Anonymity, Immediacy and Electoral Delegation in Socio-Technical Networked Computer Systems
نویسنده
چکیده
Political decision-making is a key concern for any social group; the clarity, effectiveness and participatory characteristics of the process are central to democratic societies. Networked computer systems in general and the increasing attention to social aspects in their purpose and design offer novel means for participation to the individual, but also entail specific systemic problems. These can be either variations of existing general sociological and political issues, or arising also from the system's specific technical design and structure. This talk shall provide an overview of IT systems for collective dynamic decision-making and their peculiarities, focusing on the three core interacting aspects: anonymity, immediacy and electoral delegation. While the idea of delegated voting dates back to the 19th century, today's net-worked computer technology enables its realization without logistic restrictions, thus increasingly blurring the concepts of direct, participatory democracy and indirect, representative democracy, as well as implicit and explicit voting. An important aspect for the dynamic bottom-up formation of efficient hierarchical structures is the combination of meritocratic characteristics and immediacy of the delegation , i.e., the amount of time between granting and withdrawing deciding votes both for the agenda setting and the actual decision-making, which allows for the fine-grained transition between participatory and representative modes. In current socially aware systems, the role of anonymity and/or pseudonymity is highly controversial. Traditionally, electoral anonymity implies freedom from persecution and freedom of speech while legitimization is taken care of by an external authority which is cut out from the decision-making process as such. However, in engineered networked systems that explicitly involve social structure, also the authorization or legitimization becomes critical as it is a part of or at least directly connected to the system itself, causing potential for misuse both internally and externally – a dilemma that needs to be resolved in order to establish the necessary level of acceptance with regards to the perception and use of such systems and the credibility of the obtained results. Starting from these considerations, by discussing examples of recently deployed systems from the German political landscape, community management and organizational sector, this talk intends to contribute to the interdisciplinary understanding of crucial aspects in how socio-technical networked computer systems and their users interact with each other.
منابع مشابه
Designinga Neuro-Sliding Mode Controller for Networked Control Systems with Packet Dropout
This paper addresses control design in networked control system by considering stochastic packet dropouts in the forward path of the control loop. The packet dropouts are modelled by mutually independent stochastic variables satisfying Bernoulli binary distribution. A sliding mode controller is utilized to overcome the adverse influences of stochastic packet dropouts in networked control system...
متن کاملDesigning Secure Socio-Technical Systems with STS-ml
A Socio-Technical System (STS) is an interplay of humans, organizations and technical systems. STSs consist of interacting actors, which depend on one another to achieve their objectives. In previous work, we have proposed STS-ml, a security requirements modelling language (using i*-like primitives such as actor, goal, delegation) for the design of secure STSs. STS-ml represents security requir...
متن کاملLearners’ Engagement in Meaning Negotiation and Classroom Interaction as a Function of Their Perceptions of Teachers’ Instructional Communicative Behaviors
A significant share of classroom interaction occurs between teachers and language learners. Therefore, the individual characteristics of teachers could play facilitative or impeding roles thus encouraging or discouraging learners from getting engaged in interaction and meaning negotiation attempts when interacting with their teachers. Surprisingly however, this area has attracted scant attentio...
متن کاملDefining “Anonymity” in Networked Communication
Joan Feigenbaum Technical Report YALEU/DCS/TR-‐1448 December 2011 Support for anonymous communication in hostile environments is the main goal of DARPA’s “Safer Warfighter Communications” program (DARPA-‐BAA-‐10-‐69: SAFER). Despite the fact that the word is regularly encountered in common parlance, “anonymity” is actually a subtle concept – one that the computer-‐science community has ...
متن کاملModelling and Compensation of uncertain time-delays in networked control systems with plant uncertainty using an Improved RMPC Method
Control systems with digital communication between sensors, controllers and actuators are called as Networked Control Systems (NCSs). In general, NCSs encounter with some problems such as packet dropouts and network induced delays. When plant uncertainty is added to the aforementioned problems, the design of the robust controller that is able to guarantee the stability, becomes more complex. In...
متن کامل