Created for use in the Digital Doorways research project, this design stimuli shows the steps of submitting an application, sharing personal information, and verifying identity for Arizona's integrated online application that includes SNAP and Medicaid.
This blog introduces Code for America’s new service blueprint for Medicaid work requirements, highlighting how it can help states map system changes, identify pain points, and prioritize human-centered design.
A statewide initiative by the New York State Department of Environmental Conservation (DEC) to plant and track 25 million trees by 2033 across New York State.
This UN report warns against the risks of digital welfare systems, emphasizing their potential to undermine human rights through increased surveillance, automation, and privatization of public services.
Comprehensive and sustained improvement in benefits access and customer experience requires changes across policy, operations, technology, staffing, procurement, and more. This guide offers a collection of actions and best practices for states to apply.
This study examines how bureaucratic interactions differ among public assistance programs—WIC, SNAP, and Medicaid—highlighting variations in participant experiences and the psychological costs associated with each.
The US General Services Administration announces that it is seeking a limited number of state and local government partners to take advantage of login.gov to administer their federally funded programs.
Government agencies adopting generative AI tools seems inevitable at this point. But there is more than one possible future for how agencies use generative AI to simplify complex government information.
Remote identify proofing is the process federal agencies and other entities use to verify that the individuals who apply online for benefits and services are who they claim to be. If the applicant responds correctly to personal questions, their identity is considered to be verified. However, data stolen in recent breaches could be used fraudulently to respond to knowledge-based verification questions. Alternative methods are available that provide stronger security, but these methods may have limitations in cost, convenience, technological maturity, and they may not be viable for all segments of the public.