Privacy, Security and Motivation of Crowds

1,190 views

Published on

Short talk on the ethics of security and privacy as it relates to Ushahidi deployments.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,190
On SlideShare
0
From Embeds
0
Number of Embeds
2
Actions
Shares
0
Downloads
9
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Privacy, Security and Motivation of Crowds

  1. 1. PRIVACY, SECURITY, MOTIVATION OF CROWDS Jon Gosier, Director SwiftRiver @jongos
  2. 2. About Ushahidi Notable Uses The ChallengeUshahidi is a free, open-source Ushahidi has been deployed in As the amounts of dataplatform used for crowdsourcing major global crisis scenarios, aggregated by Ushahidi usersand visualizing data geospatially. allowing organizations to draw grows, they face a commonIt was born out of the 2008 situational awareness from the problem. How do they effectivelyelection unrest when founders crowd. To date it’s been manage this realtime data? HowJuliana Rotich, Erik Hersman, Ory downloaded over 15,000 times. can we help them discoverOkolloh and David Kobia wanted credible and actionable info fromto allow Kenyan citizens a way to S o m e o f t h e m o re n o t a b l e the deluge of reports they’ll getSMS reports of incident to know deployments include recently in from the public? The SwiftRiverwhat was occurring around them. Egypt, the Haiti earthquakes, the initiative was created to begin toThis was one of the earliest uses fires in Russia, the Queensland answer some of these questionsof crowdsourcing for crisis floods in Australia. for Ushahidi deployers.response.
  3. 3. NETWORK DYNAMICSGood crowdsourcing campaigns build upon the existing tiesbetween people and their networks. There’s a natural mult-iplier, where the people in the original network becomenodes for new networks and so on.
  4. 4. EARNING TRUST❖ Participation is permission❖ Consent is not carte blanche❖ Clarity is critical❖ Trust is Earned or Burned❖ Transparency is hard to teach
  5. 5. PRIVACY❖ Protection of data is different than theprotection of people/identity❖ Standards like HTTPS or SSL❖ Encryption❖ Anonymity is not a given (TOR Project)❖ The usual fail-points are still threats (weakpasswords, compromised servers, carelessemployees)
  6. 6. VALIDATION ❖ Verify factual occurrences (location, time, date) ❖ Verify contributor identity (who?) ❖ Verify contributor credentialsEverything beyond these three points is an educatedguess. Anyone looking to game the campaign will onlybe affective if they are able to compromise theaforementioned.
  7. 7. MOTIVATION❖ Ease of participation❖ Low risk of failure or shame❖ Social Capital❖ Repute & Accolade❖ Barter❖ Strategic Spending ($)❖ Data Sharing❖ Altruism & Charity
  8. 8. PRIVACY, SECURITY, MOTIVATION OF CROWDS http://swiftly.org

×