SlideShare a Scribd company logo
(1) Public Accountability for Public Decisions made Privately Pattern in PLML
Form

Pattern ID:         1 Sociotechnical-JCT

Pattern Name:       Public Accountability for Public Decisions made Privately

Problem:            Secret ballots pose a problem. How can we be sure that the
                    recording, tallying, and reporting of the individual votes is
                    accurate? If a person who tallies the votes, for instance, has an
                    interest in the outcome of the voting, they may make an
                    unconscious error or deliberately misrepresent the vote. If the
                    voting process is not seen by the electorate as a fair and honest
                    process for change, violent action becomes a more likely
                    alternative. .

Context:            Some public decisions such as voting, if done completely
                    publicly, would subject each individual decision maker to
                    various kinds of pressure and intimidation, especially by those
                    already in power. For this reason, voting is often done by
                    secret ballot.

Forces:             * Open public voting allows intimidation by those in power.
                    * Completely secret voting allows misrepresentation of results.
                    * People with opposed interests in the outcome but a common
                    interest in what is preserved by an honest process may keep
                    each other honest.
                    * A physical process of recording, tallying, and reporting can,
                    in principle, be understood and observed by the vast majority of
                    the electorate.
                    * To be an effective alternative for change to violent
                    revolution, a voting process must have credibility with the
                    majority of the electorate.
                    * A process which is observable and understandable, and
                    balances opposing interests, has credibility even among those
                    who do not actually observe.

Solution:           Any process that touches private voting; e.g., deciding who is
                    allowed to vote, designing ballots, recording of votes, tallying
                    votes, and reporting on results must be observable and
                    understandable by the majority of the electorate. In addition,
                    the design of the process, its implementation and any remedies
                    for mistakes must be controlled by a balance of opposing
                    interests.

Synopsis:

Evidence:           Thousands of experiences of voting processes that work.




                                        1
Example:            (1)    Positive: Paper ballots with joint tallying by
                    representative of opposing political parties.
                    (2)    Negative: Electronic voting machines with proprietary
                    software unavailable and not understandable by the vast
                    majority of the electorate.

Rationale:          Power corrupts. People in power will tend to use various
                    means to keep that power and to use it for their own ends. If
                    there is no way to recall representatives or change things in
                    peaceful ways, people who feel perpetually exploited may
                    result to violent means.

Confidence:`

Literature:         http://www.commondreams.org/headlines03/1013-01.htm
                    Schwartz, John, Report Finds Risks in Internet Voting by
                    Americans Overseas. New York Times, January 22, 2004.

Related Patterns:   This pattern is a part of a growing socio-technical pattern
                    language at:
                    http://www.truthtable.com/websitewelcome_page_index.html

                    and will also be submitted to the CPSR Public Sphere Project at
                    http://www.cpsr.org/program/sphere/patterns

                    Registered Anonymity
                    Random Testing for Compliance Assurance
                    Who Speaks for Wolf? (Ensuring Stakeholder Coverage)
                    Multi-part Keys for Security Assurance
                    Verifiable Electronic Voting
                    Balance of Interests to Insure Fairness



Author:             John C Thomas

Creation Date:      21st January 2004

Revision Number:    2

Last Modified:      23rd January 2004




                                        2

More Related Content

DOC
The year was 1967
DOC
JSAI paper on Collaborative Innovation Tools
PPT
Understanding and harnessing conflict1
DOC
Walking People analysis
DOC
Position paper for ecscw 2007 workshop
PPTX
9. grizma tal morda
PPT
Supporting social roles and diversity
PDF
A Perfect Storm: Ubiquity and Social Science
The year was 1967
JSAI paper on Collaborative Innovation Tools
Understanding and harnessing conflict1
Walking People analysis
Position paper for ecscw 2007 workshop
9. grizma tal morda
Supporting social roles and diversity
A Perfect Storm: Ubiquity and Social Science

Similar to Public accountability pattern in plml format (20)

PDF
PPT
Ε-Democracy as Humanistic Communication
PDF
Counter to intent: Voters' mental models of alternative counting methods
PDF
National Civic Summit - Lorraine C. Minnite
PDF
Usability and security in future voting systems
PDF
A review of the underlying concepts of electronic voting
PDF
11.a review of the underlying concepts of electronic voting
DOCX
Prepare Prior to completing this discussion question, review Chapte.docx
PDF
PREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGY
PDF
Electoral System in 2025: Diagnosis and Change Principles
PDF
Design and Critique for Challenging Problems
PPT
The Citizens Assembly Potential
PDF
Challenges of free and fair elections towards 2011 general elections
PDF
Reventing How America Votes Through Open Source Solutions - Gregory Miller OS...
PDF
Collective Decision Making Systems: From the Ideal State to Human Eudaimonia
PDF
The GOP dirty games of voter suppression.
DOCX
.Prepare Prior to completing this discussion question, review.docx
ODP
Chapter 7 section 2
DOCX
Madlena pavlova security_in__digital_voting_system
PPTX
Electoral systems and democratisation - Prof Sarah Birch
Ε-Democracy as Humanistic Communication
Counter to intent: Voters' mental models of alternative counting methods
National Civic Summit - Lorraine C. Minnite
Usability and security in future voting systems
A review of the underlying concepts of electronic voting
11.a review of the underlying concepts of electronic voting
Prepare Prior to completing this discussion question, review Chapte.docx
PREVENTION OF VOTER FRAUD USING BLOCKCHAIN TECHNOLOGY
Electoral System in 2025: Diagnosis and Change Principles
Design and Critique for Challenging Problems
The Citizens Assembly Potential
Challenges of free and fair elections towards 2011 general elections
Reventing How America Votes Through Open Source Solutions - Gregory Miller OS...
Collective Decision Making Systems: From the Ideal State to Human Eudaimonia
The GOP dirty games of voter suppression.
.Prepare Prior to completing this discussion question, review.docx
Chapter 7 section 2
Madlena pavlova security_in__digital_voting_system
Electoral systems and democratisation - Prof Sarah Birch
Ad

More from John Thomas (20)

PDF
Ppdd copy
PDF
Slideshowfor nw jct
PDF
Design rationale for turing's nightmares
PDF
Sigchi extended abstractsjct
PDF
PPT
Social computing jct
DOC
Business process re-engineering comes to baseball
DOC
HCII 2005 paper
DOC
Stories in HCI
DOC
A collaboration is a collaboration is a collaboration1
DOC
Ecscw 2007 workshop position paper on handovers
DOC
Narrative methods as supplement to field experience
DOC
Sensemaking position paper for chi 2005 workshop
RTF
Chi 2001 workshop proposal on narrative techniques
DOC
Note on Tool to Measure Complexity
DOC
Chi2006 workshop paper on trust
PPT
Motivation and incentives
PPT
Human computer interaction research at ibm t
PPT
Panel: User Centered Design for International Development
PPT
Meta design and social creativity
Ppdd copy
Slideshowfor nw jct
Design rationale for turing's nightmares
Sigchi extended abstractsjct
Social computing jct
Business process re-engineering comes to baseball
HCII 2005 paper
Stories in HCI
A collaboration is a collaboration is a collaboration1
Ecscw 2007 workshop position paper on handovers
Narrative methods as supplement to field experience
Sensemaking position paper for chi 2005 workshop
Chi 2001 workshop proposal on narrative techniques
Note on Tool to Measure Complexity
Chi2006 workshop paper on trust
Motivation and incentives
Human computer interaction research at ibm t
Panel: User Centered Design for International Development
Meta design and social creativity
Ad

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PPTX
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
PPT
Teaching material agriculture food technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
A Presentation on Artificial Intelligence
PPTX
Cloud computing and distributed systems.
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
Machine Learning_overview_presentation.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Spectral efficient network and resource selection model in 5G networks
Advanced methodologies resolving dimensionality complications for autism neur...
sap open course for s4hana steps from ECC to s4
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
ACSFv1EN-58255 AWS Academy Cloud Security Foundations.pptx
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Assigned Numbers - 2025 - Bluetooth® Document
Programs and apps: productivity, graphics, security and other tools
Per capita expenditure prediction using model stacking based on satellite ima...
Digital-Transformation-Roadmap-for-Companies.pptx
A Presentation on Artificial Intelligence
Cloud computing and distributed systems.
Encapsulation_ Review paper, used for researhc scholars
Machine Learning_overview_presentation.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Electronic commerce courselecture one. Pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
Spectral efficient network and resource selection model in 5G networks

Public accountability pattern in plml format

  • 1. (1) Public Accountability for Public Decisions made Privately Pattern in PLML Form Pattern ID: 1 Sociotechnical-JCT Pattern Name: Public Accountability for Public Decisions made Privately Problem: Secret ballots pose a problem. How can we be sure that the recording, tallying, and reporting of the individual votes is accurate? If a person who tallies the votes, for instance, has an interest in the outcome of the voting, they may make an unconscious error or deliberately misrepresent the vote. If the voting process is not seen by the electorate as a fair and honest process for change, violent action becomes a more likely alternative. . Context: Some public decisions such as voting, if done completely publicly, would subject each individual decision maker to various kinds of pressure and intimidation, especially by those already in power. For this reason, voting is often done by secret ballot. Forces: * Open public voting allows intimidation by those in power. * Completely secret voting allows misrepresentation of results. * People with opposed interests in the outcome but a common interest in what is preserved by an honest process may keep each other honest. * A physical process of recording, tallying, and reporting can, in principle, be understood and observed by the vast majority of the electorate. * To be an effective alternative for change to violent revolution, a voting process must have credibility with the majority of the electorate. * A process which is observable and understandable, and balances opposing interests, has credibility even among those who do not actually observe. Solution: Any process that touches private voting; e.g., deciding who is allowed to vote, designing ballots, recording of votes, tallying votes, and reporting on results must be observable and understandable by the majority of the electorate. In addition, the design of the process, its implementation and any remedies for mistakes must be controlled by a balance of opposing interests. Synopsis: Evidence: Thousands of experiences of voting processes that work. 1
  • 2. Example: (1) Positive: Paper ballots with joint tallying by representative of opposing political parties. (2) Negative: Electronic voting machines with proprietary software unavailable and not understandable by the vast majority of the electorate. Rationale: Power corrupts. People in power will tend to use various means to keep that power and to use it for their own ends. If there is no way to recall representatives or change things in peaceful ways, people who feel perpetually exploited may result to violent means. Confidence:` Literature: http://www.commondreams.org/headlines03/1013-01.htm Schwartz, John, Report Finds Risks in Internet Voting by Americans Overseas. New York Times, January 22, 2004. Related Patterns: This pattern is a part of a growing socio-technical pattern language at: http://www.truthtable.com/websitewelcome_page_index.html and will also be submitted to the CPSR Public Sphere Project at http://www.cpsr.org/program/sphere/patterns Registered Anonymity Random Testing for Compliance Assurance Who Speaks for Wolf? (Ensuring Stakeholder Coverage) Multi-part Keys for Security Assurance Verifiable Electronic Voting Balance of Interests to Insure Fairness Author: John C Thomas Creation Date: 21st January 2004 Revision Number: 2 Last Modified: 23rd January 2004 2