Policy Design and Practice最新文献

筛选
英文 中文
RegTech and creating public value: opportunities and challenges 监管科技与创造公共价值:机遇与挑战
IF 7
Policy Design and Practice Pub Date : 2023-05-16 DOI: 10.1080/25741292.2023.2213059
M. Bolton, Michael Mintrom
{"title":"RegTech and creating public value: opportunities and challenges","authors":"M. Bolton, Michael Mintrom","doi":"10.1080/25741292.2023.2213059","DOIUrl":"https://doi.org/10.1080/25741292.2023.2213059","url":null,"abstract":"Abstract Regulatory technology (RegTech) has its origins in private sector applications of information technology in pursuit of more efficient compliance with government regulations. Initially, the term “RegTech” referred to either the technical solutions intended to aid financial service providers in managing regulatory issues or to the companies and organizations that develop and deliver such solutions. Increasingly, regulatory experts are stretching the term’s coverage to include efforts by governments to harness technical solutions in pursuit of more efficient targeting and conduct of regulatory monitoring and enforcement. Whether deployed within the private or public sectors, RegTech holds significant potential to improve regulatory compliance, reduce compliance costs, and improve the speed and accuracy with which known harms can be addressed and emerging risks can be identified. Here, we focus on the potential for RegTech to support the creation of public value. We suggest public value is most likely to be realized when governments (1) keep focused on regulatory purpose and effective design and (2) build effective collaboration with RegTech providers and regulated entities. KEY MESSAGES: Governments hunger for more efficient and effective ways to deliver public value. Increasingly digital/digitisation is being seen as the way to deliver this. With regard to the regulation of harms, RegTech is the latest in a line of proposed approaches. RegTech holds promise but we know it is not failsafe because it can exhibit both data science and human implementation problems. Implementation of RegTech brings both practical opportunities and challenges.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2023-05-16","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41532444","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Does Performance-Related-Pay work? Recommendations for practice based on a meta-analysis 绩效薪酬制度有效吗?基于荟萃分析的实践建议
IF 7
Policy Design and Practice Pub Date : 2023-04-27 DOI: 10.1080/25741292.2023.2205756
B. George, Zeger van der Wal
{"title":"Does Performance-Related-Pay work? Recommendations for practice based on a meta-analysis","authors":"B. George, Zeger van der Wal","doi":"10.1080/25741292.2023.2205756","DOIUrl":"https://doi.org/10.1080/25741292.2023.2205756","url":null,"abstract":"Abstract Performance-related-pay (PRP) is a controversial topic. Views about its impact are mixed. Through a meta-analysis of studies in public administration, we aim to provide an evidence-based answer to the question: Does PRP work? Our meta-analysis finds a statistically significant, positive but small population effect size between PRP and employee and performance outcomes. Subgroup analyses show that PRPs impact is contingent upon the type of outcome, geographical context, government level, and data source rather than universal in nature. Effect sizes decrease when performance outcomes are measured as opposed to employee outcomes; in USA and European contexts compared to Asian contexts; at the local level compared to the federal level; and when multiple source or experimental data are used compared to single source data. Based on our findings and PRP literature, we construct a flowchart to support practitioners in deciding whether PRP may “work” for them while avoiding its many and typical pitfalls. Evidence for practice Our meta-analysis demonstrates that the impact of performance-related-pay (PRP) on employee and performance outcomes in public administration is statistically significant and positive; however, the fact that the effects sizes are small leads us to conclude that PRP is not a “magic bullet”. Intriguingly, performance outcomes are less impacted by PRP than employee-related outcomes like work motivation and job satisfaction, implying that PRP might carry some motivational benefits while its benefits for better performance outcomes are questionable. PRP seemingly works better in Asia than in Europe or the USA – arguably due to existing predispositions regarding the effects of rewards and monetary incentives – and also seems more effective at the federal than the local government level. Much of the small positive impact uncovered in this meta-analysis seems to be the result of the type of data used in studies. Specifically, studies using multiple or experimental data show a trivial and statistically insignificant overall impact. Practitioners thus need to carefully assess how they will evaluate PRPs impact to avoid biases due to data type. An evidence-based flowchart including questions at the macro (cultural and societal considerations), meso (specific organizational characteristics), and micro (individual and team behavior) level is presented as a support tool for practitioners in deciding upon and designing PRP systems in their organization.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2023-04-27","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"45900625","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Making way for design thinking in the public sector: a taxonomy of strategies 为公共部门的设计思维让路:战略分类
IF 7
Policy Design and Practice Pub Date : 2023-04-20 DOI: 10.1080/25741292.2023.2199958
Geert Brinkman, A. van Buuren, W. Voorberg, Mieke van der Bijl-Brouwer
{"title":"Making way for design thinking in the public sector: a taxonomy of strategies","authors":"Geert Brinkman, A. van Buuren, W. Voorberg, Mieke van der Bijl-Brouwer","doi":"10.1080/25741292.2023.2199958","DOIUrl":"https://doi.org/10.1080/25741292.2023.2199958","url":null,"abstract":"Abstract Public organizations are increasingly turning to design thinking to address wicked societal issues, enhance innovation, and improve services. However, in general, public organizations do not provide the most receptive context for design thinking. To be applied effectively, design thinking requires sufficient tolerance for uncertainty, capacity for risk-taking, receptiveness to new ideas, and flexibility to learn and adapt. Public organizations, instead, favor rationality, stability, and accountability, and are therefore generally characterized as rigid and risk-averse. Additional efforts are thus required to make way for design thinking within this context. Until now, research on strategies to support the application of design thinking in a public sector context is limited. In this paper, 14 design thinking projects in the public sector were analyzed to identify these strategies, resulting in a practical framework of strategic actions to build confidence, form an alliance, generate support, enhance compatibility, and thereby enable design thinking in the public sector. Accordingly, this study contributes to the theory and practice of design thinking for public issues.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2023-04-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44842913","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
European climate pact citizen volunteers: strategies for deepening engagement and impact 欧洲气候协定公民志愿者:深化参与和影响的策略
IF 7
Policy Design and Practice Pub Date : 2023-04-14 DOI: 10.1080/25741292.2023.2199961
J. Tosun, J. Pollex, Laurence Crumbie
{"title":"European climate pact citizen volunteers: strategies for deepening engagement and impact","authors":"J. Tosun, J. Pollex, Laurence Crumbie","doi":"10.1080/25741292.2023.2199961","DOIUrl":"https://doi.org/10.1080/25741292.2023.2199961","url":null,"abstract":"Abstract The European Climate Pact is one constitutive element of the European Green Deal, which has the ambition of making the European Union (EU) climate neutral by 2050. It is a particularly intriguing measure since it is designed as a format for volunteering, known as European Climate Pact Ambassadors, whom the EU Commission expects to inform members of their communities and networks about climate change and to inspire and support climate action. Each Pact Ambassador is presented on a dedicated website hosted by the EU Commission, which means that this programme is highly personalized. With this paper, we address Pact Ambassadors who do not work as policy professionals and strive to offer them guidance on navigating their mandate. In essence, we invite them to personalize the mandate and to assume those roles and carry out those activities that they feel comfortable with and which align with the overarching goals and principles of the ambassadors’ programme.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2023-04-14","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43506546","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
Public attribution in the US government: implications for diplomacy and norms in cyberspace 美国政府的公共归属:对网络空间外交和规范的影响
IF 7
Policy Design and Practice Pub Date : 2023-04-03 DOI: 10.1080/25741292.2023.2199964
H. Lee
{"title":"Public attribution in the US government: implications for diplomacy and norms in cyberspace","authors":"H. Lee","doi":"10.1080/25741292.2023.2199964","DOIUrl":"https://doi.org/10.1080/25741292.2023.2199964","url":null,"abstract":"Abstract In recent years, states have publicly assigned responsibility for cyber incidents to state adversaries with increasing frequency. While emerging scholarship provides insight into the strategic rationale for public cyber attribution, the literature lacks a rigorous understanding of when and under what circumstances states publicly attribute cyber incidents in practice. This paper seeks to address this gap by providing an empirical study of public cyber attribution by the US government from 2010–2020. Based on an original dataset, I find that US government actors publicly attribute cyber incidents through four distinct “channels”–criminal, technical, official policy, and unofficial policy. The purpose, timing, and state subject of attribution appear to vary consistently by channel, while organizational interests and channel-specific factors shape the context in which public attribution takes place. The lack of a unified approach creates challenges for US diplomacy—as adversaries may misperceive attributions as reflecting a whole-of-government agenda—and informs the normative environment of cyber operations in ways potentially unanticipated by individual agencies.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43869643","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber governance in Africa: at the crossroads of politics, sovereignty and cooperation 非洲的网络治理:处于政治、主权和合作的十字路口
IF 7
Policy Design and Practice Pub Date : 2023-04-03 DOI: 10.1080/25741292.2023.2199960
Nnenna Ifeanyi-Ajufo
{"title":"Cyber governance in Africa: at the crossroads of politics, sovereignty and cooperation","authors":"Nnenna Ifeanyi-Ajufo","doi":"10.1080/25741292.2023.2199960","DOIUrl":"https://doi.org/10.1080/25741292.2023.2199960","url":null,"abstract":"Abstract Africa has recently focused on an ambition to achieve digital transformation through the pursuit of various flagship initiatives which are aimed at achieving its ‘Agenda 2063’ objectives. Digital transformation will be better achieved through appropriate cyber governance policies and mechanisms, and the success of Africa’s Digital Transformation Strategy 2020-2030 hinges on diverse factors. According to the Strategy, African governments have a fundamental responsibility to create an enabling environment, with policies and regulations that promote digital transformation across foundation pillars, which include cybersecurity. The Strategy also stipulates the need to reinforce the region’s human and institutional capacity to secure the cyberspace by building trust and confidence in the use of cyber technologies. The aim of the paper is to examine Africa’s cyber governance agenda in relation to peace and security. While there are political dimensions to determining the thresholds of such discourses in Africa, the uncertainties of governance mechanisms, political underpinnings and limitations in digital capacity may mean that international standards of cyber governance have merely been theoretical in the African context. The paper examines Africa’s extant policies and political strategies for cyber governance, and the region’s interaction with international cyber governance processes. The paper further discusses the prospects and challenges to cyber governance in the region, and the approaches to leveraging international cooperation in promoting cyber stability in the region.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43925585","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Preparing for future cyber crises: lessons from governance of the coronavirus pandemic 为未来的网络危机做准备:冠状病毒大流行治理的经验教训
IF 7
Policy Design and Practice Pub Date : 2023-04-03 DOI: 10.1080/25741292.2023.2205764
G. Mott, Jason R. C. Nurse, Christopher Baker‐Beall
{"title":"Preparing for future cyber crises: lessons from governance of the coronavirus pandemic","authors":"G. Mott, Jason R. C. Nurse, Christopher Baker‐Beall","doi":"10.1080/25741292.2023.2205764","DOIUrl":"https://doi.org/10.1080/25741292.2023.2205764","url":null,"abstract":"Abstract The SARS-CoV-2 pandemic has had an immense impact on public policy and the management of risks that threaten critical systems, such as national health services. Drawing on perspectives from multiple disciplines, this article considers lessons-learned with respect to mitigating the threats to critical systems and societal harms presented by the proliferation of malware. The article dovetails crisis management with cyber resilience, for the purpose of analyzing transferable good-practices and areas-for-improvement, drawing on preparedness and response strategies deployed in public policymaking in the United Kingdom during the pandemic. Reflecting on key national and local ransomware incidents that have impacted key services, the article offers a post-SARS-CoV-2 review of recent British strategic outputs with respect to cyber resilience; most notably the National Cyber Security Strategy and the Government Cyber Security Strategy. The article focuses on lessons that may be learned with respect to communications strategies. The article argues that although the recent British cyber-security strategies hold significant promise in terms of improving preparedness, response and recovery in relation to future cyber crisis, nuanced, dynamic and empathetic multi-stakeholder engagement will be required in order to meaningfully implement the measures outlined in the strategy documents.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"41390166","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Governing cyber crises: policy lessons from a comparative analysis 治理网络危机:比较分析的政策教训
IF 7
Policy Design and Practice Pub Date : 2023-04-03 DOI: 10.1080/25741292.2023.2213061
François Delerue, Monica Kaminska
{"title":"Governing cyber crises: policy lessons from a comparative analysis","authors":"François Delerue, Monica Kaminska","doi":"10.1080/25741292.2023.2213061","DOIUrl":"https://doi.org/10.1080/25741292.2023.2213061","url":null,"abstract":"In cyberspace, the notion of crisis is multifaceted. The complexity of cyber crises pertains to the diversity of actors, activities, targets, and effects involved, creating governance challenges. For example, information campaigns on the Internet have created a crisis of trust in political discourse and authority in many democratic societies. A recent ransomware attack by a criminal actor brought the entire nation of Costa Rica to a standstill. Incidents such as the state-sponsored SolarWinds and Microsoft Exchange hack have put pressure on the demarcation line between cyber espionage and disruptive cyber operations. Strategic shifts to more proactive and continuous operations as a method of addressing cyber conflict short of war raise questions about key concepts like sovereignty and breed concerns about crisis escalation. State-sponsored malware is increasingly being found in critical infrastructure and electoral systems. The current armed conflict in Ukraine, which has seen an unprecedented involvement of cyber hacktivist groups and private actors, brings to the fore new difficulties of cyber crisis management for both the belligerents and third states. These ongoing developments in the threat landscape continually shift the goal posts on acceptable state behavior in cyberspace. Despite important strides in cyber policy development by some governments, many strategies are still in the early stages of maturity and provide little guidance for the diversity of cyber crises that can unfold. Moreover, there is much variance in national, regional, and multilateral approaches to what is sometimes called a cyber “wild west” in the international realm, yet these divergences remain understudied. Additionally, states do not always abide by their own policies or the ones agreed internationally, both in their practice of offensive cyber operations and in addressing","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2023-04-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"48013896","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Cyber-attacks and the right of self-defense: a case study of the Netherlands 网络攻击与自卫权——以荷兰为例
IF 7
Policy Design and Practice Pub Date : 2023-02-22 DOI: 10.1080/25741292.2023.2179955
Ferry Oorsprong, P. Ducheine, P. Pijpers
{"title":"Cyber-attacks and the right of self-defense: a case study of the Netherlands","authors":"Ferry Oorsprong, P. Ducheine, P. Pijpers","doi":"10.1080/25741292.2023.2179955","DOIUrl":"https://doi.org/10.1080/25741292.2023.2179955","url":null,"abstract":"Abstract Whilst Article 51 of the UN Charter as a rule indicates that an “armed attack” may trigger a State’s right of self-defense, the actual purport of armed attack remains a matter of interpretation and qualification. To improve the notion of the rule on self-defense and contribute to the jus ad bellum, more clarification as to what constitutes an armed attack in cyberspace is necessary. Therefore, policy norms—regarding when cyber-attacks reach the threshold of an armed attack—could guide State behavior. On the one hand, these policy norms could be used in the political decision-making processes for States that consider initiating cyber-attacks. On the other, they could help victim States in their decision-making processes in response to grave cyber-attacks. The aim of the paper is to propose a tangible guideline that outlines when cyber-attacks—perpetrated solely in or through cyberspace and not in conjunction with conventional military attacks—can qualify as an armed attack. By assessing the positions of States and leading academic opinions regarding the qualification of cyber-attacks as armed attacks, and applying international and interdisciplinary policy documents to transfer the legal debate into tangible options, a policy framework is deduced that can serve as a baseline for international cyber norms. This framework distinguishes three separate categories of armed attack in cyberspace, each with their own distinctive levels to determine when a cyber-attack can qualify as an armed attack. These absolute levels are tailored for the Netherlands but could also be suitable for other States when transferred to percentages of the gross national/domestic product and the population size.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2023-02-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"43244924","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 0
Great power narratives on the challenges of cyber norm building 大国对网络规范构建挑战的叙述
IF 7
Policy Design and Practice Pub Date : 2023-02-08 DOI: 10.1080/25741292.2023.2175995
Mischa Hansel
{"title":"Great power narratives on the challenges of cyber norm building","authors":"Mischa Hansel","doi":"10.1080/25741292.2023.2175995","DOIUrl":"https://doi.org/10.1080/25741292.2023.2175995","url":null,"abstract":"Abstract States, companies and civil society actors broadly agree that ICT misuse needs to be prevented through effective international policies and regulatory efforts. However, corresponding norm-building processes have been repeatedly characterized by setbacks and controversies regarding interpretations. Whenever such a situation has arisen, state representatives quickly engaged in intense storytelling, accusing their counterparts of seeking to impose “the law of the jungle” or of following hidden policy agendas at the UN. This paper focusses on the stories state representatives use to explain the international community’s recurrent failures, such as arms races, crisis escalations or destructive criminal acts. Using narrative concepts and methods, the analysis explores the dynamics of this emerging transnational public diplomacy, focusing on Russia and the United States in particular. Beyond comparing main structural elements of each narrative, the goal is to elucidate legitimization strategies and dilemmas, resulting in several policy implications. For example, United States representatives and allies need to make specific and concise references to UN cyber norms during public attributions, lest they could play into the hands of a counter-narrative of Western domination and hypocrisy.","PeriodicalId":20397,"journal":{"name":"Policy Design and Practice","volume":null,"pages":null},"PeriodicalIF":7.0,"publicationDate":"2023-02-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"44341826","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 1
0
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
相关产品
×
本文献相关产品
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术官方微信