skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: Cataloging Algorithmic Decision Making in the U.S. Government
Government use of algorithmic decision-making (ADM) systems is widespread and diverse, and holding these increasingly high-impact, often opaque government algorithms accountable presents a number of challenges. Some European governments have launched registries of ADM systems used in public services, and some transparency initiatives exist for algorithms in specific areas of the United States government; however, the U.S. lacks an overarching registry that catalogs algorithms in use for public-service delivery throughout the government. This paper conducts an inductive thematic analysis of over 700 government ADM systems cataloged by the Algorithm Tips database in an effort to describe the various ways government algorithms might be understood and inform downstream uses of such an algorithmic catalog. We describe the challenge of government algorithm accountability, the Algorithm Tips database and method for conducting a thematic analysis, and the themes of topics and issues, levels of sophistication, interfaces, and utilities of U.S. government algorithms that emerge. Through these themes, we contribute several different descriptions of government algorithm use across the U.S. and at federal, state, and local levels which can inform stakeholders such as journalists, members of civil society, or government policymakers  more » « less
Award ID(s):
1845460
PAR ID:
10386490
Author(s) / Creator(s):
; ; ;
Date Published:
Journal Name:
Computation + Journalism Symposium
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. While resilience in emergency management has been studied at the macro- (government) and micro-levels (individual field responder), little is known for resilience of incident management teams (IMTs). To investigate challenges and resilience factors of IMTs, this paper documents thematic analysis of 10 interviews with emergency personnel who responded to Hurricane Harvey in 2017. Themes emerged in four categories: goals, challenges, resilience factors, and technical tools of IMTs. Given similar goals but unique challenges during Harvey, IMTs sought to establish and maintain a common operating picture to make sense of evolving situations and make decisions adaptively. Various technical tools were used providing different functionalities, but a need for technology to reduce cognitive load was indicated. Findings of this study will inform the development of more resilient IMTs in future disasters. 
    more » « less
  2. We conducted an observational study to document student misconceptions about cybersecurity using thematic analysis of 25 think-aloud interviews. By understanding patterns in student misconceptions, we provide a basis for developing rigorous evidence-based recommendations for improving teaching and assessment methods in cybersecurity and inform future research. This study is the first to explore student cognition and reasoning about cybersecurity. We interviewed students from three diverse institutions. During these interviews, students grappled with security scenarios designed to probe their understanding of cybersecurity, especially adversarial thinking. We analyzed student statements using a structured qualitative method, novice-led paired thematic analysis, to document patterns in student misconceptions and problematic reasoning that transcend institutions, scenarios, or demographics. Themes generated from this analysis describe a taxonomy of misconceptions but not their causes or remedies. Four themes emerged: overgeneralizations, conflated concepts, biases, and incorrect assumptions. Together, these themes reveal that students generally failed to grasp the complexity and subtlety of possible vulnerabilities, threats, risks, and mitigations, suggesting a need for instructional methods that engage students in reasoning about complex scenarios with an adversarial mindset. These findings can guide teachers’ attention during instruction and inform the development of cybersecurity assessment tools that enable cross-institutional assessments that measure the effectiveness of pedagogies. 
    more » « less
  3. Background: A person’s cultural background shapes how they interpret and navigate problems. Given that large numbers of international researchers work and train in the U.S. we sought to better understand how researchers use the decision-making strategy of seeking help to navigate ethical and professional challenges.Methods: Participants (N = 300) were researchers working or training in the U.S. who were born in East Asia (EA) or born in the U.S. They completed a screening survey; then a subset completed think-aloud interviews (n = 66) focused on how they would respond to three hypothetical research scenarios.Results: Thematic analysis of the transcripts showed that seeking help was a commonly endorsed strategy, with some nuances between groups. Themes included seeking help in the form of getting advice, seeking someone to help solve the problem, and gathering information. Endorsement of the seeking help strategy frequently depended on participants’ relationships; desiring to seek help from people they trusted. Notably, EA participants tended to prefer seeking help in ways that avoided reputational harm to others.Conclusion: A better understanding of how researchers from different cultural backgrounds use decision-making strategies can inform how to make educational programs more inclusive and comprehensive to more effectively develop researchers’ ethical and professional decision-making skills. 
    more » « less
  4. null (Ed.)
    Cost and schedule overruns are common in the procurement of large-scale defense acquisition programs. Current work focuses on identifying the root causes of cost growth and schedule delays in the defense acquisition programs. There is need for a mix of quantitative and qualitative analysis of cost and schedule overruns which takes into account program factor such as, technology maturity, design maturity, initial acquisition time, and program complexity. Such analysis requires an easy to access database for program-specific data about how an acquisition programs’ technical and financial characteristics vary over the time. To fulfill this need, the objective of this paper is twofold: (i) to develop a database of major US defense weapons programs which includes details of the technical and financial characteristics and how they vary over time, and (ii) to test various hypotheses about the interdependence of such characteristics using the collected data. To achieve the objective, we use a mixed-method analysis on schedule and cost growth data available in the U.S. Government Accountability Office's (GAO's) defense acquisitions annual assessments during the period 2003-2017. We extracted both analytical and textual data from original reports into Excel files and further created an easy to access database accessible from a Python environment. The analysis reveals that technology immaturity is the major driver of cost and schedule growth during the early stages of the acquisition programs while technical inefficiencies drive cost overruns and schedule delays during the later stages. Further, we find that the acquisition programs with longer initial length do not necessarily have higher greater cost growth. The dataset and the results provide a useful starting point for the research community for modeling cost and schedule overruns, and for practitioners to inform their systems acquisition processes. 
    more » « less
  5. null (Ed.)
    Graph mining is an essential component of recommender systems and search engines. Outputs of graph mining models typically provide a ranked list sorted by each item's relevance or utility. However, recent research has identified issues of algorithmic bias in such models, and new graph mining algorithms have been proposed to correct for bias. As such, algorithm developers need tools that can help them uncover potential biases in their models while also exploring the impacts of correcting for biases when employing fairness-aware algorithms. In this paper, we present FairRankVis, a visual analytics framework designed to enable the exploration of multi-class bias in graph mining algorithms. We support both group and individual fairness levels of comparison. Our framework is designed to enable model developers to compare multi-class fairness between algorithms (for example, comparing PageRank with a debiased PageRank algorithm) to assess the impacts of algorithmic debiasing with respect to group and individual fairness. We demonstrate our framework through two usage scenarios inspecting algorithmic fairness. 
    more » « less