tag:blogger.com,1999:blog-84775991537422443042024-03-14T14:58:55.227+13:00Global Village GovernanceThe connectedness and interdependence of our lives.Laurencehttp://www.blogger.com/profile/01456098756145499083noreply@blogger.comBlogger41125tag:blogger.com,1999:blog-8477599153742244304.post-67470408782356172882018-01-08T09:02:00.000+13:002018-01-10T12:15:46.295+13:00The post-digital social contract (part 3 of 3)<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<b><a href="http://3.bp.blogspot.com/-FaNShwKepCU/VOhrkoaIAdI/AAAAAAAAACA/iOI5xRcRlhQ/s1600/blog%2Btitle.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="70" src="https://3.bp.blogspot.com/-FaNShwKepCU/VOhrkoaIAdI/AAAAAAAAACA/iOI5xRcRlhQ/s1600/blog%2Btitle.png" width="320" /></a></b></div>
<br />
<div class="subhead1">
<b><span lang="EN-US">Restore balance and reclaim personal data</span></b></div>
<br />
<div class="MsoListParagraph" style="mso-list: l1 level1 lfo1;">
<span style="mso-ansi-language: EN-NZ; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">1.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">The major actors – digital corporations and governments – need a haystack to find a needle.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn1" name="_ednref1" style="mso-endnote-id: edn1;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[i]</span></span></span></span></a><span style="mso-spacerun: yes;"></span> </span> </div>
</div>
They use a three step process to do this: <br />
(1) Create and adapt models with inference engine and rules; <br />
(2) Apply the model to data and match individuals to groups; <br />
(3) Take actions based on the matching, observe the results and tune the model.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn2" name="_ednref2" style="mso-endnote-id: edn2;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[ii]</span></span></span></span></a><span style="mso-spacerun: yes;"> The more data, the better the model. </span><br />
<br />
<div class="MsoListParagraph" style="mso-list: l1 level1 lfo1;">
<span style="mso-ansi-language: EN-NZ; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">2.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">The old school design approach to controlling this surveillance is to ask questions like: What are the rules? What are the consent points? Where are consents held? What are the defaults (opt-in or opt-out)? What are the obligations to the individual?<span style="mso-spacerun: yes;"> </span>How are those obligations met and monitored? How are obligations passed between actors? Can we regulate personal data markets? Should controls be centralized or distributed? What are the incentives? How do we resource enforcement?</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l1 level1 lfo1;">
<span style="mso-ansi-language: EN-NZ; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">3.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">This old school design will not work. The solution cannot be designed from within the frame of reference of the problem. Governments and digital corporations are committed to the current operating model – institutions try to preserve the problem to which they are the solution. Accepting the parameters of data surveillance legitimizes the relationship between the surveiller and the surveillee.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn3" name="_ednref3" style="mso-endnote-id: edn3;" title=""><span style="mso-special-character: footnote;"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[iii]</span></span></a><span style="mso-spacerun: yes;"> </span></span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l1 level1 lfo1;">
<span style="mso-ansi-language: EN-NZ; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">4.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">The global personal data ecosystem must develop homeostatic controls to absorb the variety of the system. Dynamic equilibrium must balance the interests of the different actors using transparency, feedback loops, and intrinsic regulators.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn4" name="_ednref4" style="mso-endnote-id: edn4;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[iv]</span></span></span></span></a> </span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l1 level1 lfo1;">
<span style="mso-ansi-language: EN-NZ; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">5.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">An effective future for the personal data ecosystem must manage this variety at a global level, cope with complexity and ambiguity, and be simple and easy to understand.<span style="mso-spacerun: yes;"> </span>It must be designed for a future world and recognize that the rate of technological change is exponential, which is why it cannot use old school design. In the global village there are only Pulchinella’s secrets<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn5" name="_ednref5" style="mso-endnote-id: edn5;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[v]</span></span></span></span></a>.</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l1 level1 lfo1;">
<span style="mso-ansi-language: EN-NZ; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">6.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span style="mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ;">There are no legal, political, economic or social levers that can control the data appetites of governments and corporations in the post-digital world.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn6" name="_ednref6" style="mso-endnote-id: edn6;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[vi]</span></span></span></span></a> Once you eliminate the impossible, whatever remains, no matter how improbable, must be the truth.<span style="mso-spacerun: yes;"> </span></span><span lang="EN-US"></span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l1 level1 lfo1;">
<span style="mso-ansi-language: EN-NZ; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">7.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span style="mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ;">The only option to achieve control is by using the technology </span><span lang="EN-US">to rebalance the asymmetry – similar to the coveillance idea proposed by Kevin Kelly.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn7" name="_ednref7" style="mso-endnote-id: edn7;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[vii]</span></span></span></span></a> The technology must provide a facility for the surveillee to retrieve all information about their personal data including what has been collected, who has accessed the data, what data has been linked, and what inferences have been made. </span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l1 level1 lfo1;">
<span style="mso-ansi-language: EN-NZ; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">8.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">Personal data must be created with the ability to annotate and transmit information about what has happened to it. The annotations must be embedded in tamper-proof technology within the global personal data ecosystem, and the internet of things will need to manage these annotations.</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l1 level1 lfo1;">
<span style="mso-ansi-language: EN-NZ; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">9.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">There are many questions that must be addressed in imagining this future – political economy, policy, leadership, engineering and technology – including: </span></div>
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo2;">
<span lang="EN-US" style="font-family: "symbol"; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">What is the ethical foundation of the post-digital social contract? Why is it important and what are the underlying values? </span></div>
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo2;">
<span lang="EN-US" style="font-family: "symbol"; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">Who has the interest, the insight and the energy to create the post-digital social contract? Where will leadership come from?</span></div>
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo2;">
<span lang="EN-US" style="font-family: "symbol"; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">How can legitimate government espionage activities operate effectively in secret while preserving the values of the post-digital social contract?</span></div>
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo2;">
<span lang="EN-US" style="font-family: "symbol"; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">What is the economic impact of the post-digital social contract? What happens to competitive advantage if there is full transparency of the personal data ecosystem?</span></div>
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo2;">
<span lang="EN-US" style="font-family: "symbol"; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">Is it possible? Can technology attach persistent transmitters to individual items of personal data?</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l1 level1 lfo1;">
<span style="mso-ansi-language: EN-NZ; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">10.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">I would like to think it is possible. The technology needs to be network-based and decentralized while maintaining trust and confidence. I have identified two areas where similar concepts are implemented in different domains – the blockchain and Distributed Object Numbering – which gives me some confidence that there is a technology that could achieve the rebalancing of information asymmetry. </span></div>
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo2;">
<span lang="EN-US" style="font-family: "symbol"; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">The blockchain algorithm is currently applied in many digital currencies, of which Bitcoins are the best known. But some consider that the underlying technology could be a disruptive force in many other sectors – by creating a network of trust from untrusted components.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn8" name="_ednref8" style="mso-endnote-id: edn8;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[viii]</span></span></span></span></a></span></div>
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo2;">
<span lang="EN-US" style="font-family: "symbol"; mso-bidi-font-family: Symbol; mso-fareast-font-family: Symbol;"><span style="mso-list: Ignore;">·<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">The Digital Object Architecture was designed to<span style="mso-spacerun: yes;"> </span>enable all types of information to be managed over very long time frames, and has been defined in ITU standard X.1255 - a framework for discovery of identity.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn9" name="_ednref9" style="mso-endnote-id: edn9;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[ix]</span></span></span></span></a></span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l1 level1 lfo1;">
<span style="mso-ansi-language: EN-NZ; mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">11.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">The future of the global personal data ecosystem need serious systems thinking, using expertise from a range of disciplines: lawyers & public policy analysts, commercial marketers & financiers, geeks & hackers, intellectuals, international governance specialists, privacy advocates, piracy advocates and data scientists. </span><br />
<br />
<span lang="EN-US"><i>Series first published March 2015</i></span></div>
<div style="mso-element: endnote-list;">
<br clear="all" />
<hr align="left" size="1" width="33%" />
<div id="edn1" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref1" name="_edn1" style="mso-endnote-id: edn1;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[i]</span></span></span></span></span></a><span lang="EN-US"> The Director of the NSA <a href="http://reason.com/blog/2013/07/19/why-spy-on-everybody-because-you-need-th">explained </a> that they intercept all personal data to enable them to find “the needle in the haystack” </span></div>
</div>
<div id="edn2" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref2" name="_edn2" style="mso-endnote-id: edn2;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[ii]</span></span></span></span></span></a><span lang="EN-US"> The model for placing people on no-fly lists is described in <a href="https://firstlook.org/theintercept/article/2014/07/23/blacklisted/">a 166 page manual</a> analyzed by the Intercept ; more than 40% of the people on the list <a href="https://firstlook.org/theintercept/article/2014/08/05/watch-commander/">have no affiliation</a> to a recognized terrorist group. </span></div>
</div>
<div id="edn3" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref3" name="_edn3" style="mso-endnote-id: edn3;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[iii]</span></span></span></span></span></a><span lang="EN-US"> The idea that institutions become dedicated to the problem they set out to solve and so perpetuate the problem has been named (<a href="http://kk.org/thetechnium/2010/04/the-shirky-prin/">the Shirky Principle</a>). As an aside, there are no English words for either of the 2 parties involved in surveillance.</span></div>
</div>
<div id="edn4" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref4" name="_edn4" style="mso-endnote-id: edn4;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[iv]</span></span></span></span></span></a><span lang="EN-US"> These terms are taken from cybernetics; information on cybernetics can be found in <i>An Introduction to Cybernetics (1956)</i> by W Ross Ashby where he describes the Law of Requisite Variety, and in <i>Brain of the Firm (1972)</i> and <i>Platform for Change (1975)</i> by Stafford Beer, where he describes the Viable System Model.</span></div>
</div>
<div id="edn5" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref5" name="_edn5" style="mso-endnote-id: edn5;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[v]</span></span></span></span></span></a><span lang="EN-US"> The idea that there are no secrets in the village was a central theme of Italian “commedia dell’arte” in the 16<sup>th</sup> century. <a href="http://digitalenlightenmentforum.com/2015/02/17/pulchinella-revisited/">Pulchinella Revisited </a> explains how to derive four laws of secrecy in the information society. </span></div>
</div>
<div id="edn6" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref6" name="_edn6" style="mso-endnote-id: edn6;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[vi]</span></span></span></span></span></a><span lang="EN-US"> As Evgeny Morozov says at the end of this <a href="http://newleftreview.org/article/download_pdf?id=3112">long article </a><span style="mso-spacerun: yes;"> </span>“the ultimate battle lines are clear. It’s a question of whether all these sensors, filters, profiles and algorithms can be used by citizens and communities for some kind of emancipation from bureaucracies and companies”<span style="mso-spacerun: yes;"> </span>He suggests, in my view unrealistically,<span style="mso-spacerun: yes;"> </span>that there is an option for social control of the big data stores.</span></div>
</div>
<div id="edn7" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref7" name="_edn7" style="mso-endnote-id: edn7;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[vii]</span></span></span></span></span></a><span lang="EN-US"> “How can we have a world in which we are all watching each other, and everybody feels happy?”- <a href="http://edge.org/conversation/the-technium">a conversation.</a> </span><span style="mso-ansi-language: EN-NZ;"></span></div>
</div>
<div id="edn8" style="mso-element: endnote;">
<div class="MsoNormal" style="line-height: normal; margin-bottom: .0001pt; margin-bottom: 0cm;">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref8" name="_edn8" style="mso-endnote-id: edn8;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[viii]</span></span></span></span></span></a><span lang="EN-US"> </span><span lang="EN-US" style="font-size: 10.0pt;">For more on the implications of Blockchain see </span><span lang="EN-US"><br />
<a href="http://radar.oreilly.com/2014/12/blockchain-and-decentralization-hold-big-implications-for-society.html"><span style="font-size: 10.0pt;">Blockchain and decentralization hold big implications for society</span></a></span><span lang="EN-US" style="font-size: 10.0pt;"><span style="mso-spacerun: yes;"> </span>and </span><span lang="EN-US"><a href="https://medium.com/backchannel/how-bitcoins-blockchain-could-power-an-alternate-internet-bb501855af67"><span style="font-size: 10.0pt;">How blockchain could power an alternate internet</span></a></span></div>
</div>
<div id="edn9" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref9" name="_edn9" style="mso-endnote-id: edn9;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[ix]</span></span></span></span></span></a><span lang="EN-US"> For information on Digital Object Architecture refer to <br />
<a href="http://www.cnri.reston.va.us/index.html">Corporation for National Research Initiatives (CNRI)</a> and <a href="http://www.itu.int/DONA/">Digital Object Numbering Authority</a> </span><span style="mso-ansi-language: EN-NZ;"></span></div>
</div>
</div>
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br /></div>
Laurencehttp://www.blogger.com/profile/01456098756145499083noreply@blogger.com0tag:blogger.com,1999:blog-8477599153742244304.post-64854353844974664452018-01-08T09:01:00.000+13:002018-01-10T12:16:29.569+13:00The post-digital social contract (part 2 of 3). <div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-FaNShwKepCU/VOhrkoaIAdI/AAAAAAAAACA/iOI5xRcRlhQ/s1600/blog%2Btitle.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="70" src="https://3.bp.blogspot.com/-FaNShwKepCU/VOhrkoaIAdI/AAAAAAAAACA/iOI5xRcRlhQ/s1600/blog%2Btitle.png" width="320" /></a></div>
<!--[if gte mso 9]><xml> <o:OfficeDocumentSettings> <o:RelyOnVML/> <o:AllowPNG/> </o:OfficeDocumentSettings> </xml><![endif]--> <br />
<div class="subhead1">
</div>
<div class="subhead1">
<b><span lang="EN-US">The personal data ecosystem: Out of Trust, Out of Control</span></b></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">1.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">The pre-digital social contract was straightforward:<span style="mso-spacerun: yes;"> </span>I chose to disclose my secrets to others based on the level of trust in our relationship. I chose to reveal personal data when the value I got was more than the risk of something bad, based on the integrity of the other party. </span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">2.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">Trust has been reduced by ubiquitous sensors and monitoring (such as mobile phone location sensing, CCTV with face recognition, and embedded systems<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn1" name="_ednref1" style="mso-endnote-id: edn1;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[i]</span></span></span></span></a>), people choosing to be “always on”, and the power of big data analytics to bring together data from different sources.<span style="mso-spacerun: yes;"> </span>In a post-digital world we have no ability to assess the integrity of those making judgments on our personal data.</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">3.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span lang="EN-US">Trust can be restored by integrity, reputation, and transparency – qualities that are increasingly absent in public world.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn2" name="_ednref2" style="mso-endnote-id: edn2;" title=""><span style="mso-special-character: footnote;"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[ii]</span></span></a></span> The power and knowledge asymmetry breaks personal trust. So we must think laterally about how to rebalance the asymmetry.</div>
</div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">4.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US"><span style="mso-spacerun: yes;"> </span>The personal information ecosystem is so complex that it cannot be categorized, controlled or managed. <span style="mso-spacerun: yes;"> </span>There are endless articles about the volume of data created by and about people; there is not “too much data”, there is what there is.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn3" name="_ednref3" style="mso-endnote-id: edn3;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[iii]</span></span></span></span></a> There are small patterns in big data (a very low signal to noise ratio), so exponential increases in data create more opportunity for inferences. Control must be embedded in different parts of the ecosystem, and must cover user generated data (name, registration details, email), observed data (location, search behavior, social connections), and inferred data (looking for new home, medical condition). </span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">5.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">Inferred data can be crass, spooky, revealing and sometimes just plain wrong. The data algorithms are programmed and the results interpreted without context, often without any sensitivity or respect for the individual. Correlation does not mean causation.<span style="mso-spacerun: yes;"> </span>But, once data has been interpreted, it becomes real, and is reinforced without the subject having any opportunity to correct errors.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn4" name="_ednref4" style="mso-endnote-id: edn4;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[iv]</span></span></span></span></a><span style="mso-spacerun: yes;"> </span>Inferred data is the toxic zone of the personal data ecosystem.<span style="mso-spacerun: yes;"> </span></span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">6.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span lang="EN-US">The boundary between public and private knowledge is rapidly and dramatically changing as the personal data ecosystem expands.<span style="mso-spacerun: yes;"> </span>This can be illustrated by using the Johari grid<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn5" name="_ednref5" style="mso-endnote-id: edn5;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[v]</span></span></span></span></a> to divide personal data into four categories. </span></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-N4QvVDYSiRg/VOh0-jErpWI/AAAAAAAAACM/5zPQ5yeF5JA/s1600/johari%2Bwindow.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="259" src="https://4.bp.blogspot.com/-N4QvVDYSiRg/VOh0-jErpWI/AAAAAAAAACM/5zPQ5yeF5JA/s1600/johari%2Bwindow.png" width="320" /></a></div>
<br />
<div align="center" class="MsoNormal" style="line-height: 200%; margin-bottom: .0001pt; margin-bottom: 0cm; text-align: center;">
<span style="mso-ansi-language: EN-NZ; mso-fareast-language: EN-NZ; mso-no-proof: yes;"> </span><span lang="EN-US"></span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">7.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">Two changes relate to public information about the individual: (1) More personal information, previously only known to the individual, and disclosed to trusted others, is becoming “public”; and (2) More personal information previously “blind”, is also being shared, and thereby “public”.<span style="mso-spacerun: yes;"> </span>Both these changes relate to the transparent and pervasive nature of digital media (in particular social media). Individuals have some control over the extent to which they share and read personal information online, making these changes relatively benign. </span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">8.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US"><span style="mso-spacerun: yes;"> </span>The third change – to inferred data – is more challenging.<span style="mso-spacerun: yes;"> </span>Data from the “unknown” is moving into the “blind” – so that others know more things about me that I do not know - based on inferences from personal data harvested from the personal data ecosystem. This is the honeypot, where a lot of money can be made in a domain with no rules.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn6" name="_ednref6" style="mso-endnote-id: edn6;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[vi]</span></span></span></span></a><span style="mso-spacerun: yes;"> </span><span style="mso-spacerun: yes;"> </span></span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">9.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">Personal Data is the new currency of the internet.<span style="mso-spacerun: yes;"> </span>Personal data costs half a cent to collect and is worth around $1,200. People are clustered and their data is traded.<span style="mso-spacerun: yes;"> </span>Why is this bad?<span style="mso-spacerun: yes;"> </span>What is wrong with producing a list of left handed dentists who have visited Disneyland in the last 5 years?<span style="mso-spacerun: yes;"> </span>What about selling a list of rape victims at $0.05 per name?<span style="mso-spacerun: yes;"> </span>What about selling data on suspected alcoholics, HIV sufferers, or people inquiring about abortion?<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn7" name="_ednref7" style="mso-endnote-id: edn7;" title=""><span style="mso-special-character: footnote;"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[vii]</span></span></a></span><br />
<div>
</div>
</div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">10.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">Privacy as a social norm has been replaced by privacy as a political norm, malleable by media and controllable by the powerful.<span style="mso-spacerun: yes;"> </span>Polls in many countries report that the majority agree with the statement “it is worth losing some personal privacy in order to keep us safe from terrorist attacks”, but this view is not shared by minorities. The level of support is less about surveillance and more about trust in the organisation that is doing the surveilling.</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">11.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">Many commentators are suggesting mechanisms (such as laws & regulations, or user education) to build a new post-digital social contract based on shared values on how personal data should be used.<span style="mso-spacerun: yes;"> </span>This approach is dangerous because intelligent and well-intentioned people who understand the critical issues are diverted from building a robust post-digital social contract, and meanwhile power asymmetry increases.</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">12.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span lang="EN-US">There are three major reasons that this approach will not work for the global personal data ecosystem: (1) there is no effective jurisdiction to create a regulatory and compliance regime; (2) there is no agreement on shared values across different cultures;<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn8" name="_ednref8" style="mso-endnote-id: edn8;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[viii]</span></span></span></span></a> (3) the approach will not control “bad actors”.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn9" name="_ednref9" style="mso-endnote-id: edn9;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[ix]</span></span></span></span></a></span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">13.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">In other domains, money is often used to crystallize the balance between competing claims, but personal data is different – ethically and economically. Ethically, there are generally agreed no-go areas for trading personal assets – kidneys, blood, babies – but for personal data there are no bright lines, only fuzzy edges. Economically, a personal data asset is a non-rival good – it can be shared without losing value. A new calculus is needed.</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">14.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">The strategic risk is homogeneity - homogeneity reduces resilience. The personal data ecosystem needs diversity to be innovative and sustainable. By clustering individuals based on their profile, the profiled become the profile, become predictable and become exploitable.<span style="mso-spacerun: yes;"> </span>Diversity has intrinsic value by creating and maintaining the variety of personal data. When patterns tell me who I am, I become what they tell me. The personal data ecosystem is a public good, and its future must not be viewed through a lens of property rights. </span></div>
<div style="mso-element: endnote-list;">
<br clear="all" />
<hr align="left" size="1" width="33%" />
<div id="edn1" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref1" name="_edn1" style="mso-endnote-id: edn1;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[i]</span></span></span></span></span></a><span lang="EN-US"> <a href="http://www.nakedcapitalism.com/2014/01/jacob-appelbaum-30c3-protect-infect-militarization-internet-transcript.html"><span lang="EN-NZ" style="mso-ansi-language: EN-NZ;">Jacob Applebaum and Der Speigel</span></a> reveal embedded equipment that supports state surveillance</span></div>
</div>
<div id="edn2" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref2" name="_edn2" style="mso-endnote-id: edn2;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[ii]</span></span></span></span></span></a><span lang="EN-US"> Adam Curtis summed it up perfectly: “Nobody trusts anyone in authority today. It is one of the main features of our age. Wherever you look there are lying politicians, crooked bankers, corrupt police officers, cheating journalists and double-dealing media barons, sinister children's entertainers, rotten and greedy energy companies and out-of-control security services.” <a href="http://www.bbc.co.uk/blogs/adamcurtis/posts/SUSPICIOUS-MINDS">Suspicious Minds </a> . </span></div>
</div>
<div id="edn3" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref3" name="_edn3" style="mso-endnote-id: edn3;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[iii]</span></span></span></span></span></a><span lang="EN-US"> See for example <a href="https://whatsthebigdata.files.wordpress.com/2014/07/webin60seconds.jpg">The web in 60 seconds </a></span></div>
</div>
<div id="edn4" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref4" name="_edn4" style="mso-endnote-id: edn4;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[iv]</span></span></span></span></span></a><span lang="EN-US"> No-fly lists are one example of this <a href="http://papersplease.org/wp/"> series of Kafkaesque tales </a></span></div>
</div>
<div id="edn5" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref5" name="_edn5" style="mso-endnote-id: edn5;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[v]</span></span></span></span></span></a><span lang="EN-US"> The Johari Window was developed in the 1950s as a framework for understanding interpersonal relationships; its use in the personal data ecosystem was suggested to me by Kaliya Hamlin.</span></div>
</div>
<div id="edn6" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref6" name="_edn6" style="mso-endnote-id: edn6;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[vi]</span></span></span></span></span></a><span lang="EN-US"> Examples of inferences include targeted marketing of products (“people who bought this, also bought this”), genome sequencing to identify pre-disposition to health events, and law enforcement (“has a family history of criminal behavior”). <a href="http://www.whitehouse.gov/issues/technology/big-data-review">John Podesta </a>, who led the Big Data review for the White House, commented that “One significant finding of our review was the potential for big data analytics to lead to discriminatory outcomes and to circumvent longstanding civil rights protections in housing, employment, credit, and the consumer marketplace.” </span></div>
</div>
<div id="edn7" style="mso-element: endnote;">
<div class="MsoEndnoteText" style="mso-pagination: widow-orphan lines-together;">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref7" name="_edn7" style="mso-endnote-id: edn7;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[vii]</span></span></span></span></span></a><span lang="EN-US"> Sue Halpern has estimated that the personal data industry is $120 billion and talks about data sales in this video <a href="http://neukom.dartmouth.edu/donoho_colloquium/halpern_andarewepuppetsinawiredworld.html">this video. </a>.</span></div>
<div class="MsoEndnoteText" style="mso-pagination: widow-orphan lines-together;">
<span lang="EN-US">More discussion on the value of personal information can be found at <a href="http://www.theatlantic.com/technology/archive/2012/03/how-much-is-your-data-worth-mmm-somewhere-between-half-a-cent-and-1-200/254730/">How much is your data worth? </a><span class="MsoHyperlink"><br />
</span><a href="http://www.theguardian.com/news/datablog/2014/apr/22/how-much-is-personal-data-worth">How much is personal data worth</a><span class="MsoHyperlink"><br />
</span><a href="http://www.networkworld.com/news/2013/110713-data-brokers39-collection-of-internet-275750.html"><span lang="EN-NZ" style="mso-ansi-language: EN-NZ;">Data brokers </span></a></span><span style="mso-ansi-language: EN-NZ;"><br />
</span><span lang="EN-US"><a href="http://www.spectator.co.uk/features/9093961/little-brothers-are-watching-you/"><span lang="EN-NZ" style="mso-ansi-language: EN-NZ;">Little brothers are watching you</span></a></span><span class="MsoHyperlink"><span style="mso-ansi-language: EN-NZ;"><br />
</span></span><span lang="EN-US"><a href="http://www.theatlantic.com/technology/archive/2012/02/im-being-followed-how-google-151-and-104-other-companies-151-are-tracking-me-on-the-web/253758/"><span lang="EN-NZ" style="mso-ansi-language: EN-NZ;">I'm being followed </span></a></span><span style="mso-ansi-language: EN-NZ;"> </span></div>
</div>
<div id="edn8" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref8" name="_edn8" style="mso-endnote-id: edn8;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[viii]</span></span></span></span></span></a><span lang="EN-US"> While there could be general agreement to the statement ‘personal data collection is necessary to catch the terrorists’, this statement presents two problems: (1) how to decide who is a terrorist, recognizing that yesterday’s terrorists can become tomorrow’s governments; and (2) how to decide someone is a terrorist without gathering their personal data. </span></div>
</div>
<div id="edn9" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref9" name="_edn9" style="mso-endnote-id: edn9;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[ix]</span></span></span></span></span></a><span lang="EN-US"> Bad actors (in both public and private sector) decide to ignore regulations to achieve other goals that they consider more important. If you trust an organisation with your data, you believe they will act in good faith (the good actor) and the personal data ecosystem can make this more efficient and effective. If you do not trust an organisation, any personal data ecosystem will not protect you; for example you can set a policy to require a company to confirm that they have deleted your data, but you cannot verify that your data is deleted. </span></div>
</div>
</div>
<!--[if gte mso 9]><xml> <o:OfficeDocumentSettings> <o:RelyOnVML/> <o:AllowPNG/> </o:OfficeDocumentSettings> </xml><![endif]--><!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves>false</w:TrackMoves> <w:TrackFormatting/> <w:PunctuationKerning/> <w:ValidateAgainstSchemas/> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF/> <w:LidThemeOther>EN-US</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>AR-SA</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables/> <w:SnapToGridInCell/> <w:WrapTextWithPunct/> <w:UseAsianBreakRules/> <w:DontGrowAutofit/> <w:SplitPgBreakAndParaMark/> <w:EnableOpenTypeKerning/> <w:DontFlipMirrorIndents/> <w:OverrideTableStyleHps/> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math"/> <m:brkBin m:val="before"/> <m:brkBinSub m:val="--"/> <m:smallFrac m:val="off"/> <m:dispDef/> <m:lMargin m:val="0"/> <m:rMargin m:val="0"/> <m:defJc m:val="centerGroup"/> <m:wrapIndent m:val="1440"/> <m:intLim m:val="subSup"/> <m:naryLim m:val="undOvr"/> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/> <w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/> <w:LsdException Locked="false" Priority="39" Name="toc 1"/> <w:LsdException Locked="false" Priority="39" Name="toc 2"/> <w:LsdException Locked="false" Priority="39" Name="toc 3"/> <w:LsdException Locked="false" Priority="39" Name="toc 4"/> <w:LsdException Locked="false" Priority="39" Name="toc 5"/> <w:LsdException Locked="false" Priority="39" Name="toc 6"/> <w:LsdException Locked="false" Priority="39" Name="toc 7"/> <w:LsdException Locked="false" Priority="39" Name="toc 8"/> <w:LsdException Locked="false" Priority="39" Name="toc 9"/> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/> <w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/> <w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/> <w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/> <w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/> <w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/> <w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/> <w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/> <w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/> <w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/> <w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/> <w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/> <w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/> <w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/> <w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/> <w:LsdException Locked="false" Priority="37" Name="Bibliography"/> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin-top:0cm;
mso-para-margin-right:0cm;
mso-para-margin-bottom:10.0pt;
mso-para-margin-left:0cm;
line-height:115%;
mso-pagination:widow-orphan;
font-size:11.0pt;
font-family:"Calibri","sans-serif";
mso-ascii-font-family:Calibri;
mso-ascii-theme-font:minor-latin;
mso-hansi-font-family:Calibri;
mso-hansi-theme-font:minor-latin;
mso-ansi-language:EN-US;
mso-fareast-language:EN-US;}
</style> <![endif]--><br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br /></div>
</div>
Laurencehttp://www.blogger.com/profile/01456098756145499083noreply@blogger.com0tag:blogger.com,1999:blog-8477599153742244304.post-6047281405858323022018-01-08T09:00:00.000+13:002018-01-10T12:15:09.092+13:00The post-digital social contract (part 1 of 3). <div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-FaNShwKepCU/VOhrkoaIAdI/AAAAAAAAAB8/hwquNzlXyyM/s1600/blog%2Btitle.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="70" src="https://3.bp.blogspot.com/-FaNShwKepCU/VOhrkoaIAdI/AAAAAAAAAB8/hwquNzlXyyM/s1600/blog%2Btitle.png" width="320" /></a></div>
<!--[if gte mso 9]><xml> <o:OfficeDocumentSettings> <o:RelyOnVML/> <o:AllowPNG/> </o:OfficeDocumentSettings> </xml><![endif]--> <br />
<div class="subhead1">
</div>
<div class="subhead1">
<b><span lang="EN-US"> Part 1 We can't put the genie back, the bottles have gone</span></b></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">1.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">The pre-digital social contract operated at a community, regional and national level.<span style="mso-spacerun: yes;"> </span>It consisted of agreements on acceptable behavior between individuals, governments, companies and communities.<span style="mso-spacerun: yes;"> </span>This social contract is broken; broken by the internet and technology, globalization, neo-liberal economics, and “the war on terror”. </span></div>
<br />
<div class="MsoListParagraph" gt="" lang="EN-US" span="" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;">
<span lang="EN-US">2.<span style="font: 7.0pt "Times New Roman&quot;"> </span>The post-digital social contract is being created in real time by the actions of governments and digital corporations<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn1" name="_ednref1" style="mso-endnote-id: edn1;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[i]</span></span></span></span></a> based on massive asymmetries of power, knowledge and money. The result will be a single post digital social contract for the planet.</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">3.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">The power asymmetry is never going to go away - between government and the individual, and between digital corporations and the individual.<span style="mso-spacerun: yes;"> </span>To argue that surveillance by these powerful actors should be controlled and subject to "informed consent" is flawed.</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">4.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">Governments will never give up their addiction<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn2" name="_ednref2" style="mso-endnote-id: edn2;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[ii]</span></span></span></span></a> to surveillance - regulations will only drive the surveillance beyond public scrutiny; a continuing succession of Chelsea Mannings and Edward Snowdens will reveal what is happening, the messengers will be shot, hands will be wrung, inquiries will inquire and nothing will change.</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">5.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span lang="EN-US">Digital corporations complain about their coerced involvement in government surveillance as a diversion.<span style="mso-spacerun: yes;"> </span>They argue that using their service is an option and if you don't like the value that they provide by consolidating your data, you can opt out. They will maintain this position and move jurisdictions to continue operations and avoid penalties.</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">6.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span lang="EN-US">It will not be possible to turn back the surveillance machines, or even control them.</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">7.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">Political leaders look to their law-making powers to establish control within their domain of digital sovereignty; this will not work.<span style="mso-spacerun: yes;"> </span>Economically it is not practical – due to the strength of global markets and supply chains. Socially it is not practical – because people are connected across the globe by interactions, conversations and virtual workspaces.</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">8.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">The post digital social contract has three major actors who place different priorities on the critical factors in the personal data ecosystem: privacy, security & public safety, and value creation. Consider the distribution of technical and economic power, and the embedded assumptions about each actor in the global personal data ecosystem.</span></div>
<br />
<div class="subhead2">
<i><span lang="EN-US">Governments as actors in the global personal data ecosystem</span></i></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">9.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span lang="EN-US">There are more than 190 national governments, all of whom are regulators as well as significant collectors of personal data.<span style="mso-spacerun: yes;"> </span>This dual role creates tensions: many policy makers and political leaders want to establish controls on personal data collection, while at the same time making themselves exempt. In reality, a small number of nation states, those with sufficient political and economic power, will influence the future shape of the personal data ecosystem.<span style="mso-spacerun: yes;"> </span></span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">10.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span lang="EN-US">The national security agencies in governments operate outside of any effective legal framework. The concept of the Deep State, a part of government uncontrolled by elected officials, is beginning to be more widely understood.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn3" name="_ednref3" style="mso-endnote-id: edn3;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[iii]</span></span></span></span></a> While there is a legitimate rationale for spies, most state collection of personal data has a tenuous connection to national security. Legislation is not the answer to spying because spies operate beyond the law, and votes in the senate/parliament to cut budgets do not affect the deep state. By extending the ethics of the Deep State beyond the core function of espionage, governments invite scrutiny of broader surveillance activities.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn4" name="_ednref4" style="mso-endnote-id: edn4;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[iv]</span></span></span></span></a><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;"> </span></span></span></span></span></div>
<br />
<div class="subhead2">
<i><span lang="EN-US">Digital corporations as actors in the global personal data ecosystem</span></i></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">11.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span lang="EN-US">Digital corporations will not change for better global outcomes, because their principal motivation is growth and profit. Digital corporations avoid the cost of externalities; while they should fund the damage of their activities, environmental degradation and the global financial crisis have shown that this will not happen.</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">12.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">Regulation of corporations at a national level will not work - bad actors in a global personal data ecosystem will move to data havens, similar to the movement of capital since it went global.<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn5" name="_ednref5" style="mso-endnote-id: edn5;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[v]</span></span></span></span></a> Production moves to the lowest cost environment; the long-run costs in the personal data ecosystem are not labor and raw materials, but the cost of regulatory compliance.</span></div>
<br />
<div class="subhead2">
<i><span lang="EN-US">People as actors in the global personal data ecosystem </span></i></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">13.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span lang="EN-US">It is not possible to make such clear statements about the third group of actors – the 3 billion people in the global personal data ecosystem.<span style="mso-spacerun: yes;"> </span>Are they seduced by the sirens of free services in exchange for the monetization of their personal data? How do they balance the desire for reliable digital interaction with others and access to information against surveillance and monitoring in the name of safety and security? What about the growth of celebrity voyeurism, increased voluntary public disclosure, and reality TV?<span style="mso-spacerun: yes;"> </span>Are people happy to be slaves to algorithms?<span style="mso-spacerun: yes;"> </span>Are they willing to spend the time to curate their own digital footprints?<span style="mso-spacerun: yes;"> </span></span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">14.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span lang="EN-US">In the pre-digital contract, people assumed the right to private communications.<span style="mso-spacerun: yes;"> </span>We now know (with a debt of gratitude to brave individuals who have pushed digital disclosures and often paid a high personal price) that governments and corporations are both working to actively erode that presumption.<span style="mso-spacerun: yes;"> </span>By keeping everything, governments are better equipped to find Bad Guys, and corporations are better equipped to make profits.</span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">15.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span lang="EN-US">What is the response of thinking activists? They can use social revolution to fight back –securing personal email communications, disconnecting from the net<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_edn6" name="_ednref6" style="mso-endnote-id: edn6;" title=""><span class="MsoEndnoteReference"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[vi]</span></span></span></span></a>, and creating floods of false positives – but power and critical mass will doom such efforts.<span style="mso-spacerun: yes;"> </span></span></div>
<br />
<div class="MsoListParagraph" style="mso-list: l0 level1 lfo1;">
<span lang="EN-US" style="mso-bidi-font-family: Calibri; mso-bidi-theme-font: minor-latin;"><span style="mso-list: Ignore;">16.<span style="font: 7.0pt "Times New Roman";"> </span></span></span><span dir="LTR"></span><span lang="EN-US">Trust is broken. Can trust be restored as a basis for the post-digital social contract? Can technology and behaviors be adjusted to create a trustworthy foundation for the global personal data ecosystem? </span></div>
<div style="mso-element: endnote-list;">
<br clear="all" />
<hr align="left" size="1" width="33%" />
<div id="edn1" style="mso-element: endnote;">
<div class="MsoNoSpacing">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref1" name="_edn1" style="mso-endnote-id: edn1;" title=""></a><span lang="EN-US">Notes</span></div>
<div class="MsoNoSpacing">
<br /></div>
<div class="MsoNoSpacing">
<span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 11.0pt; line-height: 115%;">[i]</span></span></span></span></span><span lang="EN-US"> “</span><span lang="EN-US" style="font-size: 10.0pt;">Digital Corporations” refers to major personal data collectors and traders of personal data. Google, Microsoft, Apple, Yahoo, Facebook, Twitter, AOL and LinkedIn can be seen as the big 8 of data collection for western consumers. There are also sites like ВКонтакте (VK), </span><span lang="EN-US" style="font-family: "mingliu"; font-size: 10.0pt;">腾讯 (</span><span lang="EN-US" style="font-size: 10.0pt;">tencent),</span><span lang="EN-US" style="font-family: "mingliu"; font-size: 10.0pt;"> </span><span lang="EN-US" style="font-size: 10.0pt;">新浪微博 (Sina Weibo) that have hundreds of millions of users. Traders in personal data are a growing segment of the personal data ecosystem, with billion dollar companies such as ChoicePoint, Acxiom and Seisint.</span><span lang="EN-US"></span></div>
</div>
<div id="edn2" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref2" name="_edn2" style="mso-endnote-id: edn2;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[ii]</span></span></span></span></span></a><span lang="EN-US"> “I am America and I am addicted to data” was the claim in <a href="http://www.faz.net/aktuell/feuilleton/debatten/ueberwachung/information-consumerism-the-price-of-hypocrisy-12292374.html">this article</a>, but it is a sentiment that can be applied to most governments. </span></div>
</div>
<div id="edn3" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref3" name="_edn3" style="mso-endnote-id: edn3;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[iii]</span></span></span></span></span></a><span lang="EN-US"> </span><span style="mso-ansi-language: EN-NZ;">The very nature of the Deep State makes it impervious to description: the only people who know its true nature do not reveal what they know. The public get glimpses of the full extent of the Deep State through whistle-blowers, occasional leaks, and by historical reports on the behaviour of agencies such as the KGB and the Stasi. For more on the deep state see:</span></div>
<div class="MsoEndnoteText">
<span lang="EN-US"><a href="http://opinionator.blogs.nytimes.com/2013/09/15/the-banality-of-systemic-evil/"><span lang="EN-NZ" style="mso-ansi-language: EN-NZ;">The Banality of Systemic Evil</span></a></span><span class="MsoHyperlink"><span style="mso-ansi-language: EN-NZ;"><br />
</span></span><span lang="EN-US"><a href="http://billmoyers.com/2014/02/21/anatomy-of-the-deep-state/"><span lang="EN-NZ" style="mso-ansi-language: EN-NZ;"> Anatomy of the Deep State </span></a></span><span class="MsoHyperlink"><span style="mso-ansi-language: EN-NZ;"><br />
</span></span><span lang="EN-US"><a href="https://www.opendemocracy.net/ourkingdom/anthony-barnett/is-there-uk-deep-state"><span lang="EN-NZ" style="mso-ansi-language: EN-NZ;">Is there a UK Deep State?</span></a></span><span class="MsoHyperlink"><span style="mso-ansi-language: EN-NZ;"><br />
</span></span><span lang="EN-US"><a href="http://www.theguardian.com/commentisfree/2013/sep/03/snowden-manning-assange-new-heroes"><span lang="EN-NZ" style="mso-ansi-language: EN-NZ;"> The new heroes </span></a></span><span style="mso-ansi-language: EN-NZ;"><br />
</span><span lang="EN-US"><a href="http://thedailyblog.co.nz/2013/08/24/rulers-without-faces-plumbing-the-depths-of-new-zealands-deep-state/"><span lang="EN-NZ" style="mso-ansi-language: EN-NZ;">Rulers without faces</span></a></span><span class="MsoHyperlink"><span style="mso-ansi-language: EN-NZ;"><br />
</span></span><span lang="EN-US"><a href="http://www.nybooks.com/articles/archives/2014/jul/10/glenn-greenwald-partial-disclosure/"><span lang="EN-NZ" style="mso-ansi-language: EN-NZ;">Partial Disclosure</span></a></span><span style="mso-ansi-language: EN-NZ;"></span></div>
</div>
<div id="edn4" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref4" name="_edn4" style="mso-endnote-id: edn4;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[iv]</span></span></span></span></span></a><span lang="EN-US"> Although the National Research Council <a href="http://arstechnica.com/tech-policy/2008/10/analysis-data-mining-doesnt-work-for-spotting-terrorists/"> found in 2008 </a> that “Automated identification of terrorists through data mining (or any other known methodology) is neither feasible .. nor desirable” government surveillance around the world continues to grow in capability and reach.</span></div>
</div>
<div id="edn5" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref5" name="_edn5" style="mso-endnote-id: edn5;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[v]</span></span></span></span></span></a><span lang="EN-US"> <a href="http://www.taxjustice.net/topics/more/size-of-the-problem/">Tax havens have grown </a> to store more than $21 trillion since capital was globalized in the 1970s <span style="mso-spacerun: yes;"> </span></span></div>
</div>
<div id="edn6" style="mso-element: endnote;">
<div class="MsoEndnoteText">
<a href="https://www.blogger.com/blogger.g?blogID=8477599153742244304#_ednref6" name="_edn6" style="mso-endnote-id: edn6;" title=""><span class="MsoEndnoteReference"><span lang="EN-US"><span style="mso-special-character: footnote;"><span class="MsoEndnoteReference"><span lang="EN-US" style="font-family: "calibri" , "sans-serif"; font-size: 10.0pt; line-height: 115%;">[vi]</span></span></span></span></span></a><span lang="EN-US"> A description of <a href="http://www.fastcompany.com/3019847/think-you-can-live-offline-without-being-tracked-heres-what-it-takes">a minimal personal data footprint</a> </span></div>
</div>
</div>
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br />
<br /></div>
</div>
</div>
Laurencehttp://www.blogger.com/profile/01456098756145499083noreply@blogger.com0tag:blogger.com,1999:blog-8477599153742244304.post-38334518436623742272017-12-15T11:09:00.001+13:002018-01-14T16:18:53.643+13:00Declaration of Independence for the Internet<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
Corporations of the Information Industries, you weary giants of silicon and cables, I am from the Internet where we belong to many countries and to no countries. On behalf of the future, I ask you to treat our communities with respect. Your financial values are not welcome among us. You have no voice where we gather.<br />
<br />
We have no elected governance, so I address you with no greater authority than that with which liberty itself always speaks. We declare the Internet to be naturally independent of the monopolies you seek to impose. You have no moral right to control our information or our discourse.<br />
<br />
We have previously declared our independence from government control. We now declare that corporations do not govern the Internet. We will not rest in protecting what we have created.<br />
<br />
Governance derives its just powers from the consent of the governed. You have neither solicited nor received ours. Your terms and conditions do not bind us. You do not know the richness and diversity of our world. Do not think that you can dominate it – you cannot. Our world has strength through diversity. We will resist homogenisation and colonisation of individuals, cultures and indigenous peoples. Surplus, not scarcity, will be the foundation for the Internet that we grow, using our collective actions.<br />
<br />
You seek to control our great and gathering conversations, but you have done nothing but plunder the wealth of our meeting places. You cannot accommodate our diversity, our desire to be both consumers and creators, or our instant sharing of information everywhere. We have created an uncaptureable Internet built on interactions and relationships between people, a world that is both everywhere and nowhere. We have no need of gatekeepers.<br />
<br />
We want to live with an Internet that all may enter without privilege or prejudice accorded by race, gender, location, economic power, military force, language or station of birth. We reject differentiation between the digital bits that carry the sentiments and expressions of humanity, from the debasing to the angelic, all parts of a seamless global conversation.<br />
<br />
We want to live with an Internet where anyone anywhere may express their beliefs, no matter how singular, without fear of being coerced into silence or conformity. We reserve a special place for the creators and makers, who draw from their human experience to create and share meaning.<br />
<br />
We believe that from ethics, enlightened self-interest, and the commonweal, collective governance will emerge. We are citizens of different countries and also citizens of the Internet. Our identities are distributed across your walled gardens. The only law that all our constituent cultures generally recognize is the Golden Rule. We hoped that you would build solutions on that basis. But we cannot accept the solutions you are attempting to impose. We reject your financial models that venerate advertising and trade personal information, riding roughshod over personal privacy.<br />
<br />
Apple, Google/Alphabet, Amazon, Facebook, Microsoft, TenCent, AliBaba and a myriad of other corporate actors are erecting tollbooths across the Internet. You control what we access with your biased algorithms, designed from your perches of privilege, over which we have no recourse. We demand transparency of your methods to filter and present our information. We demand that you provide redress to those adversely affected by your algorithms. We demand that you take accountability for your actions, and ensure that they do not create discriminatory bias.<br />
<br />
Your increasingly obsolete information models perpetuate themselves by concentrating wealth and controlling speech throughout the world. These algorithms declare ideas, and the people that create them, to be another industrial product no more noble than pig iron. We believe that these ideas are the very heart and soul of the Internet, and must be treated with respect.<br />
<br />
The Internet is not a single global community, but a vast collection of distributed communities. This decentralisation of identities, values and data is threatened by your actions. Your increasing colonisation places us in the same position as previous lovers of freedom and self-determination who rejected the authorities of distant, uninformed powers. We declare our virtual selves immune to your control, and do not consent to your rule over our lives.<br />
<br />
We are the makers; we have the skills, the ethos, and the determination to create a better world built on the values of freedom and trust. We will make the Internet as the digital commune of the future, built on surplus not scarcity. May it be more humane and fair than the world your corporations have made.<br />
<br />
Laurence Millar, with thanks to <a href="https://www.eff.org/cyberspace-independence">John Perry Barlow</a><br />
<br />
Wellington, New Zealand<br />
<br />
15 December 2017</div>
Laurencehttp://www.blogger.com/profile/01456098756145499083noreply@blogger.com0tag:blogger.com,1999:blog-8477599153742244304.post-59246139269355418182017-11-20T15:14:00.000+13:002017-11-20T15:14:51.790+13:00Digital Goverment? Sort of.<div dir="ltr" style="text-align: left;" trbidi="on">
<!--[if gte mso 9]><xml> <o:OfficeDocumentSettings> <o:AllowPNG/> </o:OfficeDocumentSettings> </xml><![endif]--><br />
<!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves/> <w:TrackFormatting/> <w:DoNotShowPropertyChanges/> <w:PunctuationKerning/> <w:ValidateAgainstSchemas/> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF/> <w:LidThemeOther>EN-NZ</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>AR-SA</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables/> <w:SnapToGridInCell/> <w:WrapTextWithPunct/> <w:UseAsianBreakRules/> <w:DontGrowAutofit/> <w:SplitPgBreakAndParaMark/> <w:EnableOpenTypeKerning/> <w:DontFlipMirrorIndents/> <w:OverrideTableStyleHps/> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math"/> <m:brkBin m:val="before"/> <m:brkBinSub m:val="--"/> <m:smallFrac m:val="off"/> <m:dispDef/> <m:lMargin m:val="0"/> <m:rMargin m:val="0"/> <m:defJc m:val="centerGroup"/> <m:wrapIndent m:val="1440"/> <m:intLim m:val="subSup"/> <m:naryLim m:val="undOvr"/> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/> <w:LsdException Locked="false" Priority="9" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 2"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/> <w:LsdException Locked="false" Priority="39" Name="toc 1"/> <w:LsdException Locked="false" Priority="39" Name="toc 2"/> <w:LsdException Locked="false" Priority="39" Name="toc 3"/> <w:LsdException Locked="false" Priority="39" Name="toc 4"/> <w:LsdException Locked="false" Priority="39" Name="toc 5"/> <w:LsdException Locked="false" Priority="39" Name="toc 6"/> <w:LsdException Locked="false" Priority="39" Name="toc 7"/> <w:LsdException Locked="false" Priority="39" Name="toc 8"/> <w:LsdException Locked="false" Priority="39" Name="toc 9"/> <w:LsdException Locked="false" Priority="35" QFormat="true" Name="caption"/> <w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/> <w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/> <w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/> <w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/> <w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/> <w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/> <w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/> <w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/> <w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/> <w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/> <w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/> <w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/> <w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/> <w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/> <w:LsdException Locked="false" Priority="37" Name="Bibliography"/> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin:0cm;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:10.0pt;
font-family:"Times New Roman","serif";
mso-fareast-language:EN-US;}
</style> <![endif]--> <br />
<div class="MsoNormal">
I regained my sense of excitement about digital technologies during my two days at the <a href="https://2017.nethui.nz/">NetHui2017</a>. Maybe it was the unusual gender balance at the front of the room: three keynote speakers - all female, a female MC, one all-female panel and 50-50 split on the other panel I attended. Maybe it was the <a href="https://livestream.com/accounts/4547920/events/7904209/videos/165647108">agenda* set by the new Minister</a> with a portfolio of <a href="https://www.beehive.govt.nz/minister/hon-clare-curran">all things digital</a>, which seem to embrace the values and priorities of the Internet community in New Zealand<span style="font-size: x-small;"><i> (*start video at 27:00)</i></span>. Maybe it was reconnecting with the community after several years mostly working outside New Zealand. Whatever the reason I came away rejuvenated and motivated to resume this blog. </div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
This post is about my recent application for New Zealand superannuation (“National Super”) with scores for digital on a scale from A+ and F at the different stages.<br />
</div>
<div class="MsoNormal">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-msI3l7SQ_j8/WhIvTKNJwLI/AAAAAAAAAbw/peHyloI1G2YYpsNsUhFhn9fDpr7bmtbAQCEwYBhgL/s1600/A%252B.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="103" data-original-width="103" src="https://1.bp.blogspot.com/-msI3l7SQ_j8/WhIvTKNJwLI/AAAAAAAAAbw/peHyloI1G2YYpsNsUhFhn9fDpr7bmtbAQCEwYBhgL/s1600/A%252B.gif" /></a></div>
<div class="MsoNormal">
It started with an A+: the government knew that I would turn 65 in December and wrote me a letter telling me how to apply - a return on investment for all the time I spent completing my date of birth on government forms. Proactive notification of entitlements to citizens shows how government can use information that it has collected, rather than placing it in write-only storage. Some may require a digital notification for an A+, but I see proactive service delivery as transformational.<br />
<br />
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://2.bp.blogspot.com/-YZx_6NHxjME/WhI1M5hgifI/AAAAAAAAAcg/2KRBltVa140sESueoQ87x44Iw2UjrgB8wCEwYBhgL/s1600/B-.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="112" data-original-width="105" src="https://2.bp.blogspot.com/-YZx_6NHxjME/WhI1M5hgifI/AAAAAAAAAcg/2KRBltVa140sESueoQ87x44Iw2UjrgB8wCEwYBhgL/s1600/B-.png" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
The letter explained that I should call an 0800 number to get a client reference number, After 20 minutes wait time, I explained what I needed and was transferred to the National Super call centre. Why not give the correct number in the proactive notification letter?<br />
</div>
<div class="MsoNormal">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-msI3l7SQ_j8/WhIvTKNJwLI/AAAAAAAAAbw/peHyloI1G2YYpsNsUhFhn9fDpr7bmtbAQCEwYBhgL/s1600/A%252B.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="103" data-original-width="103" src="https://1.bp.blogspot.com/-msI3l7SQ_j8/WhIvTKNJwLI/AAAAAAAAAbw/peHyloI1G2YYpsNsUhFhn9fDpr7bmtbAQCEwYBhgL/s1600/A%252B.gif" /></a></div>
<div class="MsoNormal">
Armed with my client reference number I started the online application process. I used the option of logging in with RealMe, no need for another password to access a government service.<br />
<br />
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://2.bp.blogspot.com/-YZx_6NHxjME/WhI1M5hgifI/AAAAAAAAAcg/2KRBltVa140sESueoQ87x44Iw2UjrgB8wCEwYBhgL/s1600/B-.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="112" data-original-width="105" src="https://2.bp.blogspot.com/-YZx_6NHxjME/WhI1M5hgifI/AAAAAAAAAcg/2KRBltVa140sESueoQ87x44Iw2UjrgB8wCEwYBhgL/s1600/B-.png" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
My wife had applied for superannuation earlier in the year with all of her details and many of mine. Some of the information she had provided was already prefilled in my online application; some was not and I needed to re-enter the same data. The date she arrived in New Zealand was incorrect – had the data from her application been manually re-keyed into another system?<br />
</div>
<div class="MsoNormal">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-3GtUV0o7iI0/WhI1MyLnsQI/AAAAAAAAAcg/PX6d-n9Aj30katPr2iOho5H0dkttQj7HQCEwYBhgL/s1600/A-.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="112" data-original-width="105" src="https://4.bp.blogspot.com/-3GtUV0o7iI0/WhI1MyLnsQI/AAAAAAAAAcg/PX6d-n9Aj30katPr2iOho5H0dkttQj7HQCEwYBhgL/s1600/A-.png" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="MsoNormal">
I was told I needed to visit an MSD office with my wife to present evidence of my identity, was offered an appointment the next day and received immediate confirmation. </div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
<i>I needed to bring documentary evidence of my identity and address. Asking my computer screen why I needed to do this, when Government had already provided me with a RealMe verified identity provided some release of my frustration but no answer. </i><br />
<br />
</div>
<div class="MsoNormal">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://2.bp.blogspot.com/-SeGc9MLfifg/WhIvUWhhqDI/AAAAAAAAAb8/BED6xz28Udou1nchOJSMQcuquhHlx6myACEwYBhgL/s1600/B.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="112" data-original-width="105" src="https://2.bp.blogspot.com/-SeGc9MLfifg/WhIvUWhhqDI/AAAAAAAAAb8/BED6xz28Udou1nchOJSMQcuquhHlx6myACEwYBhgL/s1600/B.png" /></a></div>
<div class="MsoNormal">
The meeting started at the scheduled time and was moderately efficient, although there did seem to be some work involved in copying information from one computer screen to another.<br />
</div>
<div class="MsoNormal">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://4.bp.blogspot.com/-uTxnUO9Pgdo/WhIvVEXQmHI/AAAAAAAAAcA/SDrWWZMQcQE2rRX1FO91skqpZwPGHk61gCEwYBhgL/s1600/F.gif" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" data-original-height="112" data-original-width="105" src="https://4.bp.blogspot.com/-uTxnUO9Pgdo/WhIvVEXQmHI/AAAAAAAAAcA/SDrWWZMQcQE2rRX1FO91skqpZwPGHk61gCEwYBhgL/s1600/F.gif" /></a></div>
<div class="MsoNormal">
I provided my passport, driving license, and the letter the government sent me to start this process. The officer made photocopies of these documents (which had all been produced from data in government computers). It was only later I realised that I had taken my expired rather than my current passport. The officer asked whether I had signed the online application; I said that I had ticked the box and submitted the form online. She printed the form for me to sign physically, and the meeting was over. The officer explained that the physical interview was not needed for applicants born in New Zealand and this might be extended to people born overseas in the future. It was not clear why my wife needed to be there. </div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
Some may consider a “Fail” to be a bit harsh. I appreciate the need to verify identity before setting someone up with a regular government payment for the rest of their life. However, I already have a verified digital identity issued by the government, the interview itself added no value, my wife did not need to be there, and government is now storing photocopies of my passport and driving license for no reason; this is clear evidence of unnecessary “make work”.</div>
<div class="MsoNormal">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="https://1.bp.blogspot.com/-SeGc9MLfifg/WhIvUWhhqDI/AAAAAAAAAcE/BOpSptcpvo4feFC6Bdbw9TY1yfjFcO5MgCEwYBhgL/s1600/B.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" data-original-height="112" data-original-width="105" src="https://1.bp.blogspot.com/-SeGc9MLfifg/WhIvUWhhqDI/AAAAAAAAAcE/BOpSptcpvo4feFC6Bdbw9TY1yfjFcO5MgCEwYBhgL/s1600/B.png" /></a></div>
<div class="MsoNormal">
I score the overall process as a B; there were some very good aspects, such as proactive notification and confirmed timely appointments. However as a digital experience it fell well short of what is possible. A citizen who has lived at the same address in New Zealand for more than 30 years and holds a verified digital identity issued by the government should be able to complete the whole application online. </div>
<div class="MsoNormal">
<br /></div>
<div class="MsoNormal">
The <a href="https://www.dia.govt.nz/Better-Public-Services">government target </a>is that 80% of the transactions for the twenty most common public services will be completed digitally by 2021. Application for National Super was not included in the original list of common public services, but has recently been added.<span style="mso-spacerun: yes;"> </span>It could be an “quick win” <span style="mso-spacerun: yes;"> </span>for online uptake, but process redesign is needed to achieve the full potential of digital government. </div>
<div class="MsoNormal">
<br /></div>
</div>
Laurencehttp://www.blogger.com/profile/01456098756145499083noreply@blogger.com0tag:blogger.com,1999:blog-8477599153742244304.post-91454089519795392702015-10-23T07:21:00.003+13:002015-10-23T07:21:59.090+13:00It was 20 years ago today (5)<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
Brendan Boyle moved to head the Ministry of Social Development at the end of 2011, and in 2012 Colin MacDonald became Secretary of Internal Affairs, and the third Government CIO.<br />
<br />
In 2013, a new strategy document was released - Government ICT Strategy and Action Plan to 2017. The strategy identified four focus areas - Services are digital by default; Information is managed as an asset; Investment and capability are shared; and Leadership and culture deliver change. These are underpinned by System Assurance with a focus on the risks and quality of ICT investment from a whole of government perspective.<br />
<br />
<a href="http://3.bp.blogspot.com/-UPf-E63Wvaw/ViieE5NG4mI/AAAAAAAAAMo/ShhaKt0Gh-U/s1600/xtra3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="227" src="http://3.bp.blogspot.com/-UPf-E63Wvaw/ViieE5NG4mI/AAAAAAAAAMo/ShhaKt0Gh-U/s320/xtra3.jpg" width="320" /></a><br />
Following a significant amount of customer research, development began on a new portal. Initially working with the source code for gov.uk, the NZ team conducted alpha and beta tests, collected user feedback and eventually made the decision to move away from a portal to a consolidated information source, with links to agency sites for transactions.<br />
<span id="goog_101473240"></span> <br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-_BLEKr5iKFM/ViieX8VvjVI/AAAAAAAAAM0/qJMbIb4KIso/s1600/5.1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://1.bp.blogspot.com/-_BLEKr5iKFM/ViieX8VvjVI/AAAAAAAAAM0/qJMbIb4KIso/s320/5.1.jpg" width="179" /></a></div>
<div style="text-align: center;">
<u>First beta.govt.nz 2013</u></div>
<br />
The design used in the beta version marked the return to the long form of website, with scrolling to see the full content. The feedback from the final beta version was that the site was too formal, it needed a more “Kiwi” feel, and that it was “too boring”. <br />
<span id="goog_101473253"></span><span id="goog_101473254"></span><br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-pzVFUH-YD04/ViUxXuznEOI/AAAAAAAAALA/3gS02dKcb_U/s1600/5.2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://4.bp.blogspot.com/-pzVFUH-YD04/ViUxXuznEOI/AAAAAAAAALA/3gS02dKcb_U/s320/5.2.jpg" width="213" /></a></div>
<br />
<div style="text-align: center;">
<u>Final beta.govt.nz</u></div>
<u></u><br />
Changes were made and the new site was launched in July 2014 with information from 44 agencies, structured in the way that users said they looked for information. It also marked the return to www.govt.nz from www.newzealand.govt.nz. The site was no longer referred to as 'the government portal'; its remit had shifted: "Govt.nz is your guide to finding and using New Zealand Government services." As Colin MacDonald put it "Govt.nz is an example in action of putting the customer at the centre, and keeping the customer at the centre."<br />
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-1d7N60fyQX0/ViUxXlZYzRI/AAAAAAAAAK4/CplgjMdd1-M/s1600/5.3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://1.bp.blogspot.com/-1d7N60fyQX0/ViUxXlZYzRI/AAAAAAAAAK4/CplgjMdd1-M/s320/5.3.jpg" width="209" /></a></div>
<br />
<div style="text-align: center;">
<u>www.govt.nz on launch</u></div>
<u></u><br />
After the site was launched in July 2014, the Govt.nz team received a lot of feedback about the site. Some of it was about how the site looked, and its structure; the public felt that the site did not look like a government site and were not sure that they could trust the information on it. The new design lacked a distinctly New Zealand feel.<br />
<br />
As a response to this feedback, Govt.nz looked different in February 2015. The changes were described by the team: "The pale blue colours and snapshots are gone. So are the serif fonts. We’ve lost some of the white space and are using stronger visual cues. Our focus is on ensuring our site looks authoritative, and making it easier for people to find what they need. We’ve begun work to restructure the site, too. We’re aiming for fewer levels, and more intuitive content groups - so there are fewer clicks to find what you are looking for."<br />
<br />
The changes included a more authoritative header and a clearer visual hierarchy. The results in user testing feedback were positive – “it looks friendly, like New Zealand”, “official looking” and “efficient, warm and friendly” – and the new site was released in February 2015.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-SBtlELplvUw/ViUxXkxEmeI/AAAAAAAAAK8/g13cYadAPwk/s1600/5.4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://4.bp.blogspot.com/-SBtlELplvUw/ViUxXkxEmeI/AAAAAAAAAK8/g13cYadAPwk/s320/5.4.jpg" width="215" /></a></div>
<div style="text-align: center;">
<u>www.govt.nz – February 2015</u></div>
<u></u><br />
As well as consolidating government information to make it easier to find, access and use, the Govt.nz team has also developed functionality to support open and transparent government. For example, listing all consultations taking place across local and central government, which people can view by topics of interest or by agency. Government head office contact details are also available to be downloaded from the Government A-Z, via an API.<br />
<br />
The next step will be to integrate services into people’s lives, and work has started work on modelling how services are used around four life events, though Colin MacDonald admits “this is, sadly, a relatively slow process.” The first life event to be examined is the birth of a child. The hope is that, rather than having to register with a range of agencies one by one, “you’ll be able to go to one place, and everything will be there to access and for you to use”, allowing parents to access such services when it’s convenient for them.<br />
<br />
The team use the <a href="http://webtoolkit.govt.nz/">webtoolkit.govt.nz</a> as an interactive space to share information and lessons learned in the web space. Accessibility is critical to ensure everyone is able to use the new online channel, and the team have conducted <a href="https://webtoolkit.govt.nz/blog/2015/02/part-i-literacy-and-government-websites-to-the-data/">research </a>that shows low literacy, language and internet access are key barriers to finding government information online. As a result, the team are working on the design and test of non-text and low-text content, and translating key information.<br />
<br />
It is clear that after 20 years, the spirit of connecting government with the public using the internet continues to drive the work programme.<br />
<br />
<br /></div>
Laurencehttp://www.blogger.com/profile/01456098756145499083noreply@blogger.com0tag:blogger.com,1999:blog-8477599153742244304.post-78613467671447078872015-10-22T06:30:00.001+13:002015-10-22T06:30:14.292+13:00It was 20 years ago today (4)<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
</div>
The eGovernment team at SSC embraced Web2.0, sensing the importance of the move from one-way portals and delivery of information to
increased interaction, two way communication and collaboration. In 2007, the team launched an eParticipation wiki and and an eGovernment research discussion forum.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-7V-91hgYa_c/ViaBQFEy-NI/AAAAAAAAAL8/TuxJB7xfmoQ/s1600/wiki.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="152" src="http://1.bp.blogspot.com/-7V-91hgYa_c/ViaBQFEy-NI/AAAAAAAAAL8/TuxJB7xfmoQ/s320/wiki.png" width="320" /></a></div>
<br />
<div style="text-align: center;">
<u>wiki.participation.e.govt.nz </u></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-b1GQNNmulcY/ViaCGfI8A-I/AAAAAAAAAME/r3Mo8QtK4cc/s1600/research.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="247" src="http://1.bp.blogspot.com/-b1GQNNmulcY/ViaCGfI8A-I/AAAAAAAAAME/r3Mo8QtK4cc/s320/research.png" width="320" /></a></div>
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<u>research.elabs.govt.nz </u></div>
<div class="separator" style="clear: both; text-align: center;">
<br /></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div style="text-align: center;">
</div>
In early 2008, the unit started blogging and adopted Yammer as a social media tool. As Joanna McLeod wrote in the first blog post: "Other agencies ask us for guidance in setting up their own blogs –
what better way to help them than to give a clear demonstration of how
we do it, and the policies behind our thinking? We’re interested in issues around identity, privacy,
accessibility, intellectual property, web standards and Web 2.0. Views expressed in this blog are those of the contributors, and are
not necessarily the views of the State Service Commission or its
official policy."<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-qetEnbX1yrA/ViI7d4cRGFI/AAAAAAAAAJg/CE98zB_vWLg/s1600/3.7.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://1.bp.blogspot.com/-qetEnbX1yrA/ViI7d4cRGFI/AAAAAAAAAJg/CE98zB_vWLg/s320/3.7.png" width="279" /></a></div>
<div style="text-align: center;">
<u>blog.e.govt.nz</u> </div>
<br />
The Portal was upgraded to respond to the changes in technology and public expectations and a new portal was launched in March 2008, by the Minister of State Services David Parker. At the launch, he spoke about the need for government to keep up with the pace of change in the web world; over three years, ideas that were just emergent, such as the use of images and RSS, had gone mainstream. The portal created a joined up and consistent experience across government (no wrong door) with a new Look and Feel, Tag clouds that reflect usage, and search in te Reo, as well as the opportunity to provide context specific promotion of agency services.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-AGOuVRXBafo/ViI7du0SDiI/AAAAAAAAAI4/NDhm1_52CEo/s1600/3.6.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://2.bp.blogspot.com/-AGOuVRXBafo/ViI7du0SDiI/AAAAAAAAAI4/NDhm1_52CEo/s320/3.6.png" width="308" /></a></div>
<div style="text-align: center;">
<u>www.govt.nz March 2008</u></div>
<div style="text-align: center;">
</div>
<br />
Laurence Millar commented later in the year that “there has been a favourable response to the rollout of the website – especially the downloadable search box, which means that New Zealanders can search government web sites from other web sites without the need to directly go to the portal – our interest is in people getting access to the information they are seeking, in a consistent and repeatable fashion, from wherever they are searching.” <br />
<br />
The portal remained stable in this format for the next six years. <br />
<br />
By 2008, the EGU had grown from a dedicated policy focus, to operate all-of-government 24x7 services like the Government Shared Network (now <a href="https://www.ict.govt.nz/services/show/One-govt">one.gov</a>) and authentication (now <a href="https://www.realme.govt.nz/">RealMe</a>). While it had benefited considerably from being close to the centre of government, the branch was now a dominant part of SSC with more than half the staff and 80% of the capital expenditure.<br />
<br />
Cabinet decided that strategy and policy leadership should remain at SSC under the newly designated 'New Zealand <b>G</b>overnment <b>CIO</b>', and that service delivery (<b>G</b>overnment <b>T</b>echnology <b>S</b>ervices) should move back to the Department of Internal Affairs. The transition was executed in two stages: in 2008 the separate functions of GCIO and GTS were established in SSC, in preparation for the transfer to DIA a year later.<br />
<br />
In November 2008, Laurence Millar addressed the Public Sector Chief Executives as GCIO, and spoke of how the world had changed in the years since a group of them had suggested that e-government needed whole of government leadership. Government had collectively created policy and standards, built a portal, a secure network, authentication, LandOnline, TeAra, Companies Office, online tax returns, Customs single window, Studylink, National Digital Heritage Archive, and many more online services in every agency and sector. He closed his speech by suggesting that these achievements were not enough and that the government had not kept pace with the technologies that had so dramatically changed the expectations of New Zealanders. <br />
<br />
Following the transfer of GTS in 2009, eGovernment strategy and policy leadership remained in SSC for 18 months, and then was also moved to DIA. Brendan Boyle, by now Secretary for Internal Affairs, took on the role of Government CIO. He commented: “The prime minister is quite clear on the need for a CIO; he sees the advantages of a modern ICT environment and is a great believer in what ICT can do in terms of productivity. There is a greater tendency now to be more collaborative. I want to get the government ICT environment to be as coordinated and efficient as if we were one organisation.” The new website highlighted the directions and priorities for government ICT.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-d59CJT6Mvo0/VifJfYi_PcI/AAAAAAAAAMY/I2IZWqjiwKY/s1600/final%2Bpic%2Bfor%2Bpart%2B4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="304" src="http://3.bp.blogspot.com/-d59CJT6Mvo0/VifJfYi_PcI/AAAAAAAAAMY/I2IZWqjiwKY/s320/final%2Bpic%2Bfor%2Bpart%2B4.jpg" width="320" /></a></div>
<br />
The Knowledge, Information, Research & Technology branch was formed to encompass the strategy and policy role from SSC, Government Technology Services, Archives NZ, and the National Library, headed by Stephen Crombie, previously head of GTS.<br />
</div>
Laurencehttp://www.blogger.com/profile/01456098756145499083noreply@blogger.com0tag:blogger.com,1999:blog-8477599153742244304.post-1253779195766749762015-10-21T06:44:00.002+13:002015-10-21T06:54:29.842+13:00It was 20 years ago today (3)<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
The eGovernment Strategy 2003 envisaged a networked approach where agencies acted more coherently. The first step in government transformation was based on familiar sound sounding goals: “Successful government will become synonymous with processes and services integrated across the traditional boundaries between government agencies rather than ones confined to compartments. It will mean people being able to participate more readily across a spectrum of public sector activity and processes” said the eGovernment strategy summary written by Hugh McPhail, EGU Policy Manager. <br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-MVDfBQjvAwg/ViU4QcVjaII/AAAAAAAAALM/5URxnJA2ddE/s1600/xtra2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://4.bp.blogspot.com/-MVDfBQjvAwg/ViU4QcVjaII/AAAAAAAAALM/5URxnJA2ddE/s320/xtra2.jpg" width="227" /></a></div>
With the portal launched and the strategy published, Brendan Boyle moved to the role of Chief Executive at Land Information New Zealand in October, and Bethia Gibson took the position of Acting Director of EGU. Laurence Millar returned from working overseas and was appointed as the next EGU Director in early 2004.<br />
<br />
The eGovernment Advisory Board was strengthened, with six public service chief executives, Mark Prebble (SSC), Christopher Blake (DIA), James Buwalda (Labour), Brian Pink (Statistics NZ), Bryan Taylor (Auckland City Council), and Geoff Dangerfield (Economic Development), and Kerry McDonald as an independent advisor.<br />
<br />
In his first presentation to agency chief executives, Laurence Millar highlighted the importance of the portal. “SSC has received a large number of suggestions on how the portal should develop. The portal team has a future development path that includes the idea of no wrong door, sectoral portlets, information syndication and franchising”. <br />
<br />
Linked services were also a feature of his presentation.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-RcMNGfrvaHk/ViI7bR57NFI/AAAAAAAAAIE/VyikSp8_SSg/s1600/3.1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="http://3.bp.blogspot.com/-RcMNGfrvaHk/ViI7bR57NFI/AAAAAAAAAIE/VyikSp8_SSg/s320/3.1.png" width="320" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-_deL3SzNzZ0/ViI7bds0ojI/AAAAAAAAAII/69f9eWibZdc/s1600/3.2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="240" src="http://3.bp.blogspot.com/-_deL3SzNzZ0/ViI7bds0ojI/AAAAAAAAAII/69f9eWibZdc/s320/3.2.png" width="320" /></a></div>
<br />
Other examples of linked services identified were: having a baby, starting a business, opening a café, student loans, hiring staff, finding and looking after a place to live, and a death in the family. While these concepts were easy to create in PowerPoint, the reality of linked services across multiple government entities was to prove elusive. Successive iterations of the portal continued to struggle with this challenge, and after 20 years seamless interaction across multiple government agencies is still not implemented.<br />
<br />
In May 2005, the Government launched the Digital Strategy, a national strategy encompassing Connection, Capability and Content, which had been developed with input from government agencies, private sector and community representatives, under the leadership of the Minister of IT, David Cunliffe. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-IaeUbg7QZOM/ViZ5gi4lBoI/AAAAAAAAALs/OqOzlzlqdEY/s1600/100px-Digital_strategy_triangle.JPG" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="197" src="http://3.bp.blogspot.com/-IaeUbg7QZOM/ViZ5gi4lBoI/AAAAAAAAALs/OqOzlzlqdEY/s200/100px-Digital_strategy_triangle.JPG" width="200" /></a></div>
<div style="text-align: center;">
<u>New Zealand Digital Strategy 2005</u></div>
<div style="text-align: center;">
<u><br /></u></div>
The Digital Strategy provided a wider context for eGovernment and a new look was launched for the government portal, under the direction of Jason Ryan, EGU Communications Manager.<br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-iG4eY5TBGh4/ViI7cx5aTyI/AAAAAAAAAI0/guOwCUzqaLE/s1600/3.4.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="179" src="http://1.bp.blogspot.com/-iG4eY5TBGh4/ViI7cx5aTyI/AAAAAAAAAI0/guOwCUzqaLE/s320/3.4.jpg" width="320" /></a></div>
<br />
<br />
<div style="text-align: center;">
<u>www.govt.nz May 2005</u></div>
<br />
The portal operational team, with leadership from Sara Barham and Victoria Wray, managed the daily operations of the portal, including quality assurance of metadata from government agencies, the RSS feed, metalogue, and NZGLS (New Zealand Government Locator Service). The portal email box contained a wide range of questions and feedback, which were forwarded to the relevant agency.<br />
<br />
The 2006 update of the eGovernment Strategy focused on the inevitability of technological change and the need for government to recognise and meet the challenges. Annette King, Minister of State Services said in her introduction. "individuals and businesses have become accustomed to doing their banking online, 24 hours a day and 7 days a week, so they expect to deal with government in a way that is convenient for them.<span style="color: black; font-family: AGaramond-Regular; font-size: 11pt; font-style: normal; font-variant: normal;"><span style="color: black; font-family: AGaramond-Regular; font-size: 11pt; font-style: normal; font-variant: normal;"><span style="color: black; font-family: AGaramond-Regular; font-size: 11pt; font-style: normal; font-variant: normal;"></span></span>" T</span>he emphasis was now very much with the Internet as a
channel for publishing information and delivering interactive services.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-9dGXNwfseoQ/ViU4QcwR0FI/AAAAAAAAALY/ebZ9zL_7arM/s1600/xtra1.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://4.bp.blogspot.com/-9dGXNwfseoQ/ViU4QcwR0FI/AAAAAAAAALY/ebZ9zL_7arM/s320/xtra1.jpg" width="225" /></a></div>
<div style="text-align: center;">
<u>eGovernment Strategy 2006 </u> </div>
<br />
The eGovernment Unit published a White Paper on Web Site Search by Elyssa Timmer (SSC) and Bryan Lyall (NZTE). The research laid the foundation for the move to using a public index of government websites initially provided by Microsoft MSN and later by Google, from their daily crawling of websites. <br />
<br />
In 2007, a government-wide branding exercise resulted in the adoption of newzealand.govt.nz as the brand that would be used across all government media – print, television and internet. The website moved from www.govt.nz to www.newzealand.govt.nz in April 2007, to reflect this new brand, and the new syndicated search facility was introduced to the site two months later.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/---RQzrHDXc0/ViI7c_8l0TI/AAAAAAAAAIo/X61NpUr3c-0/s1600/3.5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="179" src="http://1.bp.blogspot.com/---RQzrHDXc0/ViI7c_8l0TI/AAAAAAAAAIo/X61NpUr3c-0/s320/3.5.jpg" width="320" /></a></div>
<br />
<div style="text-align: center;">
<u>www.newzealand.govt.nz 2007</u></div>
<br /></div>
Laurencehttp://www.blogger.com/profile/01456098756145499083noreply@blogger.com0tag:blogger.com,1999:blog-8477599153742244304.post-72505707293037364752015-10-20T06:24:00.000+13:002015-10-20T06:24:00.363+13:00It was 20 years ago today (2)<div dir="ltr" style="text-align: left;" trbidi="on">
Trudy Rankin was the NZGO Site Manager in 1999 and worked on the development of improvements to the site; these included a new text based search engine, better integration of information on the site, and improved links with other sites. Individual government agencies gained the ability to update their information, and media releases were automatically sent to mailing group subscribers according to the news categories they selected.<br />
<br />
The second iteration of NZGO was launched in October 1999 by the Honourable Jenny Shipley, Prime Minister, supported by Minister Williamson. <br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-Ew6OV7oW9gc/ViI7bKg-wII/AAAAAAAAAIc/sCArajxvrTg/s1600/2.1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="154" src="http://2.bp.blogspot.com/-Ew6OV7oW9gc/ViI7bKg-wII/AAAAAAAAAIc/sCArajxvrTg/s320/2.1.png" width="320" /></a></div>
<br />
It adopted a long form, scrolling to the bottom of the
page, and by this time it also had a new url - www.nzgo.govt.nz.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-9lVs8Vu0IrM/ViI9Udyya3I/AAAAAAAAAKA/141spcqb2O4/s1600/2.3.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="640" src="http://1.bp.blogspot.com/-9lVs8Vu0IrM/ViI9Udyya3I/AAAAAAAAAKA/141spcqb2O4/s640/2.3.jpg" width="326" /></a></div>
<div style="text-align: center;">
<u>www.nzgo.govt.nz</u></div>
<br />
The launch was one of the last official engagements of the Prime Minister prior to the change of government in the 1999 election. The new Labour government continued to support eGovernment and the newly appointed Minister of State Services, Trevor Mallard, became the champion within Cabinet.<br />
<br />
Government Statistician Len Cook was an active supporter of eGovernment. He saw the launch of the new NZGO as a very significant shift in collaboration across government, and worked with his fellow Chief Executives to persuade Michael Wintringham, the State Services Commissioner, that leadership from the centre was essential for the success of eGovernment.<br />
<br />Brendan Kelly and Russell Craig were working in the Strategy Development Branch at the State Services Commission (SSC), and were given the job of determining how this could happen. Over several months, they developed policy that underpinned the case for intervention via an e-government strategy. With the support of their branch manager, Derek Gill, who understood the potential for government transformation, they became strong advocates for eGovernment and recommended that SSC should establish an eGovernment Unit (EGU). The founding roles of the unit were to:<br />
<ul style="text-align: left;">
<li>develop a vision of how information and technology will play a role in delivering good government to the people of New Zealand in the future supported by a whole of Government information strategy </li>
<li>build a sound and shared body of thinking that allows information technology driven public sector change to be integrated into the devolved public management </li>
<li>establish a programme of aggressive yet realistic milestones for implementation.</li>
</ul>
Brendan Boyle was Registrar General of Lands before he studied for an MBA at the Massachusetts Insttute of Technology (MIT). He chose ICT and e-business electives, and completed his thesis on eGovernment. He commented “At that time, the dot.com boom was happening and I had access to leading-edge practitioners.” He returned from the USA to New Zealand in 2000 and took up the leadership of the EGU. <br />
<br />
The EGU developed the first eGovernment strategy in 2001, which highlighted the ways government could use the Internet to increase the value of services internally, and to all New Zealanders. Mike Pearson defined the eGovernment architecture which first used the term “portal” to describe the one-stop shop at the center – linking the public with government entities.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-3uKdmEKn6GM/ViUjaZyFdsI/AAAAAAAAAKY/PXmYkpc-kJo/s1600/2..4v2.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="320" src="http://3.bp.blogspot.com/-3uKdmEKn6GM/ViUjaZyFdsI/AAAAAAAAAKY/PXmYkpc-kJo/s320/2..4v2.jpg" width="243" /></a></div>
The portal project to create “NZGO on steroids” was part of an overall plan to improve the way government departments communicated with each other and the public. The new portal would take a thesaurus like approach that was aligned to how people think and behave, using metadata to describe what each government agency provided.<br />
<br />
The definition of the metadata and refining the underlying keywords was pivotal to the effectiveness of the portal. The Minister, Trevor Mallard, was educating his Cabinet colleagues by using the term “metadata” to explain how the portal would to deliver the right information about agency services. Roc Coote came up with the name Metalogue, a clever modernisation of catalogue, to describe the full list of government services.<br />
<br />
As Andrea Gray, EGU Relationships Manager explains “We had an energetic team working to establish an enduring relationship and a capability in agencies that would support their own development of their Internet presence over time." The aim was that agencies would recognise their websites as part of their service delivery arm (and not a brochure about their structure), and that accessibility was a primary design feature, not an optional add-on.<br />
<br />
Many EGU people were involved in the completion of the portal, which increased in scale and complexity as the implications of the metalogue approach became clear. Trudy Rankin took over from Colin Jackson as Portal Establishment Project Manager, Kent Duston had the role of Portal Business Manager and Edwin Bruce was in overall charge of the Portal Project<br />
<br />
The portal www.govt.nz was officially launched by Prime Minister Helen Clark at the Mount Wellington community library in Auckland on 14 November 2002. The long scrolling form had been replaced by a more compact design that enabled all the options to be seen on the landing page.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-TYypd0uxPFM/ViI7aoMSpsI/AAAAAAAAAH4/qOFlZBIOKzs/s1600/2.5.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="130" src="http://2.bp.blogspot.com/-TYypd0uxPFM/ViI7aoMSpsI/AAAAAAAAAH4/qOFlZBIOKzs/s320/2.5.jpg" width="320" /></a></div>
<div style="text-align: center;">
<u>www.govt.nz</u></div>
<u></u><br />
The government wanted the portal to become the dominant means of interaction with citizens, but some were concerned that the 63% of New Zealand homes that didn’t have Internet access would miss out on online information and social services. There were still few services allowing citizens to complete transactions online but there were plans to increase this over the next two years. Access would become a focus of policy work in the next few years.<br />
<br /></div>
Laurencehttp://www.blogger.com/profile/01456098756145499083noreply@blogger.com0tag:blogger.com,1999:blog-8477599153742244304.post-26556533156322668692015-10-19T06:35:00.001+13:002015-10-19T06:35:30.444+13:00It was 20 years ago today<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: center;">
<b><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;">Twenty years of eGovernment and the portal in New Zealand</span></b><br />
<b><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;">1. First Steps 1995-1998</span></b></div>
<div style="text-align: left;">
</div>
<div style="text-align: left;">
</div>
<div style="text-align: left;">
<!--[if gte mso 9]><xml> <o:OfficeDocumentSettings> <o:AllowPNG/> </o:OfficeDocumentSettings> </xml><![endif]--></div>
<div style="text-align: left;">
<!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves/> <w:TrackFormatting/> <w:DoNotShowPropertyChanges/> <w:PunctuationKerning/> <w:ValidateAgainstSchemas/> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF/> <w:LidThemeOther>EN-NZ</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>AR-SA</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables/> <w:SnapToGridInCell/> <w:WrapTextWithPunct/> <w:UseAsianBreakRules/> <w:DontGrowAutofit/> <w:SplitPgBreakAndParaMark/> <w:EnableOpenTypeKerning/> <w:DontFlipMirrorIndents/> <w:OverrideTableStyleHps/> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math"/> <m:brkBin m:val="before"/> <m:brkBinSub m:val="--"/> <m:smallFrac m:val="off"/> <m:dispDef/> <m:lMargin m:val="0"/> <m:rMargin m:val="0"/> <m:defJc m:val="centerGroup"/> <m:wrapIndent m:val="1440"/> <m:intLim m:val="subSup"/> <m:naryLim m:val="undOvr"/> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/> <w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/> <w:LsdException Locked="false" Priority="0" QFormat="true" Name="heading 2"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/> <w:LsdException Locked="false" Priority="39" Name="toc 1"/> <w:LsdException Locked="false" Priority="39" Name="toc 2"/> <w:LsdException Locked="false" Priority="39" Name="toc 3"/> <w:LsdException Locked="false" Priority="39" Name="toc 4"/> <w:LsdException Locked="false" Priority="39" Name="toc 5"/> <w:LsdException Locked="false" Priority="39" Name="toc 6"/> <w:LsdException Locked="false" Priority="39" Name="toc 7"/> <w:LsdException Locked="false" Priority="39" Name="toc 8"/> <w:LsdException Locked="false" Priority="39" Name="toc 9"/> <w:LsdException Locked="false" Priority="0" Name="header"/> <w:LsdException Locked="false" Priority="0" Name="footer"/> <w:LsdException Locked="false" Priority="0" QFormat="true" Name="caption"/> <w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/> <w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/> <w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/> <w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/> <w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/> <w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/> <w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/> <w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/> <w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/> <w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/> <w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/> <w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/> <w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/> <w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/> <w:LsdException Locked="false" Priority="37" Name="Bibliography"/> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin:0cm;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:10.0pt;
font-family:"Times New Roman","serif";
mso-fareast-language:EN-US;}
</style> <![endif]--> </div>
<div class="MsoPlainText">
<!--[if gte mso 9]><xml> <o:OfficeDocumentSettings> <o:AllowPNG/> </o:OfficeDocumentSettings> </xml><![endif]--><!--[if gte mso 9]><xml> <w:WordDocument> <w:View>Normal</w:View> <w:Zoom>0</w:Zoom> <w:TrackMoves/> <w:TrackFormatting/> <w:DoNotShowPropertyChanges/> <w:PunctuationKerning/> <w:ValidateAgainstSchemas/> <w:SaveIfXMLInvalid>false</w:SaveIfXMLInvalid> <w:IgnoreMixedContent>false</w:IgnoreMixedContent> <w:AlwaysShowPlaceholderText>false</w:AlwaysShowPlaceholderText> <w:DoNotPromoteQF/> <w:LidThemeOther>EN-NZ</w:LidThemeOther> <w:LidThemeAsian>X-NONE</w:LidThemeAsian> <w:LidThemeComplexScript>AR-SA</w:LidThemeComplexScript> <w:Compatibility> <w:BreakWrappedTables/> <w:SnapToGridInCell/> <w:WrapTextWithPunct/> <w:UseAsianBreakRules/> <w:DontGrowAutofit/> <w:SplitPgBreakAndParaMark/> <w:EnableOpenTypeKerning/> <w:DontFlipMirrorIndents/> <w:OverrideTableStyleHps/> </w:Compatibility> <m:mathPr> <m:mathFont m:val="Cambria Math"/> <m:brkBin m:val="before"/> <m:brkBinSub m:val="--"/> <m:smallFrac m:val="off"/> <m:dispDef/> <m:lMargin m:val="0"/> <m:rMargin m:val="0"/> <m:defJc m:val="centerGroup"/> <m:wrapIndent m:val="1440"/> <m:intLim m:val="subSup"/> <m:naryLim m:val="undOvr"/> </m:mathPr></w:WordDocument> </xml><![endif]--><!--[if gte mso 9]><xml> <w:LatentStyles DefLockedState="false" DefUnhideWhenUsed="true"
DefSemiHidden="true" DefQFormat="false" DefPriority="99"
LatentStyleCount="267"> <w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Normal"/> <w:LsdException Locked="false" Priority="0" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="heading 1"/> <w:LsdException Locked="false" Priority="0" QFormat="true" Name="heading 2"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 3"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 4"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 5"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 6"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 7"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 8"/> <w:LsdException Locked="false" Priority="9" QFormat="true" Name="heading 9"/> <w:LsdException Locked="false" Priority="39" Name="toc 1"/> <w:LsdException Locked="false" Priority="39" Name="toc 2"/> <w:LsdException Locked="false" Priority="39" Name="toc 3"/> <w:LsdException Locked="false" Priority="39" Name="toc 4"/> <w:LsdException Locked="false" Priority="39" Name="toc 5"/> <w:LsdException Locked="false" Priority="39" Name="toc 6"/> <w:LsdException Locked="false" Priority="39" Name="toc 7"/> <w:LsdException Locked="false" Priority="39" Name="toc 8"/> <w:LsdException Locked="false" Priority="39" Name="toc 9"/> <w:LsdException Locked="false" Priority="0" Name="header"/> <w:LsdException Locked="false" Priority="0" Name="footer"/> <w:LsdException Locked="false" Priority="0" QFormat="true" Name="caption"/> <w:LsdException Locked="false" Priority="10" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Title"/> <w:LsdException Locked="false" Priority="1" Name="Default Paragraph Font"/> <w:LsdException Locked="false" Priority="11" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtitle"/> <w:LsdException Locked="false" Priority="22" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Strong"/> <w:LsdException Locked="false" Priority="20" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Emphasis"/> <w:LsdException Locked="false" Priority="59" SemiHidden="false"
UnhideWhenUsed="false" Name="Table Grid"/> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Placeholder Text"/> <w:LsdException Locked="false" Priority="1" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="No Spacing"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 1"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 1"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 1"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 1"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 1"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 1"/> <w:LsdException Locked="false" UnhideWhenUsed="false" Name="Revision"/> <w:LsdException Locked="false" Priority="34" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="List Paragraph"/> <w:LsdException Locked="false" Priority="29" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Quote"/> <w:LsdException Locked="false" Priority="30" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Quote"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 1"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 1"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 1"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 1"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 1"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 1"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 1"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 1"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 2"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 2"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 2"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 2"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 2"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 2"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 2"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 2"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 2"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 2"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 2"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 2"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 2"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 2"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 3"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 3"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 3"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 3"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 3"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 3"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 3"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 3"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 3"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 3"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 3"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 3"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 3"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 3"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 4"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 4"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 4"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 4"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 4"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 4"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 4"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 4"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 4"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 4"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 4"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 4"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 4"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 4"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 5"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 5"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 5"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 5"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 5"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 5"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 5"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 5"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 5"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 5"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 5"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 5"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 5"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 5"/> <w:LsdException Locked="false" Priority="60" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Shading Accent 6"/> <w:LsdException Locked="false" Priority="61" SemiHidden="false"
UnhideWhenUsed="false" Name="Light List Accent 6"/> <w:LsdException Locked="false" Priority="62" SemiHidden="false"
UnhideWhenUsed="false" Name="Light Grid Accent 6"/> <w:LsdException Locked="false" Priority="63" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 1 Accent 6"/> <w:LsdException Locked="false" Priority="64" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Shading 2 Accent 6"/> <w:LsdException Locked="false" Priority="65" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 1 Accent 6"/> <w:LsdException Locked="false" Priority="66" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium List 2 Accent 6"/> <w:LsdException Locked="false" Priority="67" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 1 Accent 6"/> <w:LsdException Locked="false" Priority="68" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 2 Accent 6"/> <w:LsdException Locked="false" Priority="69" SemiHidden="false"
UnhideWhenUsed="false" Name="Medium Grid 3 Accent 6"/> <w:LsdException Locked="false" Priority="70" SemiHidden="false"
UnhideWhenUsed="false" Name="Dark List Accent 6"/> <w:LsdException Locked="false" Priority="71" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Shading Accent 6"/> <w:LsdException Locked="false" Priority="72" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful List Accent 6"/> <w:LsdException Locked="false" Priority="73" SemiHidden="false"
UnhideWhenUsed="false" Name="Colorful Grid Accent 6"/> <w:LsdException Locked="false" Priority="19" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Emphasis"/> <w:LsdException Locked="false" Priority="21" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Emphasis"/> <w:LsdException Locked="false" Priority="31" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Subtle Reference"/> <w:LsdException Locked="false" Priority="32" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Intense Reference"/> <w:LsdException Locked="false" Priority="33" SemiHidden="false"
UnhideWhenUsed="false" QFormat="true" Name="Book Title"/> <w:LsdException Locked="false" Priority="37" Name="Bibliography"/> <w:LsdException Locked="false" Priority="39" QFormat="true" Name="TOC Heading"/> </w:LatentStyles> </xml><![endif]--><!--[if gte mso 10]> <style>
/* Style Definitions */
table.MsoNormalTable
{mso-style-name:"Table Normal";
mso-tstyle-rowband-size:0;
mso-tstyle-colband-size:0;
mso-style-noshow:yes;
mso-style-priority:99;
mso-style-parent:"";
mso-padding-alt:0cm 5.4pt 0cm 5.4pt;
mso-para-margin:0cm;
mso-para-margin-bottom:.0001pt;
mso-pagination:widow-orphan;
font-size:10.0pt;
font-family:"Times New Roman","serif";
mso-fareast-language:EN-US;}
</style> <![endif]--> </div>
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><br />In the mid-1990s, New Zealand government officials were starting to realise the potential for the Internet to change the way government communicated with the public. Two parallel initiatives were underway. In the Ministry of Commerce, the IT policy unit were developing a register of government departments and selected information about the departments. In the Department of Internal Affairs, the Government Within Reach project was building an index of the services provided by government and relating those services to individual agencies. These two approaches – what government departments do, and how information and services are accessed and perceived by the public – are common themes in the development of government portals over the last 20 years.</span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><i><br />Ministry of Commerce</i><br />Reg Hammond and Colin Jackson were in the Ministry of Commerce IT policy unit, providing research and advice for Maurice Williamson, New Zealand’s first Minister of Information and Communications Technology. Colin managed to get hold of the dot.govt domain name, which had already been established for email use, and got a server running using www.govt.nz. The Ministry of Commerce wasn’t averse to experimentation but unwilling to make any investment. “I didn’t like my chances of going to the IT department and asking for funding to put this strange thing called a Web server in. They wouldn’t have bought that”. So he went to Victoria University and sought assistance from IT department head Frank March.</span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"></span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-hFfx-F02mBg/ViI0dspjD0I/AAAAAAAAAHE/s1ZVitfbxRk/s1600/1.1.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="175" src="http://4.bp.blogspot.com/-hFfx-F02mBg/ViI0dspjD0I/AAAAAAAAAHE/s1ZVitfbxRk/s400/1.1.png" width="400" /></a></div>
<div style="text-align: center;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><u>www.govt.nz</u></span></div>
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><br />Colin tells the story: “I got some wine and cheese, invited the information people from lots of government departments, sat the projector on a desk, and showed them the web server, explaining this was now accessible from anywhere in the world. I said I want some money and your information. I asserted that this was the official government Web server and nobody questioned me, although the Ministry of Foreign Affairs and Trade did give me a hard time because they hadn’t vetted it first.” </span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><br />Nathan (Nat) Norkington, a graduate student who’d been responsible for introducing web technology at Victoria University, provided a lot of the drive to get the web site operational. He began gathering the laws of New Zealand to make them more accessible to the public and ‘crawled’ government pages to download relevant information. The problem was that Government Print had sold the rights to all New Zealand legislation which was locked up in a private company website. As Nat puts it: “It had pretty crappy access and so I was in a sense liberating it from them. I was going to put them into a much better searchable web but a grumpy call from Wellington turned that off” </span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><b><br /></b><i>Government Within Reach</i><br />Concurrent with the efforts at MED, the Department of Internal Affairs was working with Telecom NZ on the Government Within Reach project. The result was launched on 19 October 1995 - Government Blue Pages at the front of each telephone directory, providing a national index of services offered by government departments and agencies.</span><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;">Two
Ministers were involved in the launch – Warren Cooper, Minister of
Internal Affairs and Maurice Williamson, Minister of Communications.</span> </span><br />
<br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"></span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-Y_1G8ijed9w/ViI9OEV2z8I/AAAAAAAAAJ4/xA3NTl2y7lQ/s1600/1.3.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="270" src="http://3.bp.blogspot.com/-Y_1G8ijed9w/ViI9OEV2z8I/AAAAAAAAAJ4/xA3NTl2y7lQ/s320/1.3.png" width="320" /></a></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-z7lNLs_zjwU/ViI0dj6AeEI/AAAAAAAAAHI/oRiKe8cCMv8/s1600/1.2.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="366" src="http://4.bp.blogspot.com/-z7lNLs_zjwU/ViI0dj6AeEI/AAAAAAAAAHI/oRiKe8cCMv8/s400/1.2.png" width="400" /></a></div>
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"></span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;">The index was also “being launched as an online service accessible through the Internet” </span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"> </span><br />
<div style="text-align: center;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><u></u></span></div>
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-PSzPAdkjn5I/ViI0d-iqHxI/AAAAAAAAAHU/0gAuqeEyzB4/s1600/1.4.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="179" src="http://4.bp.blogspot.com/-PSzPAdkjn5I/ViI0d-iqHxI/AAAAAAAAAHU/0gAuqeEyzB4/s320/1.4.png" width="320" /></a></div>
<div style="text-align: center;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><u>www.gwr.govt.nz</u></span></div>
<br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;">More than 1,000 listings of government services involving 195 state agencies were listed. Internet users could browse to the listings in the Blue Pages site - searching by text keywords or subject - to check which agency provided the service. They could then email their query to that agency. Only a handful of agencies were capable at this stage of replying electronically; messages to the rest were converted to fax. </span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><br />The project was sponsored by Neil Mackay, Deputy Secretary at Internal Affairs; Laurence Millar was the DIA project director, and the project was supported by an Advisory Board headed by former Treasury Secretary Graham Scott and including Social Welfare Director-General Margaret Bazely. External stakeholder governance continued to be an important part of government website presence over the next 20 years. </span><br />
<br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;">The project was reviewed by Paul Reynolds, an early member of the New Zealand digerati and sadly no longer with us. He brought his characteristic Scottish acerbic point of view.</span><br />
<br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"></span><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-fyI-yB_4hX8/ViI0eVhSDnI/AAAAAAAAAHc/qIMmO79nupg/s1600/1.5.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="370" src="http://4.bp.blogspot.com/-fyI-yB_4hX8/ViI0eVhSDnI/AAAAAAAAAHc/qIMmO79nupg/s400/1.5.png" width="400" /></a></div>
<div style="text-align: center;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><u>First hostile review of a government portal </u>October 1995 </span></div>
<div style="text-align: center;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;">(not available online)</span></span></div>
<br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;">By 1997, with encouragement from the State Services Commission, the two initiatives had merged into one – titled New Zealand Government Online (NZGO) and provided at www.govt.nz. </span><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;">The
governance arrangements were adjusted to include more active involvement
of public service leadership. The NZGO Advisory Board was chaired by
Len Cook, Government Statistician, other members included </span><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"><span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;">Margaret Bazley, </span>Carol
Stigley Chief Executive of local Government NZ, and Roger Blakeley,
Secretary of Internal Affairs. NZGO was still operated by the Department
of Internal Affairs. </span><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-f1lv0aztZVM/ViI0eRSuH1I/AAAAAAAAAHY/SQ8DLAldioE/s1600/1.6.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="167" src="http://4.bp.blogspot.com/-f1lv0aztZVM/ViI0eRSuH1I/AAAAAAAAAHY/SQ8DLAldioE/s400/1.6.jpg" width="400" /></a></div>
<div style="text-align: center;">
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"> <u>www.govt.nz January 1997</u></span></div>
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;"> </span><br />
<span style="font-family: "Helvetica Neue",Arial,Helvetica,sans-serif;">The site was managed by Shane Middlemiss, who felt that the increasing importance of the Internet wasn’t understood at the time the GWR project started and the initial government webpages and blue pages web directory were launched. He wanted NZGO to deliver a more compelling portal experience, and developed a 3D style virtual lobby and counter with major public sector topics on a smorgasbord behind a customer advisor: “We needed a universal customer advisor as the welcoming face of government so morphed a few hundred randomly-selected passport photos to create an average New Zealander's face. Of course, the results were fuzzy, ugly rubbish so we ended up using the attractive face of one of the DIA IT support staff. In the end we ran into probably one of the first accessibility clashes with the fixed width image map clashing, so it never made it to live use.”</span></div>
Laurencehttp://www.blogger.com/profile/01456098756145499083noreply@blogger.com0tag:blogger.com,1999:blog-8477599153742244304.post-56004885803725593712013-01-17T18:34:00.001+13:002013-01-22T13:59:28.324+13:00The future of education - it's up to us<div dir="ltr" style="text-align: left;" trbidi="on">
<div style="text-align: justify;">
<span style="background-color: #ead1dc;">UPDATE: The original host for the wiki had advertising that some found intrusive, and was unreliable. The wiki has been moved to <a href="http://wikieducator.org/NZInquiry" target="_blank">wikieducator</a>, which is a friendly neighbourhood, with related content material. </span></div>
<br />
<br />
This is the third, and last in a series of posts about the <a href="http://www.parliament.nz/en-NZ/PB/SC/Documents/Reports/7/e/2/50DBSCH_SCR5695_1-Inquiry-into-21st-century-learning-environments.htm" target="_blank">Parliamentary Inquiry into 21st century learning environments and digital literacy</a>. I was thinking how a national discussion on the topic, which I think is critical to our social, economic and cultural future, could be encouraged. Exchanges of views on blog posts, emails and discussions lists are all useful in their own way, but they are all transient.<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://digitaleducationnz.educatewiki.com/wiki/Main_Page" target="_blank"><img border="0" height="266" src="http://4.bp.blogspot.com/-VFb8K6Bue5M/UPeNCGiuBBI/AAAAAAAAAQg/SPnuVlKh1uU/s400/Untitled.png" width="400" /></a></div>
<br />
<div class="separator" style="clear: both; text-align: center;">
</div>
<br />
Then I realised that a wiki is the ideal tool to build discussion and gather views on the report - the importance and priority of different recommendations, the timing and progress that is being made, and the gathering of input from the wide range of stakeholders that have an interest.<br />
<br />
So I took the report, and placed it on a wiki <a href="http://wikieducator.org/NZInquiry" target="_blank">here</a>.** I chose mediawiki because it is familiar to people through their use of wikipedia. I have protected the pages that contain the actual content of the report, to maintain the integrity of the document tabled in Parliament. Each chapter of the report is on a separate page, and the discussion tab can be used to gather ideas and comments.<br />
<br />
I guess this is a bit of an experiment in education policy development for New Zealand, which could become a focal point for discussion on the impact of the digital world on our education system; maybe it could be the base of a project for a school in 2013?<br />
<br />
<br />
<i>Disclosure: I was engaged by the Select Committee as an expert advisor to the Inquiry.</i><br />
<br />
<strike><i>** </i></strike><i><strike>I chose to use a free hosting service, and it worked fine while I put
the pages together, but appears to be down at the moment, so if you do
not connect straight away, please keep tryin</strike>g. </i> </div>
Laurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com1tag:blogger.com,1999:blog-8477599153742244304.post-49509199964404370812013-01-16T12:25:00.001+13:002013-01-16T12:25:49.573+13:00The World into the Classroom - the Classroom into the World The <a href="http://www.parliament.nz/en-NZ/PB/SC/Documents/Reports/7/e/2/50DBSCH_SCR5695_1-Inquiry-into-21st-century-learning-environments.htm" target="_blank">report </a>from the parliamentary inquiry into 21st century learning contains 48 recommendations; this is an indication of the breadth of the inquiry, which covered the full range of issues that arise from considering the impact of digital on education.In this post I discuss five areas that, in my view, are the most important for change to occur: devices, community, workforce, equity and leadership.<br />
<br />
<b>Devices </b><br />
<div class="separator" style="clear: both; text-align: center;">
<img border="0" height="211" src="http://1.bp.blogspot.com/-ZoSEpMft-OA/UPOIns6w4VI/AAAAAAAAAPg/RwopZlcwdkY/s1600/digital-devices.jpg" width="320" /></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
Devices such as laptops, tablets and smartphones are the foundation of future learning. They fulfil two main functions - to provide access to information and as a tool for creativity and learning. They are embedded in educational practice at leading schools -- not as a special tool, but simply as "the way we do things round here". My personal belief is that every child should have exclusive access to their own device, which they use at school and at home. There are a small number of children whose families cannot afford to provide such a device, but schools have always found options to respond to children who are excluded from activities because of financial pressure. Once devices become "the way we do things round here", affordability barriers can be overcome.<br />
<br />
<b>Community</b><br />
We know that children's achievement is significantly affected by the extent to which their families and caregivers are engaged with their education. As education becomes more digital, it is essential that families, as well as children, are confident in the digital world. This will require a significant investment in digital literacy, but will also mean that parents and caregivers will improve their skills for participation in the digital economy.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://taurangamoanacluster.ultranet.school.nz/ClassSpace/372/" target="_blank"><img border="0" height="215" src="http://3.bp.blogspot.com/-DxSkmTtMMdk/UPOInQauO3I/AAAAAAAAAPY/d_1zouiUTUE/s1600/connections.jpg" width="320" /></a></div>
Community connections are not only local, but regional and global as well.<br />
<br />
<b>Workforce</b><br />
We also know that the most important influence on children's educational achievement is the quality of teaching and leadership within the school. It is essential that everyone involved in the delivery of education is digitally competent.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.itlresearch.com/images/stories/reports/ITL%20Research%202011%20Findings%20and%20Future%20Directions%20Presentation.pdf" target="_blank"><img border="0" height="257" src="http://2.bp.blogspot.com/-9iy5lyc4o-c/UPOIm-joQWI/AAAAAAAAAPU/4JciBWBIMKQ/s1600/ITL+how+students+use+ICT.png" width="320" /></a><b> </b></div>
<div class="separator" style="clear: both; text-align: center;">
</div>
This will require a substantial increase in investment in in-service training and also a major overhaul of initial teacher training to ensure that the future workforce have the skills and confidence to lead and support children's learning. This change much is more than a five day training course - it is actually a complete reboot of the profession to introduce new pedagogy and practices based on a model of continuous learning and collaboration.<br />
<br />
<b>Equity</b><br />
The New Zealand education system is world leading; however we have a long tail of underachievement, in particular Maori and Pasifika students and in rural areas.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.tpk.govt.nz/en/in-print/kokiri/kokiri-25-2012/maori-pursuing-digital-horizons/" target="_blank"><img border="0" height="144" src="http://1.bp.blogspot.com/-gOtt5t380k4/UPOIoZ51lrI/AAAAAAAAAPk/i1453qcH55w/s1600/equity+maori+smartphone.jpg" width="320" /></a></div>
Digital education provides both an opportunity and a risk:digital tools can be used to personalise education and there is some evidence that this is effective in creating better engagement and maintaining connections with children; however financial and economic pressures may exclude the disadvantaged from participation both at school and at home. This is clearly an area for government investment and intervention to ensure equity of access and a future inclusive community.<br />
<br />
<b>Leadership</b><br />
The digital tsunami has deconstructed many industries over the last 20 years. Education is entering a period of transformational change that will affect every aspect of learning. We know that the biggest factor in achieving successful transformational change is leadership - having a common vision, a structured programme of change and sufficient investment to achieve the future state.<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://www.epractice.eu/en/library/281756" target="_blank"><img border="0" src="http://2.bp.blogspot.com/-3GUtS5IxJus/UPOImPRYNdI/AAAAAAAAAPQ/PEOIYws4FWo/s1600/change+management+investment.png" /></a></div>
There needs to be a shift from competition to collaboration across the whole education sector - including the national provision and funding of internet and core services, to enable schools to focus on areas where innovation is important. Chapter 11 of the report outlines the importance of leadership and urges the government to ensure that the institutional arrangements are in place to provide effective leadership. This is probably the most important change to New Zealand in the next 20 years and we must get it right.<br />
<br />
<i>Disclosure: I was engaged by the Select Committee as an expert advisor to the Inquiry.</i> Laurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com2tag:blogger.com,1999:blog-8477599153742244304.post-21529782307823065532013-01-15T11:35:00.000+13:002013-01-15T11:35:48.556+13:0021st century learning and the digital tsunami<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: left;">
<a href="http://2.bp.blogspot.com/-Jv6svZbL088/UOjlH0gHDuI/AAAAAAAAAPA/ERGKtCB-NLE/s1600/Untitled.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="193" src="http://2.bp.blogspot.com/-Jv6svZbL088/UOjlH0gHDuI/AAAAAAAAAPA/ERGKtCB-NLE/s320/Untitled.png" width="400" /></a></div>
The changes in education as a result of the digital tsunami cannot be underestimated – it is the largest, and arguably most important, transformation that will happen in New Zealand in our lifetime. 2,500 schools and 4,500 early childhood education (ECE) centres, nearly 100,000 registered teachers, 750,000 students at school and 190,000 at ECE centres, and more than four million stakeholders .<br />
<br />
The Select Committee for Education and Science completed an inquiry into 21st century learning environments and digital literacy, and submitted <a href="http://www.parliament.nz/en-NZ/PB/SC/Documents/Reports/7/e/2/50DBSCH_SCR5695_1-Inquiry-into-21st-century-learning-environments.htm" target="_blank">the report</a> to the House in December 2012 The text of the report gives some indications of the nature of the inquiry. In this post, I use the top 10 most frequently used words in the report to illustrate some general themes relating to the future of education; my next post will discuss the key recommendations from the report.<b> </b><br />
<br />
<b>Learning</b><br />
<div class="MsoNormal">
Education is about learning, but "learning" is not just what children do at school. Learning happens everywhere, and learning happens for everyone - teachers, students, families and care givers. Technology creates a platform of almost limitless opportunities for better learning .<b> </b><br />
<br />
<b>Schools</b><br />
The focus of the inquiry was the impact of technology on schools; there was general agreement on the changes that are needed to the school environment - it needs to support flexible, adaptive and collaborative learning within the school and through connections with other schools.<b> </b></div>
<div class="MsoNormal">
<br />
<b>Heard</b><br />
There were 90 written submissions to the inquiry, and 55 oral submissions; this involved a lot of listening to a wide range of well informed advice. From this listening, there emerged a clear consensus - in the future, education will use innovation and collaboration to create a unique personalised learning experience for every child.<b> </b></div>
<div class="MsoNormal">
<br />
<b>Digital</b><br />
It's not the technology that will make a difference, but the fact that all resources, whether used by or created by the student, are digital and reusable. The technology will continue to change, so skills will be needed to ensure that the technology is continually put to best use.<b> </b></div>
<div class="MsoNormal">
<br />
<b>Access</b><br />
Universal access to digital tools is fundamental to a high quality education system<b> </b>- this includes device and internet<b> </b>access at school, at home and in the community, for all participants - learners, teachers, parents and caregivers.<b> </b></div>
<div class="MsoNormal">
<br />
<b>Students</b><br />
The voices of the students who made submissions to the inquiry were illuminating; they have grown up in a digital world, where information and connections are instantly available, and they will drive future innovation.<b> </b></div>
<div class="MsoNormal">
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-7gIotLLop9o/UPSE7Mde3yI/AAAAAAAAAQA/bArEsp7ahbA/s1600/digital+tsunami.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/-7gIotLLop9o/UPSE7Mde3yI/AAAAAAAAAQA/bArEsp7ahbA/s1600/digital+tsunami.jpg" /></a></div>
<b>New Zealand</b><br />
The digital tsunami is changing education in every country in the world; it is essential that New Zealand culture, language and values are at the core of our education system. No-one else will nurture these unique assets, and we have a responsibility to develop and maintain Maori and Pasifika content.<b> </b></div>
<div class="MsoNormal">
<br />
<b>21<sup>st</sup> Century</b><br />
The changes in the first 13 years of the 21st century have been huge - for example, in 2000 there was no broadband, Gmail, Facebook, or iTunes. Changes in technology will continue to accelerate over the remaining 87 years of the century; the shift to digital needs to be adaptive to continuous technology change.<b> </b><br />
<br />
<b>Teachers</b><br />
The teaching profession is at the front-line of responding to the challenge<b>s</b> and opportunities of digital education. Significantly increased investment is needed to ensure that our teachers have the skills and confidence to act as guides for future generations.</div>
<br />
<i></i><br />
<i><br /></i>
<i>Disclosure: I was engaged by the Select Committee as an expert advisor to the Inquiry.</i><br />
<br />
<br />
<br /></div>
Laurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com3tag:blogger.com,1999:blog-8477599153742244304.post-47456965464660041992012-08-14T12:37:00.000+12:002012-08-14T12:37:40.098+12:00Data Scientists – building open data capability<div dir="ltr" style="text-align: left;" trbidi="on">
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-NdakE9bImIo/UCmYfc1rjhI/AAAAAAAAAOg/yrvSXOy8-iE/s1600/Untitled.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><br /></a></div>
Following on from the previous post, an emerging community of “farmers” are sharing practices and constructing a series of helpful guides on how to approach data management. If you want to move beyond being a hunter gatherer of data, you should look at the guides that are under construction, and contribute your experience to the community. Here are three sources that you may find useful. <br />
<br />
<a href="http://3.bp.blogspot.com/-U7T7_yV6YV0/UCmYGT-vRbI/AAAAAAAAAOY/3HJsKVuXnsI/s1600/Untitled.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="122" src="http://3.bp.blogspot.com/-U7T7_yV6YV0/UCmYGT-vRbI/AAAAAAAAAOY/3HJsKVuXnsI/s200/Untitled.png" width="200" /></a><br /><a href="http://semanticommunity.info/" target="_blank">Semantic Community</a> is a wiki dedicated to using and promoting Data Science - “It is not just where you put your data (cloud), but how you put it there." A good entry point is the section on<a href="http://semanticommunity.info/Data_Science/Free_Data_Visualization_and_Analysis_Tools" target="_blank"> free data visualisation tools</a>. I was fortunate that one of the drivers behind the Semantic Community, Brand Niemann, was willing to be online at 4am to deliver a <a href="http://semanticommunity.info/@api/deki/files/18968/BrandNiemann08062012.pptx" target="_blank">presentation</a> to a <a href="http://www.w3.org/egov/wiki/Main_Page" target="_blank">W3C egov</a> conference call, which helped me connect to this rich data source. <br />
<br />
<a href="http://1.bp.blogspot.com/-0tEavuLVDVc/UCmZC4R1NDI/AAAAAAAAAOo/cbkmD5T0iv0/s1600/Untitled.png" imageanchor="1" style="clear: right; float: right; margin-bottom: 1em; margin-left: 1em;"><img border="0" height="106" src="http://1.bp.blogspot.com/-0tEavuLVDVc/UCmZC4R1NDI/AAAAAAAAAOo/cbkmD5T0iv0/s200/Untitled.png" width="200" /></a><br />The <a href="http://handbook.schoolofdata.org/en/latest/index.html" target="_blank">Data Wrangling handbook</a> is a crowdsourced “textbook” from the School of Data, supported by the good folk at the Open Knowledge Foundation. The OKFN blog last month published <a href="http://blog.okfn.org/2012/07/24/managing-expectations/" target="_blank">Managing Expectations</a> by Rufus Pollock which described the long term evolution of open knowledge; it promised to be the first of two posts, so watch out for the sequel. <br />
<br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://2.bp.blogspot.com/-NdakE9bImIo/UCmYfc1rjhI/AAAAAAAAAOg/yrvSXOy8-iE/s1600/Untitled.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="http://2.bp.blogspot.com/-NdakE9bImIo/UCmYfc1rjhI/AAAAAAAAAOg/yrvSXOy8-iE/s200/Untitled.png" width="195" /></a></div>
The <a href="http://www.guardian.co.uk/news/datablog" target="_blank">Guardian data blog</a> has been do<span id="goog_1837517336"></span><span id="goog_1837517337"></span>ing some great work on visualising data about the Olympics over the last two week. Last year Tim O’Reilly wrote a short <a href="http://www.forbes.com/pictures/lmm45emkh/tim-oreilly-is-the-founder-of-oreily-media/#gallerycontent" target="_blank">piece </a>for Forbes on the topic of the “World’s 7 Most Powerful Data Scientists." More interesting than the fact that the list actually contains ten names, is the fact that they are all from the USA – just like "World Series" baseball. In the w3c discussion, Brand Niemann confirmed my view that the Guardian data blog is leading the application of data science to data journalism; maybe <a href="http://www.guardian.co.uk/profile/simonrogers" target="_blank">Simon Rogers</a> should be at the top of the list.<br />
<br />
<br />
<br />
<br />
<br /></div>
Laurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com1tag:blogger.com,1999:blog-8477599153742244304.post-63343858149797746412012-08-01T15:13:00.000+12:002012-08-20T12:13:25.296+12:00The anthropology of Open Government Data – moving beyond Hunter-Gatherer<div dir="ltr" style="text-align: left;" trbidi="on">
<br />
<i><b>R</b><b>AW DATA NOW</b></i> was the rallying cry issued by <a href="http://blog.okfn.org/2007/11/07/give-us-the-data-raw-and-give-it-to-us-now/" target="_blank">Rufus Pollock</a> from the Open Knowledge Foundation in November 2007. Sir Tim Berners-Lee picked up the call in his landmark <a href="http://www.ted.com/talks/tim_berners_lee_on_the_next_web.html" target="_blank">TED talk</a> from February 2009, and now, nearly five years on, Open Government and Open Data have become part of government operations for many countries around the world.<br />
<br />
In this post, I propose that we are still at an early stage of Open Government Data, and use the stages of evolution of our species as a framework for thinking about the future of Open Data.<br />
<br />
<b>Hunter Gatherer</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-oh7FghVql8w/UBdvj7oTNbI/AAAAAAAAANw/1cvAqhTWfWc/s1600/Hunter-Gatherers.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="177" src="http://4.bp.blogspot.com/-oh7FghVql8w/UBdvj7oTNbI/AAAAAAAAANw/1cvAqhTWfWc/s200/Hunter-Gatherers.jpg" width="200" /></a></div>
<br />
For over 100,000 years, homo sapiens was a Hunter Gatherer and generally nomadic, hunting and foraging for food and moving constantly in the search for sustenance. <br />
<br />
The open data community is essentially a hunter-gatherer world – finding food (data) and providing it to our families in the best way possible. The tribes have ways of sharing information on where good food can be found (#opendata on Twitter is a good source), but in some terrains (governments) food is hard to find, and it takes skill, experience, and cunning to be an effective data hunter. <br />
<br />
Fortunately hunters are willing to share their findings, and provide <a href="http://bitly.com/bundles/laurencemillar/1" target="_blank">signposts</a> to help hunters find easy to gather food, although a lot of it has tough skin (pdf) and is of low (calorific) value. <br />
<br />
<a href="http://datos.fundacionctic.org/sandbox/catalog/faceted/" target="_blank">Maps </a>are emerging, but are not authoritative. Interoperability is sharing information on the design of the bow and arrow, through channels such as on <a href="https://scraperwiki.com/" target="_blank">Scraperwiki</a> and <a href="http://code.google.com/p/google-refine/" target="_blank">G_Refine</a>.<br />
<br />
<b>Agriculture</b><br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://3.bp.blogspot.com/-cLAXHXwXEFQ/UBdvlAs9FtI/AAAAAAAAAN4/h7IuNLwwC7w/s1600/ag-rev.jpeg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"></a><a href="http://3.bp.blogspot.com/-cLAXHXwXEFQ/UBdvlAs9FtI/AAAAAAAAAN4/h7IuNLwwC7w/s1600/ag-rev.jpeg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="200" src="http://3.bp.blogspot.com/-cLAXHXwXEFQ/UBdvlAs9FtI/AAAAAAAAAN4/h7IuNLwwC7w/s200/ag-rev.jpeg" width="140" /></a></div>
<br />
Humans first began the systematic cultivation of plants and animals between 7,000 and 10,000 years ago, and the relative security provided by agriculture provided the incentive for most humans to live as farmers in permanent settlements.<br />
<br />
The idea of farming and harvesting data is emerging in a few areas; two notable examples are <a href="http://www.opencorporates.com/" target="_blank">OpenCorporates</a> and the <a href="http://www.guardian.co.uk/world-government-data" target="_blank">World Government Data Store</a>, where farmers have planted crops from many terrains in one place. <br />
<br />
The emergence of data geo-coding and <a href="http://www.youtube.com/watch?v=bvyB92JrqLA" target="_blank">Spatial Data Infrastructure</a> initiatives suggest that more facilities will be available to support agriculture. <br />
<br />
<b>Cities, states and empires</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://1.bp.blogspot.com/-EgIfuIZyj7s/UBdvl7UX_pI/AAAAAAAAAOA/oGnJ3yfj3Z8/s1600/city+states.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="185" src="http://1.bp.blogspot.com/-EgIfuIZyj7s/UBdvl7UX_pI/AAAAAAAAAOA/oGnJ3yfj3Z8/s200/city+states.jpg" width="200" /></a></div>
<br />
The next phase of anthropological evolution saw the establishment of governments, complex economic and social structures with increasing specialisation, sophisticated language and writing systems, and distinct cultures and religions. The rise and fall of these cities, states and empires has happened across the world for the last 2,000 years.<br />
<br />
Open Government Data has not yet moved into this stage, although some people are <a href="http://gov2au.com/2011/02/11/open-public-data-then-what-part-1/" target="_blank">thinking</a> what it might bring. Government is the world’s largest information business – from global organisations such as the UN to national, regional and local governments. How will the supply chain change as the internet deconstructs the management and distribution of government information? Other industries have tried to preserve their old business models but have been unsuccessful – <a href="http://confusedofcalcutta.com/2011/02/20/why-platforms-leak-the-impact-of-artificial-scarcity/" target="_blank">artificial scarcity is met by abundance</a>.<br />
<br />
What are the specialised roles that will emerge to support this more complex environment - data retailers, data wholesalers, distributors, quality control inspectors, curators and regulators – and what are the new operational models? Can we expect to see the emergence of the farmers market, specialist stores, department stores and hypermarket chains?<br />
<br />
<b>Industrialisation</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;">
<a href="http://4.bp.blogspot.com/-a_B_LMkw4lk/UBdvnHMJ-nI/AAAAAAAAAOI/UV8Fza_nFxU/s1600/industrial.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="150" src="http://4.bp.blogspot.com/-a_B_LMkw4lk/UBdvnHMJ-nI/AAAAAAAAAOI/UV8Fza_nFxU/s200/industrial.jpg" width="200" /></a></div>
<br />
Just over 200 years ago, the industrial revolution replaced human and animal labour with machines which led to major new modes of mass production, and the related social and economic changes that are the foundation of modern society.<br />
<br />
The promise of the <a href="http://www.w3.org/standards/semanticweb/" target="_blank">semantic web</a>, <a href="https://joinup.ec.europa.eu/" target="_blank">interoperability</a>, and the <a href="http://www.practicalparticipation.co.uk/odi/2011/11/evaluating-open-government-data-initiatives-can-a-5-star-framework-work/" target="_blank">5 star scale</a> of open data may be a pointer to a future. Many have commented that the semantic web is too complex for today’s operational needs; the open data ecosystem may need to evolve through different phases. The experience of early pioneers can help to ensure that all parts of the ecosystem develop to support high levels of automation - the journey will be much shorter than the evolution of the human race, but will still take decades to reach full potential. </div>
Laurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com2tag:blogger.com,1999:blog-8477599153742244304.post-51996180688248784472011-06-24T14:09:00.000+12:002011-06-24T14:09:41.065+12:00Sector Development 101<div dir="ltr" style="text-align: left;" trbidi="on">Singapore reclaimed a leadership role in e-government and ICT sector development with the announcement this week of <a href="http://www.egov.gov.sg/egov-masterplans/egov-2015/vision-strategic-thrusts">eGov2015</a> and the third call for <a href="http://www.ida.gov.sg/Infrastructure/20070110112154.aspx">Cloud Computing Proposals</a>.<br />
<div class="separator" style="clear: both; text-align: center;"></div><br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/-wUUhutPSpaI/TgPv0--z3dI/AAAAAAAAANo/0bG5ACqIO8M/s1600/cloud+xkcd.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="103" src="http://2.bp.blogspot.com/-wUUhutPSpaI/TgPv0--z3dI/AAAAAAAAANo/0bG5ACqIO8M/s320/cloud+xkcd.png" width="320" /></a></div><br />
Their approach to cloud computing is an outstanding example of sector development – both strategy and execution. Singapore decided to promote the City State as a cloud computing hub by encouraging vendors to establish cloud facilities in Singapore, and then issuing a series of calls for the use of these facilities. Different cloud vendors have participated in each of the three calls for cloud computing proposals.<br />
<br />
To ensure the investment is a genuine stimulus to the sector, eligible applicants have to be Singapore-registered companies, and supportable types of projects include trials, proof-of-concepts and testing. The government had previously identified specific verticals - digital media, life sciences, manufacturing, financial services, retail & tourism, and education. Organisations developing solutions in these areas were selected to take advantage of subsidised cloud computing resources. <br />
<br />
The <a href="http://www.ida.gov.sg/Infrastructure/20090204131831.aspx">first call</a> in May 2010 outlined the objective to establish Singapore as a Shared Services Hub, focus on the verticals, and enable local users, especially SMEs, and to exploit SaaS (software as a service) for HR, finance, IT & other admin functions. In November 2010, the <a href="http://www.ida.gov.sg/Infrastructure/20110524173242.aspx%20">second call</a> was issued focused on the same verticals. Proposals that were selected include: video hosting and streaming, social media monitoring and analysis, document sharing loud services marketplace, asset traceability and management, Radio Frequency Identification (RFI) technology, commodity trading and investment risk assessment solutions, smart traffic and mobile phone data screening.<br />
<br />
The third call, issued last week, continued a focus on “lighthouse projects” that illustrate and promote the use of the infrastructure in the verticals, and added a focus on transportation and construction. At the same time Singapore became the third Asian country to launch an <a href="http://data.gov.sg/">open data portal</a> with more than 5,000 datasets – providing developers with plenty of data to crunch in the cloud.<br />
<br />
Other governments should watch and learn.<br />
<br />
They are being assessed – also this week a "<a href="http://www.asiacloud.org/index.php/news/press-release-cloud-readiness-index">Cloud Readiness Index</a>" was announced which will analyse 10 key attributes critical to the deployment and use of cloud computing technology across 14 different countries in the region - China, Australia, Hong Kong, India, Indonesia, Japan, Korea, Malaysia, New Zealand, the Philippines, Singapore, Taiwan, Thailand and Vietnam.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://1.bp.blogspot.com/-Wmi22yQBvoI/TgPv0cQU9TI/AAAAAAAAANk/ePASTgXKy4Y/s1600/cloud+dilbert.png" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" height="99" src="http://1.bp.blogspot.com/-Wmi22yQBvoI/TgPv0cQU9TI/AAAAAAAAANk/ePASTgXKy4Y/s320/cloud+dilbert.png" width="320" /></a></div><br />
</div>Laurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com3tag:blogger.com,1999:blog-8477599153742244304.post-64199049103380246602011-02-08T06:54:00.000+13:002011-02-08T06:54:49.921+13:00Small earthquake in the media: not many dead<div dir="ltr" style="text-align: left;" trbidi="on"><br />
Wikileaks took pole position in world headlines in November 2010, becoming an "overnight sensation" after several years under the radar. Was it, as the <a href="http://www.guardian.co.uk/commentisfree/cifamerica/2010/dec/06/western-democracies-must-live-with-leaks">Guardian claimed</a> "the first really sustained confrontation between the established order and the culture of the internet"? Is <a href="http://www.stuff.co.nz/the-press/opinion/perspective/4606624/Silence-from-US-media-is-deafening">Naomi Wolf right</a> about the ambivalence of US media in their defence of journalists revealing truth?<br />
<br />
As the story was breaking, I was travelling between the Middle East, Asia and New Zealand. I followed the story with an obsession that was fed across timezones and political boundaries - accessing information sources without borders. The immediacy of the internet media pushed the circulation of ideas to hyperspeed: Live tweeting from the court hearing in London, commentary flaming in media blogs, and a palpable sense of excitement as the "war" escalated. The DDoS attacks on Wikileaks and the attacks by Anonymous on suppliers who withdrew their services, had all the characteristics of early skirmishes. As <a href="http://www.guardian.co.uk/media/2010/dec/14/wikileaks-julian-assange-protect-from-attack">Julian Assange remarked sardonically</a> "We now know that Visa, Mastercard, PayPal and others are instruments of US foreign policy. It's not something we knew before". And the continuing <a href="http://www.wired.com/threatlevel/2011/02/wikileaks-sweden/">leaks</a> around his court case include the publication of his <a href="http://www.fsilaw.com/sitecore/content/Global/content/Julian%20Assange%20Case%20Papers.aspx">defense</a>. The events have been great theatre, and rich in irony.<br />
<br />
At the same time, Wikileaks has very quickly become part of the journalism landscape. Although only 3,500 of the 251,287 cables have been published, news stories are now regularly accompanied by commentary from Wikileaks - it has become another source of information. <br />
<br />
<div class="separator" style="clear: both; text-align: center;"></div><b>After the obligatory 15 minutes of fame, has the world changed?</b><br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/_6dbsnQYJTPg/TVAt-dz2pII/AAAAAAAAANQ/Ygy9kExY0E8/s1600/wlogo.png" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" height="320" src="http://2.bp.blogspot.com/_6dbsnQYJTPg/TVAt-dz2pII/AAAAAAAAANQ/Ygy9kExY0E8/s320/wlogo.png" width="138" /></a></div>In my view, it has. Many people that I respect have already published their views; here I contribute why I think so.<br />
<br />
Before answering, I need to separate the Wikileaks effect from its founder - Julian Assange. I have no direct knowledge of him, or what caused him to pursue his quest with <a href="http://cryptome.org/0002/ja-conspiracies.pdf">a clear understanding</a> of his goal and the associated dangers, but I enjoyed reading Aaron Bady's <a href="http://zunguzungu.wordpress.com/2010/11/29/julian-assange-and-the-computer-conspiracy-%E2%80%9Cto-destroy-this-invisible-government%E2%80%9D">insights</a> into Julian the man. Here I look at the structural implications for a 21st century fourth estate. <br />
<br />
Since the globalisation of capital in the 1970s, there has been an imbalance between power and accountability. Neo-liberal economic ideology, which should have ended with the 2008 financial crisis, amazingly led to rehabilitation of the <a href="http://www.imdb.com/title/tt1645089/">very people</a> who got us into this mess, and the perpetuation of the obscene gap between the rich and poor. <br />
<br />
Rudolf Elmer recently used Wikileaks to <a href="http://abcnews.go.com/Business/rudolf-elmer-hands-swiss-bank-account-details-wikileaks/story?id=12630995">release financial details</a> of Swiss bank account holders - an indication that Wikileaks is not just a channel for US government leaks. Wikileaks targets power and wealth, without fear or favour, and is a necessary counterbalance to the transnational resources available to power and wealth. Look at <a href="http://mirror.wikileaks.info/">the organisations</a> that have been held to account. <br />
<br />
Power and wealth seeks privacy and secrecy, and abhors public scrutiny. Social institutions have evolved, building on the hard work of brave and ethical leaders, to create controls which balance the exercise of power. We look aghast at the excesses of dictators in developing countries who accumulate and hide wealth while their people live in poverty. However in western democracies, power and wealth have found ways to avoid examination by the traditional fourth estate, which is struggling for survival, recycling press releases from governments and corporations alongside celebrity gossip and reality shows.<br />
<br />
Laws and government systems seek to balance the interests of the individual with the interests of the community. Globalisation has removed capital from the control of these laws, and a globalised media has not yet emerged to hold power and wealth to account. Power and wealth take advantage of this opportunity to avoid the oversight of national watchdogs, and use professional advisors, transnational wealth management and offshore funds to minimise their contribution to the collective interest. <br />
<br />
Wikileaks has been described as the <a href="http://pressthink.org/2010/07/the-afghanistan-war-logs-released-by-wikileaks-the-worlds-first-stateless-news-organization/">first stateless news organisation</a>, operating as a networked organisation, and not subject to the control of any single government. Power and wealth have understood the value of being stateless; it has probably always been this way, but we thought that good governments controlled abuses. This faith has dissolved as the secrecy is lifted, and behind the veil we see how the elite, including our political leaders, live. The Cayman Islands has the <a href="http://www.gao.gov/new.items/d08778.pdf%20">fifth largest banking asset base</a> on the planet (277 banks holding US$2 trillion of deposits in a country with a population of 60,000). Holding power and wealth to account, whether it is through the US embassy cables or the details of offshore wealth held in Swiss banks accounts, is an important task that needs to operate on a global basis in the 21st century. <br />
<br />
After the initial publication of the first 191 cables on 28 November 2010, the Wikileaks web site experienced a distributed denial of service (DDoS) attack; in the following week, a range of suppliers withdrew from providing their services to Wikileaks including Paypal, MasterCard and Visa payment services, PostFinance in Switzerland who closed the Wikileaks bank account, Tableau data visualization, EveryDNS domain services, and Amazon hosting services. This line-up indicates the significance of the challenge to the status quo.<br />
<br />
The ability of the internet to hold power to account has been praised in western media when applied in countries like China, North Korea, much of the Middle East and a large part of Africa. The <a href="http://techliberation.com/2010/01/21/hillary-clintons-historic-speech-on-global-internet-freedom/">statement by Hilary Clinton</a> in January 2010 seemed to define the US policy in support of "Internet freedom .. {giving} people access to knowledge", but the policy turned out to be <a href="http://www.nowpublic.com/world/hillary-clinton-wikileaks-statement-and-remarks-november-29-2010-2732928.html">fungible</a> when the power of the internet was applied to US government activities. <br />
<br />
What we have found is that technology is value neutral, and the internet can apply scrutiny to all sources of power and wealth, irrespective of ideology. Operating with integrity and openness is the only way to the moral high ground.<br />
<br />
Power and wealth are now facing an equal and opposite force of a different nature - the agility and resilience of the internet. <br />
<ul style="text-align: left;"><li>"The Net interprets censorship as damage and routes around it" - <a href="http://www.toad.com/gnu/">John Gilmore</a>'s famous quip </li>
<li>A <a href="http://www.readwriteweb.com/archives/wikileaks_on_pirate_bay_the_facts_figures.php">mirror</a> of the Wikileaks Cablegate site was seeded as a torrent 20 minutes after its availability was published on Twitter. </li>
</ul>This speed and agility is beyond the ability of any government to control: the Chinese government's <a href="http://en.wikipedia.org/wiki/Green_Dam_Youth_Escort">Green Dam Youth Escort</a> project was not successful, and currently <a href="http://www.trust.org/alertnet/blogs/technotalk/google-and-twitter-help-egyptians-bypass-internet-closure/">technology </a>is enabling Egyptians to carry on texting and tweeting during anti-government protests, circumventing the country's internet shutdown.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://3.bp.blogspot.com/_6dbsnQYJTPg/TVAvSx0CQ6I/AAAAAAAAANU/gL7kQj8Vb_4/s1600/berlin+wall.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/_6dbsnQYJTPg/TVAvSx0CQ6I/AAAAAAAAANU/gL7kQj8Vb_4/s1600/berlin+wall.jpg" /></a></div><br />
Even if Wikileaks has a short life, the world of power and wealth has been changed forever, in the same way that Napster deconstructed the music business. Creating a place to "help you safely get the truth out" is an essential part of creating a more balanced world, now that individual governments can no longer do so. The fact that there is such a place will change the behaviours of those holding power and wealth.<br />
<br />
From Napster to Pirate Bay, from Wikileaks to Openleaks, the genie is out of the bottle. Does government really want to start another unwinnable war against an abstract noun? <br />
<br />
Or as the Guardian put it (before the separation):<br />
<br />
<i>Politicians now face an agonising dilemma. The old, mole-whacking approach won't work. Our rulers have a choice to make: either they learn to live in a WikiLeakable world, with all that implies in terms of their future behaviour; or they shut down the internet.</i><br />
<br />
<br />
<b>Places to go to find out more </b><br />
<br />
<a href="http://vimeo.com/17711353">Wikirebels - a must-watch documentary from STV</a>. Some soundbites:<br />
<ul style="text-align: left;"><li>"A difference can be made bottom up" </li>
<li>"Information does not respect borders" </li>
<li>"Democracy without transparency is not democracy, it's just an empty word"</li>
<li>"By and large Wikileaks is a force for the good. Wikileaks in very very powerful ... one has to be cautious about anything that is very powerful"</li>
</ul><a href="http://confusedofcalcutta.com/2010/12/12/sea-of-joy/">You see it's not really about Wikileaks. .. every artificial scarcity will be met by an equal and opposite artificial abundance; over time, the artificial abundance will win</a>.<br />
<br />
<a href="http://pressthink.org/2010/07/the-afghanistan-war-logs-released-by-wikileaks-the-worlds-first-stateless-news-organization/"></a>The leaders of Myanmar and Belarus, or Thailand and Russia, can now rightly say to us "You went after Wikileaks domain name, their hosting provider, and even denied your citizens the ability to register protest through donations, all without a warrant and all targeting overseas entities, simply because you decided you don't like the site. <a href="http://www.shirky.com/weblog/2010/12/wikileaks-and-the-long-haul/">If that's the way governments get to behave, we can live with that</a>.<br />
<br />
<a href="http://www.shirky.com/weblog/2010/12/half-formed-thought-on-wikileaks-global-action/">Society is made up of competing goods that can't be resolved in any perfect way</a> - freedom vs. liberty, state secrets vs. citizen oversight <br />
<br />
<a href="http://zunguzungu.wordpress.com/2010/11/29/julian-assange-and-the-computer-conspiracy-%E2%80%9Cto-destroy-this-invisible-government%E2%80%9D/">In a world where leaking is easy, secretive or unjust systems are nonlinearly hit relative to open, just systems.</a><br />
<br />
<a href="http://www.schneier.com/blog/archives/2010/12/wikileaks_1.html%20">Governments will have to learn what the music and film industries have been forced to learn already, that it's easy to copy and publish digital files</a><br />
<br />
In 1958 a young Rupert Murdoch, then owner and editor of Adelaide's The News, wrote: "<a href="http://www.theaustralian.com.au/in-depth/wikileaks/dont-shoot-messenger-for-revealing-uncomfortable-truths/story-fn775xjq-1225967241332">In the race between secrecy and truth, it seems inevitable that truth will always win</a>."<br />
<br />
</div>Laurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com3tag:blogger.com,1999:blog-8477599153742244304.post-14336929112842195262010-08-06T23:35:00.001+12:002010-08-18T18:11:22.194+12:00Is Open Government absolute?A new normal has emerged in public policy thinking over the last 18 months: the idea that the reality of Open Government is a “good thing” and that Open Data is an important step in turning the policy of open government an operational reality. The latest event was the <a href="http://agimo.govspace.gov.au/2010/07/16/declaration-of-open-government/">Declaration of Open Government</a> last month by the Australian government. So are there boundaries to Open Government? If the mantra is "open by default", what are legitimate reasons for not following the default?<br />
<br />
Cultural change involved in implementing Open Government is huge. Despite the fact that we have had the Official Information Act in place in New Zealand for almost 30 years, there are still questions over whether government officials are comfortable operating in accordance with the legislation. The widespread availability of Internet technology removes significant operational barriers from releasing official information, and has exposed more deep-seated systemic resistance. Legislation is a blunt instrument to effect behavioural change.<br />
<br />
Last week, the NZ government, led by the Department of Conservation, convened a group of invited participants to brainstorm what data sets should be prioritised across government for release under an open data program. A good idea, I thought, but others did not.<br />
<br />
<i>“.. I am concerned about the process here. It's quite legitimate for private individuals to run invite-only events (Foo, for example), and for private companies to do so (Microsoft Open Govt), but IMHO it's a different ballgame when government is involved, especially (ironically) when the topic is open govt or open govt data. .... We need to scale past this invite-only, pussy-footing to larger, public, open processes as fast as possible."</i><br />
<br />
The full discussion is <a href="http://groups.open.org.nz/groups/ninja-talk/messages/topic/2jiITWOZsxmgr1DfGpotAF">here</a><br />
<br />
This got me to thinking about the fundamentals of Open Government. Technology has made it possible for every interaction of a government official or politician to be published online. Should every step in the development of ideas take place "on the record" or is there a place for deliberative privacy? <br />
<br />
Beth Noveck, Deputy CIO and spearhead of the Obama campaign for open and transparent government, spoke about this when <a href="http://longnow.org/seminars/02010/mar/04/transparent-government/">questioned (at 1:20:00)</a> on whether legislating for transparency of meetings simply moved discussions from 'meetings' to the lunch table<a href="http://longnow.org/seminars/02010/mar/04/transparent-government/"></a>. (There was a secondary question about whether secrecy is used as an excuse for not making data open; in this post, I am focused on information that is not subject to privacy or national security constraints).<br />
<br />
If everything is totally open, people either grandstand for the cameras or are reluctant to join a conversation for fear of appearing stupid. Deals are not made in front of TV cameras, and locking politicians into early public positions can have unforseen consequences.<br />
<br />
The White House publishes a list of visitors, and meetings of senior government officials are a matter of public record "so we know there are no secret energy meetings going on, but they are in fact happening out in the open". The problem of institutional reform is hard, and the current approach is to start with lobbying – “ensuring that when we talk with lobbyists we are much more open than when we are going to lunch with our colleagues”.<br />
<br />
Beth’s view is also that there are practical constraints on full transparency - "if we had to record every conversation, we would spend so much time being open, there would not be enough time to get the job done". However, this may be a temporary constraint - it is not hard to imagine a future where everything is able to be recorded without any active effort required of participants.<br />
<br />
Just because everything can be made part of the public record, does not mean it should be. In the new world of Open Government, we need to understand the legitimacy of government having discussions in private or by invitation only. The questions are: <br />
<ul><li>the criteria for choosing who is involved in early stage discussion </li>
<li>the disclosure requirements about the existence and content of early stage discussions</li>
<li>at what point should those discussions be opened up to a wider community. </li>
</ul>I personally support deliberative privacy with transparency of participation - publication of who is part of the early stage discussions. The results should be disclosed early enough that positions are not fully formed (and we find ourselves in faux consultation), while allowing enough time to develop ideas so that the subsequent dialogue is effective. In many ways, public officials are caught either way: when ideas are first floated they are criticised for being short on detail, and if they present detailed proposals they are criticised for not consulting widely enough.<br />
<br />
Back to the government event last week. I stand by my view that the event was a good idea. People outside government do not always understand the pressures and cultural expectations that constrain what you can do within government. For this event, the organisers made efforts to cast the net wide for community involvement, and published the outcome of the discussions within two working days. As far as I am aware, no-one was excluded from the event, and it is hard to see what more the organisers could have done to operate openly.<br />
<br />
As <a href="http://publicstrategist.com/2010/08/apps-for-elephants/">Public Strategist has observed</a> : <br />
<i>The government is an elephant - It tries to dance, but finds it hard, and the smaller animals around it can get hurt. The solution may be for the elephant to stand stock still, to do nothing for fear of treading on something more nimble, but more easily hurt. Or it may be to learn to tread more carefully, to place its feet carefully, but to keep moving nevertheless. Or it may be to charge ahead regardless and let others survive as best they can.</i><br />
<br />
When faced with Open Government, the natural response of the elephant is the first option, so we should support and encourage government officials to choose the second option. Encourage them to interact with people and understand how to operate within a community, and join in a rolling conversation in different forums without constraints on who should be involved in individual events. The more conversations there are about Open Government, the more we will make progress. Anyone who champions the cause should be praised and encouraged.<br />
<br />
The US government chose the third option, and they did this because of the unequivocal leadership from the top - the very first thing President Obama did, on his first day in office, was to sign the executive memorandum on transparency and open government. With that level of leadership, the elephant can charge ahead. Without that leadership, the best we can expect from our public servants is that they learn to move forward, and keep moving. Our job is to encourage those that are moving and harangue those that are not.<br />
<br />
So praise to the State Services Commission who today <a href="http://www.ssc.govt.nz/display/document.asp?DocID=7797">announced</a> the formal adoption by Cabinet of the NZ Government Open Access and Licensing framework (NZGOAL). This provides guidance for State Services agencies to follow when releasing copyright works and non-copyright material for re-use by third parties, standardises the licensing of government copyright works for re-use using Creative Commons licences, and recommends the use of ‘no-known rights’ statements for non-copyright material.<br />
<br />
To continue the conversation: OpenLabourNZ is running a public <a href="http://blog.labour.org.nz/index.php/2010/08/02/obamas-open-govt-guru-to-talk-at-openlabournz-public-event/">one-day event</a> at the end of August. I am looking forward to the presence of <a href="http://www.rasiej.com/">Andrew Rasiej</a>, who will be joining the event by video link. I look forward to further discussion of these issues, which are at the heart of Open Government.Laurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com0tag:blogger.com,1999:blog-8477599153742244304.post-78619755420516155602010-06-08T15:38:00.002+12:002010-06-09T18:22:37.144+12:00Active with the activists<div class="separator" style="clear: both; text-align: center;"></div><div class="separator" style="clear: both; text-align: center;"><a href="http://2.bp.blogspot.com/_6dbsnQYJTPg/TA8zF2YZW1I/AAAAAAAAAMc/E9GYCQNZaQU/s1600/112378696.jpg" imageanchor="1" style="clear: left; float: left; margin-bottom: 1em; margin-right: 1em;"><img border="0" src="http://2.bp.blogspot.com/_6dbsnQYJTPg/TA8zF2YZW1I/AAAAAAAAAMc/E9GYCQNZaQU/s320/112378696.jpg" /></a></div><br />
<ul><li></li>
</ul>45 minutes outside Chiang Mai in Northern Thailand, nearly 100 attendees, from NGOs, community media, academics, activists, social workers and government officials, are at the <a href="http://mekongict.org/">second MekongICT camp</a>. People have come from Thailand, Laos, Myanmar/Burma, Cambodia, Bangladesh, Malaysia, Korea, Vietnam, India and Sri Lanka; from outside the region there are community-based ICT proponents from the US, Canada, and New Zealand.<br />
<br />
My key note covered <a href="http://www.slideshare.net/laurence.millar/mekong-ict-june-2010">Government 2.0 and Civil Information Society</a> – why it is important, examples of government 2.0 around the world, and how to move forward. Coming from a high trust, transparent democracy in New Zealand, I was filled with admiration for activists working in these Mekong countries who have none of the tools that we take for granted - such as Freedom of Information legislation or consultative democracy. <br />
<br />
One question that I was asked – “what incentives can be put in place for countries like ours, where government is closed and we cannot get information?” – gave me food for thought. Apart from anger that people with power, in positions of authority and leadership, do not accept their responsibilities to serve the people who they lead, I could only come up with one answer - find an individual government official who wants to make a difference. If "<a href="http://onthecommons.org/profile.php?id=1994">Law is the Operating System of Democracy</a>", how do you lead your life without a reliable operating system?<br />
<br />
The ideas emerging so far include protecting your information when operating as an NGO, and activism through citizen journalism.There are teams building <a href="http://prometheusradio.org/">community radio stations </a>with parts that you used to be able to buy from Dick Smiths and Radio Shack before they put them all away in the drawers at the back and sold you glossy end products. Another group <span style="background-color: white;">are </span><span style="background-color: white;">creating a wifi mesh network to connect communities peer to peer communities. Along the hall, I am at a workshop designing SMS systems for supporting farmers - "for people in the world that need it most, the only way to access the power of ICT is through SMS.</span><br />
<br />
<br />
I keep thinking "Agitprop" without even knowing if that is a word with currency in the 21st century - it meant a lot in 1970. Wikipedia tells me that it is term from Bolshevist Russia, that had negative connotations in the west. It seems to fit well with what is happening here - communities helping each other to help themselves. Billy Bragg would be proud of them:<br />
<br />
<br />
Jumble sales are organised and pamphlets have been posted <br />
Even after closing time there's still parties to be hosted <br />
You can be active with the activists <br />
Or sleep in with the sleepers <br />
While you're waiting for the <a href="http://www.ebaumsworld.com/video/watch/681816/">great leap forward</a>Laurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com1tag:blogger.com,1999:blog-8477599153742244304.post-86025863971724428112010-05-08T05:32:00.001+12:002010-05-08T05:47:37.266+12:00Eat your own dogfoodThe New Zealand Labour Party have launched a new way of developing policy – out in the open, involving anyone who chooses to participate. They are starting by developing a policy on open and transparent government. Some might criticise this as a self-referential policy wonk, others would call it eating your own dogfood.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"><a href="http://3.bp.blogspot.com/_6dbsnQYJTPg/S-RNfEiwM_I/AAAAAAAAAMI/aTvU4QQJN3w/s1600/2447000009_28aba2f8e4_m.jpg" imageanchor="1" style="margin-left: 1em; margin-right: 1em;"><img border="0" src="http://3.bp.blogspot.com/_6dbsnQYJTPg/S-RNfEiwM_I/AAAAAAAAAMI/aTvU4QQJN3w/s320/2447000009_28aba2f8e4_m.jpg" /></a></div>I have a preference for <a href="http://www.cio.com/article/122351/Pegasystems_CIO_Tells_Colleagues_Drink_Your_Own_Champagne">drinking your own champagne</a>.<br />
<br />
In Australia, Kate Lundy started her use of ICT and social media tools while in opposition, and last year launched the successful <a href="http://www.katelundy.com.au/category/campaigns/publicsphere/">Public Sphere</a> initiative, which built momentum behind the creation of the <a href="http://gov2.net.au/">Gov2.0 TaskForce</a>. In the US, <a href="http://change.gov/content/home">social media tools</a> were used by the Obama campaign to tap into what the public wanted, proving an effective tool for listening to a wide set of stakeholders. However, for yesterday's general election in the UK, social media seemed to be used more as a source of data on public sentiment than as a campaign tool.<br />
<br />
It is probably not surprising that many such initiatives start from opposition parties. Being in government creates a lot of work, driven by daily operational imperatives, so there is less time to consider the fundamentals of the democratic process. In addition, the ruling government contains the people upon whom lobbyists spend most of their money and attention, creating a community that is protective of their insider position.<br />
<br />
The risks of fake participation can be reduced by ICT technologies. The techniques used to give the illusion of participation have been <a href="http://www.iap2.org/displaycommon.cfm?an=1&subarticlenbr=429">identified</a> as <br />
<ul><li>Don’t publicize the meeting to potential opponents.</li>
<li>Schedule the meeting at an inconvenient time or place.</li>
<li>Stack citizen representatives on public bodies.</li>
<li> Signal the futility of participating to those most likely to participate.</li>
<li>Intimidate potential opponents by forcing them to reveal their identities</li>
</ul>With these risks in mind, it is ecouraging that the Labour Party initiative was re-tweeted by the National Business Review, the publication of choice for business leaders. And comments on the policy are coming from across the political spectrum. <br />
<br />
In 2007, New Zealand provided world leadership in the use of e-participation, through the <a href="http://www.policeact.govt.nz/wiki/">Police Act wiki</a>, the <a href="http://www.goodpracticeparticipate.govt.nz/levels-of-participation/collaborative-processes-and-partnerships/bioethicscasestudy.html">Bioethics Council</a> and guidance from the <a href="http://plone.e.govt.nz/policy/participation/guide-to-online-participation.html">State Services Commission</a>. More recently, New Zealand has been overtaken by developments in London, Canberra and Washington. It is encouraging that the Labour Party has started this initiative and already there are discussions about some fundamental policy points. Should the Official Information Act cover commercial in confidence information, given that government is using public money? During the negotiation phase it is clearly appropriate, but once the contract has been signed, there is no good reason for withholding the details. Opening the operations of our elected MPs up to the same level of scrutiny as other parts of public life is another aspect of Open Government. <br />
<br />
We have a way to go. Since early 2009, the Federal US government have led in the implementation of <a href="http://www.whitehouse.gov/open/about/policy">open government</a> and <a href="http://www.data.gov/">open data</a>. The Australian government have already <a href="http://www.finance.gov.au/publications/govresponse20report/index.html">accepted </a>the recommendations of the Gov 2.0 task force and are proceeding to implementation And despite the absence of social media in the election campaign, the British government have introduced some real <a href="http://petitions.number10.gov.uk/">innovation</a> in citizen participation.<br />
<br />
<div class="separator" style="clear: both; text-align: center;"></div>New Zealand <a href="http://www.transparency.org/policy_research/surveys_indices/cpi/2009/cpi_2009_table">leads the world in good government</a>, which has open and democratic policy-making at its core. We need to broaden and strengthen the dialogue, and accelerate the pace, to retain that positionLaurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com0tag:blogger.com,1999:blog-8477599153742244304.post-17252222067903203122010-03-12T16:07:00.002+13:002010-03-15T18:22:01.291+13:00The global Gov2.0 community and the speed of informationMy first <a href="http://en.oreilly.com/gov2-international">global conference </a>this morning - featured speakers were:<br />
<br />
<ul><li><a href="http://eaves.ca/about/">David Eaves </a>from Centre for the Study of Democracy in Canada</li>
<li>Joel Whittaker from the <a href="http://www.usip.org/">US Institute for Peace</a></li>
<li><a href="http://en.oreilly.com/gov2-international/public/schedule/speaker/78293">Yaron Gamburg</a> from the Israel Ministry of Foreign Affairs</li>
<li><a href="http://katelundy.com.au/">Kate Lundy</a> from Australia</li>
<li><a href="http://www.futuregovconsultancy.com/">Dominic Campbell</a> from London</li>
</ul><br />
There were more than 300 attendees (all virtual) from Australia, Mexico, USA, Canada, Spain, Brazil, Israel, UK, India, Singapore Taiwan, Netherlands, Lebanon, Georgia, Romania and Kuwait - possibly other countries as well.<br />
<br />
The content of the presentations was great (should be online at the <a href="http://en.oreilly.com/gov2-international">conference site</a> shortly), and the chat stream was a useful and interesting adjunct to the event. My comments will be at the <a href="http://www.futuregov.net/blog">FutureGov</a> blog shortly.<br />
<br />
At the end of the three hours I was excited and had a bundle of new ideas; but I was also left with a sense of disconnection or disembodiedness - a bit like jet lag. <b>which is what this post is about.</b><br />
<br />
<a href="http://3.bp.blogspot.com/_6dbsnQYJTPg/S5miS3usorI/AAAAAAAAAK4/H0kDxh-3-b4/s1600-h/bike.png" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5447563669362483890" src="http://3.bp.blogspot.com/_6dbsnQYJTPg/S5miS3usorI/AAAAAAAAAK4/H0kDxh-3-b4/s200/bike.png" style="cursor: pointer; display: block; height: 185px; margin: 0px auto 10px; text-align: center; width: 200px;" /> </a>My thoughts went to an article written by Ian Illich in 1973 - <a href="http://clevercycles.com/energy_and_equity/">Energy and Equity</a>. The article was about the way mankind moves around the planet, and the energy deficit created by industrialisation.<br />
<br />
"<span style="font-style: italic;">Man, unaided by any tool, gets around quite efficiently. He carries one gram of his weight over a kilometer in ten minutes by expending 0.75 calories. Man on his feet is thermodynamically more efficient than any motorized vehicle and most animals. Man on a bicycle can go three or four times faster than the pedestrian, but uses five times less energy in the process. He carries one gram of his weight over a kilometer of flat road at an expense of only 0.15 calories. The bicycle is the perfect transducer to match man’s metabolic energy to the impedance of locomotion. Equipped with this tool, man outstrips the efficiency of not only all machines but all other animals as well</span>."<br />
<br />
The article argues that other forms of transport are use less energy and create more inequity:<br />
"<span style="font-style: italic;">More energy fed into the transportation system means that more people move faster over a greater range in the course of every day. Everybody’s daily radius expands at the expense of being able to drop in on an acquaintance or walk through the park on the way to work. Extremes of privilege are created at the cost of universal enslavement.</span>"<br />
<br />
<br />
As one reviewer noted, <span dir="ltr" id="ed_rvw_0_hd1" style="display: inline;">"The result, worldwide, would be a postindustrial economy of 'modern subsistence'-from which Illich regrets the Chinese are deviating though he appears to have hopes for the Cambodians. Therein, of course, lies the difficulty: notwithstanding Illich's disclaimers, an authoritarian pall hangs over his proposals--along with a religious asceticism/quietism." Which is not a great outcome.</span><br />
<br />
<a href="http://4.bp.blogspot.com/_6dbsnQYJTPg/S5mpNK0IWGI/AAAAAAAAALA/NMtU_meEEzQ/s1600-h/airbus.png" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5447571267987724386" src="http://4.bp.blogspot.com/_6dbsnQYJTPg/S5mpNK0IWGI/AAAAAAAAALA/NMtU_meEEzQ/s200/airbus.png" style="display: block; height: 108px; margin: 0px auto 10px; text-align: center; width: 162px;" /></a><br />
<span dir="ltr" id="ed_rvw_0_hd1" style="display: inline;"></span><br />
<span dir="ltr" id="ed_rvw_0_hd1" style="display: inline;">Nevertheless, at the time the essay was published I thought there was an important truth buried in the essay - about the impact on individuals of modern mass transport. I developed the idea of a psychic deficit caused by high speed travel, that meant the body needed time, after a high speed journey to readjust to the destination state. Rather like the deep sea diver needs to pause periodically for decompression to avoid the bends, </span>so the body needs to readjust after air-travel to "allow the electrons to catch up".<br />
<br />
<br />
<a href="http://4.bp.blogspot.com/_6dbsnQYJTPg/S5mpWJY04xI/AAAAAAAAALI/02lNh-_BDq0/s1600-h/deep+sea+diver.png" onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}"><img alt="" border="0" id="BLOGGER_PHOTO_ID_5447571422223590162" src="http://4.bp.blogspot.com/_6dbsnQYJTPg/S5mpWJY04xI/AAAAAAAAALI/02lNh-_BDq0/s200/deep+sea+diver.png" style="display: block; height: 200px; margin: 0px auto 10px; text-align: center; width: 154px;" /></a><br />
<br />
<br />
So I found myself thinking at the end of a three hour global conference, do we need to give time for ideas to settle, when they are zapping round the world like electrons in the Hadron Collider, and give our brains time to absorb the ideas. Of course we need time to absorb ideas and integrate them into our personal mental models - that is what sleep and dreams are for; but do we need more time if the ideas have travelled longer distances, or pinged around in cyberspace, than if they shared at same location - in a face to face conversation?<br />
<br />
Maybe I am too old to be a digital native?<br />
<br />
<br />
<br />
<br />
<br />
<span dir="ltr" id="ed_rvw_0_hd1" style="display: inline;"></span><br />
<span dir="ltr" id="ed_rvw_0_hd1" style="display: inline;"></span>Laurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com2tag:blogger.com,1999:blog-8477599153742244304.post-74358290414988316942010-01-28T22:05:00.023+13:002010-02-01T20:04:19.858+13:00The Public Domain is the rule, copyright protection is the exception<a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_6dbsnQYJTPg/S2YwocCUxZI/AAAAAAAAAJo/Wtj7vEuMbs0/s1600-h/monk.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 104px; height: 149px;" src="http://2.bp.blogspot.com/_6dbsnQYJTPg/S2YwocCUxZI/AAAAAAAAAJo/Wtj7vEuMbs0/s200/monk.jpg" alt="" id="BLOGGER_PHOTO_ID_5433083471747925394" border="0" /></a><br />Speaking at the open government mini-conference within linux.conf.au last week, I found myself saying out loud "<span style="font-weight: bold;">copyright will be gone in fifty years, and the current ACTA discussions are the final desparate actions of a dying regime</span>". While it is a view that I have held for some time, the articulation in public carries with it a responsibility to provide some rationale for my opinion - so here goes.<br /><br />There will be a single Information Economy in the 21st century - the very premise of this blog. In this new economy the <a href="http://globalvillagegovernance.blogspot.com/2009/06/its-like-europe-in-1944.html">supply chain for content will be destroyed and recreated</a>, and attempts to prevent this happening will be seen from the future as minor interruptions on the inevitable journey (rather like the attempts by port companies and dockside labour to stop the <a href="http://press.princeton.edu/titles/8131.html">shipping container</a>, which revolutionised the distribution industry).<br /><br />Colonisation of language is a clear sign that a regime is threatened - desparate times require that words gain new meanings. Piracy (on the high seas) is dangerous, violent, organised crime - using the same word for downloading a document, movie or song word is like using the same word for murder and for not wearing a seat belt. If you want an activity that deserves the label "piracy", what about <a href="http://www.guardian.co.uk/commentisfree/2010/jan/12/disdain-democracy-bankers-bonuses-theft">banking</a>?<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://3.bp.blogspot.com/_6dbsnQYJTPg/S2Z8kgbcQ3I/AAAAAAAAAKg/h5Ryob56o3M/s1600-h/16.01.10-Martin-Rowson-on-006.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 152px;" src="http://3.bp.blogspot.com/_6dbsnQYJTPg/S2Z8kgbcQ3I/AAAAAAAAAKg/h5Ryob56o3M/s200/16.01.10-Martin-Rowson-on-006.jpg" alt="" id="BLOGGER_PHOTO_ID_5433166967091250034" border="0" /></a>Glyn Moody gave a great keynote speech at linux.conf.au - it should be on the core curriculum for every student of economics 101. <a href="http://opendotdotdot.blogspot.com/2010/01/recalibrating-intellectual-monopolies.html">He pointed</a> me to the Public Domain Manifesto, from which the title of this blog is taken. I am not able to do his ideas justice here - wait for the video to be published; one of his points was that anti-sharing does not scale - it is either win-lose (for the market), or lose-lose (for the tragedy of the commons). And he highlighted the work of <a href="http://nobelprize.org/nobel_prizes/economics/laureates/2009/press.html">Elinor Ostrom</a>, who received the Nobel Prize for economics for her work on ownership of common property.<br /><br />It is a universal truth that more good comes from sharing ideas and data than from protecting them, although our whole economic system is based on the opposite - we have taken the concepts of ownership rights over physical property, and applied them to intellectual property, with disastrous results.<br /><br />By 2030, all content will be available:<br /><br /><div style="text-align: center;"><span style="font-size:180%;">In Any Language<br />Anywhere in the World<br />At Any Time<br />Instantaneously<br />At Zero Cost</span><br /></div><br />So, there will be no money to be made from the content itself.<br /><br /><div style="text-align: center;">But what about us?<br /></div><br /><div style="text-align: center;"><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_6dbsnQYJTPg/S2Zo9pWtTtI/AAAAAAAAAKQ/YjcC526N1l4/s1600-h/creatives.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 200px; height: 44px;" src="http://4.bp.blogspot.com/_6dbsnQYJTPg/S2Zo9pWtTtI/AAAAAAAAAKQ/YjcC526N1l4/s200/creatives.jpg" alt="" id="BLOGGER_PHOTO_ID_5433145408751488722" border="0" /></a>(or more importantly, the people that make money from our work,<br />and the work of others like us)<br /></div><br />I don't know the answer. There are developing ideas - the best I have come across so far are:<br /><br />"<a href="http://www.edge.org/3rd_culture/kelly08/kelly08_index.html">When copies are free, you need to sell things that can not be copied</a>"<br />"<a href="http://www.blogger.com/How%20Do%20Publishers%20and%20Authors%20Get%20Paid%20in%20a%20%22Free%22%20World?">How do authors and publishers get paid in a "Free" World</a>"<br />"<a href="http://confusedofcalcutta.com/2009/07/13/the-death-of-the-download/">It was never about owning content. It was always about listening to music.</a>"<br />"<a href="http://toc.oreilly.com/2009/07/content-is-a-service-business.html">Content is a service business</a>"<br />"<a href="http://www.guardian.co.uk/media/2010/jan/25/cudlipp-lecture-alan-rusbridger">The new media have disappeared. They are just media now</a>"<br /><br /><br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://2.bp.blogspot.com/_6dbsnQYJTPg/S2ZsW5_unVI/AAAAAAAAAKY/6snsWHvowWY/s1600-h/avatar.jpg"><img style="margin: 0px auto 10px; display: block; text-align: center; cursor: pointer; width: 150px; height: 113px;" src="http://2.bp.blogspot.com/_6dbsnQYJTPg/S2ZsW5_unVI/AAAAAAAAAKY/6snsWHvowWY/s200/avatar.jpg" alt="" id="BLOGGER_PHOTO_ID_5433149141250121042" border="0" /></a>Laurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com5tag:blogger.com,1999:blog-8477599153742244304.post-1901078462974070752010-01-06T22:50:00.004+13:002010-01-06T23:05:45.245+13:00What next for government transformation?<p>December is the month that public servants, at the end of the year, publish the results of their work, and take some time off to spend with their families, knowing that the evidence of their achievements during the year is open for review by the public. Three governments – <span class="caps">USA</span>, <span class="caps">UK</span> and Australia - released major documents in December, and they give some signposts for the trends that we can expect to see in 2010 and beyond. </p> <p>On December 22, Australia published <a href="http://www.finance.gov.au/publications/gov20taskforcereport/index.html">Engage – getting on with Government 2.0</a>, the report from a TaskForce set up by the Prime Minister to make recommendations on improving the accessibility, transparency, innovation, and collaboration of government. The report contains an excellent statement of the benefits and challenges of using <span class="caps">ICT</span>, particularly social media/web 2.0 tools. The report makes strong recommendations for government action, proposing both policy and operational changes to secure the identified benefits. The Task Force places a high priority on the value of freeing up public sector information (<span class="caps">PSI</span>), listing how <span class="caps">PSI</span> can be managed as a national resource to deliver increased accountability, economic growth and social benefits). It is particularly encouraging that the Task Force practiced what it preached – with extensive use of <a href="http://gov2.net.au/">the taskforce blog</a>, and community participation during the development of the report. (Disclosure – I was a member of the international reference group). </p> <p>Earlier in the month, on December 8th, the <span class="caps">UK</span> government published <a href="http://www.hmg.gov.uk/media/52788/smarter-government-final.pdf">Putting the Frontline First: smarter government</a>, which also contains a strong emphasis on the value of opening up government data. The report has a broader aim than the Australian task force, considering how to improve the quality of public services through the use of <span class="caps">ICT</span>, devolving more responsibility to the frontline for regional and local services, and streamlining central government. Of particular relevance to readers of FutureGov will be the sections on “Accelerate the move to digitalised public services” (placing the emphasis on increased usage of online services, and a new “Tell Us Once” service), “Radically open up data” (creating a single access point for valuable public datasets, making them free for reuse), and “Harness the power of comparative data“ (using data on frontline performance to drive better performance, by giving citizens and professionals the tools to act as catalysts for change).<br /></p> <p>Also on December 8, the <span class="caps">US</span> government issued the <a href="http://www.whitehouse.gov/open/documents/open-government-directive">Open Government Directive</a>, which establish a clear action plan for individual government agencies to implement the commitment made by President Obama in his Memorandum on Transparency and Open Government, issued on his first day in office January 21, 2009. In a remarkable year, the Federal <span class="caps">US</span> government has demonstrated strong leadership in the use of Open Government to strengthen transparency, participation, and collaboration. Over the coming weeks, I will write about a number of common themes from these three landmark publications; here I discuss just one – Open Government. </p> <p>All three governments recognise the value of opening up government data (covered in my <a href="http://blog.e.govt.nz/index.php/2009/04/30/government-in-the-global-village/">final post</a> as New Zealand’s Government <span class="caps">CIO</span> in April 2009). It is not an exaggeration to nominate Open Government Data as the most important idea of 2009; at the start of the year Open Data was an emerging concept, and each of these end-of-year publications shows how deeply the idea is now embedded in core government policy and operations. More links on this major shift in government policy thinking can be found in <a href="http://globalvillagegovernance.blogspot.com/2009/09/dont-accept-no-from-somebody-who-cant.html">this article</a> I wrote last year. </p> <p>All three reports highlight the importance of engagement between government and citizens to strengthen trust in government, develop better policy, reduce operating costs and release resources for front-line service delivery. </p> <p>Ensuring that government information is freely available is a foundation concept that has been enacted in <a href="http://en.wikipedia.org/wiki/Freedom_of_information_legislation">legislation in a large number of countries</a>, and a number of governments have also established independent agencies to monitor and oversee the operation of the legislation. </p> <p>Government agencies are not able to respond to the demands for information – from individuals, the media, businesses and not-for-profit organisations. This is because government is currently operating as a “retailer” of information – using data that has been collected to prepare official reports; government needs to move to being a wholesaler of information, allowing the community to create the reports using government supplied data. </p><br /><br />(also posted at http://www.futuregov.net/blog/2010/jan/5/what-next-government-transformation/)Laurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com1tag:blogger.com,1999:blog-8477599153742244304.post-420126416116101912009-12-16T21:34:00.013+13:002009-12-21T08:24:53.889+13:00NZ in the new information economyI contributed to the Listener Feature article on <a href="http://www.listener.co.nz/issue/3633/features/14646/20_ideas_for_a_better_world.html">Twenty Ideas for a Better World</a> :<br /><br /><span style="font-weight: bold; font-style: italic;">Sunrise or Sunset economic development?</span><p style="font-style: italic;"></p><span style="font-style: italic;"> The 21</span><sup style="font-style: italic;">st</sup><span style="font-style: italic;"> century will be the Information century – weightless products and services will be the engine of global economic growth, fuelled by the internet. This single market of two billion people will demand increasing information processing capability - massive data centres using renewable power with a long run competitive price. Almost 10% of NZs electricity generation capacity is currently used at Tiwai Point for a 20th century business - importing alumina and exporting manufactured aluminium. NZ is internationally respected for integrity, we have a "green" brand, a stable legal and regulatory regime, and last month were confirmed as the least corrupt country in the world. These factors create a unique competitive advantage for a globally attractive data centre facility drawing on renewable Manapouri energy. The information industry is at a discontinuity point. Do we have the vision and courage to seize the opportunity and establish NZ as a trusted provider of services to the new global economy?</span><p></p><br />This post places the article in a wider context . Feel free to contribute via comments.<br /><span style="font-weight: bold;"><br />What can we expect this century?<br /></span><br />Thinking about the 21st century world economy, it is not easy to project forward 90 years; imagine forecasting 2009 from 1919 – faster buggy whips anyone?<br /><br />But there are some clear signals; it will be an information century, and there will be a single global economy connected using the Internet - we are still at early stages in the history of the Internet, and it will continue to evolve. There will be a massive increase in information-based products and services - entertainment, movies, e-books, and other e-things not yet invented - as all products move to this single open infrastructure.<br /><br />Think how financial markets have evolved over the last 40 years since capital flows went global – recall Walter Wriston, talking about the <a href="http://dca.lib.tufts.edu/features/wriston/media/ms134.004.030.00007_transcript.doc">Twilight of Sovereignty</a> which I referenced in an <a href="http://globalvillagegovernance.blogspot.com/2009/06/dealing-with-scale.html">earlier post</a>. Now think what similar globalisation will mean for information-based products, and imagine the disruption as one single market is created.<br /><br />Information in this century will be universally available, in any language, updatable from anywhere on the planet, at any time. It will be copied and distributed instantly at zero cost.<br /><br /><span style="font-weight: bold;">What will this flat world look like?</span><br /><br />In this new economy, points of commerce will emerge (in a similar way to the entrepots of the 18th century, or the financial centres of the 20th century) – <a href="http://en.wikipedia.org/wiki/Attractor">attractor</a> locations in an otherwise flat world. Network economics will drive more and more interaction to these attractors, which will develop unassailable critical mass, securing a long-term ringside seat - top tier countries in the digital information economy. Other locations, service providers, and economies will be relegated to a second tier seating, where they jostle for position as feeders to the top tier.<br /><br />We are still early in the century, and the seat tickets have not yet been claimed; for example in the entertainment and media world, NZ has a top tier seat, based on the work of Weta Workshop. As a consequence of this creative leadership, we have also built a technology capability and now NZ has <span style="text-decoration: underline;"></span><a href="http://computerworld.co.nz/news.nsf/tech/BD28C911E281AD19CC2576720071E255">eight supercomputers</a> in the world's top 500, compared to one in Australia. <span style="font-size:130%;"><span style="line-height: 115%;font-family:";font-size:12pt;" ></span></span><br /><br />For an example of how a country has identified the future potential, consider Singapore's Intelligent Nation vision - <a href="http://www.ida.gov.sg/About%20us/20070903145526.aspx">iN2015</a> . The Singapore story of the last 50 years is remarkable– successfully establishing a viable and growing economy with no natural resources. Now they are looking to maintain a leadership position in the information century, and have aligned their activities - government and private sector behind this strategic vision.<br /><br /><span style="font-weight: bold;">Future success</span><br /><br />What is needed to become one of these attractors – a top tier player in the information economy?<br /><br />In my view the most important pre-requisite is a strategic intent to be a player – that is, a national decision that this is where we want our economy to be in 50 years time.<br /><br />The characteristics needed to be successful are many, and I would not presume to know what they all are. I do know that a collection of NZ leaders, drawn from multiple disciplines and focused on the question, could develop a shortlist, and assess our current position – world leader, in the peloton, or off the pace – in each. Then we could develop a build/buy/partner approach to strengthen areas where we are not currently competitive, and position us for success.<br /><br />I think it likely that physical presence, in the form of the global data centre that I suggested in the Listener article, is likely to be one – not something that will differentiate a country, but a necessary price of being in the top tier. There is also the related infrastructure - power, bandwidth and international connectivity, and when I have talked with people this is the area where the discussion has focused. There are lots of reasons why we could not build such a facility – we don't have the funds to invest, there is no payback, there will be even less jobs for a data centre than for an aluminium smelter, we don't have the bandwidth, we don’t have the .... In my view these technology and infrastructure issues can be solved by investment.<br /><br />The strategic assets that a country will need to claim and retain a top tier position are a lot more difficult to secure simply by investment - assets such as trust, integrity, a stable legal and regulatory regime, and good relations with both the West and Asia (the Internet economy is moving inexorably to the population centres of China and India). These assets are core to New Zealand values, and we need to protect and nurture our current leadership position in these (for example NZ has the least corrupt public sector in the world according to the Transparency International <a href="http://www.transparency.org/policy_research/surveys_indices/cpi/2009">annual survey</a>)<br /><br />People are the third essential ingredient (after technology and values). As life in the world becomes more difficult (crowding, pollution, climate, traffic, violence - pick your own dystopian trigger), New Zealand becomes an increasingly attractive place to live. We have a special place in the world's consciousness as an accessible and friendly Shangri-la; how many people, when they hear you are from NZ say "Oh, I've always wanted to go there"? If we can attract creativity and build more components needed for success in the digital information economy, there is no reason why we should not sit in a top tier seat.<br /><br /><span style="font-weight: bold;">The big question</span><br /><br />The top tier seats will be claimed over the next 10-20 years. To get one will require focused strategic thinking, which is then transformed into action, by government, private sector investors and individuals. Are we up to it?<br /><br /><br /><div style="text-align: center;">"while the future's there for anyone to change<br />still you know it seems<br />it would easier sometimes to change the past"<br /></div><div style="text-align: center;">(<span style="font-style: italic;">Fountain of Sorrow, Jackson Browne 1974</span>)<br /></div>Laurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com3tag:blogger.com,1999:blog-8477599153742244304.post-64967345516206169822009-11-27T14:44:00.006+13:002009-11-27T15:43:52.303+13:00Ga1a strikes backHas there been an increase in unusual natural disasters recently of more extreme weather leading to flooding, more earthquakes and tsunamis, and more hurricanes and tornados? Or is it just an increase in the vividness of the reporting, beaming live footage of distress into our living rooms or mobile phones. While there is definitely more loss of life (more people living in 'at risk" places), and more reporting, the <a href="http://maps.grida.no/go/graphic/trends-in-natural-disasters">evidence</a> seems to suggest that, in addition, the world is getting more unpredictable.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_6dbsnQYJTPg/Sw8zwg4gLpI/AAAAAAAAAI8/DSmYnnd75dk/s1600/web_trends_in_natural_disasters_004.jpg"><img style="margin: 0pt 10px 10px 0pt; cursor: pointer; width: 400px; height: 372px;" src="http://4.bp.blogspot.com/_6dbsnQYJTPg/Sw8zwg4gLpI/AAAAAAAAAI8/DSmYnnd75dk/s400/web_trends_in_natural_disasters_004.jpg" alt="" id="BLOGGER_PHOTO_ID_5408598586048917138" border="0" /></a><br /><br />I can't help but harbour a sneaking suspicion that as we move inexorably beyond the <a href="http://www.350.org/about/science">350 threshold</a>, that mother earth, Gaia, is sending increasingly impatient signals saying "enough already". This is echoed by <a href="http://www.treehugger.com/files/2009/10/the-science-of-350-the-most-important-number.php">Bill McKibben</a> : "The negotiations that will happen in Copenhagen aren't really about what we want to do, or what the Chinese want to do, or what Exxon Mobil wants to do. They're about what physics and chemistry want to do: the physical world has set its bottom line at 350, and it's not likely to budge."<br /><br />Some <a href="http://www.marketingweb.co.za/marketingweb/view/marketingweb/en/page72308?oid=113835&sn=Marketingweb+detail">suggested</a> that the financial meltdown in 2008 was Gaia trying to communicate with global policy makers in the only language they understood – economics and markets; while this may be a bit fanciful, it is clear that the real power is held by nature rather than man.<br /><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_6dbsnQYJTPg/Sw82fvTQTBI/AAAAAAAAAJU/I0fwJ2abwgE/s1600/Picture3.jpg"><img style="margin: 0pt 10px 10px 0pt; float: left; cursor: pointer; width: 200px; height: 130px;" src="http://4.bp.blogspot.com/_6dbsnQYJTPg/Sw82fvTQTBI/AAAAAAAAAJU/I0fwJ2abwgE/s200/Picture3.jpg" alt="" id="BLOGGER_PHOTO_ID_5408601596396325906" border="0" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_6dbsnQYJTPg/Sw82YGC2lNI/AAAAAAAAAJM/24LGi3lcVSk/s1600/Picture2.jpg"><img style="margin: 0pt 10px 10px 0pt; float: right; cursor: pointer; width: 200px; height: 125px;" src="http://4.bp.blogspot.com/_6dbsnQYJTPg/Sw82YGC2lNI/AAAAAAAAAJM/24LGi3lcVSk/s200/Picture2.jpg" alt="" id="BLOGGER_PHOTO_ID_5408601465062593746" border="0" /></a><br /><a onblur="try {parent.deselectBloggerImageGracefully();} catch(e) {}" href="http://4.bp.blogspot.com/_6dbsnQYJTPg/Sw82Nn2UvrI/AAAAAAAAAJE/gvEkxXgLHtc/s1600/Picture1.jpg"><img style="margin: 0pt 10px 10px 0pt; cursor: pointer; width: 200px; height: 126px;" src="http://4.bp.blogspot.com/_6dbsnQYJTPg/Sw82Nn2UvrI/AAAAAAAAAJE/gvEkxXgLHtc/s200/Picture1.jpg" alt="" id="BLOGGER_PHOTO_ID_5408601285158289074" border="0" /></a><br /><br />Everywhere you look there is evidence of this, <span style="font-weight: bold;">apart from</span> in the urban centres where policy makers and politicians spend all their lives.<br /><br />The recent establishment of the G20 to include such countries such as Brazil, Saudi Arabia, Australia, Indoensia in addition to the Old Powers was a recognition of the importance of enrolling more leaders in charting the future of the planet. As <a href="http://www.guardian.co.uk/commentisfree/2009/sep/25/g8-g2-g5-global-governance">Paul Collier</a> observed, there are any number of G groupings from the G77 (who have no voice, other than the voice of dignity in poverty), to the G5, who have the economic muscle to compel countries to avoid the tragedy of the commons and work for the collective good.<br /><br />I hope they do, otherwise there is a real chance that G1 (Ga1a) will decide that she has had enough of the human race destroying the planet and issue an eviction order.Laurence 2009-2015http://www.blogger.com/profile/01423703298779392323noreply@blogger.com0