SCRAPING THE SOCIAL GRAPH CRISIS MONITORING WITH SOCIAL MEDIA Georgetown University email@example.com @jongos
About Ushahidi Notable Uses The ChallengeUshahidi is a free, open-source Ushahidi has been deployed in As the amounts of dataplatform used for crowdsourcing major global crisis scenarios, aggregated by Ushahidi usersand visualizing data geospatially. allowing organizations to draw grows, they face a commonIt was born out of the 2008 situational awareness from the problem. How do they effectivelyelection unrest when founders crowd. To date it’s been manage this realtime data? HowJuliana Rotich, Erik Hersman, Ory downloaded over 15,000 times. can we help them discoverOkolloh and David Kobia wanted credible and actionable info fromto allow Kenyan citizens a way to S o m e o f t h e m o re n o t a b l e the deluge of reports they’ll getSMS reports of incident to know deployments include recently in from the public? The SwiftRiverwhat was occurring around them. Egypt, the Haiti earthquakes, the initiative was created to begin toThis was one of the earliest uses ﬁres in Russia, the Queensland answer some of these questionsof crowdsourcing for crisis ﬂoods in Australia. for Ushahidi deployers.response.
“It’s not information overload. It’s ﬁlter failure.” - Clay Shirky
PLATFORM GOALSConsider the context, relevance defined by the userOffer an opt-in global database of trust and authorityAlgorithms augment, but not define, human decision makingWork across media channels (Twitter, Email, Feeds, SMS)Be accessible (offline/online/mobile)Index massive amounts of the mobile/social web
KNC AWARD & RIVER IDfinal component of the veracity algorithmneeds to be able to scale massivelychanging the backend (Hadoop & Mongo DB)research by data scientistsuse-cases at scale and iterative improvements
NETWORK DYNAMICSGood crowdsourcing campaigns build upon the existing tiesbetween people and their networks. There’s a natural mult-iplier, where the people in the original network becomenodes for new networks and so on.
EARNING TRUST❖ Participation is permission❖ Consent is not carte blanche❖ Clarity is critical❖ Trust is Earned or Burned❖ Transparency is hard to teach
PRIVACY❖ Protection of data is different than theprotection of people/identity❖ Standards like HTTPS or SSL❖ Encryption❖ Anonymity is not a given (TOR Project)❖ The usual fail-points are still threats (weakpasswords, compromised servers, carelessemployees)
VALIDATION ❖ Verify factual occurrences (location, time, date) ❖ Verify contributor identity (who?) ❖ Verify contributor credentialsEverything beyond these three points is an educatedguess. Anyone looking to game the campaign will onlybe affective if they are able to compromise theaforementioned.
MOTIVATION❖ Ease of participation❖ Low risk of failure or shame❖ Social Capital❖ Repute & Accolade❖ Barter❖ Strategic Spending ($)❖ Data Sharing❖ Altruism & Charity