Produced By: Federal/National Government: Agency
-
Digital Identity Federal Agencies Need to Strengthen Online Identity Verification Processes
Remote identify proofing is the process federal agencies and other entities use to verify that the individuals who apply online for benefits and services are who they claim to be. If the applicant responds correctly to personal questions, their identity is considered to be verified. However, data stolen in recent breaches could be used fraudulently to respond to knowledge-based verification questions. Alternative methods are available that provide stronger security, but these methods may have limitations in cost, convenience, technological maturity, and they may not be viable for all segments of the public.
-
Communications Promoting Public Benefits Access Through Web-Based Tools and Outreach: A National Scan of Efforts. Volume I: Background, Efforts in Brief, and Related Initiatives
Demand for public benefits is rising in response to continued economic pressure on vulnerable people, in addition to changes in eligibility rules for some safety net programs. This report summarizes existing benefits access efforts, studies the successes and challenges of benefits expansion efforts through a subset of in-depth case studies, and analyzes the potential for sustaining, expanding, and replicating successful efforts.
-
Digitizing Policy + Rules as Code Implementing rules without a rules engine
It is frequently assumed that when rules are implemented as code, a rules engine is necessary. However, it is possible for policy people and engineers to effectively work together to code logic that drives technological system without needing a mediating rules engine at all.
-
Digitizing Policy + Rules as Code OpenFisca: Write rules as code
OpenFisca provides a syntax for writing Rules as Code.
-
Procurement Prerequisites for modular contracting
18F describes modular contracting, the process of breaking up large, custom software procurements into a small constellation of smaller contracts. Modular procurement requires agile, product thinking, user-centered design, DevSecOps, and loosely-coupled architecture.
-
Digitizing Policy + Rules as Code Eligibility APIs Initiative
Documentation of 18F's and 10x's Eligibility APIs Initiative
-
Human-Centered Design 18F Methods: Usability Testing
18F describes how to implement usability tests to understand how intuitive a given design is, as well as how adaptable it is to meeting user needs.
-
Procurement 18F Agile-based project approach
18F describes its Agile-based project approach combining iterative software development, product management, user-centered design, and DevOps.
-
Procurement Launching New Digital Tools for WIC Participants
Toolkit to help agencies administering WIC become more informed purchasers of digital tools for WIC participants.
-
Procurement De-risking Guide: Budgeting and overseeing tech projects
Guide by 18F explaining how to minimize the risk of policy failure when selecting technology vendors.
-
Data Using Data Matching and Targeted Outreach to Enroll Families With Young Children in WIC
WIC enrollment has declined over the past decade, but evidence from randomized control trials indicates that using data from other programs to identify WIC-eligible families and following up with text-based outreach can boost program participation.
-
Communications Federal Plain Language Guidelines
Guidelines to help organizations write in compliance with the Plain Writing Act of 2010.