SlideShare a Scribd company logo
1 of 20
Theft-based civic hacking: a
review




Stefan Magdalinski
Saturday 16th January 2010
                               1
Civic Hacking:

Fixing democracy by using
democracy’s own existing,
broken, rules.




                            2
1998: UpMyStreet.com




                       3
Tribute!




           4
2000: FaxYourMP.com




                      5
2005: WriteToThem.com




                        6
2005: WriteToThem.com League Tables




                                      7
2004: TheyWorkForYou.com




                           8
2004: The Official Hansard




                             9
A debate, done properly




                          10
Slice and Dice and All Things Nice




                                     11
2008 WhatDoTheyKnow.com – FOIA Filer & Archiver




                                             12
2005 FarmSubsidy.org




                       13
Farmsubsidy.org Results




    By 2010 full transparency on all
   end recipients of EU farm, fisheries
        & infrastructure subsidies




                                          14
Farmsubsidy.org Results




    By 2010 full transparency on all
   end recipients of EU farm, fisheries
        & infrastructure subsidies


           ~ $100 billion/year


                                          14
Recipe for Theft-Based Activism:

    1.   Identify broken civic institution
    2.   Liberate data from said institution
    3.   Build civic tools that are too useful to turn off
    4.   Leave with citizens for x years
    5.   Watch said institution reform
    6.   Doesn't necessarily need lots of users/money



                                                       15
Results


   Licensing:

   Ask forgiveness, not permission?




                                  16
Results


   Licensing:

   Ask forgiveness, not permission?

    No! the correct response is
    ‘Go F**k Yourself!’

    - this data is our right.


                                  16
Question:

What online democratic tools are there
in RSA, and what do you need?




                                 17
Thank You
stefan@whitelabel.org
http://www.twitter.com/smagdali




                                  18

More Related Content

Similar to Civic Hacking: a review

Oxford social media workshop
Oxford social media workshopOxford social media workshop
Oxford social media workshopCatherine Howe
 
Open Government and local community foundations: Getting involved
Open Government and local community foundations: Getting involvedOpen Government and local community foundations: Getting involved
Open Government and local community foundations: Getting involvedHack the Hood
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacytolshinoda
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsJyrki Kasvi
 
32C3: Europe’s biggest fails in digital policy-making
32C3: Europe’s biggest fails in digital policy-making32C3: Europe’s biggest fails in digital policy-making
32C3: Europe’s biggest fails in digital policy-makingKirsten Fiedler
 
Transparency in Financial Disclosure Bill Lutz
Transparency in Financial Disclosure Bill LutzTransparency in Financial Disclosure Bill Lutz
Transparency in Financial Disclosure Bill LutzClarity2010
 
Why College Students Use Custom Essay Writing Ser
Why College Students Use Custom Essay Writing SerWhy College Students Use Custom Essay Writing Ser
Why College Students Use Custom Essay Writing SerApril Ford
 
Free Essay On Swot Analysis
Free Essay On Swot AnalysisFree Essay On Swot Analysis
Free Essay On Swot AnalysisLydia Jana
 
LECTURE 4 - Cyberculture
LECTURE 4 - CybercultureLECTURE 4 - Cyberculture
LECTURE 4 - CybercultureKim Flintoff
 
Key Note Presentation - Jani Makraduli
Key Note Presentation - Jani MakraduliKey Note Presentation - Jani Makraduli
Key Note Presentation - Jani Makradulie-Democracy Conference
 
[2010] Key Note Presentation - by Jani Makraduli
[2010] Key Note Presentation - by Jani Makraduli[2010] Key Note Presentation - by Jani Makraduli
[2010] Key Note Presentation - by Jani Makradulie-Democracy Conference
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for ChangeTeodoro Llanes II
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Saptarshi Ghosh
 
Jai Jawan Jai Kisan Jai Vigyan Essay In Marathi
Jai Jawan Jai Kisan Jai Vigyan Essay In MarathiJai Jawan Jai Kisan Jai Vigyan Essay In Marathi
Jai Jawan Jai Kisan Jai Vigyan Essay In MarathiLisa Young
 
5-Paragraph-Essay - Mr. DwyerMr. Dwyer
5-Paragraph-Essay - Mr. DwyerMr. Dwyer5-Paragraph-Essay - Mr. DwyerMr. Dwyer
5-Paragraph-Essay - Mr. DwyerMr. DwyerPam Fenno
 
Piracy, Policy, Participation
Piracy, Policy, ParticipationPiracy, Policy, Participation
Piracy, Policy, ParticipationRob Jewitt
 
"Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari..."Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari...Terry O'Brien
 
Great Expectations: After the vote - citizens online, e-democracy in governan...
Great Expectations: After the vote - citizens online, e-democracy in governan...Great Expectations: After the vote - citizens online, e-democracy in governan...
Great Expectations: After the vote - citizens online, e-democracy in governan...Steven Clift
 

Similar to Civic Hacking: a review (20)

Oxford social media workshop
Oxford social media workshopOxford social media workshop
Oxford social media workshop
 
Open Government and local community foundations: Getting involved
Open Government and local community foundations: Getting involvedOpen Government and local community foundations: Getting involved
Open Government and local community foundations: Getting involved
 
3 censorship privacy
3 censorship privacy3 censorship privacy
3 censorship privacy
 
Freedom or Control in Virtual Worlds
Freedom or Control in Virtual WorldsFreedom or Control in Virtual Worlds
Freedom or Control in Virtual Worlds
 
32C3: Europe’s biggest fails in digital policy-making
32C3: Europe’s biggest fails in digital policy-making32C3: Europe’s biggest fails in digital policy-making
32C3: Europe’s biggest fails in digital policy-making
 
Transparency in Financial Disclosure Bill Lutz
Transparency in Financial Disclosure Bill LutzTransparency in Financial Disclosure Bill Lutz
Transparency in Financial Disclosure Bill Lutz
 
Why College Students Use Custom Essay Writing Ser
Why College Students Use Custom Essay Writing SerWhy College Students Use Custom Essay Writing Ser
Why College Students Use Custom Essay Writing Ser
 
Free Essay On Swot Analysis
Free Essay On Swot AnalysisFree Essay On Swot Analysis
Free Essay On Swot Analysis
 
Transcript of Zurkowski video at LILAC 2014
Transcript of Zurkowski video at LILAC 2014Transcript of Zurkowski video at LILAC 2014
Transcript of Zurkowski video at LILAC 2014
 
LECTURE 4 - Cyberculture
LECTURE 4 - CybercultureLECTURE 4 - Cyberculture
LECTURE 4 - Cyberculture
 
Key Note Presentation - Jani Makraduli
Key Note Presentation - Jani MakraduliKey Note Presentation - Jani Makraduli
Key Note Presentation - Jani Makraduli
 
[2010] Key Note Presentation - by Jani Makraduli
[2010] Key Note Presentation - by Jani Makraduli[2010] Key Note Presentation - by Jani Makraduli
[2010] Key Note Presentation - by Jani Makraduli
 
Se emp ppt
Se emp pptSe emp ppt
Se emp ppt
 
10 ICT as a Platform for Change
10 ICT as a Platform for Change10 ICT as a Platform for Change
10 ICT as a Platform for Change
 
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories Motivations behind Software Piracy: Relevance to Computer Ethics Theories
Motivations behind Software Piracy: Relevance to Computer Ethics Theories
 
Jai Jawan Jai Kisan Jai Vigyan Essay In Marathi
Jai Jawan Jai Kisan Jai Vigyan Essay In MarathiJai Jawan Jai Kisan Jai Vigyan Essay In Marathi
Jai Jawan Jai Kisan Jai Vigyan Essay In Marathi
 
5-Paragraph-Essay - Mr. DwyerMr. Dwyer
5-Paragraph-Essay - Mr. DwyerMr. Dwyer5-Paragraph-Essay - Mr. DwyerMr. Dwyer
5-Paragraph-Essay - Mr. DwyerMr. Dwyer
 
Piracy, Policy, Participation
Piracy, Policy, ParticipationPiracy, Policy, Participation
Piracy, Policy, Participation
 
"Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari..."Information Compliance - Freedom of Information, Data Protection and Librari...
"Information Compliance - Freedom of Information, Data Protection and Librari...
 
Great Expectations: After the vote - citizens online, e-democracy in governan...
Great Expectations: After the vote - citizens online, e-democracy in governan...Great Expectations: After the vote - citizens online, e-democracy in governan...
Great Expectations: After the vote - citizens online, e-democracy in governan...
 

Recently uploaded

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessPixlogix Infotech
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 

Recently uploaded (20)

Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 

Civic Hacking: a review