22 research outputs found
Democracy and governance networks: compatible or not?
The relationship between representative democracy and governance networks is investigated
at a theoretical level. Four conjectures about the relationship are defined. The
incompatibility conjectures rests on the primacy of politics and sees governance networks as a
threat. The complementarity conjecture presents governance networks as a means of enabling
greater participation in the policy process and sensitivity in programme implementation. The
transitional conjecture posits a wider evolution of governance forms towards network
relationships. The instrumental conjecture views governance networks as a powerful means
through which dominant interests can achieve their goals. Illustrative implications for theory
and practice are identified, in relation to power in the policy process, the public interest, and
the role of public managers. The heuristic potential of the conjectures is demonstrated
through the identification of an outline research agenda
Interconnecting Governments, Businesses and Citizens – A Comparison of Two Digital Infrastructures
Part 2: Services and InteroperabilityInternational audiencePublic and private organizations in various areas are setting up digital Information Infrastructures (IIs) for interconnecting government, businesses and citizens. IIs can create value by sharing and integrating data of multiple actors. This can be the basis for value added services and especially collaborations of public and private partners can make IIs thrive. Easier access to integrated services and products (jointly) offered by government and businesses may stimulate transparency and innovations. IIs are under development in many domains, including for open data and international trade. However, there are notable differences in the design, characteristics and implementation of the IIs. The objective of this paper is to compare two diverse IIs in order to obtain a better understanding of common and differing elements in the IIs and their impact. Among the differences are the roles of government, businesses and users, in driving, developing and exploitation of the IIs
The importance of centralities in dark network value chains
This paper introduces three novel centrality measures based on the nodes’ role in the operation of a joint task, i.e., their position in a criminal network value chain. For this, we consider networks where nodes have attributes describing their "capabilities" or "colors", i.e., the possible roles they may play in a value chain. A value chain here is understood as a series of tasks to be performed in a specific order, each requiring a specific capability. The first centrality notion measures how many value chain instances a given node participates in. The other two assess the costs of replacing a node in the value chain in case the given node is no longer available to perform the task. The first of them considers the direct distance (shortest path length) between the node in question and its nearest replacement, while the second evaluates the actual replacement process, assuming that preceding and following nodes in the network should each be able to find and contact the replacement. In this report, we demonstrate the properties of the new centrality measures using a few toy examples and compare them to classic centralities, such as betweenness, closeness and degree centrality. We also apply the new measures to randomly colored empirical networks. We find that the newly introduced centralities differ sufficiently from the classic measures, pointing towards different aspects of the network. Our results also pinpoint the difference between having a replacement node in the network and being able to find one. This is the reason why "introduction distance" often has a noticeable correlation with betweenness. Our studies show that projecting value chains over networks may significantly alter the nodes’ perceived importance. These insights might have important implications for the way law enforcement or intelligence agencies look at the effectiveness of dark network disruption strategies over time