
matics analysts be exposed to design principles and how they
may be applied to
decision support systems, big data projects, and the like. Policy
informatics analysts
will need to understand and appreciate how data visualization
techniques are being
employed to “tell a story” through data.
Figure 2.1 provides an illustration of one student’s effort to
visualize campaign
donations to state legislatures from the gas-extraction (fracking)
industry undertaken
by a masters student, Jeffery Castle for a system analysis and
strategic management
class taught by Koliba.
Castle’s project demonstrates the power of data visualization to
convey a central
message drawing from existing databases. With a solid research
methods background
and exposure to visualization and design principles in class, he
was able to develop
an insightful policy informatics project.
Basic to Advanced Programming Language Skills Arguably,
policy informatics ana-
lysts will possess a capacity to visualize and present data in a
manner that is accessible.
Increasingly, web-based tools are being used to design user