SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Theft-based civic hacking: a
review




Stefan Magdalinski
Saturday 16th January 2010
                               1
Civic Hacking:

Fixing democracy by using
democracy’s own existing,
broken, rules.




                            2
1998: UpMyStreet.com




                       3
Tribute!




           4
2000: FaxYourMP.com




                      5
2005: WriteToThem.com




                        6
2005: WriteToThem.com League Tables




                                      7
2004: TheyWorkForYou.com




                           8
2004: The Official Hansard




                             9
A debate, done properly




                          10
Slice and Dice and All Things Nice




                                     11
2008 WhatDoTheyKnow.com – FOIA Filer & Archiver




                                             12
2005 FarmSubsidy.org




                       13
Farmsubsidy.org Results




    By 2010 full transparency on all
   end recipients of EU farm, fisheries
        & infrastructure subsidies




                                          14
Farmsubsidy.org Results




    By 2010 full transparency on all
   end recipients of EU farm, fisheries
        & infrastructure subsidies


           ~ $100 billion/year


                                          14
Recipe for Theft-Based Activism:

    1.   Identify broken civic institution
    2.   Liberate data from said institution
    3.   Build civic tools that are too useful to turn off
    4.   Leave with citizens for x years
    5.   Watch said institution reform
    6.   Doesn't necessarily need lots of users/money



                                                       15
Results


   Licensing:

   Ask forgiveness, not permission?




                                  16
Results


   Licensing:

   Ask forgiveness, not permission?

    No! the correct response is
    ‘Go F**k Yourself!’

    - this data is our right.


                                  16
Question:

What online democratic tools are there
in RSA, and what do you need?




                                 17
Thank You
stefan@whitelabel.org
http://www.twitter.com/smagdali




                                  18

Weitere Àhnliche Inhalte

Ähnlich wie Civic Hacking: a review

Transparency in Financial Disclosure Bill Lutz
Transparency in Financial Disclosure Bill LutzTransparency in Financial Disclosure Bill Lutz
Transparency in Financial Disclosure Bill Lutz
Clarity2010
 
LECTURE 4 - Cyberculture
LECTURE 4 - CybercultureLECTURE 4 - Cyberculture
LECTURE 4 - Cyberculture
Kim Flintoff
 
Key Note Presentation - Jani Makraduli
Key Note Presentation - Jani MakraduliKey Note Presentation - Jani Makraduli
Key Note Presentation - Jani Makraduli
e-Democracy Conference
 

Ähnlich wie Civic Hacking: a review (20)

Oxford social media workshop
Oxford social media workshopOxford social media workshop
Oxford social media workshop
 
Open Government and local community foundations: Getting involved
Open Government and local community foundations: Getting involvedOpen Government and local community foundations: Getting involved
Open Government and local community foundations: Getting involved
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
32C3: Europe’s biggest fails in digital policy-making
32C3: Europe’s biggest fails in digital policy-making32C3: Europe’s biggest fails in digital policy-making
32C3: Europe’s biggest fails in digital policy-making
 
Transparency in Financial Disclosure Bill Lutz
Transparency in Financial Disclosure Bill LutzTransparency in Financial Disclosure Bill Lutz
Transparency in Financial Disclosure Bill Lutz
 
Why College Students Use Custom Essay Writing Ser
Why College Students Use Custom Essay Writing SerWhy College Students Use Custom Essay Writing Ser
Why College Students Use Custom Essay Writing Ser
 
Free Essay On Swot Analysis
Free Essay On Swot AnalysisFree Essay On Swot Analysis
Free Essay On Swot Analysis
 
Transcript of Zurkowski video at LILAC 2014
Transcript of Zurkowski video at LILAC 2014Transcript of Zurkowski video at LILAC 2014
Transcript of Zurkowski video at LILAC 2014
 
LECTURE 4 - Cyberculture
LECTURE 4 - CybercultureLECTURE 4 - Cyberculture
LECTURE 4 - Cyberculture
 
Key Note Presentation - Jani Makraduli
Key Note Presentation - Jani MakraduliKey Note Presentation - Jani Makraduli
Key Note Presentation - Jani Makraduli
 
[2010] Key Note Presentation - by Jani Makraduli
[2010] Key Note Presentation - by Jani Makraduli[2010] Key Note Presentation - by Jani Makraduli
[2010] Key Note Presentation - by Jani Makraduli
 
Se emp ppt
Se emp pptSe emp ppt
Se emp ppt
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Jai Jawan Jai Kisan Jai Vigyan Essay In Marathi
Jai Jawan Jai Kisan Jai Vigyan Essay In MarathiJai Jawan Jai Kisan Jai Vigyan Essay In Marathi
Jai Jawan Jai Kisan Jai Vigyan Essay In Marathi
 
5-Paragraph-Essay - Mr. DwyerMr. Dwyer
5-Paragraph-Essay - Mr. DwyerMr. Dwyer5-Paragraph-Essay - Mr. DwyerMr. Dwyer
5-Paragraph-Essay - Mr. DwyerMr. Dwyer
 
Piracy, Policy, Participation
Piracy, Policy, ParticipationPiracy, Policy, Participation
Piracy, Policy, Participation
 
"Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari..."Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari...
 
Great Expectations: After the vote - citizens online, e-democracy in governan...
Great Expectations: After the vote - citizens online, e-democracy in governan...Great Expectations: After the vote - citizens online, e-democracy in governan...
Great Expectations: After the vote - citizens online, e-democracy in governan...
 

KĂŒrzlich hochgeladen

IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
Enterprise Knowledge
 

KĂŒrzlich hochgeladen (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 

Civic Hacking: a review