AWARE GOVERNMENT DATA RELEASES Micah Altman, Alexandra Wood, David R

Total Page:16

File Type:pdf, Size:1020Kb

AWARE GOVERNMENT DATA RELEASES Micah Altman, Alexandra Wood, David R TOWARDS A MODERN APPROACH TO PRIVACY- AWARE GOVERNMENT DATA RELEASES Micah Altman, Alexandra Wood, David R. O’Brien, Salil Vadhan & Urs Gasser† ABSTRACT Governments are under increasing pressure to publicly release collected data in order to promote transparency, accountability, and innovation. Because much of the data they release pertains to individuals, agencies rely on various standards and interventions to protect privacy interests while supporting a range of beneficial uses of the data. However, there are growing concerns among privacy scholars, policymakers, and the public that these approaches are incomplete, inconsistent, and difficult to navigate. To identify gaps in current practice, this Article reviews data released in response to freedom of information and Privacy Act requests, traditional public and vital records, official statistics, and e-government and open government initiatives. It finds that agencies lack formal guidance for implementing privacy interventions in specific cases. Most agencies address privacy by withholding or redacting records that contain directly or indirectly identifying information based on an ad hoc balancing of interests, and different government actors sometimes treat similar privacy risks vastly differently. These observations demonstrate the need for a more systematic approach to privacy analysis and also suggest a new way forward. DOI: http://dx.doi.org/10.15779/Z38FG17 © 2015 Micah Altman, MIT; Alexandra Wood, David R. O’Brien, Salil Vadhan & Urs Gasser, Harvard University. † Micah Altman and Alexandra Wood are the lead authors, with Alexandra Wood creating the initial draft of the manuscript and Micah Altman and Alexandra Wood taking primary responsibility for revisions. All authors, Micah Altman, Urs Gasser, David R. O’Brien, Salil Vadhan, and Alexandra Wood, contributed to the conception of the report (including core ideas and statement of research questions). Micah Altman, David R. O’Brien, and Alexandra Wood were primarily responsible for the methodology (development of the use cases and taxonomies applied), and David R. O’Brien for the project administration. Urs Gasser, David R. O’Brien, and Salil Vadhan contributed to the writing through critical review and commentary. Micah Altman, Urs Gasser, and Salil Vadhan provided scientific direction, and Urs Gasser led funding acquisition. Microsoft Corporation, in collaboration with the Berkeley Center for Law & Technology, supported the research and the writing of this report. In addition, this material is based upon work supported by the National Science Foundation under Grant No. 1237235, the Ford Foundation, and the John D. and Catherine T. MacArthur Foundation. We thank the members of the Privacy Tools for Sharing Research Data project for helpful comments. 1968 BERKELEY TECHNOLOGY LAW JOURNAL [Vol. 30:3 In response to these concerns, this Article proposes a framework for a modern privacy analysis informed by recent advances in data privacy from disciplines such as computer science, statistics, and law. Modeled on an information security approach, this framework characterizes and distinguishes between privacy controls, threats, vulnerabilities, and utility. When developing a data release mechanism, policymakers should specify the desired data uses and expected benefits, examine each stage of the data lifecycle to identify privacy threats and vulnerabilities, and select controls for each lifecycle stage that are consistent with the uses, threats, and vulnerabilities at that stage. This Article sketches the contours of this analytical framework, populates selected portions of its contents, and illustrates how it can inform the selection of privacy controls by discussing its application to two real-world examples of government data releases. TABLE OF CONTENTS I. INTRODUCTION: THE CHANGING LANDSCAPE OF GOVERNMENT RELEASES OF DATA ....................................... 1970 II. OVERVIEW OF CURRENT PRACTICES FOR RELEASING GOVERNMENT DATA .......................................... 1975 A. FOUR BROAD CATEGORIES OF GOVERNMENT DATA RELEASES ................................................................................... 1976 1. Freedom of Information and Privacy Act Requests ................ 1977 a) Types of Information Released ............................... 1979 b) Standards for Making Release Decisions ............... 1982 c) Privacy Interventions in Use ................................... 1984 2. Traditional Public and Vital Records ................................... 1986 a) Types of Information Released ............................... 1988 b) Standards for Making Release Decisions ............... 1989 c) Privacy Interventions in Use ................................... 1989 3. Official Statistics ................................................................. 1991 a) Types of Information Released ............................... 1992 b) Standards for Making Release Decisions ............... 1993 c) Privacy Interventions in Use ................................... 1995 4. E-Government and Open Government Initiatives ............... 1997 a) Types of Information Released ............................... 1999 b) Standards for Making Release Decisions ............... 2002 c) Privacy Interventions in Use ................................... 2004 B. SHORTCOMINGS IN CURRENT PRACTICES ............................. 2006 III. A FRAMEWORK FOR MODERNIZING PRIVACY ANALYSIS ........................................................................................... 2010 A. CHARACTERIZING PRIVACY CONTROLS, THREATS, VULNERABILITIES, AND USES ................................................... 2011 B. DEVELOPING A CATALOG OF PRIVACY CONTROLS AND INTERVENTIONS ........................................................................ 2015 1. Privacy Controls at the Collection and Acceptance Stage ....... 2017 2. Privacy Controls at the Transformation Stage ...................... 2020 2015] PRIVACY-AWARE GOVERNMENT DATA RELEASES 1969 3. Privacy Controls at the Retention Stage ............................... 2023 4. Privacy Controls at the Release and Access Stage ................... 2024 5. Privacy Controls at the Post-Access Stage ............................. 2028 C. IDENTIFYING INFORMATION USES, THREATS, AND VULNERABILITIES ...................................................................... 2032 1. Information Uses and Expected Utility ................................ 2032 2. Privacy Threats .................................................................. 2034 3. Privacy Vulnerabilities ........................................................ 2036 D. DESIGNING DATA RELEASES BY ALIGNING USE, THREATS, AND VULNERABILITIES WITH CONTROLS ............ 2040 1. Specifying Desired Data Uses and Expected Benefits ............ 2041 2. Selecting Controls ................................................................ 2042 IV. APPLYING THE FRAMEWORK TO REAL-WORLD EXAMPLES OF GOVERNMENT DATA RELEASES ............... 2048 A. PUBLIC RELEASE OF WORKPLACE INJURY RECORDS ............ 2049 1. Collection and Acceptance Stage ........................................... 2049 2. Retention Stage ................................................................... 2051 3. Post-Retention Transformation ........................................... 2052 4. Release and Access Stage ...................................................... 2052 5. Post-Access Stage ................................................................. 2056 6. Aligning Uses, Threats, and Vulnerabilities with Controls .............................................................................. 2056 B. MUNICIPAL OPEN DATA PORTALS .......................................... 2059 1. Collection and Acceptance Stage ........................................... 2060 2. Retention Stage ................................................................... 2061 3. Post-Retention Transformation ........................................... 2061 4. Release and Access Stage ...................................................... 2063 5. Post-Access Stage ................................................................. 2067 6. Aligning Use, Threats, and Vulnerabilities with Controls ..... 2068 V. SUMMARY .......................................................................................... 2070 1970 BERKELEY TECHNOLOGY LAW JOURNAL [Vol. 30:3 I. INTRODUCTION: THE CHANGING LANDSCAPE OF GOVERNMENT RELEASES OF DATA Transparency is a fundamental principle of democratic governance. Making government data more widely available promises to enhance organizational transparency, improve government functions, encourage civic engagement, support the evaluation of government decisions, and ensure accountability for public institutions. Releases of government data also promote growth in the private sector by guiding investment and other commercial decisions, supporting innovation in the technology sectors, and promoting economic development and competition broadly.1 Furthermore, improving access to government data also advances the state of research and scientific knowledge, changing how researchers approach their fields of study and enabling them to ask new questions and gain better insights into human behaviors.2 For instance, the increased availability of large-scale datasets is advancing developments in computational social science, a field that is rapidly changing the study of humans, human behavior, and human institutions, and effectively shifting the evidence base of social science.3 Scientists are also developing
Recommended publications
  • An Introduction to the Joint Principles for Data Citation
    RDAP Review EDITOR’S SUMMARY While the conventions of An Introduction to the Joint Principles for Data Citation bibliographic citation have been by Micah Altman, Christine Borgman, Mercè Crosas and Maryann Martone long established, the sole focus is on reference to other scholarly 3 works. Access to the data serving NOTE: This article summarizes and extends a longer report r of the manuscript must be available to any reader of Science ” e b as the basis for scholarly work has published as [ 1]. Contributors are listed in alphabetical order. We and that “ citations to unpublished data [emphasis added] m u been limited. Data citation extends describe contributions to the paper using a standard taxonomy N and personal communications cannot be used to support , described in [ 2]. Micah Altman and Mercè Crosas were the lead 1 important access to material that 4 authors, taking equal responsibility for revisions and authoring claims in a published paper” [ 4]. Too often, however, this e has been largely unavailable for m the first draft of the manuscript from which this is derived. All u proscription and others like it have been honored only in the l o sharing, verification and reuse. The authors contributed to the conception of the Force 11 principles V breach. Few research articles provide access to the data on – Joint Declaration of Data Citation discussed, to the methodology, to the project administration 5 1 and to the writing through critical review and commentary. which they are based, nor specific citations to data on which 0 Principles, finalized in February 2 the findings rely, nor protocols, algorithms, code or other h 2014, is a formal statement pulling c r a together practices used in the ata citation is rapidly emerging as a key practice technology necessary to reproduce, reuse or extend results.
    [Show full text]
  • Case 1:18-Cv-04727-ELR Document 17-11 Filed 10/19/18 Page 1 of 28
    Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 1 of 28 EXHIBIT 10 Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 2 of 28 Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 3 of 28 Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 4 of 28 Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 5 of 28 Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 6 of 28 Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 7 of 28 Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 8 of 28 Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 9 of 28 Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 10 of 28 Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 11 of 28 Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 12 of 28 Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 13 of 28 Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 14 of 28 Case 1:18-cv-04727-ELR Document 17-11 Filed 10/19/18 Page 15 of 28 Dr. Michael P.
    [Show full text]
  • 00017-89121.Pdf (110.8
    March 19, 2014 To: The Federal Trade Commision Re: Mobile Device Tracking From: Micah Altman, Director of Research, MIT Libraries; Non Resident Senior Fellow, Brookings Institution I appreciate the opportunity to contribute to the FTC’s considerations of Mobile Device Tracking. These comments address selected privacy risks and mitigation methods. Our perspective is informed by substantial advances in privacy science that have been made in the computer science literature and by recent research conducted by the members of the Privacy Tools for Sharing Research Data project at Harvard University.1 Scope of information The speakers focussed primarily on businesses use of mobile devices to track consumers’ movements through retail stores and nearby environments. However, as noted in the comments made by the Center for Digital Democracy [CDD 2014] and in the workshop discussion (as documented in the transcript), the the general scope of mobile information tracking businesses and third parties extends far beyond this scenario. Based on the current ability for third parties to collect location information from mobile phones alone, third parties have the potential to collect extensive, fine grained, continuous and identifiable records of a persons location and movement history, accompanied with a partial record of other devices (potentially linked to people) encountered over that history. Information sensitivity Generally, information policy should treat information as sensitive when that information, if linked to a person, even partially or probabilistically, is likely to cause substantial harm. There is a broad range of informational harms that are recognized by regulation and by researchers and 1 The Privacy Tools for Sharing Research Data project is a National Science Foundation funded collaboration at Harvard University involving the Center for Research on Computation and Society, the Institute for Quantitative Social Science, the Berkman Center for Internet & Society, and the Data Privacy Lab.
    [Show full text]
  • Numerical Issues in Statistical Computing for the Social Scientist
    Numerical Issues in Statistical Computing for the Social Scientist MICAH ALTMAN JEFF GILL MICHAEL P. McDONALD A JOHN WILEY & SONS, INC., PUBLICATION Numerical Issues in Statistical Computing for the Social Scientist ii WILEY SERIES IN PROBABILITY AND STATISTICS Established by WALTER A. SHEWHART and SAMUEL S. WILKS Editors: David J. Balding, Noel A. C. Cressie, Nicholas I. Fisher, Iain M. Johnstone, J. B. Kadane, Louise M. Ryan, David W. Scott, Adrian F. M. Smith, Jozef L. Teugels; Editors Emeriti: Vic Barnett, J. Stuart Hunter, David G. Kendall A complete list of the titles in this series appears at the end of this volume. Numerical Issues in Statistical Computing for the Social Scientist MICAH ALTMAN JEFF GILL MICHAEL P. McDONALD A JOHN WILEY & SONS, INC., PUBLICATION Copyright c 2004 by John Wiley & Sons, Inc. All rights reserved. Published by John Wiley & Sons, Inc., Hoboken, New Jersey. Published simultaneously in Canada. No part of this publication may be reproduced, stored in a retrieval system, or transmitted in any form or by any means, electronic, mechanical, photocopying, recording, scanning, or otherwise, except as permitted under Section 107 or 108 of the 1976 United States Copyright Act, without either the prior written permission of the Publisher, or authorization through payment of the appropriate per-copy fee to the Copyright Clearance Center, Inc., 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400, fax 978-750-4470, or on the web at www.copyright.com. Requests to the Publisher for permission should be addressed to the Permissions Department, John Wiley & Sons, Inc., 111 River Street, Hoboken, NJ 07030, (201) 748-6011, fax (201) 748-6008, e-mail: [email protected].
    [Show full text]
  • Numerical Issues in Statistical Computing for the Social Scientist
    JSS Journal of Statistical Software April 2005, Volume 12, Book Review 5. http://www.jstatsoft.org/ Reviewer: Frauke Kreuter University of Maryland, College Park Numerical Issues in Statistical Computing for the Social Scientist Micah Altman, Jeff Gill, Michael P. McDonald John Wiley & Sons, Hoboken, NJ, 2004. ISBN 0-471-23633-0. xv + 323 pp. $94.95. http://www.hmdc.harvard.edu/numerical_issues/ This is a very interesting book in an area that hasn’t gotten much attention in the so- cial sciences, but can expect to have more than just a niche audience with the increase of maximum-likelihood-based applications, a heightened interest in simulations, and a general appreciation for computational statistics. Numerical Issues in Statistical Computing for the Social Scientist is the right book for any social scientist who has stumbled upon error mes- sages relating to convergence problems, non-invertible, or ill-conditioned matrices, and who is not just interested in some rough guidance on what to watch out for, but rather wants to understand the source of these problems down to effects of errors in floating point arithmetic. Micah Altman, Jeff Gill, and Michael P. McDonald state in their preface that this book is intended to serve multiple purposes: Introducing new principles, algorithms and solutions while at the same time serving as a guide to statistical computing. There is a benefit to including new research results in a guidebook, but with it comes the challenge to find the right level of difficulty. As a result, the book seems bimodal, sometimes missing the intermediate applied researcher, who writes modest programs within a given statistical package.
    [Show full text]
  • Micah Altman
    Micah Altman Curriculum Vitae Institute for Quantitative Social Science, Harvard University 1737 Cambridge Street, Cambridge, MA 02138 Phone: (585) 466-4224 Fax: (617) 963-7370 E-mail: [email protected] URL: http://futurelib.org Education Harvard University 1999-2001 Post-doctoral Research Fellow, Department of Government California Institute of Technology 1998 Ph.D., Social Sciences Brown University 1989 B.A., Magna Cum Laude*, Computer Science B.A., Magna Cum Laude*, Ethics and Political Philosophy [*Highest distinction awarded by the University] Honors & Senior Fellow, Information Technology & Politics Section, 2011 Awards American Political Science Association Best Research Software 2009 American Political Science Association (ITP) for BARD Library Technology Excellence Award, Honorable Mention 2009 IGI Global (for The Henry A. Murray Archive) Listed in (Marquis) 2003-4, 2009 Who's Who in America, 57th, 58th, 63rd Edition Best Research Software Award, 2005 American Political Science Association (ITP); (for the VDC System) Annual Meeting Enrichment Fund Award, 2001 Association of American Geographers Best Political Science Research Website, 1999 (for The Record of American Democracy website) Outstanding Dissertation Award, 1999 Western Political Science Association (for the best political science dissertation) Weaver Award, Representation and Electoral Systems Section, 1998 American Political Science Association (for best paper presented at previous meeting) Pre-doctoral Fellowship 1996-7 Harvard-MIT Research Training Group in Political Economy John Randolf Haynes and Dora Haynes Fellowship 1995-6 Anna and James McDonnell Memorial Fellowship 1994-5 Phi Beta Kappa 1989 9/15/2011 Sigma Xi 1989 Research Senior Research Scientist 2006-Present Positions Institute for Quantitative Social Science, Harvard University Archival Director 2007-Present Henry A.
    [Show full text]
  • Open Data, Transparency and Redistricting in Mexico Alejandro Trelles, Micah Altman, Eric Magar and Michael P
    Open Data, Transparency and Redistricting in Mexico Alejandro Trelles, Micah Altman, Eric Magar and Michael P. McDonald* Abstract: The many complaints and protests by citizens generated by the deterioration of the political elite in recent decades are clear evidence, among other things, of the urgent need to strengthen the connections between citizens and their representatives. To this end, the delimitation of the electoral boundaries —also known as redistricting— is key to improve political representation. Given the many technicalities involved in this processes —geographic, statistical, digital, among the most obvious— it is easy to succumb to the temptation of relegating it to specialists and lose sight of its importance for democracy. From our perspective, the use of new technologies, as well as the generation and use of open data, offer an opportunity to strengthen political representation. In this article we discuss Mexico’s redistricting experience, the challenges in terms of transparency, and *Alejandro Trelles is a doctoral candidate in Political Science at the University of Pittsburgh, 4600 Wesley W. Posvar Hall, Pittsburgh, PA, 15260. Tel: +1(412) 979 07 15. E-mail: [email protected]. Micah Altman is director of research in the program on Information Science at the Massachusetts Institute of Technology (MIT), E25-131, 77 Massachusetts Ave, Cambridge, Massachusetts, 02139. Tel: +1(585) 466 42 24. E-mail: [email protected]. Eric Magar is a full-time professor of Political Science at the Instituto Tecnológico Autónomo de México (ITAM), Río Hondo 1, Progreso Tiza- pán, México, D.F., 01000. Tel: +52(55) 56 28 40 79. E-mail: [email protected].
    [Show full text]
  • Practical Approaches to Big Data Privacy Over Time1 Micah Altman,2 Alexandra Wood,3 David R
    Practical Approaches to Big Data Privacy Over Time1 Micah Altman,2 Alexandra Wood,3 David R. O’Brien4 & Urs Gasser5 DRAFT (November 6, 2016) Abstract. Increasingly, governments and businesses are collecting, analyzing, and sharing detailed information about individuals over long periods of time. Vast quantities of data from new sources and novel methods for large-scale data analysis promise to yield deeper understanding of human characteristics, behavior, and relationships and advance the state of science, public policy, and innovation. At the same time, the collection and use of fine-grained personal data over time is associated with significant risks to individuals, groups, and society at large. In this article, we examine a range of long- term data collections, conducted by researchers in social science, in order to identify the characteristics of these programs that drive their unique sets of risks and benefits. We also examine the practices that have been established by social scientists to protect the privacy of data subjects in light of the challenges presented in long-term studies. We argue that many uses of big data, across academic, government, and industry settings, have characteristics similar to those of traditional long-term research studies. In this article, we discuss the lessons that can be learned from longstanding data management practices in research and potentially applied in the context of newly emerging data sources and uses. 1. Corporations and governments are collecting data more frequently, and collecting, storing, and using it for longer periods. Commercial and government actors are collecting, storing, analyzing, and sharing increasingly greater quantities of personal information about individuals over progressively long periods of time.
    [Show full text]
  • Online Software Puts Redistricting Tools in the Hands of the Public by Micah Altman, Ph.D., and Michael P
    Feature The Dawn of Do-It-Yourself Redistricting? Online Software Puts Redistricting Tools in the Hands of the Public By Micah Altman, Ph.D., and Michael P. McDonald, Ph.D. “T here is only one way to do reapportionment— feed into the computer all the factors except political registration.” – Then-Governor Ronald Reagan quoted in the Los Angeles Times, Jan. 21, 1972 “ With sophisticated computer programs, politicians can draw lines to maximize precisely their party’s representation and minimize the other’s. The result is sham legislative elections in which fewer and fewer seats are competitive and moderates of both parties get squeezed out of office.” – Washington Post editorial, May 2, 2004 rizona’s 2nd congressional district is one of the most bizarrely shaped in the country. It consists of a head-shaped chunk in the state’s eastern half attached by a long, thin neck the width of Athe Colorado River as it snakes for a hundred miles through the Grand Canyon to a body-shaped portion that hugs the state’s border with California. Indeed, for sheer formal chutzpah, it may just outdo the salamander-shaped 19th- century Massachusetts district drawn to benefit Governor Elbridge Gerry and dubbed a “gerrymander” by critics. Un- like most gerrymandered districts, though, the rationale for 38 Campaigns & Elections | January 2011 the odd shape of Arizona’s 2nd is not to protect an incumbent or to favor a partic- ular party, but to separate members of the small Hopi Tribe from their longstanding, more numerous rivals in the surrounding Navajo Tribe. The desire to protect the voice of com- munities is just one among a number of competing concerns that factor into draw- Kingman Tempe ing congressional districts.
    [Show full text]
  • Public Comment Meeting Public Access to Federally Supported R&D
    Public Comment Meeting concerning Public Access to Federally Supported R&D Data 16 May 2013, 9 a.m. - 5 p.m. 17 May 2013, 9 a.m. - 12 p.m. NATIONAL ACADEMY OF SCIENCES 2101 Constitution Avenue, NW Washington DC 20418 and http://sites.nationalacademies.org/DBASSE/DBASSE_083053 Sponsored By Draft Agenda Thursday, 16 May 2013 0900 Opening of Meeting Lawrence D. Brown (NAS) Professor Department of Statistics, The Wharton School University of Pennsylvania 0915 Connecting Research, Publications, and Micah Altman Evidence: The Lifecycle and Institutional Director of Research and Head Scientist Ecology of Data Program on Information Science Massachusetts Institute of Technology Libraries 0945 Why Public Access to Data Is So Important Victoria Stodden Assistant Professor of Statistics Columbia University 1015 Break 1045 PUBLIC COMMENT SESSION 1 Universities Libraries Researchers and Students 1200 Lunch 1400 PUBLIC COMMENT SESSION 2 Publishers Private Individuals Federal Employees 1530 Break PUBLIC COMMENT SESSION 3 Walk-in Registrants, if any 1700 Meeting closes for the day Friday, 17 May 2013 0900 Opening of Meeting Lawrence Brown 0905 PUBLIC COMMENT SESSION 4 Digital Repositories and Organizations 1045 Break 1100 Rapporteur’s Report John L. King W. W. Bishop Professor School of Information University of Michigan 1145 Next Steps and Adjournment Lawrence Brown LAWRENCE D. BROWN is Miers Busch professor in the Department of Statistics, The Wharton School, University of Pennsylvania. He is an expert in statistical foundations, conditional inference, sequential methods, exponential families, and decision theory. He is a member of the National Academy of Sciences, and a fellow of both the Institute of Mathematical Statistics and the American Statistical Association.
    [Show full text]
  • Michael P. Mcdonald Dr
    Michael P. McDonald Dr. Michael P. McDonald is Assistant Professor of Government and Politics in the Public and International Affairs Department at George Mason University, and a visiting fellow in Governance Studies at the Brookings Institution. His research interests include voting behavior, redistricting, Congress, American political development, and political methodology. His research appears in American Political Science Review, American Journal of Political Science, Journal of Politics, Political Analysis, State Politics and Policy Quarterly, and PS: Political Science and Politics. He is currently working on a book with Micah Altman and Jeff Gill entitled Statistical Computing for the Social Sciences. His voter turnout research shows that turnout has not been declining, the ineligible population is rising. This research has been featured in the popular press, and he provides voter turnout numbers to academia and the media. On the practical side of politics, McDonald has worked on campaign staff for state legislative campaigns in California, has worked for national polling firms, and has worked as a redistricting consultant in Alaska, Arizona, California, and Michigan. McDonald received his B.S. of Economics from California Institute of Technology and his Ph.D. of Political Science from University of California, San Diego in 1999. He was awarded a one-year post-doctoral fellowship at the Harvard-MIT Data Center. He held a one-year Assistant Professor appointment at Vanderbilt University, and was Assistant Professor of Political Studies at University of Illinois, Springfield before moving to George Mason University. | 1775 Massachusetts Avenue, NW, Washington, DC 20036 | 202.797.6000 | fax 202.797.6004 | brookings edu .
    [Show full text]
  • Laws of Information Economics and Scholarly Publishing
    Information Services & Use 35 (2015) 57–70 57 DOI 10.3233/ISU-150775 IOS Press Information wants someone else to pay for it: Laws of information economics and scholarly publishing Micah Altman a,∗ and Marguerite Avery b,c a Director of Research, MIT Libraries, Massachusetts Institute of Technology, Cambridge, MA, USA E-mail: [email protected] b Director of Scholarly Communication at Hypothes.is, San Francisco, CA, USA c Research Affiliate at Program on Information Science, MIT Libraries, Massachusetts Institute of Technology, Cambridge, MA, USA E-mail: [email protected] Abstract. The increasing volume and complexity of research, scholarly publication, and research information puts an added strain on traditional methods of scholarly communication and evaluation. Information goods and networks are not standard market goods – and so we should not rely on markets alone to develop new forms of scholarly publishing. The affordances of digital information and networks create many opportunities to unbundle the functions of scholarly communication – the central challenge is to create a range of new forms of publication that effectively promote both market and collaborative ecosystems. Keywords: Information, economics, scholarly publishing, affordances 1. The state of scholarly communication: More and less This year marks the sesquarcentenial anniversary of Philosophical Transactions of the Royal Society, a notable milestone upon which to reflect upon the evolution of the scholarly communication ecosystem. In the beginning, three hundred and fifty years ago, scholarly communication was a relatively straight- forward proposition that entailed the collecting of individual research writings into a volume that was reproduced or published. This new method of communicating research findings to a dedicated audience was a vast improvement over the circulation of individual letters written by individual scholars on in- dividual topics.
    [Show full text]