View stunning SlideShares in full-screen with the new iOS app!Introducing SlideShare for AndroidExplore all your favorite topics in the SlideShare appGet the SlideShare app to Save for Later — even offline
View stunning SlideShares in full-screen with the new Android app!View stunning SlideShares in full-screen with the new iOS app!
UN GLOBAL PULSE: Product Harnessing innovation to protect the vulnerable Sara Farmer Chief Platform Architect, UN Global Pulse Executive Office of the Secretary-General United Nations Headquarters New York, NY
Global Pulse has a clear vision and an ambitious mission our vision Close the information gap between the onset of a crisis and the availability of actionable information for decision makers our mission Harness innovation to protect the vulnerable
Which stocks would you buy today… … if this were all you knew? Dow-Jones Index 2001-2008
The Information Gap When the global economic crisis hit in 2008, world leaders needed to know how the crisis was affecting vulnerable populations. That turned out to be a bit of a problem.
Household-level stats take months to collect, and years to validate!
The information gap is real… ? First data becomes available
Global Pulse will add new tools to traditional approach to transform vulnerability monitoring 1. Establish Baseline 2. Monitor baseline 3. Investigate anomalies 4. Respond Traditional indicators (Statistical vulnerability indicators) Proxy indicators (Non-traditional indicators of vulnerability) Active monitoring (ongoing door to door surveys) Passive monitoring (Real time observation of data streams) Physical verification (on site investigation via for eg. ad hoc household survey) Community/Network alert (Make community leaders sensitive to potential event) Response Baseline is established based on traditional and proxy indicators. This baseline may include a model of the risk terrain Baseline is monitored actively and passively for anomalies and changes Teams investigate anomalies to verify vulnerability events If vulnerabilities are identified then responses is mobilized and targeted If vulnerability corroborated Physical verification (on site investigation via for eg. ad hoc household survey) Traditional Approach New tools