Upload
ele-munjeli
View
90
Download
3
Embed Size (px)
Citation preview
WHO AM I?
Participatory Art, Intermedia, Sonic Art, Audio Engineering
Computer Science Degree from TESC with Undergraduate research in Soft ware Engineering for Deliberative Systems
NCDD – CiralDevOps Socrata
WHAT IS THIS TALK?
Mostly Ideas – but that’s importantQuestions instead of answersPerpetuati ng a common vocabulary of issues
and ideas
Deliberation – parliamentary procedures, decision making
Voting – if you have representatives or delegates
Taxation – resources and GNPJustice – rights for citizensRelations with other states
POLITICAL TOOLING
Possessions – clothes, cars, jewelry, technology
Class – accents, educati on, access to culture
Political Access – cold hard cash, infl uence, votes
OFFLINE
Numbers – social networks and published commentary
Technology – Code, coders, and access to coders
Design – intenti onal branding with digital images or work
ONLINE
IDENTIFY THE EXISTING CONFLICT MODEL
Research – minutes, videos, published articles, bloggers
Meet with offl ine advocatesVisit the adversaries at home (online or offl ine)Good faith and bad faith
Is this a goal-oriented initiati ve?
Are we trying to create a persistent community?
HOW MUCH TIME HAVE WE GOT?
IDENTIFYING VALUES THROUGH NARRATIVE
Your interest is your expertiseVoter fatigue and time as the criti cal resource
SOLUTION BASED TEAMS
Conversational roles and group dynamicsRefer to committ ee, delegati on, and
consultationCommunication plans
NAVIGATING CONVERSATION AUTHENTICALLY AT SCALE
Allowing users to push tags and defi ne the content with their own vocabulary
Users defi ning other users – role tags and popular privileges
Sinking the sins – Jezebel
PROMPT TO MERGE
When the tap runs dryLeveraging the user to identify contentStati stical tools for suggestion
ROBERT’S RULES OF ORDER:TIPS FOR CONTROLLING CONFLICT
Originally designed for scalable groups working in bad faith
Think of it as a menu, you don’t have to order everything
WHO OWNS THE DATA?HOW DO YOU DEFEND THE DATA?
WHAT’S THE BUSINESS PLAN, AND HOW DOES IT INFLUENCE ACCESS?
FINANCIAL INFORMATION
Paypal Address verifi cati onCredit cards and existing verification systemsStrategies in codeThe Washington State Voter Database
FINANCIAL INFORMATION AS
IDENTITY IN NEW YORK
Campaign Contributi ons
Not citi zens, but residents and taxpayers
No risk, it’s purely advisory
ONLINE OFFLINE INITIATIVES
People show up and can download a codeUsing devices onsite to upload data
PROBLEMS WITH SOVEREIGNTY AND ONLINE IDENTIFIERS
Someone owns the banksSomeone owns the serversSomeone owns your drivers licenseThe Internet is buggedYou and your MAC address
Machine generated
Physical artifact for peer authentication
Agnostic devicesDisposableEncrypted
THE SLEMKEY
No arti facts – decryptors and keys
Producing energy from the decryption
Flash paper encoding
DISPOSABLE IDENTIFIERS
Centralized servers mean centralized control
Prone to attack Civic
responsibility is rare
IS THE STATUS QUO IN SERVER ARCHITECTURE UNSUITABLE?
LightweightSecure protocols
or anonymityTechnical literacyThresholds for
citizen density
REQUIREMENTS
CONSEQUENCES
Do-acracyRisks for distributed systemsIneffective for long term planningThe Tyranny of Structurelessness
https://en.wikipedia.org/wiki/The_Tyranny_of_Structurelessness
Time is a resourceNonparticipation is like not paying
taxesCitizenship as a privilegePeer nationsThird party validation
CONSIDERATIONS
Stock market models
MUCHAS GRACIAS!
NCDD and ODDIJeff OrrGiacomo FerrariMarc SlemkoAndrew Gall (Peaches)Kati e VedderThe Insane Cloud Posse (DevOps Socrata)YOU!