Skip to main content

Home/ Groups/ ODI Data Infrastructure, Institutions & Data Access Initiatives
Sonia Duarte

How do different communities create unique identifiers? - Lost Boy - 0 views

  • They play an important role, helping to publish, structure and link together data.
  • The simplest way to generate identifiers is by a serial number.
  • the Ordnance Survey TOID identifier is a serial number that looks like this: osgb1000006032892. UPRNs are similar.
  • ...15 more annotations...
  • Some serial numbering systems include built in error-checking to deal with copying errors, using a check digit.
  • The second way of providing unique identifiers is using a name or code.
  • These are typically still assigned by a central authority, sometimes known as a registration agency, but they are constructed in different ways.
  • Encoding information about geography and hierarchy within codes can be useful. It can make them easier to validate.
  • It also mean you can also manipulate them,
  • But encoding lots of information in identifiers also has its downsides. The main one being dealing with changes to administrative areas that mean the hierarchy has changed. Do you reassign all the identifiers?
  • some identifier systems look at reducing the burden on that central authority.
  • federated assignment. This is where the registration agency shares the work of assigning identifiers with other organisations.
  • Another approach to reducing dependence on, and coordination with a single registration agency, is to use what I’ll call “local assignment“.
  • A simplistic approach to local assignment is “block allocation“: handing out blocks of pregenerated identifiers to organisations which can locally assign them.
  • Here the registration agency still generates the identifiers, but the assignment of identifier to “thing” is done locally.
  • A more common approach is to use “prefix allocation“. In this approach the registration agency assigns individual organisations a prefix within the identifier system.
  • One challenge with prefix allocation is ensuring that the rules for locally assigned suffixes work in every context where the identifier needs to appear.
  • In distributed assignment of identifiers, anyone can create an identifier. Rather than requesting an identifier, or a prefix from a registration agency, these systems operate by agreeing rules for how unique identifiers can be constructed.
  • A hash based identifier takes some properties of the thing we want to identify and then use that to construct an identifier. 
Sonia Duarte

How have National Statistical Institutes improved quality in the last 25 years? - IOS P... - 0 views

  • There are still major efforts needed to continuously improve. More focus needs to be put on measuring internal processes, costs, and components of quality other than accuracy. Documentation needs to be regularly updated, methods for incorporating Big Data developed, and flexibility improved so that adaptive methods based on paradata can be used.
  • it takes regular management involvement and procedures to be in place for it to succeed
  • Measurements are vital, but they are not the goal. This will require re-focusing on improving internal processes. It also implies recognizing the need to track costs as a component of quality.
  • ...1 more annotation...
  • While it will continue to be important for NSIs to increase their use of administrative data and the many sources of Big Data, these will rarely be able to be used as stand-alone sources. More often these sources will need to be combined with well-designed survey data to produce a blended, improved product.
  •  
    "Principles and Practices for a Federal Statistical Agency"
Sonia Duarte

Financials and leadership - Wikimedia Foundation - 0 views

  • 40% Direct support to websites
  • ongoing engineering improvements, product development, design and research, and legal support.
  • 34% Direct support to communities
  • ...5 more annotations...
  • strengthen these communities through grants, programs, events, trainings, partnerships, tools to augment contributor capacity, and support for the legal defense of editors.
  • 12% Fundraising
  • Wikimedia is supported entirely by donations.
  • 14% Administration and governance
  • We manage funds and resources responsibly to recruit and support skilled, passionate staff
diaszasz

Cost Structure Block in Business Model Canvas | Cleverism - 0 views

  •  
    Helpful overview of key things to consider when looking at the cost structure of data institutions
diaszasz

Factual | Business Listings in Factual Data - 1 views

  •  
    Factual started out as an aggregator that allowed organisations to deposit point of interest data to create an aggregated set. Their original business model, IIRC, was around licensing that dataset, but contributors got free access or favourable terms. I've noticed that they've changed their model, so the work of contributing the data is done via "Trusted Data Contributors" who appear to take on the work and responsibility for vetting upstream contributions. https://www.factual.com/updatelisting/ Sharing because I think the evolution is interesting, as is the approach to certifying upstream contributions. Relevant to the certification/audit discussion. Similar issues with some of the alt data ecosystem too I expect.
  •  
    Some background on their early days in this 2012 podcast https://cloudofdata.com/2012/01/data-market-chat-tyler-bell-discusses-factual/
Ben Snaith

Patterns of data institution that support people to steward data themselves, or become ... - 0 views

  • it enables people to contribute data about them to it and, on a case-by-case basis, people can choose to permit third parties to access that data. This is the pattern that many personal data stores and personal data management systems adopt in holding data and enabling users to unlock new apps and services that can plug into it. Health Bank enables people to upload their medical records and other information like wearable readings and scans to share with doctors or ‘loved ones’ to help manage their care; Japan’s accredited information banks might undertake a similar role. Other examples — such as Savvy and Datacoup — seem to be focused on sharing data with market research companies willing to offer a form of payment. Some digital identity services may also conform to this pattern.
  • it enables people to contribute data about them to it and, on a case-by-case basis, people can choose whether that data is shared with third parties as part of aggregate datasets. OpenHumans is an example that enables communities of people to share data for group studies and other activities. Owners of a MIDATA account can “actively contribute to medical research and clinical studies by granting selective access to their personal data”. The approach put forward by the European DECODE project would seem to support this type of individual buy-in to collective data sharing, in that case with a civic purpose. The concept of data unions advocated by Streamr seeks to create financial value for individuals by creating aggregate collections of data in this way. Although Salus Coop asks its users to “share and govern [their] data together.. to put it at the service of collective return”, it looks as though individuals can choose which uses to put it to.
  • it enables people to contribute data about them to it and decisions about what third parties can access aggregate datasets are taken collectively. As an example, The Good Data seeks to sell browsing data generated by its users “entirely on their members’ terms… [where] any member can participate in deciding these rules”. The members of the Holland Health Data Cooperative would similarly appear to “determine what happens to their data” collectively, as would drivers and other workers who contribute data about them to Workers Info Exchange.
  • ...6 more annotations...
  • it enables people to contribute data about them and defer authority to it to decide who can access the data. A high-profile proposal of this pattern comes in the form of ‘bottom-up data trusts’ — Mozilla Fellow Anouk Ruhaak has described scenarios where multiple people “hand over their data assets or data rights to a trustee”. Some personal data stores and personal information management systems will also operate under this kind of delegated authority within particular parameters or settings.
  • people entrust it to mediate their relationships with services that collect data about them. This is more related to decisions about data collection rather than decisions about access to existing data, but involves the stewardship of data nonetheless. For example, Tom Steinberg has described a scenario whereby “you would nominate a Personal Data Representative to make choices for you about which apps can do what with your data.. [it] could be a big internet company, it could be a church, it could be a trade union, or it could be a dedicated rights group like the Electronic Frontier Foundation”. Companies like Disconnect.Me and Jumbo are newer examples of this type of approach in practice.
  • it enables people to collect or create new data. Again, this pattern describes the collection rather than the re-use of existing data. For example, OpenBenches enables volunteers to contribute information about memorial benches, and OpenStreetMap does similar at much larger scale to collaboratively create and maintain a free map of the world. The ODI has published research into well-known collaboratively maintained datasets, including Wikidata, Wikipedia and MusicBrainz, and a library of related design patterns. I’ve included this pattern here as to me it represents a way for people to be directly involved in the stewardship of data, personal or not.
  • it collects data in providing a service to users and, on a case-by-case basis, users can share that data directly with third parties. This pattern enables users to unlock new services by sharing data about them (such as via Open Banking and other initiatives labelled as ‘data portability’), or to donate data for broader notions of good (such as Strava’s settings that enable its users to contribute data about them to aggregate datasets shared with cities for planning). I like IF’s catalogue of approaches for enabling people to permit access to data in this way, and its work to show how services can design for the fact that data is often about multiple people.
  • it collects data by providing a service to users and shares that data directly with third parties as provisioned for in its Terms and Conditions. This typically happens when we agree to Ts&Cs that allow data about us to be shared with third parties of an organisation’s choice, such as for advertising, and so might be considered a ‘dark’ pattern. However, some data collectors are beginning to do this for more public, educational or charitable purposes — such as Uber’s sharing of aggregations of data with cities via the SharedStreets initiative. Although the only real involvement we have here in stewarding data is in choosing to use the service, might we not begin to choose between services, in part, based on how well they act as data institutions?
  • I echo the point that Nesta recently made in their paper on ‘citizen-led data governance’, that “while it can be useful to assign labels to different approaches, in reality no clear-cut boundary exists between each of the models, and many of the models may overlap”
fionntan

Audits, External - Encyclopedia - Business Terms | Inc.com - 1 views

  • The auditor's unqualified report contains three paragraphs. The introductory paragraph identifies the financial statements audited, states that management is responsible for those statements, and asserts that the auditor is responsible for expressing an opinion on them. The scope paragraph describes what the auditor has done and specifically states that the auditor has examined the financial statements in accordance with generally accepted auditing standards and has performed appropriate tests. The opinion paragraph expresses the auditor's opinion (or formally announces his or her lack of opinion and why) on whether the statements are in accordance with generally accepted accounting principles.
  • Major types of audits conducted by external auditors include the financial statements audit, the operational audit, and the compliance audit. A financial statement audit (or attest audit) examines financial statements, records, and related operations to ascertain adherence to generally accepted accounting principles. An operational audit examines an organization's activities in order to assess performances and develop recommendations for improvements, or further action. Auditors perform statutory audits which are performed to comply with the requirements of a governing body, such as a federal, state, or city government or agency. A compliance audit has as its objective the determination of whether an organization is following established procedures or rules.
  • the auditor's final report to management often includes recommendations on methodologies of improving internal controls that are in place.
  • ...1 more annotation...
  • The primary goal of external auditing is to determine the extent to which the organization adheres to managerial policies, procedures, and requirements. The independent or external auditor is not an employee of the organization. He or she performs an examination with the objective of issuing a report containing an opinion on a client's financial statements. The attest function of external auditing refers to the auditor's expression of an opinion on a company's financial statements. The typical independent audit leads to an attestation regarding the fairness and dependability of the statements. This is communicated to the officials of the audited entity in the form of a written report accompanying the statements (an oral presentation of findings may sometimes be requested as well).
Sonia Duarte

Our services | BSI - 0 views

  •  
    "BSI certification shows the world that you work in the smartest, most efficient ways and that you are continually improving your performance."
fionntan

UKAS : The Benefits - 1 views

shared by fionntan on 15 Jun 20 - No Cached
  • It provides the following benefits: Competitive advantage: accreditation provides independent assurance that your staff is competent. It can sets you apart from the competition, and enable you to compete with larger organisations. Market access: accreditation is specified by an increasing number of public and private sector organisations. UKAS accreditation is also recognised and accepted globally, therefore opening up opportunities overseas. Accreditation can highlight gaps in capability, thereby providing the opportunity for improved organisational efficiency and outputs There are a number of insurance brokers and underwriters that recognise accreditation as an important factor in assessing risk, and can therefore offer lower premiums.
  • Organisations can save time and money by selecting an accredited and therefore competent supplier.
  • Provide an alternative to Regulation whilst ensuring the reliability of activities that have the potential to impact on public confidence, health and safety or the environment.
  • ...1 more annotation...
  • Accreditation is a means of assessing, in the public interest, the technical competence and integrity of organisations offering evaluation services.Accreditation, with its many potential benefits for the quality of goods and in the provision of services throughout the supply chain, underpins practical applications of an increasingly wide range of activities across all sectors of the economy, from fishing to forestry, construction to communications. Independent research has confirmed that accreditation has a positive economic value of nearly £1bn on the UK economy each year. 
Ben Snaith

Sharing tools and data globally will help us beat COVID-19 | World Economic Forum - 0 views

  • Second, we need to create open-source structures that allow national and sub-national level health systems to collect and share this precious data in a timely, privacy-preserving manner. Fragile health systems around the world have already been overwhelmed with the tsunami of demand that has arisen from the spread of COVID-19. Everyone racing to create their own solutions to problems negates the need for speed we have in this pandemic. An epidemic somewhere has the potential to become a pandemic everywhere. We need to share tools – both hardware and software – openly and understand that short term gains in one area of the world are meaningless if not shared with other areas that are battling this virus.
‹ Previous 21 - 34
Showing 20 items per page