03.03.2015 Views

2000115-Strengthening-Communities-with-Neighborhood-Data

2000115-Strengthening-Communities-with-Neighborhood-Data

2000115-Strengthening-Communities-with-Neighborhood-Data

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

Progress in <strong>Data</strong> and Technology 129<br />

software developers. Code sharing is the essence of open source software<br />

development, which has proved to be an excellent catalyst for the creation<br />

of affordable software tools.<br />

Encouraging code sharing and collaboration through local incubators<br />

(as Boston and other cities have recently done) is an effective path<br />

toward developing a strong community of local software technicians.<br />

Improve Identity Management<br />

Social service providers, like health care and financial service providers, are<br />

burdened by a critical need for stringent protection of private information.<br />

But social service providers typically do not command the technological<br />

resources available to hospitals and banks, and therefore may be less able<br />

to create and maintain secure web systems. Many social service agencies<br />

gather detailed data about their constituents’ problems—legal, financial,<br />

medical, and other issues. The potential for creating integrated systems to<br />

improve human service delivery has been articulated by thoughtful practitioners<br />

[see, for example, Allegheny County’s “Building an Interoperable<br />

Human Services System” (Smith 2008)]. But truly integrated data<br />

systems <strong>with</strong> multiple distinct partners are difficult to lock down. As<br />

impressive as Allegheny County’s achievement has been, that success<br />

would have been far more complex if it had linked multiple private providers<br />

rather than divisions of local government. The more independent<br />

nodes a network contains, the more difficult data protection becomes.<br />

This integration problem is really an authentication problem. Authentication<br />

is the verification that data requesters are truly who they say they<br />

are, and that they have permissions to access the requested data. A secure<br />

system must fulfill 100 percent of valid requests by authorized users, and<br />

must deny 100 percent of requests by unauthorized users. So identity management<br />

services, which accept each user’s identity claims and respond <strong>with</strong><br />

a decision on the access request, are the linchpin of secure systems. Some<br />

promising standards for identity management have emerged in recent years.<br />

Public key infrastructure offers a powerful identity management<br />

model, but it is currently more feasible in the context of corporate and<br />

government employee authorization management than widespread<br />

public use. oAuth is an ingenious solution used by web developers when<br />

providing personalized services to their end users, but it is not yet widely<br />

accepted for protecting truly confidential personal data. Investing in the<br />

further development of these models might improve our ability to serve<br />

diverse community audiences.

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!