recommended reading

HealthCare.gov’s Lessons for Big Government

House Oversight and Government Reform Committee Chairman Darrell Issa, R-Calif.

House Oversight and Government Reform Committee Chairman Darrell Issa, R-Calif. // J. Scott Applewhite/AP

The troubled rollout of HealthCare.gov, the Obama administration’s online health insurance marketplace, got a big picture treatment from historians and economists on Wednesday, during a hearing before the House Oversight and Government Reform Committee.

At issue was whether the government is capable of implementing large programs such as Obamacare and the website that supports it or if the inefficiencies inherent in government work make such initiatives impossible.

Republican committee members and panelists from the right-leaning Cato Institute and the Mercatus Center at George Mason University outlined the challenges government faces when implementing large programs, including that federal employees are rarely fired or otherwise punished when their systems fail and are rarely rewarded for taking risks or performing above expectation.

They also noted that government agencies tend to be more saddled by bureaucracy and more beholden to special interests than the private sector.

“Something as complicated, as complex, as multifaceted as a Web portal that’s supposed to rival sites like Amazon.com for health care is something the government was clearly not prepared to take on and do properly,” Oversight Chairman Darrell Issa, R-Calif., said, referring to HealthCare.gov.

Democratic members and Karen Kruse Thomas, a historian with the Johns Hopkins Bloomberg School of Public Health, argued that government is capable of taking on large projects to fix market failures in the private sector and to bring comfort and security to the disenfranchised. They cited social security, Medicare and other social programs as evidence.

Democrats accused Republican members of exploiting HealthCare.gov’s troubles to make an unwarranted larger argument about government’s capacity to do big things.

“I understand the logic behind free market principles, but I think corporations certainly aren’t going to look out for the poorest and least fortunate among us,” said the committee’s ranking member Rep. Elijah Cummings, D-Md.

Threatwatch Alert

Thousands of cyber attacks occur each day

See the latest threats

JOIN THE DISCUSSION

Close [ x ] More from Nextgov
 
 

Thank you for subscribing to newsletters from Nextgov.com.
We think these reports might interest you:

  • Featured Content from RSA Conference: Dissed by NIST

    Learn more about the latest draft of the U.S. National Institute of Standards and Technology guidance document on authentication and lifecycle management.

    Download
  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

    Download
  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

    Download
  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

    Download
  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security

    Download
  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

    Download

When you download a report, your information may be shared with the underwriters of that document.