Your SlideShare is downloading. ×
15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response
15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response
15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response
15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response
15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response
15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response
15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response
15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response
15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response
15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response
15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response
15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response
15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

15a humanitarianism in_the_cyberwarfare_age_the_principled_and_secure_use_of_information_in_humanitarian_response

375

Published on

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
375
On Slideshare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
4
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. Humanitarianism in the Network Cyber- warfare Age Policy Analysis and Innovation
  • 2. Humanitarianism in the Network Age www.unocha.org/hina  Recommendation 4 - Develop robust ethical guidelines around the use of information  “do no harm” standards for the ethical use of new forms of data, including protocols for protecting privacy and guaranteeing informants’ safety, and ensuring that these clearly addressed the separate issues of liability, privacy and security. Introduction
  • 3. The transition to the Network Age  off-line tools -> cloud services  not enough data -> detailed personal information  limited sharing -> open data exchanges  quickly outdated -> real-time data and two- way communication  Just humanitarian orgs–> private companies, volunteer and technical communities, governments Introduction
  • 4. Types of sensitive information Personally identifiable information (PII) Community identifiable Information (CII) Meta-data and secondary data that help identify the first two Introduction
  • 5. Legal considerations  More privacy laws  Liability and legal issues complex and getting worse  Need waivers for disasters and crisis  Agreements with private companies – and their users Legal issues
  • 6. Ethics of information in a crisis  Informed consent – what is meaningful in a crisis, particularly when linked to aid?  Responsibility of the humanitarian organization to ensure that information is handled responsibly  Think through the implications of technology – when it works and when it doesn’t Ethical issues
  • 7. Data Protection Guidelines 1. Collected in a legal manner for a legitimate purpose. 2. Don’t collect what you don’t need 3. Risk assessment 4. Informed consent 5. Accurate and up-to-date. 6. Secured to prevent unintended uses. 7. Data that is no longer needed should be destroyed. 8. Accountability – access, request and removal processes 9. Avoid duplication of information collection efforts Ethical issues
  • 8. Operational mechanisms Responsible project design Privacy Impact Assessments Ethical review boards Responsible sharing Information classification Anonymization and aggregation 1. . Ethical issues
  • 9. The age of cyber-warfare Humanitarian information will be a tempting target, so will our social capitol and trust Spyware and other tools are cheap and easy to use Armed and political groups will have organized cyberwarfare wings Security issues
  • 10. The threats  Targets:  Humanitarian organizations  Communities or ethnic groups  Crime and fraud - $$$$$$  Types of attacks:  Nuisance and protest  Data-theft and monitoring  Social attacks  Physical infrastructure disruptions  Government surveillance, filtering and censorship:  ??? Security issues
  • 11. Data security Only protect what needs protecting  Basic hygiene  Cybersecurity assessments  Work with experts where needed Humanitarian “cyber”-space Openness and transparency Dialogue with cyber-groups Avoid over-securitization Security issues
  • 12. Recommendations  Advocate for legal frameworks for sharing data in emergencies  Strengthen codes of conduct and operational procedures for the ethical use of information  Invest in risk analysis and information security  Support ethical innovation  Prioritize open data and transparency Conclusions
  • 13.  Thank you!  Credit also to Leith Baker, mFieldwork (mfieldwork.com) Conclusions

×