{"id":40625,"date":"2018-07-13T13:25:23","date_gmt":"2018-07-13T03:25:23","guid":{"rendered":"https:\/\/www.aspistrategist.ru\/?p=40625"},"modified":"2018-07-13T13:25:23","modified_gmt":"2018-07-13T03:25:23","slug":"rethinking-our-approach-to-open-source-data","status":"publish","type":"post","link":"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/","title":{"rendered":"Rethinking our approach to open-source data"},"content":{"rendered":"
<\/figure>\n

Open-source data is built on the foundation of long-term useability, authenticity and reliability. Its public nature means that it can be accessible anywhere with an internet connection.<\/p>\n

Yet when we talk about the government data that needs to be protected for national security reasons, classified information\u2014related to defence and intelligence services\u2014often takes precedence. But what about the protection of unclassified, open-source government data?<\/p>\n

Websites like data.gov.au<\/a>, Trove<\/a> and Parl Info Search<\/a> host a broad range of data that collectively documents the political, social and cultural history of Australia. Over time, this data accumulates to paint a detailed picture of our country. It\u2019s a high-value dataset given the trends big data analytics can reveal.<\/p>\n

The Department of Communications and the Arts has estimated that the value of open government data is $25 billion per year<\/a>\u2014which represents 1.5% of Australia\u2019s GDP. To give that some context, Australia is budgeting to spend<\/a> 1.91% of its GDP on defence in 2018\u201319.<\/p>\n

As outlined in the Attorney-General\u2019s Department\u2019s Protective Security Policy Framework<\/a>, simply increasing the classification level of data isn\u2019t enough to ensure its protection. The department recommends that agencies consider the potential business impact if something were to happen to their data. The policy framework outlines risks to aggregate data, including unauthorised disclosure and inconspicuous copying, modification or dissemination of information. And it warns of possible operational, reputational or monetary impacts for an individual agency or the government as a whole.<\/p>\n

In an era of technological disruption, all it takes is the dissemination of disinformation to undermine national security.<\/p>\n

Governments and private companies around the world are already starting to implement technologies and software to address data security. We\u2019re now seeing the powerful combination of traditional information security, relating to controlled access to information and security of ICT systems, with the application of principles of long-term data preservation.<\/p>\n

One example is Preservica<\/a>, a software platform that incorporates the key data-preservation principles of useability, accessibility, security and authenticity. Once digital data has been created and stored, it is continually checked not only to prevent the obsolescence of file formats, but also to confirm the integrity of the data and metadata and ensure it hasn\u2019t been manipulated. Preservica is being used by the UK National Archives, the European Commission and the Provincial Archives of New Brunswick in Canada.<\/p>\n

Swedish company Enigio Time<\/a> is based on similar principles. Its aim is to \u2018provide proof of the truth\u2019 and digital data integrity in what it calls a \u2018#PostTruth era\u2019. Enigio Time software generates a timestamp on a digital document, leaving unchangeable proof of the content of the document when it was created.<\/p>\n

Another technology that could also contribute to data integrity is blockchain. Blockchain is commonly associated with Bitcoin and cryptocurrencies, but it could also contribute to data integrity. It creates a record of data that is stored permanently in multiple locations. Despite some scepticism about it, governments around the world have already begun testing and implementing blockchain technology.<\/p>\n

The Netherlands, Georgia, Sweden, the UAE, Canada and Estonia either use blockchain or have piloted blockchain projects for a variety of government services.<\/p>\n

One example that stands out is the Chilean government\u2019s use of blockchain for the preservation and security of its environmental data.<\/p>\n

Earlier this year, the Chilean National Energy Commission launched a project called Energia Abierta (Open Energy)<\/a>. It aims to increase the security, integrity and traceability of energy information by storing publicly available data, such as national electric capacity, energy prices and emission levels, on the Ethereum blockchain technology. The commission says that public information, particularly related to energy, is critical for investment decisions and shaping policies.<\/p>\n

Chile\u2019s emissions data could, for example, be manipulated by foreign actors who could then criticise the government for not meeting its commitment to the Paris climate agreement, which Chile has ratified. A discrepancy in the information held by energy providers, the energy commission and other national agencies could severely undermine trust in Chile\u2019s governance.<\/p>\n

In Australia, blockchain is starting to appear on the government\u2019s agenda. Last year CSIRO\u2019s Data61 conducted research into blockchain and its potential applications in the government and business sectors. Its report Distributed ledgers: scenarios for the Australian economy over the coming decades<\/em><\/a>, concluded that blockchain technology can enhance the trust, accountability and auditability of data storage.<\/p>\n

In the 2018\u201319 budget, the Australian government allocated $700,000 to the Digital Transformation Agency to research how blockchain could be used to support government services. And only last week the government signed a five-year agreement<\/a> with technology company IBM to help further its digital transformation agenda.<\/p>\n

Data accessibility is also on the government\u2019s agenda, as seen by the Productivity Commission\u2019s 2017 report<\/a> into data availability and use, the data sharing for innovation agenda<\/a>, and the 2015 public data policy statement<\/a>.<\/p>\n

The value of accurate, reliable and verifiable open-source information shouldn\u2019t be underestimated. Australia needs to take advantage of new technologies as they emerge and reframe its approach to the security and preservation of open-source data.<\/p>\n","protected":false},"excerpt":{"rendered":"

Open-source data is built on the foundation of long-term useability, authenticity and reliability. Its public nature means that it can be accessible anywhere with an internet connection. Yet when we talk about the government data …<\/p>\n","protected":false},"author":753,"featured_media":40624,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_mi_skip_tracking":false,"footnotes":""},"categories":[1],"tags":[2234,391,2175,301],"class_list":["post-40625","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-general","tag-blockchain","tag-cyber","tag-data","tag-national-security-2"],"acf":[],"yoast_head":"\nRethinking our approach to open-source data | The Strategist<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Rethinking our approach to open-source data | The Strategist\" \/>\n<meta property=\"og:description\" content=\"Open-source data is built on the foundation of long-term useability, authenticity and reliability. Its public nature means that it can be accessible anywhere with an internet connection. Yet when we talk about the government data ...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/\" \/>\n<meta property=\"og:site_name\" content=\"The Strategist\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/ASPI.org\" \/>\n<meta property=\"article:published_time\" content=\"2018-07-13T03:25:23+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/07\/42153660482_902c638a40_z.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"640\" \/>\n\t<meta property=\"og:image:height\" content=\"360\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Melissa Liberatore\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:site\" content=\"@ASPI_org\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Melissa Liberatore\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"4 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\",\"url\":\"https:\/\/www.aspistrategist.ru\/\",\"name\":\"The Strategist\",\"description\":\"ASPI's analysis and commentary site\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.aspistrategist.ru\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-AU\"},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/#primaryimage\",\"url\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/07\/42153660482_902c638a40_z.jpg\",\"contentUrl\":\"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/07\/42153660482_902c638a40_z.jpg\",\"width\":640,\"height\":360},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/\",\"url\":\"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/\",\"name\":\"Rethinking our approach to open-source data | The Strategist\",\"isPartOf\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/#primaryimage\"},\"datePublished\":\"2018-07-13T03:25:23+00:00\",\"dateModified\":\"2018-07-13T03:25:23+00:00\",\"author\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/5c5720febf4730374faaa938d20e89a4\"},\"breadcrumb\":{\"@id\":\"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/#breadcrumb\"},\"inLanguage\":\"en-AU\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/www.aspistrategist.ru\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Rethinking our approach to open-source data\"}]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/5c5720febf4730374faaa938d20e89a4\",\"name\":\"Melissa Liberatore\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-AU\",\"@id\":\"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/8b52ec41cf6cc988e952bea4b88b514c?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/8b52ec41cf6cc988e952bea4b88b514c?s=96&d=mm&r=g\",\"caption\":\"Melissa Liberatore\"},\"url\":\"https:\/\/www.aspistrategist.ru\/author\/melissa-liberatore\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Rethinking our approach to open-source data | The Strategist","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/","og_locale":"en_US","og_type":"article","og_title":"Rethinking our approach to open-source data | The Strategist","og_description":"Open-source data is built on the foundation of long-term useability, authenticity and reliability. Its public nature means that it can be accessible anywhere with an internet connection. Yet when we talk about the government data ...","og_url":"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/","og_site_name":"The Strategist","article_publisher":"https:\/\/www.facebook.com\/ASPI.org","article_published_time":"2018-07-13T03:25:23+00:00","og_image":[{"width":640,"height":360,"url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/07\/42153660482_902c638a40_z.jpg","type":"image\/jpeg"}],"author":"Melissa Liberatore","twitter_card":"summary_large_image","twitter_creator":"@ASPI_org","twitter_site":"@ASPI_org","twitter_misc":{"Written by":"Melissa Liberatore","Est. reading time":"4 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebSite","@id":"https:\/\/www.aspistrategist.ru\/#website","url":"https:\/\/www.aspistrategist.ru\/","name":"The Strategist","description":"ASPI's analysis and commentary site","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.aspistrategist.ru\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-AU"},{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/#primaryimage","url":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/07\/42153660482_902c638a40_z.jpg","contentUrl":"https:\/\/www.aspistrategist.ru\/wp-content\/uploads\/2018\/07\/42153660482_902c638a40_z.jpg","width":640,"height":360},{"@type":"WebPage","@id":"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/","url":"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/","name":"Rethinking our approach to open-source data | The Strategist","isPartOf":{"@id":"https:\/\/www.aspistrategist.ru\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/#primaryimage"},"datePublished":"2018-07-13T03:25:23+00:00","dateModified":"2018-07-13T03:25:23+00:00","author":{"@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/5c5720febf4730374faaa938d20e89a4"},"breadcrumb":{"@id":"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/#breadcrumb"},"inLanguage":"en-AU","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/www.aspistrategist.ru\/rethinking-our-approach-to-open-source-data\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.aspistrategist.ru\/"},{"@type":"ListItem","position":2,"name":"Rethinking our approach to open-source data"}]},{"@type":"Person","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/5c5720febf4730374faaa938d20e89a4","name":"Melissa Liberatore","image":{"@type":"ImageObject","inLanguage":"en-AU","@id":"https:\/\/www.aspistrategist.ru\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/8b52ec41cf6cc988e952bea4b88b514c?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/8b52ec41cf6cc988e952bea4b88b514c?s=96&d=mm&r=g","caption":"Melissa Liberatore"},"url":"https:\/\/www.aspistrategist.ru\/author\/melissa-liberatore\/"}]}},"_links":{"self":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/40625"}],"collection":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/users\/753"}],"replies":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/comments?post=40625"}],"version-history":[{"count":3,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/40625\/revisions"}],"predecessor-version":[{"id":40629,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/posts\/40625\/revisions\/40629"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media\/40624"}],"wp:attachment":[{"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/media?parent=40625"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/categories?post=40625"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.aspistrategist.ru\/wp-json\/wp\/v2\/tags?post=40625"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}