You are not logged in. LOG IN NOW >
WeGov

New Data Visualization of Poverty and Corruption in Colombia

BY Julia Wetherell | Friday, December 14 2012

A new data map compares poverty rates and World Bank aid with the Colombia Transparency Index in regions across the Latin American nation. Transparency International writes that the visual correlation between these factors brings issues of corruption to the fore. Read More

Philadelphia Opens Up Crime Incident Data

BY Sam Roudman | Wednesday, December 12 2012

Today the City of Philadelphia released crime incident data for all major crimes going back to 2006, and started mapping the last 30 days of crime data on the city’s portal. The release puts the city in line with similar programs in Chicago and Baltimore. Read More

WeGov

Dashboard Government: The Politics of Measurement

BY David Eaves | Wednesday, November 28 2012

The other week I was informed that the city of Edmonton, Alberta, published an online dashboard of various metrics that it hopes will both educate residents about the city's services. As more and more of what governments do — from running buses to fixing potholes to processing paper — is managed by computers, there is an ever-increasing capacity to measure, and make public, the results of any given activity. The opportunity to create more accountable systems and governments is real. If we are going to end up with government dashboards all over the place — and frankly, I hope we do — dashboard-makers had better do a bunch of things right. Read More

WeGov

Pakistan Considering Bill that Would Ban Independent Mapping Projects

BY Nighat Dad | Wednesday, November 28 2012

The government of Pakistan is about to propose a law that would make it illegal for independent bodies to engage in mapping. The Land Surveying and Mapping Bill 2012, proposed by the Ministry of Defence (MoD), transfers all mapping authority in Pakistan to Survey of Pakistan (SoP), which reports to the MoD and takes its orders from General Head Quarters (GHQ). Read More

WeGov

Montreal Hackathon Aims to Combat Government Corruption

BY Elisabeth Fraser | Monday, November 12 2012

Hackons la Corruption (credit: QuebecOuvert)

Canada's first anti-corruption hackathon was held this past weekend in Montreal, which has been rocked by nearly two years of corruption scandals involving construction kickbacks, organized crime and prominent politicians. Read More

WeGov

EU Initiative Will Map Cyber Repression Around the World

BY Lisa Goldman | Thursday, November 8 2012

The EU is about to launch "a global monitoring system that will help chart digital repression by mapping the Internet’s "cyber geography" in near real time," reports Slate. Read More

WeGov

After a Shaky Start, Slovakia's Open Gov't Portal Succeeds With Help from Open Contracts

BY Lisa Goldman | Thursday, November 8 2012

Earlier this year the government of Slovakia launched a portal that was supposed to make all public contracts and invoices available online. But as Sunlight Foundation International Fellow Matej Kurian recounts, there were serious problems from the outset: The site "...was half-baked, missing full-text search, documents preview or space for comments. While the policy produced more data (“transparency,” if you will), it left accountability untouched." Read More

WeGov

Crisis Tracker: An Open Source Map that Curates Crowdsourced Information

BY Lisa Goldman | Thursday, November 1 2012

An open source map mines data from Twitter, curates it and presents it with an Ushahidi-like interface. Read More

WeGov

Open Source Interactive Map Curates Crowdsourced Information

BY Lisa Goldman | Thursday, November 1 2012

An open source map called CrisisTracker mines Twitter for reports, clusters them, and supports curation of report clusters with the help of volunteers. Read More

WeGov

Inexpensive Smart Phones Vulnerable to Cyber Attacks

BY Lisa Goldman | Wednesday, October 31 2012

Image from the Mozilla blog

While the release of low cost smartphones is a welcome development, their rapid proliferation could come at the cost of presenting an opportunity for malicious hackers. Read More