skip to main content
US FlagAn official website of the United States government
dot gov icon
Official websites use .gov
A .gov website belongs to an official government organization in the United States.
https lock icon
Secure .gov websites use HTTPS
A lock ( lock ) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.


Title: SPID: A New Database for Inferring Public Policy Innovativeness and Diffusion Networks
Despite its rich tradition, there are key limitations to researchers' ability to make generalizable inferences about state policy innovation and diffusion. This paper introduces new data and methods to move from empirical analyses of single policies to the analysis of comprehensive populations of policies and rigorously inferred diffusion networks. We have gathered policy adoption data appropriate for estimating policy innovativeness and tracing diffusion ties in a targeted manner (e.g., by policy domain, time period, or policy type) and extended the development of methods necessary to accurately and efficiently infer those ties. Our state policy innovation and diffusion (SPID) database includes 728 different policies coded by topic area. We provide an overview of this new dataset and illustrate two key uses: (i) static and dynamic innovativeness measures and (ii) latent diffusion networks that capture common pathways of diffusion between states across policies. The scope of the data allows us to compare patterns in both across policy topic areas. We conclude that these new resources will enable researchers to empirically investigate classes of questions that were difficult or impossible to study previously, but whose roots go back to the origins of the political science policy innovation and diffusion literature.  more » « less
Award ID(s):
1637089 1637095
PAR ID:
10457799
Author(s) / Creator(s):
; ; ; ; ; ;
Publisher / Repository:
Wiley-Blackwell
Date Published:
Journal Name:
Policy Studies Journal
Volume:
48
Issue:
2
ISSN:
0190-292X
Page Range / eLocation ID:
p. 517-545
Format(s):
Medium: X
Sponsoring Org:
National Science Foundation
More Like this
  1. Well-resourced and well-connected individuals, or “policy entrepreneurs,” often play an important role in advocating and securing the adoption of policies. There is a striking lack of inquiry into the ways that social networks shape the ability of these actors to achieve their aims, including the ways in which network ties may channel policy conflict. To address these gaps, we analyze data from an original survey and an original database of policies to assess the success of policy entrepreneurs active in a highly contentious arena: municipal policymaking concerning high-volume hydraulic fracturing (HVHF) in New York. We use text-mining to collect social network data from local newspaper archives, then use those data to construct municipal HVHF policy networks. Municipal anti-HVHF policy entrepreneurs appear more successful when they operate in less cohesive networks, act as bridges to relative newcomers to the governance network, and have a larger number of network connections. Pro-HVHF policy entrepreneurs appear more successful when they can forge high-value connections to key decision-makers. Policy entrepreneurs on both sides of the issue are more successful when they have a greater number of sympathetic coalition partners. 
    more » « less
  2. Abstract Despite the reality that advocates frequently expend significant resources to pass symbolic policies, this policy design has often been neglected by policy studies scholarship. We combine policy design and policy feedback theory to examine this oft overlooked policy design in practice using the case of California's human right to water law (Assembly Bill 685, or AB 685). Through semi‐structured interviews, archival research, and document analysis, we reveal how grassroots advocates deliberately and effectively pursued AB 685 to build power across the water justice movement and catalyze narrative change about drinking water access, while also building state responsiveness on the topic. These interpretive policy feedback effects then accelerated the policy's resource effects through formal policy changes in funding allocations, administrative structures, and regulatory systems. Collectively, feedbacks from AB 685 have transformed the sociopolitics of drinking water access. Contrary to prevailing wisdom, the policy's ambiguity proved key to building the broad coalition necessary to accomplish these changes, and it facilitated work across policy venues and governance scales through time, which is critical to enacting transformational change. Based on these findings, we argue that symbolic policies merit attention as a potentially advantageous policy design for social movements seeking social change and transformation. 
    more » « less
  3. Policy information in computer networking today, such as reachability objectives of a controller program running on a Software Defined Network (henceforth referred to as SDN) or Border Gateway Protocol (henceforth referred to as BGP) configurations independently set by autonomous networks, are hard to manage. This is in sharp contrast to the relational data structured in a database that allows easy access. This paper asks why cannot (or how can) we turn network policies into relational data. One difficulty to such an approach is that a policy does not always translate to a \textit{definite} network snapshot, but rather is fully described only when we include all the possible network states it admits. We propose relational policies that, while capable of representing and manipulating sets of network states in exactly the same way as a single one, form a strong representation system and accurately capture the information in a policy with the usual Structured Query Language (henceforth referred to as SQL) interface. We demonstrate how, like relational database improves application productivity and enables rapid innovation, relational policies allow us to extend the elegant solutions that the database community developed, to mediate multiple data sources in order to address long-standing challenges and new opportunities for autonomous policy making in the distributed networking environment. We also show the feasibility of relational policies by evaluation on synthetic policies and realistic network topologies. 
    more » « less
  4. Bauer, Lujo; Pellegrino, Giancarlo (Ed.)
    Ensuring the proper use of sensitive data in analytics under complex privacy policies is an increasingly critical challenge. Many existing approaches lack portability, verifiability, and scalability across diverse data processing frameworks. We introduce PICACHV, a novel security monitor that automatically enforces data use policies. It works on relational algebra as an abstraction for program semantics, enabling policy enforcement on query plans generated by programs during execution. This approach simplifies analysis across diverse analytical operations and supports various front-end query languages. By formalizing both data use policies and relational algebra semantics in Coq, we prove that PICACHV correctly enforces policies. PICACHV also leverages Trusted Execution Environments (TEEs) to enhance trust in runtime, providing provable policy compliance to stakeholders that the analytical tasks comply with their data use policies. We integrated PICACHV into Polars, a state-of-the-art data analytics framework, and evaluate its performance using the TPC-H benchmark. We also apply our approach to real-world use cases. Our work demonstrates the practical application of formal methods in securing data analytics, addressing key challenges. 
    more » « less
  5. Abstract As a cold war with China heats up, the U.S. and other members of the G7 need new approaches to their science and technology innovation (STI) policies. Dominance on the innovation frontier is no longer possible through traditional techno‐nationalist policies that view nations as ‘competing’ through exclusive STI development. Instead, we must recognise that talent and intellectual property are globally distributed, and thus build global collaborations that draw on the world's greatest talent while providing benefits equitably in a global STI commons. We need to recognise this new reality, not only for the benefits this would confer on humankind, but also to contend with China's growing STI capabilities and, eventually perhaps, integrating China into a system of global collaboration. Additionally, and importantly, national policies must recognise the geographically untethered operations of multinational enterprises that are the developers and/or repositories of STI but have weak ties to any one nation, thus blunting policies that try to contain STI within a country's borders. In this paper, we suggest approaches to advance these goals for global STI based on theories and cases of collective action. 
    more » « less