Mapping Government's Reach

Someday, brilliantly designed and spectacularly colorful computer-generated maps are likely to portray every nuance of government subsidies and incentives. They don't yet.

Promoters of computer mapping insist, however, that supersophisticated designs are just around the corner. After all, they note, using these maps for simple tasks such as community planning, public education and mobilizing public opinion is a recent phenomenon.

Computer-generated maps rely on sophisticated software called the Geographic Information System (GIS). Just a few years ago, GIS was extremely expensive and inordinately difficult to use. It also required a very powerful computer, out of reach of most non-profit organizations and all but the largest local governments.

"The technical and cost problems have been largely overcome," said Michael A. Stegman, assistant Housing and Urban Development (HUD) secretary for policy development and research. The map-making software can be used on most computers "and a lot of the data are available from a variety of sources."

HUD is one of them. A few years ago, the department provided relatively primitive mapping software to localities and nonprofit organizations involved in two grant programs. It was part of a pet project of both Stegman and Secretary Andrew M. Cuomo when he was assistant secretary for community planning and development. HUD has now upgraded the software, made it a lot easier to use and included a map library in a package that it plans to market for $249 later this spring.

What local officials need is more government data translated into a form that the mapping software can read. "Frankly, another challenge we have is to get more-specific data," Cleveland Heights (Ohio) councilman Kenneth Montlack said. "It's a very difficult task to track down all the sources of funds and to figure out what dollars get spent where."

Cuyahoga County planning director Paul A. Alsenas, for example, wanted to construct a map that showed traffic patterns on major roads around the county, but the county engineer had not yet converted that data into digital form. "So we had to buy data from a company in Texas that should be available from folks a block and a half away from us," Alsenas said. "But at least we got it."

By themselves, the most startling maps won't forge political coalitions. "Let's not think that technology and maps will change the world," Stegman said. "You need charismatic leaders and strategists who know how to use this tool, who understand the fault lines of American society and how to bridge them, and who can now use this vehicle as a resource to mobilize public opinion."

Stay up-to-date with federal news alerts and analysis — Sign up for GovExec's email newsletters.
Close [ x ] More from GovExec

Thank you for subscribing to newsletters from
We think these reports might interest you:

  • Sponsored by G Suite

    Cross-Agency Teamwork, Anytime and Anywhere

    Dan McCrae, director of IT service delivery division, National Oceanic and Atmospheric Administration (NOAA)

  • Data-Centric Security vs. Database-Level Security

    Database-level encryption had its origins in the 1990s and early 2000s in response to very basic risks which largely revolved around the theft of servers, backup tapes and other physical-layer assets. As noted in Verizon’s 2014, Data Breach Investigations Report (DBIR)1, threats today are far more advanced and dangerous.

  • Federal IT Applications: Assessing Government's Core Drivers

    In order to better understand the current state of external and internal-facing agency workplace applications, Government Business Council (GBC) and Riverbed undertook an in-depth research study of federal employees. Overall, survey findings indicate that federal IT applications still face a gamut of challenges with regard to quality, reliability, and performance management.

  • PIV- I And Multifactor Authentication: The Best Defense for Federal Government Contractors

    This white paper explores NIST SP 800-171 and why compliance is critical to federal government contractors, especially those that work with the Department of Defense, as well as how leveraging PIV-I credentialing with multifactor authentication can be used as a defense against cyberattacks

  • Toward A More Innovative Government

    This research study aims to understand how state and local leaders regard their agency’s innovation efforts and what they are doing to overcome the challenges they face in successfully implementing these efforts.

  • From Volume to Value: UK’s NHS Digital Provides U.S. Healthcare Agencies A Roadmap For Value-Based Payment Models

    The U.S. healthcare industry is rapidly moving away from traditional fee-for-service models and towards value-based purchasing that reimburses physicians for quality of care in place of frequency of care.

  • GBC Flash Poll: Is Your Agency Safe?

    Federal leaders weigh in on the state of information security


When you download a report, your information may be shared with the underwriters of that document.