background preloader

E-democracy

E-democracy
E-democracy (a combination of the words electronic and democracy) incorporates 21st-century information and communications technology to promote democracy. That means a form of government in which all adult citizens are presumed to be eligible to participate equally in the proposal, development, and creation of laws.[1] E-democracy encompasses social, economic and cultural conditions that enable the free and equal practice of political self-determination. History[edit] During the 20th century democratic participation was frequently restricted to a wealthy clique that was periodically selected via the election of delegates from political parties which had developed a manifesto. Virtual social networks matured at the beginning of the 21st century, enabling the emergence of flashmobs. Application[edit] E-democracy can be applied within the political processes of local communities, states/regions, nations and on the global stage Tools and types[edit] Practical issues[edit] Citizens' roles[edit]

Cyberdémocratie Un article de Wikipédia, l'encyclopédie libre. La cyberdémocratie (ou e-démocratie) consiste en l'utilisation d'Internet pour développer la démocratie, en se servant de sites web comme support des informations, des débats voire des processus de décisions démocratiques. La cyberdémocratie cherche à répondre à l'idéal démocratique dans lequel tous les citoyens seraient des participants égaux aux propositions, aux créations et à la mise en œuvre des lois. Origine du nom[modifier | modifier le code] La cyberdémocratie est une traduction littérale du terme américain Cyberdemocracy. En 1981, Ted Becker, homme politique américain, a créé le terme de Teledemocracy pour désigner l'utilisation des moyens modernes de communication dans le processus démocratique. On trouve aussi le terme de démocratie virtuelle. La démocratie électronique directe[modifier | modifier le code] La cyberdémocratie n'est appliquée nulle part dans le monde en totalité, cependant plusieurs initiatives prennent forme.

E-Authentication Electronic authentication, also referred to as e-authentication is the process of establishing confidence in user identities electronically presented to an information system. Authentication is a process closely related to identification. In online environments, the username identifies the user, while the password authenticates that the user is whom he claim to be. E-authentication presents a technical challenge when this process involves the remote authentication of individual people over a network, for the purpose of electronic government and commerce. Overview[edit] In the conceptual e-authentication model, a claimant in an authentication protocol is a subscriber to some Credential Service Provider (CSP). The role of tokens[edit] Something you know (for example, a password)Something you have (for example, an ID badge or a cryptographic key)Something you are (for example, a voice print or other biometric) Electronic credentials[edit] Verifiers[edit] e-Authentication in government[edit]

The role of civil society in decentralisation and alleviating poverty: an exploratory case study from Tanzania In many developing countries decentralisation efforts have been planned and implemented as a means to improve service delivery to all citizens, to increase citizen participation, and to improve good governance at the sub-national level. However, until recently, poverty reduction has not been a central feature of decentralisation measures until recently. Donors have begun to realise the importance and value of non-state actors in improving the effectiveness of the state in this area. This paper examines the relations between the concepts of decentralisation, poverty alleviation and civil society, and recent policy developments in the context of Tanzania. The paper notes the following: Tanzania has a five level governance system including village, ward, district, region and central levels.

E-Democracy.org Online identity Internet identity, or internet persona is a social identity that an Internet user establishes in online communities and websites. It can also be considered as an actively constructed presentation of oneself. Although some people prefer to use their real names online, some Internet users prefer to be anonymous, identifying themselves by means of pseudonyms, which reveal varying amounts of personally identifiable information. An online identity may even be determined by a user's relationship to a certain social group they are a part of online. Some can even be deceptive about their identity. The concept of the self, and how this is influenced by emerging technologies, are a subject of research in fields such as psychology and sociology. Online social identity[edit] Identity expression and identity exposure[edit] The disclosure of a person's identity may present a certain number of issues[2] related to privacy and the undesired disclosure of personal information. Blended identity[edit]

Can hyperlocal social networks help a municipality to provide better services? by Olena Ursu I first met Oleg Levchenko, executive director of the civil society organization, Podillya Agency for Regional Development, during aconference on smart cities, organized by UNDP in Ukraine the municipality of Vinnytsya last year. The challenge: I was impressed by Oleg’s passion and commitment, and that’s also when I first heard his concerns about citizens who were very ready to complain about their problems and who expected these problems to be solved by the authorities. He called for a new approach to change the nature of citizen engagement in local decision-making – he wants citizens to help come up with solutions to community problems, and for them to help carry out the solutions too. Oleg Levchenko presents e-governance and e-democracy tools aimed at improving municipal governance in Vinnytsya (in Ukrainian) The idea is to have a hyperlocal social network for Vinnystya, where citizens and local authorities can discuss and share their ideas for a better city.

eJournal of eDemocracy and Open Government Интернет голосования, концепт защиты от накруток Сразу скажу, что весь топик носит характер концепта, потому что с этой темой я столкнулся с другой стороны баррикад и идеи пока в коде не реализованы. Итак, вам понадобилось провести интернет-голосование «Мисс Карбина-телеком, Нижний Укропольск — 2012». Первое, с чем вы наверняка столкнетесь — это накрутки со стороны конкурсантов, если кого-то вы действительно смогли заинтересовать своим конкурсом, а если быть совсем уж честными, то его призами. Для начала нужно правильно сформулировать цель защиты — «сделать максимально жесткую привязку голоса в счетчике к реальному человеку». Самое красивое и технически на данный момент сложно обходимое решение — это привязка голоса к сотовому телефону. Только вот не всем нравится слово «дорого». Сразу скажу, что все остальные технические средства защиты не дают 100% гарантии защиты и реально обходимы. Способ № 1: привязка голоса к ip-адресу. Преимущества: + С одного ip адреса больше одного раза действительно не проголосуешь. Недостатки: В сухом остатке.

e Democracy Suite • e Gov software Features: On-Line Campaigns On-Line Petitions On-Line Consultations and analysis Committee Meetings and Minutes e-Alerts SMS Text Alerts Officer Profiles/web sites/microsites Blogs e-Democracy web sites Community Pledges Election results - election scoreboards and statistics Social networks - Twitter, Facebook etc These applications can be used independently or all together and can be purchased or used when required as a ASP.NET service provided in conjunction with the Local Government Association. Benefits: A true e-democracy package covering every aspect that is well thought out, easy to implement and use all at an affordable price. e Democracy components: Extended your democratic mandate! Components can be integrated with your CMS or set as stand alone web applications. Web Labs User Groups Customers who use Web Labs technologies have joined together in user groups around the U.K. Do you want more technology to do more for you? Web Labs Service Desk Plus

Obama to hand Commerce Dept. authority over cybersecurity ID | Privacy Inc. STANFORD, Calif.--President Obama is planning to hand the U.S. Commerce Department authority over a forthcoming cybersecurity effort to create an Internet ID for Americans, a White House official said here today. It's "the absolute perfect spot in the U.S. government" to centralize efforts toward creating an "identity ecosystem" for the Internet, White House Cybersecurity Coordinator Howard Schmidt said. That news, first reported by CNET, effectively pushes the department to the forefront of the issue, beating out other potential candidates, including the National Security Agency and the Department of Homeland Security. The move also is likely to please privacy and civil-liberties groups that have raised concerns in the past over the dual roles of police and intelligence agencies. The announcement came at an event today at the Stanford Institute for Economic Policy Research, where U.S. "We are not talking about a national ID card," Locke said at the Stanford event.

GroupServer Open Source Platform: E-Democracy.org E-Democracy uses open source software to the greatest extent possible. We seek to connect most people in a local community possible across their technology preferences, generations, etc. into a unified online community space. We seek to connect people who do not yet know each other in public and community life (unlike Facebook which best connects you to people you already know, trust, and are most like you). At the neighborhood in particular, there is a natural monopoly with people flocking to the online space with the most people/activity - so without a multi-technology approach, large parts of the community will be excluded if you are only on Facebook, just email, or just desktops. The GroupServer platform allows us to reach people via email (still the most used daily online tool), via daily email digest with web reading, web reading only, and web feed. Current Priority - Provide Re-Design Feedback Current Resources For More Information Contact the E-Democracy Tech Team.

White House drafting plan for cyberspace safety | Politics and Law The White House is hoping to come up with a comprehensive strategy to better protect people in cyberspace and is asking the public for help. Releasing a draft of the potential new National Strategy for Trusted Identities in Cyberspace (PDF) last Friday, the government is aiming to set up a system that would let people voluntarily create trusted identities to use in online transactions. The goal, as described in a blog post by White House cybersecurity chief Howard Schmidt , is to secure and protect transactions in cyberspace through use of a special ID--a smart card or digital certificate--that would prove that people are who they say they are. These digital IDs would be offered to consumers by online vendors for financial transactions. Looking for suggestions from the public, the U.S. Department of Homeland Security has launched a Web site to elicit ideas and feedback on the NSTIC. In discussing the NSTIC's digital-ID initiative, Schmidt outlined a number of specific benefits.

LiquidFeedback - more than Liquid Democracy Why Obama’s National Internet ID Solution is a Really, REALLY Bad Idea Join in on the Facebook Discussion on this topic. When it comes to the Internet, the US government usually doesn’t have a clue. That seems to be the case with the recent announcement of the Obama Administration’s plans to develop an internet identity system that officials claim will reduce fraud and identity theft while streamlining online transactions. Cut to the chase: the National Strategy for Trusted Identities in Cyberspace (NSTIC) is a bad idea. On the surface having something that will increase online transactions and reduce identity theft makes (some) sense. This step is not a prudent one. How Do You Spell Disaster? A skeleton key is “a key or similar object capable of opening any lock regardless of make or type.” This should terrify the tech-savvy crowd. Having a single-point of entry into many websites is already available in several forms, most prominently through Facebook. Stay Out of My Interwebbing Activities Exactly. A False Sense of Security They will trust it too much.

Related: