Securization of policy making social computing. An application to e-cognocracy

  • Authors:
  • José María Moreno-Jiménez;Joan Josep Piles;José Ruiz;José Luis Salazar;Alberto Turón

  • Affiliations:
  • Grupo Decisión Multicriterio Zaragoza, Universidad de Zaragoza, Gran Vía no. 2, 50005 Zaragoza, Spain;Grupo de Tecnología de las Comunicaciones, Universidad de Zaragoza, María de Luna no. 1, 50018 Zaragoza, Spain;Grupo de Tecnología de las Comunicaciones, Universidad de Zaragoza, María de Luna no. 1, 50018 Zaragoza, Spain;Grupo de Tecnología de las Comunicaciones, Universidad de Zaragoza, María de Luna no. 1, 50018 Zaragoza, Spain;Grupo Decisión Multicriterio Zaragoza, Universidad de Zaragoza, Gran Vía no. 2, 50005 Zaragoza, Spain

  • Venue:
  • Computers in Human Behavior
  • Year:
  • 2011

Quantified Score

Hi-index 0.00

Visualization

Abstract

Policy making social computing conform a set of social software tools that deal with the e-participation of citizens in policy making, that is to say, with the conjoint (representatives and citizens) design and selection through the internet of public policies. E-cognocracy is a cognitive democracy oriented to the extraction and sharing of knowledge associated with the scientific resolution of public decision making problems related with the governance of society. This model of democracy takes advantage of the potential of the Knowledge Society with the incorporation of the knowledge and the preferences of the actors involved in the decision making process. This uses different rounds in order to incorporate the preferences through an e-voting module and the arguments that support the individual positions through e-discussion. Considering e-cognocracy as the democracy model that supports interaction between citizens and their representatives in the construction of a better world, this paper presents a new proposal for the technological securization of the e-voting (prioritization) and e-discussion stages of e-cognocracy. This new suggestion, in which the electoral authority has been eliminated through the use of short linkable ring signatures, is a more simple and efficient system than our previous proposals.