recommended reading

Technology is no longer open data’s biggest challenge


Managers -- not technology or budget -- now may be the biggest obstacles to government data transparency.

Information technology bosses and government administrators are reluctant to invest time and staff in projects in which they feel they hold little stake, according to participants at the 2012 International Open Data conference.

When it’s not clear who is responsible for an open data initiative -- or who will get credit for its success -- managers lack incentive to pursue the change, said Shauneen Furlong, a Canadian consultant and a panelist at the conference. She listed risk factors facing open data initiatives, including skewed reward mechanisms for managers and a lack of motivation and accountability.

Managers also may be wary of revealing dirty laundry or exposing their offices to undue attention. In developing countries especially, data transparency projects have come under scrutiny from politicians wary of the public impact of open information on their governments. Even the World Bank, the host of this week’s conference, faced questions when it opened up its data sets under the leadership of former president Robert Zoellick. Many of the economists and academics involved with the bank’s research did not acquiesce easily to releasing their data to the public.

While the technology factor in open data remains an issue, it is becoming significantly less of a problem. The costs of everything from the actual technology, connectivity and operations are falling. The engineering know-how to set up scaled systems to handle thousands of pieces of information exists and is becoming increasingly accessible. In many instances, the production of the system has become the easy part of an open data project.

Still, government administrators often pass on these projects because they do not see how they will affect their agencies. Furlong suggested introducing incentives -- including linking projects’ success to pay, as was done in Canada -- to provide the motivation for managers to pursue open data and e-government policies.

For now, open data implementation is weaker than it should be, panelists argued, which is detrimental for citizens and stakeholders seeking to increase the speed of delivery for government services.  

(Image via mkabakov/

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.