22 research outputs found

    Democracy and governance networks: compatible or not?

    Get PDF
    The relationship between representative democracy and governance networks is investigated at a theoretical level. Four conjectures about the relationship are defined. The incompatibility conjectures rests on the primacy of politics and sees governance networks as a threat. The complementarity conjecture presents governance networks as a means of enabling greater participation in the policy process and sensitivity in programme implementation. The transitional conjecture posits a wider evolution of governance forms towards network relationships. The instrumental conjecture views governance networks as a powerful means through which dominant interests can achieve their goals. Illustrative implications for theory and practice are identified, in relation to power in the policy process, the public interest, and the role of public managers. The heuristic potential of the conjectures is demonstrated through the identification of an outline research agenda

    Interconnecting Governments, Businesses and Citizens – A Comparison of Two Digital Infrastructures

    Full text link
    Part 2: Services and InteroperabilityInternational audiencePublic and private organizations in various areas are setting up digital Information Infrastructures (IIs) for interconnecting government, businesses and citizens. IIs can create value by sharing and integrating data of multiple actors. This can be the basis for value added services and especially collaborations of public and private partners can make IIs thrive. Easier access to integrated services and products (jointly) offered by government and businesses may stimulate transparency and innovations. IIs are under development in many domains, including for open data and international trade. However, there are notable differences in the design, characteristics and implementation of the IIs. The objective of this paper is to compare two diverse IIs in order to obtain a better understanding of common and differing elements in the IIs and their impact. Among the differences are the roles of government, businesses and users, in driving, developing and exploitation of the IIs

    The importance of centralities in dark network value chains

    No full text
    This paper introduces three novel centrality measures based on the nodes’ role in the operation of a joint task, i.e., their position in a criminal network value chain. For this, we consider networks where nodes have attributes describing their "capabilities" or "colors", i.e., the possible roles they may play in a value chain. A value chain here is understood as a series of tasks to be performed in a specific order, each requiring a specific capability. The first centrality notion measures how many value chain instances a given node participates in. The other two assess the costs of replacing a node in the value chain in case the given node is no longer available to perform the task. The first of them considers the direct distance (shortest path length) between the node in question and its nearest replacement, while the second evaluates the actual replacement process, assuming that preceding and following nodes in the network should each be able to find and contact the replacement. In this report, we demonstrate the properties of the new centrality measures using a few toy examples and compare them to classic centralities, such as betweenness, closeness and degree centrality. We also apply the new measures to randomly colored empirical networks. We find that the newly introduced centralities differ sufficiently from the classic measures, pointing towards different aspects of the network. Our results also pinpoint the difference between having a replacement node in the network and being able to find one. This is the reason why "introduction distance" often has a noticeable correlation with betweenness. Our studies show that projecting value chains over networks may significantly alter the nodes’ perceived importance. These insights might have important implications for the way law enforcement or intelligence agencies look at the effectiveness of dark network disruption strategies over time
    corecore