Business
Authors
News Type
News
Date
Paragraphs
SELECT Magazine's contributing editor talks to Rafiq Dossani about outsourcing, one of the hottest and most controversial topics in the global IT industry.

SELECT: What is the current size of the outsourcing market? What percent of U.S. software development, call centers, etc., have already moved to developing nations? Is the amount of outsourcing still increasing?

Dossani: To provide some perspective, although the off-shoring of services has been going on for mans Nears, technology led by the widespread use of the Internet has changed things. The resulting new twist in the provision of services is that the required interaction between the seller and the consumer has been substantially limited. The advances in information technology made possible the parsing of the provision of certain services into components requiring different levels of skill and interactivity As a result, certain portions of the serviced activity that might or might not be skill-intensive, but required low levels of face-to-face interaction could be relocated offshore. The sequence of events that enabled this process is the following:

    First, the digital age allowed (or, at least, revolutionized) the conversion of service flows into stocks of information, making it possible to store a service. For example, a legal opinion that earlier had to be delivered to the client in person could now be prepared as a computer document and transmitted to the client via e-mail or, better yet, encoded into software. Easy storage and transmission allowed for the physical separation of the client and vendor as well as their separation in time. It also induced the separation of services into components that were standardized and could be prepared in advance (such as a template for a legal opinion) and other components that were customized for the client (such as the opinion itself) or remained non-storable. Taking advantage of the possibility of subdividing tasks and the economies that come with the division of labor, this reduced costs by offering the possibility of preparing the standardized components with lower-cost

    labor and, possibly at another location.

    The second fundamental impact of digitization was the conversion of non-information service flows into information service flows. For example, the sampling of tangible goods by a buyer through visiting a showroom is increasingly being replaced by virtual samples delivered over the Internet. Once converted to an information flow, the service may also he converted into a stock of information and subjected to the above mentioned forces of cost reduction through standardization of components and remote production.

    Third, the low-cost transmission of the digitized material accelerated the off-shoring of services. Services such as writing software programs which were off-shored to India in the early 1970s were enabled by digitized storage and, in the 1980s, by the standardization of programming languages. Still later, as digital transmission costs fell in

    the 1990s (just as digital storage costs had fallen earlier), even nonstorable

    services, such as customer care, could he handled offshore.

The offshore services outsourcing market (excluding software development) is still small and will probably be approximately $10 billion for 2005. It employs about 500,000 people, two thirds of whom are located in India. The rest are widely distributed, with developing Asia and Ireland accounting for most of the remaining employment. About 60% of the employment is in call centers. The U.S. and U.K. call-center industry together employ about five million people, so the percentage of offshore jobs is still small. It is even smaller for other services.

Offshore software development employs approximately another 500,000 people. This compares with U.S. employment of about two million. This is a larger percentage of the total software development labor market. although most of the outsourced work is programming, while work such as systems integration and design continue to be done in the U.S.

The growth rate is still high and there are concerns about whether or not this rapid growth rate will hurt the quality of work done. However. this rate will still likely he in excess of 30% in 2005 and 2006. The reason for this is the massive wage differential.

Clearly there have been massive failures as well as outstanding successes in outsourcing. What are the critical success factors for making outsourcing work?

The infrastructure (telecom. finance, power) has all been standardized, although the solutions might not he the same as in developed countries. The critical success factors are two: the quality of labor and supervision; and managing growth. Unbelievable there is a growing shortage of labor. The result is that the quality of work is declining. Project supervisory skills are also in short supply. Managing growth, especially keeping attrition

under control, training, developing new vertical skills, moving into back-office work, and offering the client turnkey packages are some of the critical managerial factors for success.

Short of being willing to work for $15,000/year, what can western IT professionals do to provide sufficient value to prevent their functions from being outsourced?

The U.S. educational system still turns out a good product. It is sufficiently ahead of the comparable Indian product so that a recent computer science/computer engineering graduate from the average U.S. university can earn a premium of at least 100% over his Indian counterpart from a good university such as the IlTs, with substantially higher premiums for graduates from schools such as MIT and Stanford. The problem occurs more with mid-career professionals. Those with older skills are unable to compete with freshly trained graduates from India. Therefore, they need to update those skills regularly and take advantage of opportunities to globalize and convert them into managerial skills. This may have to he mandated at some point, as has happened in the financial sector, where stockbrokers need to regularly sit for exams to renew their licenses.

That said, most of the offshore jobs are relatively low-skilled. For example, the single largest category of offshore services is outbound calling for the financial services industry for selling mortgages or collecting overdue receivables. The work is routine, based on scripts that pop-up on the computer screen in response to prompts.

Do these findings suggest that developed countries are likely to be only marginally threatened by the globalization of services? Even if high-end work is stays within developed countries, as has happened in the software industry, the problem is that not everyone in developed countries can readily shift to high-end work. Since the 1960s, the shift in the economies of developed nations towards service-based economies certainly increased the number of highly-skilled service workers, but there was an even greater swelling in the number of other less-skilled service workers. This is partly a consequence of the nature of many services as linked, inseparable sets of activities with different

skill levels, combined with a pyramid of labor requirements, i.e., there is more demand for lower-level work than for high-end work. In manufacturing. the unemployment created by the reduction in demand for blue collar labor in developed countries was offset by the absorption of much of the surplus labor into service industries, often with minimal training. But the shift of low-end service workers to high-end workers will require a longer period of re-education and may have significant interim consequences on unemployment rates.

The threat to developed countries is increased by the fact that, apart from software, the largest growth in off-shoring is happening in business services. These are also the sectors with the largest growth in U.S. employment.

Further, there is evidence that even higher skilled functions can be moved offshore or might evolve on their own. For example, interviews with people at a firm earlier this year revealed that they had initially been contracted by an American firm to call its clients with overdue credit card payments. The offshore company eventually purchased the receivables from its client and assumed the collection risk itself. Another firm, Wipro Spectramind, managed the radiology services of Massachusetts General Hospital for its second and third shifts. Thus, American radiologists, who earn an average of $315,000 a year were replaced by Indian radiologists, who earn $20,000 a year on average.

I understand that there is a whole subculture in Pakistan and India of people who go to work in the late afternoon or evening and then work a full day on U.S. time. What effect has outsourcing had on the cultures of the countries that are recipients of much of the outsourced work? Have labor rates dramatically increased? Is it difficult for local companies in India and Pakistan to get quality IT talent?

Indeed such a subculture now exists. It is viewed as very stressful work and not suitable for a long-term career. Companies that do such work try to ameliorate the stress by hiring psychiatric counselors to provide free counseling to stressed-out employees. They also provide free meals and transportation, sports facilities, etc.

However, labor rates have increased only, a little. This is more than offset by

the rise in productivity of this labor over time.

Outsourcing is clearly a temporary solution. As labor rates equalize, the benefit of outsourcing decreases. In Pakistan and China, there are still huge differences in labor costs, but in Turkey, rates are closer to what they are in the 11.5. and other Western states. Realistically, how long can we gain a significant benefit form outsourcing?

India and China, and to some extent, Pakistan, have large labor pools. That is why, in manufacturing, Chinese wage rates have not changed despite massive employment growth over the past three decades. I think that wage rates in India will actually fall because of increasing supply, which is being drawn into outsourcing. This would mean several more decades of benefit from outsourcing.

One way in which developed countries may retain value is if their firms control the work done, either through providing the risk capital or through subsidiaries. While it is difficult to predict which organizational types will dominate, a number of firm-specific factors that influence the liability of off-shoring and organization structure are summarized here:

    The knowledge component of the activity. A higher knowledge component makes the firm more concerned about whether the quality of the service will change due to a location change or the transfer process.

    The interactive components of the process.

    The ability to modularize the process

    Savings from concentrating an activity in one location, leading to

    benefits of scale and scope.

    Reengineering as part of the transfer process. To transfer a business process, it is necessary to study it intensively and script the transfer. In the process of study, often there will he aspects of the current methodology for discharging the process that do not add value. Very often these aspects are legacies of earlier methodologies that were not eliminated as the production process evolved. During the act of transfer these are easier to abandon than at an existing facility' where they have become a "natural' part of the daily routine. Our interviews identified other unexpected benefits that go beyond the efficiency effects. Simply examining the business processes may reveal previously undetected inefficiencies. During the transfer process, these inefficiencies can be addressed without disrupting work patterns. Workers in the new location then use the reengineered process which is usually more efficient.

    The time-sensitive nature of the work.

All News button
1
Authors
News Type
Q&As
Date
Paragraphs
In this Q&A session from the Council on Foreign Relations (reprinted in the New York Times), Shorenstein APARC visiting professor David Kang -- together with other experts on the region -- comments on South Korea's increasing independence from the United States, and other issues related to the "North Korea problem."

What is South Korea's strategic posture in East Asia?

After the Korean War ended in 1953, South Korea and the United States established a political and security alliance that has lasted more than half a century. "For a number of decades, South Korea primarily defined itself as a U.S. ally, with the enemy to the north," says Donald Gregg, president of the Korea Society and a former U.S. ambassador to Korea. However, South Korea is now trying to create a new role for itself in Asia. Seoul is exploring a growing economic relationship with China--which passed the United States in 2003 to become South Korea's largest trading partner--and its policy of engagement and growing cooperation with North Korea is pulling it away from the United States. "All we know for sure is that South Korea's role is no longer junior partner to the U.S.," says David Kang, a visiting professor of Asian studies at Stanford University. "The days when they would just unquestioningly follow the U.S. are over."

Kang and other experts say Seoul is beginning to shift its focus towards increasing regional ties with its Asian neighbors. The U.S.-South Korea relationship, while still strong, is not as exclusive as it has been in the past. "South Korea is still an ally of the United States ... nevertheless, it has been the most active country in promoting East Asian cooperation and integration, and will probably continue to do so," says Charles Armstrong, professor of history and director of the Center for Korean Studies at Columbia University.

What are South Korea's biggest foreign policy challenges?

Dealing with North Korea while preserving its relationship with the United States, maintaining relations with Japan, and addressing potential long-term military or economic threats from China, experts say. But "the major issue for Seoul is overwhelmingly North Korea, and everything else gets filtered through that lens," Kang says. South Korea looks to its northern neighbor with the goal of eventual reunification, and therefore seeks economic cooperation and political engagement to smooth relations and slowly move down that path. The United States, on the other hand, is primarily seeking to prevent North Korea from gaining nuclear weapons, and has refused to engage with Pyongyang until that issue is resolved.

Other experts see a disconnect between how South Korea views its role in the region and how other nations see it. South Korean officials talk of playing a "balancing" or mediating role in regional disputes, including tensions between China and Japan and the nuclear standoff between the United States and North Korea. But South Korea's "actual ability to mediate and balance is limited," says Armstrong. And while South Korean President Roh Moo-Hyun has expressed hopes of building Seoul into a logistics and business hub for the region, existing tensions on the peninsula--including international fears that North Korea is amassing a nuclear arsenal--cloud any long-term economic plans. As things stand, South Korea has the world's 11th largest economy, but not a corresponding level of political clout.

How is South Korea dealing with North Korea?

Through a policy of active engagement. In 1998, Former President Kim Dae-Jung introduced the "Sunshine Policy" aimed at improving ties with North Korea while assuring Pyongyang that Seoul is not trying to absorb it. Since then, "the degree of economic interaction between south and north has substantially increased," Armstrong says. Kim and North Korean President Kim Jung-Il met at a historic summit in 2000, and increasing progress has been made on a range of issues, from economic--increased rail links and joint projects like the Gaesung industrial complex--to social and symbolic, including cross-border family visits and Korean athletes marching together under a single flag at the Olympics. Trade between the two countries reached $697 million in 2004, and South Korea is now Pyongyang's second-largest trading partner after China.

South Korea sees engagement with North Korea as yielding far more benefits than confrontation. "South Korea is reorienting itself toward reconciliation and eventual reunification of the peninsula," Gregg says. South Korean officials say reunification would reduce the burden on each side of maintaining huge armies, help improve living standards, draw international investment, create employment, and help avert the worst possibility: open war on the Korean peninsula.

What is South Korea's relationship with China?

South Korea is developing increasingly warm relations with its giant western neighbor. "There is a real fascination with China in South Korea, and the flow of investment, exports, students, tourists, and businessmen going to China from South Korea has exploded in the last several years," Armstrong says. Bilateral trade between Seoul and Beijing reached $90 billion in 2004, a 42 percent increase from 2003. The two countries also agree politically on issues ranging from opposition to Japanese Prime Minister Junichiro Koizumi's visits to the Yasukuni war shrine, to accord on how to deal with North Korea's nuclear ambitions. China is also choosing the path of engagement with North Korea, and helping Pyongyang find a "Chinese way" to develop: that is, increasing economic openness without sacrificing political control. "On the whole, [South Korea and China] see pretty much eye to eye on the major geopolitical issues," Kang says.

Beijing, like Seoul, is investing in North Korea, which has ample natural resources--including coal, iron, and gold--and a low-cost labor force. In 2003, Chinese investment in North Korea was $1.1 million; in 2004, it ballooned to $50 million; and in 2005, it was expected to reach $85-90 million. The volume of trade between China and North Korea reached $1.5 billion in 2005, making Beijing Pyongyang's largest foreign trading partner. North Korean leader Kim Jung-Il, who rarely travels, emphasized Beijing's importance to his country by visiting China in January.

South Korea is positioning itself to be closer to an ascendant China, but trying to do it without jeopardizing existing ties with the United States. South Korea's biggest worry, experts say, is being pulled into a conflict between the United States and China over Taiwan.

What's the relationship like between South Korea and Japan?

"Very bad at the moment in terms of public diplomacy and popular opinion," Columbia University's Armstrong says. South Korean wariness of Japan dates back at least to 1910, when imperial Japan invaded Korea and ruled it as a colony for thirty-five years. During the occupation, Japanese efforts to suppress Korean language and culture earned Korean enmity. During World War II, the Japanese practice of using "comfort women"--women from occupied countries, mostly Korea, who were forced to serve as prostitutes for the Japanese army--increased the anti-Japanese feeling.

South Koreans, and others across the region, are also infuriated by Koizumi's annual visit to the Yasukuni shrine. The site honors more than two million Japanese war dead, but includes the remains of more than a dozen convicted war criminals. South Korea also has disputes with Japan over territory. Both countries claim a group of islands--and the fishing and mineral rights around them--in the Sea of Japan that the Koreans call Dokdo and the Japanese call Takeshima. And many critics in South Korea and across Asia accuse Japan of whitewashing its wartime atrocities in its grade-school textbooks.

But much of the South Korean conflict with Japan may be for domestic political consumption, some experts say. "Under the surface, I would say the degree of interaction [between Seoul and Tokyo] remains high and, in the economic realm, is rather good," Armstrong says.

How is South Korea dealing with the United States?

While experts say most South Koreans still consider the U.S.-Korean alliance the backbone of their security relationship, time has passed and attitudes are shifting. A new generation of South Koreans, assertive and nationalistic, are less mindful of the Korean War--and less grateful for American intervention in the conflict that left nearly three million Koreans dead or wounded--and more resistant to what they see as a U.S. attempt to impose its values and Washington's singular focus on terrorism. The United States has opposed South Korean engagement efforts with North Korea, and has also moved to increase its ties with Japan. The Bush administration's foreign policy, including the war on terror, its punitive stance toward North Korean nuclear weapons, and particularly the invasion of Iraq, is highly unpopular in South Korea, according to opinion surveys there.

South Koreans are also increasingly demanding more control over their country's military and political affairs. In 2004, the United States returned several military bases to Korean control, and agreed to withdraw 12,500 of the 37,500 U.S. troops currently stationed in Korea by 2008. U.S. officials, including Defense Secretary Donald Rumsfeld, had been pushing for South Korea to take more of a role in the defense of the Korean peninsula, to free up U.S. forces for deployment elsewhere. But, all differences aside, Seoul is still eager to cooperate with the United States. South Korea, with some 3,000 troops in Iraq, is the third-largest member of the U.S.-led coalition there, behind the United States and Britain.

What is the recent history of the region?

Poised between China and Japan, fought over by the United States and Russia, the Korean peninsula long has played a central role in Asia's geopolitical affairs. After World War II, Japanese colonial rule gave way to U.S. and Soviet trusteeship over the southern and northern halves of Korea, respectively. The peninsula was divided at the 38th Parallel. In 1948, the southern Republic of Korea and the northern Democratic People's Republic of Korea, under Kim Il-Sung, were established.

In 1950, North Korean forces invaded South Korea, starting a conflict that brought in China on the North Korean side and a U.S.-led UN coalition on the South Korean side. While an armistice was agreed to in 1953, a formal peace treaty was never signed. In 1954, the United States agreed to help South Korea defend itself against external aggression in a mutual defense treaty. U.S. troops have been stationed in Korea since then. In addition to this important security relationship, shared interests in the last fifty years have included fighting communism and, since the 1980s, establishing a strong democracy and fostering economic development. However, in recent years strain has emerged on a range of issues, none more important than how to handle Pyongyang.

All News button
1
News Type
News
Date
Paragraphs
"Feeding the World in the 21st Century: Exploring the Connections Between Food Production, Health, Enviromental Resources and International Security," was one of eight projects to be be awarded.

Eight research projects led by multidisciplinary-faculty teams have jointly received $1.05 million in the first round of awards made by Stanford's new $3 million Presidential Fund for Innovation in International Studies.

Coit D. Blacker, director of the Freeman Spogli Institute for International Studies, said the fund is the first program launched by the university's International Initiative, which seeks to encourage collaborative, cross-disciplinary approaches to address the global challenges of pursuing peace and security, improving governance and advancing human well-being.

The multi-year projects, selected by the International Initiative's executive committee from 37 proposals, will bring together faculty from fields that traditionally do not collaborate to produce new courses, symposia, conferences and research papers. Blacker, who chairs the executive committee, said additional awards totaling about $2 million will be made in 2007 and 2008.

President John Hennessy said he supports the research projects. "The world does not come to us as neat disciplinary problems, but as complex interdisciplinary challenges," he said. "The collaborative proposals we have selected for this first round of funding offer great potential to help shed light on some of the most persistent and pressing political issues on the global agenda today."

Projects in the first round of funding include:

Governance under Authoritarian Rule. Stephen Haber and Beatriz Magaloni, political science; Ian Morris, classics, history; and Jennifer Trimble, classics. The researchers will examine the political economy of authoritarian systems and determine why some authoritarian governments are able to make the transition to democracy, stable growth and functioning institutions, while others prove predatory and unstable.

Addressing Institutional and Interest Conflicts: Project Governance Structures for Global Infrastructure Development. Raymond Levitt, civil and environmental engineering; Doug McAdam and W. Richard Scott, sociology. The project will analyze the challenges of creating efficient and effective public/private institutions for the provision of low-cost, distributed and durable infrastructure services in emerging economies.

Combating HIV/AIDS in Southern Africa: The Treatment Revolution and Its Impact on Health, Well-Being and Governance. David Katzenstein, infectious diseases; and Jeremy Weinstein, political science. Based on the 2005 Group of 8's commitment to put 10 million people infected with HIV/AIDS on treatment within five years, this project will research the impact of this treatment revolution on health, well-being and governance in sub-Saharan Africa.

Evaluating Institutional Responses to Market Liberalization: Why Latin America Was Left Behind. Judith Goldstein, political science; Avner Greif, economics; Steven Haber, political science; Herb Klein, history; H. Grant Miller, Freeman Spogli Institute (FSI)/medicine; and Barry Weingast, political science. The project will research the interaction between inequality and Latin American institutions in explaining the poor economic performance of countries in the region during the past two decades, examining why reforms such as trade liberalization have failed to yield expected results.

Feeding the World in the 21st Century: Exploring the Connections Between Food Production, Health, Environmental Resources and International Security. Rosamond L. Naylor, FSI/economics; Stephen J. Stedman, FSI/political science; Peter Vitousek, biological sciences; and Gary Schoolnik, medicine, microbiology and immunology. The group will launch a new research and teaching program, titled "Food Security and the Environment," with an initial priority on determining linkages between food security, health and international security, and globalization, agricultural trade and the environment.

The Political Economy of Cultural Diversity. James D. Fearon, political science; and Romain Wacziarg, Graduate School of Business. The researchers will assess the impact of ethnic, linguistic and religious diversity on economic growth, trade and capital flows, governance, development of democracy and political stability.

In addition, two grants to plan forthcoming research projects have received $25,000:

Global Health by Design. Geoffrey Gurtner, plastic and reconstructive surgery; David Kelley, mechanical engineering; Thomas Krummel, surgery; Julie Parsonnet, medicine, health research and policy; and Paul Yock, medicine, bioengineering. The group will design a project to examine how new technology can be used to develop effective, affordable and sustainable methods and devices to prevent disease in the world's poorest countries.

Ecological Sanitation in Rural Haiti: An Interdisciplinary Approach to Sanitation and Soil Fertility. Ralph Greco, surgery; and Rodolfo Dirzo, biological sciences. The researchers will develop a plan to test the efficacy of ecological sanitation in decreasing disease and enhancing soil fertility in rural Haiti.

All News button
1
-

Having developed domain expertise in offshore outsourcing of software development services, some Indian IT companies have moved up the value chain and expanded the sophistication of their offerings. For example, Tata Consultancy Services has developed unique competence and intellectual property in areas such as automation of software development, engineering services, life sciences, and enterprise software products, through investments in R&D. Dr. Shroff's presentation will discuss the increasing role of R&D and intellectual property in the Indian IT industry with TCS as a leading example.

Prior to joining TCS in 1998, Dr. Shroff had been on the faculty of the California Institute of Technology, Pasadena, USA, after which he joined the Department of Computer Science and Engineering at Indian Institute of Technology, Delhi, India. Dr. Shroff graduated from the Indian Institute of Technology, Kanpur, India, in 1985 and received his Ph.D. in Computer Science from Rensselaer Polytechnic Institute, NY, USA, in 1990.

Philippines Conference Room

Gautam Shroff Vice President of Technology Programs Speaker Tata Consultancy Services
Seminars
Authors
News Type
News
Date
Paragraphs

Stanford, CA - The Office of the President and the Stanford International Initiative announced today that eight new interdisciplinary research grants totaling $1.05 million have been awarded to Stanford faculty. The grants are the first to be awarded from Stanford's new $3 million Presidential Fund for Innovation in International Studies (PFIIS), created to support interdisciplinary research and teaching on three overarching global challenges: pursuing peace and security, improving governance, and advancing human well-being.

"The world does not come to us as neat disciplinary problems, but as complex interdisciplinary challenges," said Stanford President John Hennessy. "The collaborative proposals we have selected for this first round of funding offer great potential to help shed light on some of the most persistent and pressing political issues on the global agenda today - issues acutely important to our common future," he stated.

The research projects qualifying for first round funding of $1.025 million are:

  • Governance under Authoritarian Rule. Stephen Haber and Beatriz Magaloni, Political Science. Ian Morris, Classics, History and Jennifer Trimble, Classics. Will examine the political economy of authoritarian systems and determine why some authoritarian governments are able to transition to democracy, stable growth and functioning institutions, while others prove predatory and unstable.
  • Addressing Institutional and Interest Conflicts: Project Governance Structures for Global Infrastructure Development. Raymond Levitt, Civil & Environmental Engineering, Doug McAdam and W. Richard Scott, Sociology. Will analyze the challenges of creating efficient and effective structures for the provision of low cost, distributed and durable infrastructure services in emerging economies.
  • Combating HIV/AIDS in Southern Africa: The Treatment Revolution and its Impact on Health, Well-Being and Governance. David Katzenstein, Infectious Diseases, and Jeremy Weinstein, Political Science. Based on the 2005 Group of 8 commitment to put 10 million people infected with HIV/AIDS on treatment within five years, will research the impact of this treatment revolution on health, well-being and governance in Sub-Saharan Africa.
  • Evaluating Institutional Responses to Market Liberalization: Why Latin America Was Left Behind. Judith Goldstein, Political Science, Avner Greif, Economics, Stephen Haber, Political Science, Herb Klein, History, H.Grant Miller, FSI/Medicine, and Barry Weingast, Political Science. Will research the interaction between inequality and Latin American institutions in explaining the poor economic performance of Latin American countries in the past two decades, examining why reforms such as trade liberalization have failed to yield expected results.
  • Feeding the World in the 21st Century: Exploring the Connections Between Food Production, Health, Environmental Resources, and International Security. Rosamond Naylor, FSI/Economics, Stephen Stedman, FSI/Political Science, Peter Vitousek, Biological Sciences, and Gary Schoolnik, Medicine, Microbiology & Immunology. Launches new research and teaching program on "Food Security and the Environment," with an initial priority on determining linkages between Food Security, Health and International Security, and Globalization, Agricultural Trade and the Environment.
  • The Political Economy of Cultural Diversity. James D. Fearon, Political Science, and Romain Wacziarg, Graduate School of Business. Will assess the impact of ethnic, linguistic and religious diversity on economic growth, trade and capital flows, governance, development of democracy and political stability.

Two planning grants were also awarded:

  • Global Health by Design. Geoffrey Gurtner, Plastic & Reconstructive Surgery, David Kelley, Mechanical Engineering, Thomas Krummel, Surgery, Julie Parsonnet, Medicine, Health Research & Policy, and Paul Yock, Medicine, Bioengineering. Will design a project to examine how new technology can be used to develop effective, affordable and sustainable methods and devices to prevent disease in the world's poorest countries.
  • Ecological Sanitation in Rural Haiti: An Interdisciplinary Approach to Sanitation & Soil Fertility. Ralph Greco, Surgery, and Rodolfo Dirzo, Biological Sciences. Will develop a plan to test the efficacy of ecological sanitation in decreasing disease and enhancing soil fertility in rural Haiti.

"Addressing some of the most significant problems of our day, in the fields of security, governance and human well-being, will require imaginative thinking, bold approaches, and interdisciplinary collaboration," stated Coit D. Blacker, Director of the Freeman Spogli Institute and Chair of the International Initiative's Executive Committee. "The Executive Committee was encouraged to receive more than 35 proposals of an impressive caliber, and after careful review, to award these first grants," Blacker said.

All News button
1
Authors
News Type
Commentary
Date
Paragraphs
Ellen Johnson Sirleaf's inauguration provides the U.S. administration a chance to show it is serious about supporting nascent democracies, creating stability in a volatile region, and providing economic opportunities for Africa's poorest countries. CISAC's Jeremy M. Weinstein and colleague Steve Radelet tell how, in this Boston Globe op-ed.

Ellen Johnson Sirleaf's inauguration as the president of Liberia marks a watershed in the country's tumultuous history.

Twenty-five years of misrule and civil war under Samuel Doe, Charles Taylor, and successive interim governments have left the country in ruins. Nearly 300,000 Liberians lost their lives, average income is one-eighth what it was in 1980, and large majorities of the population subsist in dire poverty.

Since United Nations and US troops ousted Taylor in 2003, a fragile peace has taken hold, supported by 15,000 UN peacekeepers. With free and peaceful elections under their belts, Liberians are feeling new optimism and hope. Markets here are bustling, stores are freshly painted and open for business, and newspapers and radios feature lively debate.

The new government is a clear break from a past characterized by rule by force, extensive corruption, and a culture of impunity. Sirleaf, the first African woman elected head of state, has been an outspoken champion of accountability, transparency, and good governance for decades, a stance that landed her in jail twice and was a hallmark of her opposition to past governments and campaign for the presidency.

Already change is underway. She has instituted a code of conduct and full financial disclosure for senior officials, and endorsed a program that will install internationally recruited financial controllers in several state enterprises and create a strong anticorruption commission. Her government plans to publish financial accounts on the Web, make it easier for whistleblowers to report infractions, and rewrite Liberia's outdated constitution to firmly establish participatory democracy, decentralize power, and install robust checks on the executive.

Recovery from deep conflict in Africa is not easy, but we know it is possible. Mozambique was destroyed by civil war in the 1980s, but its democratically elected government led the way to peace, stability, and a doubling of income in a dozen years. Sierra Leone suffered a blood bath in the 1990s, but the 1999 peace agreement and 2001 elections brought stability and economic growth of 7 percent a year. Rwanda's genocide was followed by a recovery that few could have imagined.

But Sirleaf faces a daunting task. Liberia's recovery will depend mainly on Liberians themselves, but it will require strong international support, just as in Mozambique, Sierra Leone, and Rwanda.

West Africa's civil wars have spawned widespread smuggling of diamonds, transshipment of drugs, and easy money laundering opportunities for global terrorist groups. Liberia's historic moment provides the U.S. administration a chance to show it is serious about supporting nascent democracies, creating stability in a volatile region, and providing economic opportunities for Africa's poorest countries.

First, the United States must continue its crucial role in the demobilization of combatants and commit to long-term rebuilding of Liberia's police and army. The new government must be able to maintain and enhance security to begin to recover.

Second, the administration should support rapid and comprehensive forgiveness of Liberia's debts, which were mainly undertaken and wasted by the rapacious Doe government. It makes no more sense to stick today's Liberians with the bill, including 20 years of accumulated interest, than to force today's Iraqis to pay Saddam Hussein's bills.

Third, and perhaps most urgent, Congress should approve supplemental funding of $50 million to $100 million to support the new government. Unfortunately, Congress recently cut the administration's initial request for Liberia, a short-sighted step that sent the wrong signal to a struggling democracy and old ally at a crucial turning point. These funds would build critical infrastructure, put kids back into schools, and continue vital training for security forces. It would give Liberians their best chance of securing peace and basic freedoms.

All News button
1
Authors
News Type
Commentary
Date
Paragraphs
Efforts to collect data on Americans go far beyond the National Security Agency's domestic spying program. The government collects vast troves of data on U.S. citizens, including consumer credit histories and medical and travel records. Congress should look into all of these activities when it investigates the NSA's domestic spying, writes CISAC fellow Laura Donohue in the Los Angeles Times.

You're being watched...Congress will soon hold hearings on the National Security Agency's domestic spying program, secretly authorized by President Bush in 2002. But that program is just the tip of the iceberg.

Since 9/11, the expansion of efforts to gather and analyze information on U.S. citizens is nothing short of staggering. The government collects vast troves of data, including consumer credit histories and medical and travel records. Databases track Americans' networks of friends, family and associates, not just to identify who is a terrorist but to try to predict who might become one.

Remember Total Information Awareness, retired Adm. John Poindexter's effort to harness all government and commercial databases to preempt national security threats? The idea was that disparate, seemingly mundane behaviors can reveal criminal intent when viewed together. More disturbing, it assumed that deviance from social norms can be an early indicator of terrorism. Congress killed that program in 2003, but according to the Associated Press, many related projects continued.

The Defense Advanced Research Projects Agency runs a data-mining program called "Evidence Extraction and Link Discovery", which connects pieces of information from vast amounts of data sources. The Defense Intelligence Agency trawls intelligence records and the Internet to identify Americans connected to foreign terrorists. The CIA reportedly runs Quantum Leap, which gathers personal information on individuals from private and public sources. In 2002, Congress authorized $500 million for the Homeland Security Department to develop "data mining and other advanced analytical tools." In 2004, the General Accounting Office surveyed 128 federal departments and agencies to determine the extent of data mining. It found 199 operations, 14 of which related to counterterrorism.

What type of information could these mine? Your tax, education, vehicle, criminal and welfare records for starters. But also other digital data, such as your travel, medical and insurance records - and DNA tests. Section 505 of the Patriot Act (innocuously titled "Miscellaneous National Security Authorities") extends the type of information the government can obtain without a warrant to include credit card records, bank account numbers and information on Internet use.

Your checking account may tell which charities or political causes you support. Your credit card statements show where you shop, and your supermarket frequent-buyer-card records may indicate whether you keep kosher or follow an Islamic halal diet. Internet searches record your interests, down to what, exactly, you read. Faith forums or chat rooms offer a window into your thoughts and beliefs. E-mail and telephone conversations contain intimate details of your life.

A University of Illinois study found that in the 12 months following 9/11, federal agents made at least 545 visits to libraries to obtain information about patrons. This isn't just data surveillance. It's psychological surveillance.

Many Americans might approve of data mining to find terrorists. But not all of the inquiries necessarily relate to terrorism. The Patriot Act allows law enforcement officers to get "sneak and peek" warrants to search a home for any suspected crime - and to wait months or even years to tell the owner they were there. Last July, the Justice Department told the House Judiciary Committee that only 12% of the 153 "sneak and peek" warrants it received were related to terrorism investigations.

The FBI has used Patriot Act powers to break into a judge's chambers and to procure records from medical clinics. Documents obtained by the American Civil Liberties Union recently revealed that the FBI used other new powers to eavesdrop on environmental, political and religious organizations.

When Congress looks into domestic spying in the "war on terror," it should ask a series of questions:

  • First, what information, exactly, is being collected? Are other programs besides the president's NSA initiative ignoring traditional warrant requirements? Are federal agencies dodging weak privacy laws by outsourcing the job to private contractors?
  • Second, who has access to the data once it is collected, and what legal restrictions are set on how it can be used or shared?
  • Third, who authorized data mining, and is its use restricted to identifying terrorists?
  • Fourth, what is the collective effect of these programs on citizens' rights? Privacy certainly suffers, but as individuals begin to feel inhibited in what they say and do, free speech and freedom of assembly also erode.
  • Fifth, how do these data collection and mining operations deal with error? As anyone who's tried to dispute an erroneous credit report can attest, once computer networks exchange data, it may be difficult to verify its accuracy or where it entered the system. Citizens who do not know they are under surveillance cannot challenge inaccurate information that may become part of their secret digital dossier.

What will Congress do to ensure that the innocent remain so?

Hero Image
defense 1 logo whitehouse.gov archives
All News button
1
Paragraphs

Congress will soon hold hearings on the National Security Agency's domestic spying program, secretly authorized by President Bush in 2002. But that program is just the tip of the iceberg.

Since 9/11, the expansion of efforts to gather and analyze information on U.S. citizens is nothing short of staggering. The government collects vast troves of data, including consumer credit histories and medical and travel records. Databases track Americans' networks of friends, family and associates, not just to identify who is a terrorist but to try to predict who might become one.

Remember Total Information Awareness, retired Adm. John Poindexter's effort to harness all government and commercial databases to preempt national security threats? The idea was that disparate, seemingly mundane behaviors can reveal criminal intent when viewed together. More disturbing, it assumed that deviance from social norms can be an early indicator of terrorism. Congress killed that program in 2003, but according to the Associated Press, many related projects continued.

The Defense Advanced Research Projects Agency runs a data-mining program called Evidence Extraction and Link Discovery, which connects pieces of information from vast amounts of data sources. The Defense Intelligence Agency trawls intelligence records and the Internet to identify Americans connected to foreign terrorists. The CIA reportedly runs Quantum Leap, which gathers personal information on individuals from private and public sources. In 2002, Congress authorized $500 million for the Homeland Security Department to develop "data mining and other advanced analytical tools." In 2004, the General Accounting Office surveyed 128 federal departments and agencies to determine the extent of data mining. It found 199 operations, 14 of which related to counterterrorism.

What type of information could these mine? Your tax, education, vehicle, criminal and welfare records for starters. But also other digital data, such as your travel, medical and insurance records--and DNA tests. Section 505 of the Patriot Act (innocuously titled "Miscellaneous National Security Authorities") extends the type of information the government can obtain without a warrant to include credit card records, bank account numbers and information on Internet use.

Your checking account may tell which charities or political causes you support. Your credit card statements show where you shop, and your supermarket frequent-buyer-card records may indicate whether you keep kosher or follow an Islamic halal diet. Internet searches record your interests, down to what, exactly, you read. Faith forums or chat rooms offer a window into your thoughts and beliefs. E-mail and telephone conversations contain intimate details of your life.

A University of Illinois study found that in the 12 months following 9/11, federal agents made at least 545 visits to libraries to obtain information about patrons. This isn't just data surveillance. It's psychological surveillance.

Many Americans might approve of data mining to find terrorists. But not all of the inquiries necessarily relate to terrorism. The Patriot Act allows law enforcement officers to get "sneak and peek" warrants to search a home for any suspected crime--and to wait months or even years to tell the owner they were there. Last July, the Justice Department told the House Judiciary Committee that only 12% of the 153 "sneak and peek" warrants it received were related to terrorism investigations.

The FBI has used Patriot Act powers to break into a judge's chambers and to procure records from medical clinics. Documents obtained by the American Civil Liberties Union recently revealed that the FBI used other new powers to eavesdrop on environmental, political and religious organizations.

When Congress looks into domestic spying in the "war on terror," it should ask a series of questions:

First, what information, exactly, is being collected? Are other programs besides the president's NSA initiative ignoring traditional warrant requirements? Are federal agencies dodging weak privacy laws by outsourcing the job to private contractors?

Second, who has access to the data once it is collected, and what legal restrictions are set on how it can be used or shared?

Third, who authorized data mining, and is its use restricted to identifying terrorists?

Fourth, what is the collective effect of these programs on citizens' rights? Privacy certainly suffers, but as individuals begin to feel inhibited in what they say and do, free speech and freedom of assembly also erode.

Fifth, how do these data collection and mining operations deal with error? As anyone who's tried to dispute an erroneous credit report can attest, once computer networks exchange data, it may be difficult to verify its accuracy or where it entered the system. Citizens who do not know they are under surveillance cannot challenge inaccurate information that may become part of their secret digital dossier.

What will Congress do to ensure that the innocent remain so?

All Publications button
1
Publication Type
Commentary
Publication Date
Journal Publisher
Los Angeles Times
Authors
Paragraphs

Health is an important factor in the process of economic development. Good

health is important for increasing the productivity of labor force and for raising the

income-earning ability of farm households. Health also has been shown to have positive and statistically significant effects on economic growth. For example, Fogel (1994) argues that about a third of income growth in Britain between 1790 and 1980 can be attributed to improvements in health. In developing countries, good health is viewed as a critical input into poverty reduction and long-term economic development. In short, it has been argued that investment in health is good business in many different settings and environments.

All Publications button
1
Publication Type
Working Papers
Publication Date
Authors
Scott Rozelle
Paragraphs

This issue of CHP/PCOR's quarterly newsletter, which covers news from the fall 2005 quarter, includes articles about:

  • a study concluding that the implantable cardioverter defibrillator -- one of the most expensive medical devices on the market -- is worth its high cost, in appropriate patients, because it prevents sudden cardiac deaths;
  • the evolution and broad application of the Quality Indicators, a set of practical tools developed by CHP/PCOR researchers that are used by hundreds of U.S. hospitals, medical groups, health insurers, state health agencies and business coalitions to screen for quality problems;
  • a study finding that the Internet can be a valuable tool to help patients with stigmatized illnesses (such as mental illness) find information about and seek treatment for their illness;
  • CHP/PCOR-hosted seminars on global health themes, given by Jack Chow of the World Health Organization -- who discussed combating malaria, TB and HIV/AIDS -- and Dean Jamison of the NIH's Fogarty International Center, who discussed evaluating countries' performance on health; and
  • a prestigious national award won by two CHP/PCOR trainees at the annual meeting of the Society for Medical Decision Making.
All Publications button
1
Publication Type
Newsletters
Publication Date
Authors
Subscribe to Business