Last month I gave a presentation to around 100 people at the Department of Innovation regarding the use of social media in Australian government, alongside Todd Wright of Threesides.
With permission Innovation have published the presentations and video over at their Innovation Blog to share the seminar with others across the public service.
I'd love to see other Departments sharing material of this kind (on a variety of topics) on a regular basis, where there's no confidentiality or commercial concerns. It reduces duplication of effort, spreads knowledge and can lead to money savings for the government.
Thursday, September 02, 2010
Innovation's Social Media in Government Seminar - presentations and videos | Tweet |
Wednesday, September 01, 2010
Independent moderation - optional or must-have for government? | Tweet |
Bang The Table has released an excellent video piece on their moderation system (titled 24/7 moderation), including a part where Matt Crozier (one of their founders) says that independent moderation can be very important for government organisations in order to avoid risks of claims of censorship when they must remove some comments from a forum, blog or other online discussion device.
This part of the video does raise a good question - when should government agencies employ independent (external) moderation and when should they use their own staff.
Matt makes the point that where trust is fractured between a government agency and its constituents there can be increased risks of accusations of bias or censorship if the agency is seen to be doing the moderation. He suggests that an independent moderator could be seen to be less biased and that it removed perceptions that government officials may be moderating a little more than they should.
I think these are good points, which can apply in circumstances where a neutral moderator is both feasible and advantageous.
There are also circumstances where an authentic voice from an agency is required - where officials need to be actively engaging as participants and be seen to be moderating the discussion.
This is particularly important when engagement is occurring through a government-run website, rather than through a separately established or third-party vehicle. Otherwise there can be issues around whether an agency is really seen to be committed or is just engaging in a token effort. Also nuances can be lost where an independent moderator doesn't understand the subject matter at sufficient depth to carry the conversation, particularly in consultations.
Agencies need to weigh up the risks and benefits for each engagement activity, as well as assess them over time as needs change. Where possible I recommend that long-term partnerships with a trusted moderator work better than tendering for a new moderator for each separate engagement as this allows an external party to build an understanding of your guidelines and the subtleties of what may be considered inappropriate comments, rather than having to re-educate each time.
Where staff are moderating they need support as their decisions impact on the integrity and public perception of your organisation. For starters they should have clear moderation guidelines and examples, possibly borrowed and reworked from the experiences of other agencies.
It helps if they have a good understanding of any Information Privacy Principles relevant to their jurisdiction and training in conflict resolution or other engagement-type interactions. It really really helps if they also have prior experience at moderation or participation in online forums and similar mediums which involve moderation activity.
Monday, August 30, 2010
Gaming of online polls and ways to mitigate vote fraud | Tweet |
I've been reading up on the gaming of the Time.com 100 Poll in 2009, where vote rigging saw the founder of 4Chan elevated to the top position and the order of names in the poll manipulated to spell out 'MARBLECAKE ALSO THE GAME' (see the video below).
While there are often legitimate reasons to create online polls or voting tools, it is very important to be aware of the potential pitfalls if measures aren't in place to minimise the risk of inappropriate voting - people 'gaming', defrauding or hacking individual polls.
Often people aren't aware of how easy it can be to game voting and it is important to weigh up what you're doing and put the right level of protection in place.
One of the simplest form of voting fraud can involve users with multiple computers and web browsers, who may be able to vote once per each - then vote again after clearing their browser cache of cookies. This is possible in the polls featured in many popular newspaper websites.
If an email address is required to vote, as is employed in more sophisticated voting systems, users with multiple accounts can sign-up and vote many times - particularly where they own domains and can create thousands of email addresses at a time. This can be monitored and partially mitigated by looking at voting patterns over time and checking the email addresses for similarity and veracity.
When polls check IP addresses they are harder to 'game', however there are still technical approaches some people can use to change IP addresses - or use botnetworks (all with different IPs) to vote on your behalf. This, however, can become quite technically complex and requires significantly more resources.
Finally, if the poll system's security is not assured, someone may hack the actual voting system and introduce biases that influence the outcome - from changing the order in which options to vote on are displayed, counting some votes as more than a single vote, or more obviously just manipulating the total votes through changing the register of votes.
There are way of checking polls to minimise fraud, using technology to check IP addresses, combining this with email address verification or linking to other services such as Facebook where people are unlikely to control more than a single account. There are also CAPTCHA-based means to screen out most automated voting (though adding a hurdle to fast voting) and even more complex automation techniques to analyse voting patterns in real-time and flag, check or disallow some votes based on their origin.
Depending on the poll different levels of mitigation may be needed. Basically the greater the reward for receiving the most votes in a poll, or the greater the controversy over the subject, the greater the likelihood that gaming or fraud will occur, and the greater the mitigation required.
Online voting in elections - such as used by Estonia - tends to employ far more sophisticated techniques to verify votes. These are much more effective, however tend to cost quite a bit (at present) to implement.
So if you're running a fairly simple and low cost online poll it may be best to use it simply as an indication, or to back it up with a human step (selecting a winner from the top ten publicly voted entries) which mitigates a lot of the risk of vote rigging.
Saturday, August 28, 2010
ACT government launches Canberra 2030 consultation integrating Web 2.0 tools | Tweet |
The government for the Australian Capital Territory (ACT) has just launched a consultation asking for the community's views on what the city should be like in twenty years time.
The Canberra 2030 consultation has gone some way to integrate Web 2.0 tools. It allows residents to submit ideas and vote on the ideas of others (up or down) and has a 'discussion forum' - although this is pre-moderated and not structured in a standard forum mode, which is likely to constrain the discussion somewhat.
There's a Twitter account and a Flickr account and also a video up at YouTube - although this doesn't appear to have been embedded in the Canberra 2030 site itself.
Despite a few basic usability issues and a little of a 'tickbox' approach, the site represents a real attempt to consult Canberrans in a more interactive way and it is worth a look.
Plus if you're an ACT resident you could win an iPad.
Wednesday, August 25, 2010
Disaster management using open source and social media | Tweet |
Some of you may be aware of the Mercury 10 national counter-terrorism exercise currently being held in Australia, involving a variety of government bodies.
While this type of scenario is only one of potentially many different types of crises or disasters that could occur, natural disasters, pandemics, rocks from space, and so on, it does raise the question for me, how is Australia using social media and open source technologies in crisis management.
We've seen quite intensive use of social media in situations such as the Haiti earthquake, Gulf of Mexico oil spill, the Mumbai terrorist attacks and the swine flu pandemic last year.
Across the world authorities are realising how valuable social media can be to help them quickly get information out to the public, to collect information on the extent of a disaster and help prioritise relief efforts.
They are also beginning to realise how dangerous it can be to not engage online, leaving rumours and misinformation to spread even faster and more virulently than was previously possible. A good example was during the Mumbai terrorist attacks when a rumour that the Indian government was asking for all live tweeting from Mumbai to stop in order to avoid giving the terrorists information about police movements.
However the really interesting developments in disaster management are happening outside of government. Software engineers and disaster management specialists have spent the last few years developing better tools for addressing crisis situations - often without any support from the authorities responsible for managing emergencies.
Two of these platforms are Ushahidi and Sahana.
Both of these platforms are open source, free-to-use web-based platforms designed to be highly resilient during disaster situations and flexible to the needs of both developing and developed nations.
Ushahidi, developed to report on violence during the 2008 Kenya election, has been deployed more than 20 times around the world to address situations such as violence in Gaza, the impact of the Gulf of Mexico oil spill, Chile and Haiti's emergency responses to their respective earthquake, track crime levels in Atlanta, medical supply levels in pharmacies across Kenya, Uganda, Malawi and Zambia and track the swine flu pandemic.
The system allows reports by mobile phone SMS and MMS and via the internet to be aggregated into a real-time map, then used to identify priority areas for relief efforts or activities. While the system can be deployed simply for reporting by authorities, it has proven to be strongest where citizens have been able to report incidents directly, allowing emergency authorities to respond with a more complete picture of events.
Ushahidi is entirely free to reuse and can be deployed within a few hours.
The group behind the service are currently working on a second service, Swift River, designed to help manage the flood of online information about a disaster in the first few hours and help both emergency services and the public distinguish between rumour and fact. While Swift River won't be launched until the end of August, a video discussing how it will work is available online.
Sahana is another free open source system developed to assist in disaster management. A a web based collaboration tool, it is designed to help manage common coordination problems, such as locating missing persons, managing volunteers and aid and coordinating efforts between a variety of aid groups, government and those impacted by the disaster.
It was originally developed in 2004 by Sri Lankan developers to support the response to the December 2004 Indian Ocean Tsunami and was deployed by the Sri Lanka government to support disaster recovery efforts. A second phase, funded through Sweden, saw Sahana expanded into a more generic disaster management tool with global application.
Sahana was designed to cope with many of the infrastructure issues that frequently occur during disasters, such as intermittent power, loss of network connectivity and the need to deploy the service on low-end hardware and systems. In fact Sahana can be transported on and operated from a USB stick and is extremely flexible and easy to customise, reflecting the need to adapt quickly to the individual nature of every disaster.
Sahana is in use for the Pakistan floods at the moment and it was also used for the Haiti earthquake - discussed in this case study (PDF). It has also been used in the Phillipines, the US, Peru, China, Indonesia and Pakistan for a range of disaster management needs.
There are other open source tools available for disaster management purposes. It is also possible to rapidly build a custom system for a specific need using free and low cost tools such as Wordpress (for content management), Google Maps (for geospatial representations), YouTube (for video), Flickr (for images), Slideshare and Scribd (for presentations and documents), Twitter (for real-time updates), WidgetBox (for embeddable widgets), Facebook (for group coordination), Wufoo (for forms) and services such as Yahoo Pipes to integrate and process information and news feeds.
In most cases the time required to put together these types of custom systems is significantly less than that required to have systems developed within high-end content management systems - as are normally deployed for normal business needs by government agencies.
In most cases these third party services are also cheaper, more scalable and have greater network resilience and peak usage capability - reflecting their need to cater for millions of simultaneous users, more than most government sites are engineered to handle.
So while some governments appear to be relying on traditional means of communications in disasters - brochures or media releases at carefully timed intervals - it is inevitable that communities will self-organise, create their own tools and deploy them with great speed.
Today's challenge for governments is to use social media and online tools to improve their own disaster management capability, organise the flood of information and provide better outcomes - deploying disaster management systems or throwing together custom solutions in a matter of hours rather than months.