recommended reading

Feds embrace ‘nerds of the Internet’

Nextgov reporter Joseph Marks, Kari Craun, director if USGS' National Geospatial Technology Center and Dominic McDevitt-Parks, resident Wikipedian for the National Archives

Nextgov reporter Joseph Marks, Kari Craun, director if USGS' National Geospatial Technology Center and Dominic McDevitt-Parks, resident Wikipedian for the National Archives // Caitlin Fairchild/

Federal agencies are turning to the public to fill information gaps and promote their data, crowdsourcing experts said at a panel Thursday.

“People who build information are starting to realize the way the Web works now -- it goes beyond their own little website,” said Dominic McDevitt-Parks, resident Wikipedian for the National Archives and Records Administration. The discussion was part of Government Executive Media Group’s Excellence in Government conference.

McDevitt-Parks, who promotes Archives’ data to Wikipedia editors, said more people are accessing his agency’s information through Wikipedia than its own website. received 17 million hits in 2011, while he estimated all the Wikipedia pages hosting Archives data tallied about 1 billion.

The answer, therefore, is to embrace the technology, he said: “If we want to reach the public, then we want to go to Wikipedia.”

The U.S. Geological Survey also is engaging the public for mapping information, testing a pilot program in Denver in which the public provides data such as where post offices and schools are located.

Kari Craun, director of USGS’ National Geospatial Technology Center, said she still has reservations about the long-term viability of the program.

“Over time, we are going to see if this is a sustainable model,” she said. “We’re not sure yet.”

Both speakers vouched for the quality of the product that results from crowdsourcing, stating the criticisms of the publicly collected information are overblown.

“I think we have to change our mindsets,” Craun said.

McDevitt-Parks concurred. “Wikipedia is where the nerds of the Internet go,” he said. “There are actually a lot of people on Wikipedia who know more about the things you are doing than maybe you do.”

Threatwatch Alert

Credential-stealing malware / User accounts compromised / Software vulnerability

Android Malware Infects More than 1M Phones, Adds 13,000 Devices a Day

See threatwatch report


Close [ x ] More from Nextgov

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.


When you download a report, your information may be shared with the underwriters of that document.