Feeds

Boundaries Commission slammed over mega map dump

FIVE HUNDRED PDFs 'optimise clarity', say bureaucrats

Top three mobile application threats

The Boundary Commission for England (BCE) has defended its decision to release more than 500 PDF maps of proposed Parliamentary constituencies, stating that they believe they provided "an appropriate level of detail".

On 13 September the BCE launched a 12-week consultation on the layout of new constituency boundaries and published nine regional maps and 500 constituency PDFs for the public to access online. The PDFs were created by Ordnance Survey.

The decision was criticised by data journalists at the Guardian and the Daily Telegraph for lack of transparency, after the BCE did not provide a more user-friendly single UK map of the new constituency boundaries.

Alasdair Rae, an academic from the University of Sheffield, subsequently created the map from existing information available on the 8,000 electoral wards.

The BCE's decision to use PDFs was criticised by Chris Taggart, the developer of citizen projects OpenlyLocal and OpenCorporates, who told GGC that publishing in PDF was of no use to people who wanted to manipulate data.

"The problem is that organisations like the Boundary Commission decide you can only have this information in a way that you can look at, but can't do anything with," he said, adding that it undermines the commission's role to make sure information "is widely disseminated and easily reused."

A spokeswoman for the BCE told GGC: "The role of the BCE is to make recommendations for new constituency boundaries across the country. In presenting initial proposals, our overriding concern is to optimise transparency and clarity.

"We are looking to support people's involvement in the consultation, so producing regional and constituency maps ensures that an appropriate level of detail is made available to all. We hope that will result in as comprehensive a consultation process as possible."

This article was originally published at Guardian Government Computing.

Guardian Government Computing is a business division of Guardian Professional, and covers the latest news and analysis of public sector technology. For updates on public sector IT, join the Government Computing Network here.

3 Big data security analytics techniques

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Banks slap Olympus with £160 MEEELLION lawsuit
Scandal hit camera maker just can't shake off its past
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.