Defending Open Data

نویسنده

  • Tom Lee
چکیده

This spring the US Congress proposed devastating cuts to the e-Government Fund, an essential source of support for data.gov, usaspending.gov and a variety of other vital resources in the US Gov 2.0/Open Data space. Sunlight was at the front lines of the fight to stop those cuts. In the process we learned important lessons about how the crisis arose, how it could be stopped, and what it means for the future of our movement. This presentation will attempt to prepare open data activists to face these challenges in other governmental contexts.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Defending and Challenging Interpretations of the past - the Role of Argument in School History

The Open University's repository of research publications and other research outputs Defending and challenging interpretations of the past: The role of argument in school history Journal Article How to cite: Coffin, Caroline (2000). Defending and challenging interpretations of the past: The role of argument in school history. Revista Canaria de Estudios Ingleses, 40 pp. 135–153. Copyright and M...

متن کامل

A Framework for Modeling the Cellular Defending Mechanisms Against Genome Stress Under Radiotherapy

© 2013 Qi et al., licensee InTech. This is an open access chapter distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/3.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited. A Framework for Modeling the Cellular Defending Mechanisms Against Genome Stress Under Ra...

متن کامل

Defending Critical Infrastructure

We apply new bilevel and trilevel optimization models to make critical infrastructure more resilient against terrorist attacks. Each model features an intelligent attacker (terrorists) and a defender (us), information transparency, and sequential actions by attacker and defender. We illustrate with examples of the US Strategic Petroleum Reserve, the US Border Patrol at Yuma, Arizona, and an ele...

متن کامل

Defending against Web Vulnerabilities and Cross-site Scripting

Researchers have devised multiple solutions to cross-site scripting, but vulnerabilities persists in many Web applications due to developer‟s lack of expertise in the problem identification and their unfamiliarity with the current mechanisms. As proclaimed by the experts, cross-site scripting is among the serious and widespread threats in Web applications these days more than buffer overflows. ...

متن کامل

COVER SHEET Holford , John W . and Caelli , William J and Rhodes , Anthony W . ( 2003 ) The Concept of Self - Defending Objects in the Development of Security Aware

This paper presents a proposed extension to the object oriented paradigm, whereby software objects are not only responsible for the encapsulation of data, but are also aware of the sensitivity of that data. Those software objects which encapsulate sensitive information will actively defend both their sensitive data and their functionality. These self-defending objects use object level role base...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2011