scholarly journals The 2012 Morris Hansen Lecture: Thank You Morris, et al., For Westat, et al.

2013 ◽  
Vol 29 (2) ◽  
pp. 223-231 ◽  
Author(s):  
Kenneth Prewitt

Abstract This article, delivered as the 22nd Memorial Morris Hansen lecture, argues that the contract houses, typified by Westat, are uniquely situated in the cluster of institutions, practices, and principles that collectively constitute a bridge between scientific evidence on the one hand and public policy on the other. This cluster is defined in The Use of Science as Evidence in Public Policy as a policy enterprise that generates a form of social knowledge on which modern economies, policies, and societies depend (National Research Council 2012). The policy enterprise in the U. S. largely took shape in the first half of the twentieth century, when sample surveys and inferential statistics matured into an information system that provided reliable and timely social knowledge relevant to the nation’s policy choices. In ways described shortly, Westat and other social science organizations that respond to “request for proposals” (RFP) from the government for social data and social analysis came to occupy a unique niche. The larger question addressed is whether the policy enterprise as we know it is prepared for the tsunami beginning to encroach on its territory. Is it going to be swamped by a data tsunami that takes information from very different sources than the familiar census/survey methods?

Ciencia Unemi ◽  
2016 ◽  
Vol 9 (17) ◽  
pp. 44 ◽  
Author(s):  
Alvaro Saenz Andrade

y participación. Estos constan en la Constitución, y en leyes orgánicas, lo que da un marco normativo impulsor del ejercicio democrático. En la aplicación de la política de fortalecimiento de la democracia, se encuentran fuerzas y posiciones provenientes de diversos actores. Se puede observar que entre los activadores de la participación el más importante es el propio Gobierno, acompañado de actores sociales organizados, antiguos y nuevos. Otros actores exigen una participación más radical, por un lado, y terceros desprecian la presencia popular en el Estado. Los medios de comunicación convencionales han sido los principales voceros de esta última posición. En la aplicación de la política de participación, las diversas fuerzas han actuado desarrollando algunos mecanismos, ocultando otros o distorsionando su sentido original. En todo ello se han manifestado las posiciones e intereses de los actores. A pesar de estas tensiones, la política de participación como tal se ha dinamizado y fortalecido. AbstractThe new Ecuadorian institutionality has created a large number of mechanisms of representation, direct democracy and participation. These are contained in the Constitution and organic laws, which gives a regulatory framework that constitutes itself the promoter of the democratic exercise. In the applying of the policy of strengthening of democracy, there are forces and positions from various actors. It can be seen that among the activators of the participation of actors, the government itself is the most important, accompanied by organized, old and new social ones. Others demand a more radical participation on the one hand, and on the other hand another third group despises a popular presence in the state. The conventional communication media have been the main spokesmen of the last group. In the applying of the policy of participation, various forces have acted by developing some mechanisms, hiding others or distorting its original meaning. About all of these, the actors have expressed their positions and interests. Despite these tensions, political participation as such has become dynamic and strengthened.


2008 ◽  
pp. 2905-2914
Author(s):  
Stephen Marsh ◽  
Andrew S. Patrick ◽  
Pamela Briggs

Building any online system or service that people will trust is a significant challenge. For example, consumers sometimes avoid e-commerce services over fears about their security and privacy. As a result, much research has been done to determine factors that affect users’ trust of e-commerce services (e.g., Egger, 2001; Friedman, Khan, & Howe, 2000; Riegelsberger & Sasse, 2001). Building trustable e-government services, however, presents a significantly greater challenge than e-commerce services for a number of reasons. First, government services are often covered by privacy protection legislation that may not apply to commercial services, so they will be subject to a higher level of scrutiny. Second, the nature of the information involved in an e-government transaction may be more sensitive than the information involved in a commercial transaction (Adams, 1999). Third, the nature of the information receiver is different in an e-government context (Adams, 1999). Some personal information, such as supermarket spending habits, might be relatively benign in an e-commerce situation, such as a loyalty program (supermarket points, or Air Miles, for instance), but other information such as medical records would be considered very sensitive if shared amongst all government agencies. Fourth, the consequences of a breach of privacy may be much larger in an e-government context, where, for example, premature release of economic data might have a profound effect on stock markets, affecting millions of investors (National Research Council, 2002). E-government services also involve significant privacy and security challenges because the traditional trade-offs of risks and costs cannot be applied as they can in business. In business contexts it is usually impossible to reduce the risks, for example of unauthorized access to information, or loss of or corruption of personal information, to zero and managers often have to trade-off acceptable risks against increasing costs. In the e-government context, because of the nature of the information and the high publicity, no violations of security or privacy can be considered acceptable (National Research Council, 2002). Although zero risk may be impossible to achieve, it is vital to target this ideal in an e-government service. In addition, government departments are often the major source of materials used to identify and authenticate individuals. Identification documents such as driver’s licenses and passports are issued by government agencies, so any breach in the security of these agencies can lead to significant problems. Identity theft is a growing problem worldwide, and e-government services that issue identification documents must be especially vigilant to protect against identity theft (National Research Council, 2002). Another significant challenge for e-government systems is protecting the privacy of individuals who traditionally have maintained multiple identities when interacting with the government (National Research Council, 2002). Today, a driver’s license is used when operating an automobile, a tax account number is used during financial transactions, while a government health card is used when seeking health services. With the implementation and use of e-government services it becomes possible to match these separate identities in a manner that was not being done before, and this could lead to new privacy concerns.


Author(s):  
S. Marsh ◽  
A. S. Patrick

Building any online system or service that people will trust is a significant challenge. For example, consumers sometimes avoid e-commerce services over fears about their security and privacy. As a result, much research has been done to determine factors that affect users’ trust of e-commerce services (e.g., Egger, 2001; Friedman, Khan, & Howe, 2000; Riegelsberger & Sasse, 2001). Building trustable e-government services, however, presents a significantly greater challenge than e-commerce services for a number of reasons. First, government services are often covered by privacy protection legislation that may not apply to commercial services, so they will be subject to a higher level of scrutiny. Second, the nature of the information involved in an e-government transaction may be more sensitive than the information involved in a commercial transaction (Adams, 1999). Third, the nature of the information receiver is different in an e-government context (Adams, 1999). Some personal information, such as supermarket spending habits, might be relatively benign in an e-commerce situation, such as a loyalty program (supermarket points, or Air Miles, for instance), but other information such as medical records would be considered very sensitive if shared amongst all government agencies. Fourth, the consequences of a breach of privacy may be much larger in an e-government context, where, for example, premature release of economic data might have a profound effect on stock markets, affecting millions of investors (National Research Council, 2002). E-government services also involve significant privacy and security challenges because the traditional trade-offs of risks and costs cannot be applied as they can in business. In business contexts it is usually impossible to reduce the risks, for example of unauthorized access to information, or loss of or corruption of personal information, to zero and managers often have to trade-off acceptable risks against increasing costs. In the e-government context, because of the nature of the information and the high publicity, no violations of security or privacy can be considered acceptable (National Research Council, 2002). Although zero risk may be impossible to achieve, it is vital to target this ideal in an e-government service. In addition, government departments are often the major source of materials used to identify and authenticate individuals. Identification documents such as driver’s licenses and passports are issued by government agencies, so any breach in the security of these agencies can lead to significant problems. Identity theft is a growing problem worldwide, and e-government services that issue identification documents must be especially vigilant to protect against identity theft (National Research Council, 2002). Another significant challenge for e-government systems is protecting the privacy of individuals who traditionally have maintained multiple identities when interacting with the government (National Research Council, 2002). Today, a driver’s license is used when operating an automobile, a tax account number is used during financial transactions, while a government health card is used when seeking health services. With the implementation and use of e-government services it becomes possible to match these separate identities in a manner that was not being done before, and this could lead to new privacy concerns.


2011 ◽  
Vol 7 (1) ◽  
pp. 431-436
Author(s):  
J. D. Annan ◽  
J. C. Hargreaves

Abstract. Henriksson et al. (2010), hereafter HALTL10, criticise Annan and Hargreaves (2006a) (AH06) primarily on the grounds that we assumed that different sources of data were conditionally independent given the climate sensitivity. While we consider this approximation to have been a reasonable one in the circumstances (and provided arguments to justify this approach), we also acknowledged its importance in our original paper and performed several sensitivity analyses. The alternative calculations presented by HALTL10 appear to strengthen rather than contradict our conclusion. HALTL10 additionally criticise Annan and Hargreaves (2009) (AH09) for proposing a Cauchy-type prior (as an alternative to the use of a uniform prior which was widespread up to that time) "without sufficient support'', and further claim that our choice was irrationally based on an economic assessment. We are surprised by these baseless claims, especially considering that the proposed prior was justified at some length both on the basis of both the "Charney report'' (National Research Council, 1979) and basic physical arguments, and also in light of our elementary demonstration of the pathological failings of the most commonly-used alternative. Thus, these claims are factually incorrect.


2011 ◽  
Vol 7 (2) ◽  
pp. 587-589
Author(s):  
J. D. Annan ◽  
J. C. Hargreaves

Abstract. Henriksson et al. (2010), hereafter HALTL10, criticize Annan and Hargreaves (2006a) (AH06) primarily on the grounds that we assumed that different sources of data were conditionally independent given the climate sensitivity. While we consider this approximation to have been a reasonable one under the circumstances (and provided arguments to justify this approach), we also acknowledged its importance in our original paper and performed several sensitivity analyses. The alternative calculations presented by HALTL10 appear to strengthen rather than contradict our conclusion. HALTL10 additionally criticize Annan and Hargreaves (2009) (AH09) for proposing a Cauchy type prior (as an alternative to the use of a uniform prior, which was widespread up to that time) "without sufficient support", and further claim that anticipated economic damages were used as a means of selecting the prior. We are surprised by these claims, especially considering that the proposed prior was justified at some length both on the basis of both the "Charney report" (National Research Council, 1979) and basic physical arguments, and also in light of our elementary demonstration of the pathological failings of the most commonly-used alternative. Thus, these claims are factually incorrect.


1985 ◽  
Vol 25 (2) ◽  
pp. 257 ◽  
Author(s):  
DJ Barker ◽  
PJ May ◽  
PER Ridley

Weaner steers were fed to attain either fat score 1 or 2 by the time that they were 1 year of age. Animals at each fat score were then either slaughtered or fed ad libitum on a basal barley and hay diet containing 11% crude protein or similar diets supplemented by either urea, meat meal or sweet lupins to contain 13% crude protein in the dry matter. Those fed were slaughtered as they attained fat score 3. Compared with those starting at fat score 2, the yearlings at fat score 1 had the same daily feed intake and thus a 10% higher relative intake, grew 15% faster and required 11% less feed per kg liveweight gain. However, they required only 6% less feed per kg carcass weight gain, owing to their 1% lower dressing percentage. The diets supplemented with the three different sources of supplementary nitrogen gave similar improvements over the basal diet in intake, growth rate and efficiency, and there were no interactions between diet and fat score. It was concluded that both the National Research Council and Agricultural Research Council feeding standards underestimate the nitrogen concentration required in grain and hay diets to ensure maximum performance and efficiency by yearling cattle growing from 220 to 370 kg liveweight, and that supplements of either urea, meat meal or lupins providing an extra 2 percentage units of crude protein improve performance to a similar extent.


Sign in / Sign up

Export Citation Format

Share Document