SlideShare a Scribd company logo
1 of 9
Download to read offline
PRIVACY, SECURITY, MOTIVATION
          OF CROWDS


    Jon Gosier, Director SwiftRiver
                @jongos
About Ushahidi                       Notable Uses                             The Challenge
Ushahidi is a free, open-source      Ushahidi has been deployed in            As the amounts of data
platform used for crowdsourcing      major global crisis scenarios,           aggregated by Ushahidi users
and visualizing data geospatially.   allowing organizations to draw           grows, they face a common
It was born out of the 2008          situational awareness from the           problem. How do they effectively
election unrest when founders        crowd.      To date it’s been            manage this realtime data? How
Juliana Rotich, Erik Hersman, Ory    downloaded over 15,000 times.            can we help them discover
Okolloh and David Kobia wanted                                                credible and actionable info from
to allow Kenyan citizens a way to    S o m e o f t h e m o re n o t a b l e   the deluge of reports they’ll get
SMS reports of incident to know      deployments include recently in          from the public? The SwiftRiver
what was occurring around them.      Egypt, the Haiti earthquakes, the        initiative was created to begin to
This was one of the earliest uses    fires in Russia, the Queensland           answer some of these questions
of crowdsourcing for crisis          floods in Australia.                      for Ushahidi deployers.
response.
NETWORK DYNAMICS




Good crowdsourcing campaigns build upon the existing ties
between people and their networks. There’s a natural mult-
iplier, where the people in the original network become
nodes for new networks and so on.
EARNING TRUST
❖ Participation is permission
❖ Consent is not carte blanche
❖ Clarity is critical
❖ Trust is Earned or Burned
❖ Transparency is hard to teach
PRIVACY
❖ Protection of data is different than the
protection of people/identity
❖ Standards like HTTPS or SSL
❖ Encryption
❖ Anonymity is not a given (TOR Project)
❖ The usual fail-points are still threats (weak
passwords, compromised servers, careless
employees)
VALIDATION
 ❖ Verify   factual occurrences (location, time,
 date)
 ❖ Verify contributor identity (who?)
 ❖ Verify contributor credentials



Everything beyond these three points is an educated
guess. Anyone looking to game the campaign will only
be affective if they are able to compromise the
aforementioned.
MOTIVATION
❖ Ease of participation
❖ Low risk of failure or shame
❖ Social Capital
❖ Repute & Accolade
❖ Barter
❖ Strategic Spending ($)
❖ Data Sharing
❖ Altruism & Charity
PRIVACY, SECURITY, MOTIVATION
          OF CROWDS


         http://swiftly.org

More Related Content

What's hot

Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
SocialmediapublicsavetyFrank Smilda
 
What Is Social Media?
What Is Social Media?What Is Social Media?
What Is Social Media?cswellz
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionJessica Slijpen
 
The WikiLeaks Conundrum
The WikiLeaks ConundrumThe WikiLeaks Conundrum
The WikiLeaks ConundrumMsifry
 
Extending the Digital Self
Extending the Digital SelfExtending the Digital Self
Extending the Digital SelfPeter Brantley
 
Transparency On Linkedin
Transparency   On LinkedinTransparency   On Linkedin
Transparency On Linkedinjaikishanreddy
 

What's hot (7)

Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
 
What Is Social Media?
What Is Social Media?What Is Social Media?
What Is Social Media?
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introduction
 
The WikiLeaks Conundrum
The WikiLeaks ConundrumThe WikiLeaks Conundrum
The WikiLeaks Conundrum
 
Extending the Digital Self
Extending the Digital SelfExtending the Digital Self
Extending the Digital Self
 
Transparency On Linkedin
Transparency   On LinkedinTransparency   On Linkedin
Transparency On Linkedin
 
E revolution summary
E revolution summaryE revolution summary
E revolution summary
 

Viewers also liked

Ushahidi Toolbox - Assessment
Ushahidi Toolbox - AssessmentUshahidi Toolbox - Assessment
Ushahidi Toolbox - AssessmentUshahidi
 
Intro to Ushahidi for Developers
Intro to Ushahidi for DevelopersIntro to Ushahidi for Developers
Intro to Ushahidi for DevelopersUshahidi
 
2011 ushahidi deployment-partners
2011 ushahidi deployment-partners2011 ushahidi deployment-partners
2011 ushahidi deployment-partnersUshahidi
 
Ushahidi Deployment - Assessment Toolbox
Ushahidi Deployment - Assessment ToolboxUshahidi Deployment - Assessment Toolbox
Ushahidi Deployment - Assessment ToolboxUshahidi
 
QR Codes and the Ushahidi Platform
QR Codes and the Ushahidi PlatformQR Codes and the Ushahidi Platform
QR Codes and the Ushahidi PlatformUshahidi
 
What if Citizens Mapped Health?
What if Citizens Mapped Health?What if Citizens Mapped Health?
What if Citizens Mapped Health?Ushahidi
 
Ushahidi Lessons Learned
Ushahidi Lessons LearnedUshahidi Lessons Learned
Ushahidi Lessons LearnedUshahidi
 
Ihub Research
Ihub ResearchIhub Research
Ihub ResearchUshahidi
 
Pivoting An African Open Source Project
Pivoting An African Open Source ProjectPivoting An African Open Source Project
Pivoting An African Open Source ProjectUshahidi
 
Haiti slides v1
Haiti slides v1Haiti slides v1
Haiti slides v1Ushahidi
 
Pem Fuel Cell For A Rc Aircraft
Pem Fuel Cell For A Rc AircraftPem Fuel Cell For A Rc Aircraft
Pem Fuel Cell For A Rc Aircraftrebekah827
 
Kenya Ushahidi Evaluation: Unsung Peace Heros/Building Bridges
Kenya Ushahidi Evaluation: Unsung Peace Heros/Building BridgesKenya Ushahidi Evaluation: Unsung Peace Heros/Building Bridges
Kenya Ushahidi Evaluation: Unsung Peace Heros/Building BridgesUshahidi
 
Ushahidi Deployment - Output Toolbox
Ushahidi Deployment - Output ToolboxUshahidi Deployment - Output Toolbox
Ushahidi Deployment - Output ToolboxUshahidi
 
Ushahidi personas scenarios
Ushahidi personas scenariosUshahidi personas scenarios
Ushahidi personas scenariosUshahidi
 
Map it, Make it, Hack it
Map it, Make it, Hack itMap it, Make it, Hack it
Map it, Make it, Hack itUshahidi
 
SwiftRiver Overview
SwiftRiver OverviewSwiftRiver Overview
SwiftRiver OverviewUshahidi
 
Data Science for Social Good and Ushahidi - Final Presentation
Data Science for Social Good and Ushahidi - Final PresentationData Science for Social Good and Ushahidi - Final Presentation
Data Science for Social Good and Ushahidi - Final PresentationUshahidi
 
Ushahidi Toolbox - Real-time Evaluation
Ushahidi Toolbox - Real-time EvaluationUshahidi Toolbox - Real-time Evaluation
Ushahidi Toolbox - Real-time EvaluationUshahidi
 

Viewers also liked (20)

Ushahidi Toolbox - Assessment
Ushahidi Toolbox - AssessmentUshahidi Toolbox - Assessment
Ushahidi Toolbox - Assessment
 
Intro to Ushahidi for Developers
Intro to Ushahidi for DevelopersIntro to Ushahidi for Developers
Intro to Ushahidi for Developers
 
2011 ushahidi deployment-partners
2011 ushahidi deployment-partners2011 ushahidi deployment-partners
2011 ushahidi deployment-partners
 
Ushahidi Deployment - Assessment Toolbox
Ushahidi Deployment - Assessment ToolboxUshahidi Deployment - Assessment Toolbox
Ushahidi Deployment - Assessment Toolbox
 
QR Codes and the Ushahidi Platform
QR Codes and the Ushahidi PlatformQR Codes and the Ushahidi Platform
QR Codes and the Ushahidi Platform
 
What if Citizens Mapped Health?
What if Citizens Mapped Health?What if Citizens Mapped Health?
What if Citizens Mapped Health?
 
Greeneworks
GreeneworksGreeneworks
Greeneworks
 
Ushahidi Lessons Learned
Ushahidi Lessons LearnedUshahidi Lessons Learned
Ushahidi Lessons Learned
 
Ihub Research
Ihub ResearchIhub Research
Ihub Research
 
Pivoting An African Open Source Project
Pivoting An African Open Source ProjectPivoting An African Open Source Project
Pivoting An African Open Source Project
 
Haiti slides v1
Haiti slides v1Haiti slides v1
Haiti slides v1
 
Pem Fuel Cell For A Rc Aircraft
Pem Fuel Cell For A Rc AircraftPem Fuel Cell For A Rc Aircraft
Pem Fuel Cell For A Rc Aircraft
 
Kenya Ushahidi Evaluation: Unsung Peace Heros/Building Bridges
Kenya Ushahidi Evaluation: Unsung Peace Heros/Building BridgesKenya Ushahidi Evaluation: Unsung Peace Heros/Building Bridges
Kenya Ushahidi Evaluation: Unsung Peace Heros/Building Bridges
 
Ushahidi Deployment - Output Toolbox
Ushahidi Deployment - Output ToolboxUshahidi Deployment - Output Toolbox
Ushahidi Deployment - Output Toolbox
 
Ushahidi personas scenarios
Ushahidi personas scenariosUshahidi personas scenarios
Ushahidi personas scenarios
 
Map it, Make it, Hack it
Map it, Make it, Hack itMap it, Make it, Hack it
Map it, Make it, Hack it
 
Testimony
TestimonyTestimony
Testimony
 
SwiftRiver Overview
SwiftRiver OverviewSwiftRiver Overview
SwiftRiver Overview
 
Data Science for Social Good and Ushahidi - Final Presentation
Data Science for Social Good and Ushahidi - Final PresentationData Science for Social Good and Ushahidi - Final Presentation
Data Science for Social Good and Ushahidi - Final Presentation
 
Ushahidi Toolbox - Real-time Evaluation
Ushahidi Toolbox - Real-time EvaluationUshahidi Toolbox - Real-time Evaluation
Ushahidi Toolbox - Real-time Evaluation
 

Similar to Privacy, Security and Motivation of Crowds

Ushahidi and Crowdmap Checkins
Ushahidi and Crowdmap CheckinsUshahidi and Crowdmap Checkins
Ushahidi and Crowdmap CheckinsUshahidi
 
Crowdsourcing and Crowdfeeding
Crowdsourcing and CrowdfeedingCrowdsourcing and Crowdfeeding
Crowdsourcing and CrowdfeedingAnahi Iacucci
 
2600 v19 n3 (autumn 2002)
2600 v19 n3 (autumn 2002)2600 v19 n3 (autumn 2002)
2600 v19 n3 (autumn 2002)Felipe Prado
 
Data-driven journalism (GIJC, Geneva April 2010) #ddj
Data-driven journalism (GIJC, Geneva April 2010) #ddjData-driven journalism (GIJC, Geneva April 2010) #ddj
Data-driven journalism (GIJC, Geneva April 2010) #ddjMirko Lorenz
 
Ushahidi: Made in Africa
Ushahidi: Made in AfricaUshahidi: Made in Africa
Ushahidi: Made in AfricaKeisha Taylor
 
FILM260 Flipbook Assignment
FILM260 Flipbook AssignmentFILM260 Flipbook Assignment
FILM260 Flipbook AssignmentJordan Pernari
 
Ushahidi esri juliana
Ushahidi esri julianaUshahidi esri juliana
Ushahidi esri julianaUshahidi
 
INTRODUCTION TO TV NEWS GATHERING
INTRODUCTION TO TV NEWS GATHERINGINTRODUCTION TO TV NEWS GATHERING
INTRODUCTION TO TV NEWS GATHERINGNayif AbuTayeh
 
Delivering value through data future agenda 2019
Delivering value through data   future agenda 2019Delivering value through data   future agenda 2019
Delivering value through data future agenda 2019Future Agenda
 
On Languages and Sharing (open data), Eliana Trinaistic & Veronica Costea
On Languages and Sharing (open data), Eliana Trinaistic & Veronica CosteaOn Languages and Sharing (open data), Eliana Trinaistic & Veronica Costea
On Languages and Sharing (open data), Eliana Trinaistic & Veronica CosteaEliana Trinaistic
 
From Fortresses to Sponges
From Fortresses to SpongesFrom Fortresses to Sponges
From Fortresses to SpongesMsifry
 
Presentation ppt
Presentation pptPresentation ppt
Presentation pptTina Moore
 
Applying citizen science model to disaster management
Applying citizen science model to disaster managementApplying citizen science model to disaster management
Applying citizen science model to disaster managementW. David Stephenson
 
Research Revolution: Big Data, Open Research and Post-Truth
Research Revolution: Big Data, Open Research and Post-TruthResearch Revolution: Big Data, Open Research and Post-Truth
Research Revolution: Big Data, Open Research and Post-TruthMark Carrigan
 
Online Journalism Story Ideas Feb12 2008[1]
Online Journalism Story Ideas Feb12 2008[1]Online Journalism Story Ideas Feb12 2008[1]
Online Journalism Story Ideas Feb12 2008[1]Neil Foote
 

Similar to Privacy, Security and Motivation of Crowds (20)

Ushahidi and Crowdmap Checkins
Ushahidi and Crowdmap CheckinsUshahidi and Crowdmap Checkins
Ushahidi and Crowdmap Checkins
 
Crowdsourcing and Crowdfeeding
Crowdsourcing and CrowdfeedingCrowdsourcing and Crowdfeeding
Crowdsourcing and Crowdfeeding
 
2600 v19 n3 (autumn 2002)
2600 v19 n3 (autumn 2002)2600 v19 n3 (autumn 2002)
2600 v19 n3 (autumn 2002)
 
CKX: The Dark Side of Data
CKX: The Dark Side of DataCKX: The Dark Side of Data
CKX: The Dark Side of Data
 
Data-driven journalism (GIJC, Geneva April 2010) #ddj
Data-driven journalism (GIJC, Geneva April 2010) #ddjData-driven journalism (GIJC, Geneva April 2010) #ddj
Data-driven journalism (GIJC, Geneva April 2010) #ddj
 
08302011 cc vtc_risk
08302011 cc vtc_risk08302011 cc vtc_risk
08302011 cc vtc_risk
 
Ushahidi: Made in Africa
Ushahidi: Made in AfricaUshahidi: Made in Africa
Ushahidi: Made in Africa
 
FILM260 Flipbook Assignment
FILM260 Flipbook AssignmentFILM260 Flipbook Assignment
FILM260 Flipbook Assignment
 
Ushahidi esri juliana
Ushahidi esri julianaUshahidi esri juliana
Ushahidi esri juliana
 
Usahidi
UsahidiUsahidi
Usahidi
 
INTRODUCTION TO TV NEWS GATHERING
INTRODUCTION TO TV NEWS GATHERINGINTRODUCTION TO TV NEWS GATHERING
INTRODUCTION TO TV NEWS GATHERING
 
Delivering value through data future agenda 2019
Delivering value through data   future agenda 2019Delivering value through data   future agenda 2019
Delivering value through data future agenda 2019
 
On Languages and Sharing (open data), Eliana Trinaistic & Veronica Costea
On Languages and Sharing (open data), Eliana Trinaistic & Veronica CosteaOn Languages and Sharing (open data), Eliana Trinaistic & Veronica Costea
On Languages and Sharing (open data), Eliana Trinaistic & Veronica Costea
 
From Fortresses to Sponges
From Fortresses to SpongesFrom Fortresses to Sponges
From Fortresses to Sponges
 
Small Ideas for ICRC
Small Ideas for ICRCSmall Ideas for ICRC
Small Ideas for ICRC
 
Presentation ppt
Presentation pptPresentation ppt
Presentation ppt
 
Applying citizen science model to disaster management
Applying citizen science model to disaster managementApplying citizen science model to disaster management
Applying citizen science model to disaster management
 
Research Revolution: Big Data, Open Research and Post-Truth
Research Revolution: Big Data, Open Research and Post-TruthResearch Revolution: Big Data, Open Research and Post-Truth
Research Revolution: Big Data, Open Research and Post-Truth
 
Online Journalism Story Ideas Feb12 2008[1]
Online Journalism Story Ideas Feb12 2008[1]Online Journalism Story Ideas Feb12 2008[1]
Online Journalism Story Ideas Feb12 2008[1]
 
ICCM 2014 -- Ignite Talks -- Session 2
ICCM 2014 -- Ignite Talks -- Session 2ICCM 2014 -- Ignite Talks -- Session 2
ICCM 2014 -- Ignite Talks -- Session 2
 

More from Ushahidi

Corruption mapping (april 2013, part 2)
Corruption mapping (april 2013, part 2)Corruption mapping (april 2013, part 2)
Corruption mapping (april 2013, part 2)Ushahidi
 
Anti-Corruption Mapping (April 2013, part 1)
Anti-Corruption Mapping (April 2013, part 1)Anti-Corruption Mapping (April 2013, part 1)
Anti-Corruption Mapping (April 2013, part 1)Ushahidi
 
Ushahdi 3.0 Design Framework
Ushahdi 3.0 Design Framework Ushahdi 3.0 Design Framework
Ushahdi 3.0 Design Framework Ushahidi
 
Around the Globe Corruption Mapping (part 2)
Around the Globe Corruption Mapping (part 2)Around the Globe Corruption Mapping (part 2)
Around the Globe Corruption Mapping (part 2)Ushahidi
 
Around the Globe Corruption Mapping (part 1)
Around the Globe Corruption Mapping (part 1)Around the Globe Corruption Mapping (part 1)
Around the Globe Corruption Mapping (part 1)Ushahidi
 
Ushahidi Toolbox - Implementation
Ushahidi Toolbox - ImplementationUshahidi Toolbox - Implementation
Ushahidi Toolbox - ImplementationUshahidi
 
Kenya Ushahidi Evaluation: Uchaguzi
Kenya Ushahidi Evaluation: UchaguziKenya Ushahidi Evaluation: Uchaguzi
Kenya Ushahidi Evaluation: UchaguziUshahidi
 
Kenya Ushahidi Evaluation: Blog Series
Kenya Ushahidi Evaluation: Blog SeriesKenya Ushahidi Evaluation: Blog Series
Kenya Ushahidi Evaluation: Blog SeriesUshahidi
 
Citizen pollution mapping made easy
Citizen pollution mapping made easy Citizen pollution mapping made easy
Citizen pollution mapping made easy Ushahidi
 
Map it, Change it
Map it, Change itMap it, Change it
Map it, Change itUshahidi
 
Re-imagining Citizen Engagement
Re-imagining Citizen EngagementRe-imagining Citizen Engagement
Re-imagining Citizen EngagementUshahidi
 
Ushahidi Research Seminar 11.11.11
Ushahidi Research Seminar 11.11.11Ushahidi Research Seminar 11.11.11
Ushahidi Research Seminar 11.11.11Ushahidi
 
What's in the toolkit (Ushahidi at ETHz)
What's in the toolkit (Ushahidi at ETHz)What's in the toolkit (Ushahidi at ETHz)
What's in the toolkit (Ushahidi at ETHz)Ushahidi
 
Volunteer Mappers: Building community resilience with citizen media
Volunteer Mappers: Building community resilience with citizen mediaVolunteer Mappers: Building community resilience with citizen media
Volunteer Mappers: Building community resilience with citizen mediaUshahidi
 
Ushahidi Deployment - Implementation Toolbox
Ushahidi Deployment - Implementation ToolboxUshahidi Deployment - Implementation Toolbox
Ushahidi Deployment - Implementation ToolboxUshahidi
 
I hub research_jc
I hub research_jcI hub research_jc
I hub research_jcUshahidi
 

More from Ushahidi (16)

Corruption mapping (april 2013, part 2)
Corruption mapping (april 2013, part 2)Corruption mapping (april 2013, part 2)
Corruption mapping (april 2013, part 2)
 
Anti-Corruption Mapping (April 2013, part 1)
Anti-Corruption Mapping (April 2013, part 1)Anti-Corruption Mapping (April 2013, part 1)
Anti-Corruption Mapping (April 2013, part 1)
 
Ushahdi 3.0 Design Framework
Ushahdi 3.0 Design Framework Ushahdi 3.0 Design Framework
Ushahdi 3.0 Design Framework
 
Around the Globe Corruption Mapping (part 2)
Around the Globe Corruption Mapping (part 2)Around the Globe Corruption Mapping (part 2)
Around the Globe Corruption Mapping (part 2)
 
Around the Globe Corruption Mapping (part 1)
Around the Globe Corruption Mapping (part 1)Around the Globe Corruption Mapping (part 1)
Around the Globe Corruption Mapping (part 1)
 
Ushahidi Toolbox - Implementation
Ushahidi Toolbox - ImplementationUshahidi Toolbox - Implementation
Ushahidi Toolbox - Implementation
 
Kenya Ushahidi Evaluation: Uchaguzi
Kenya Ushahidi Evaluation: UchaguziKenya Ushahidi Evaluation: Uchaguzi
Kenya Ushahidi Evaluation: Uchaguzi
 
Kenya Ushahidi Evaluation: Blog Series
Kenya Ushahidi Evaluation: Blog SeriesKenya Ushahidi Evaluation: Blog Series
Kenya Ushahidi Evaluation: Blog Series
 
Citizen pollution mapping made easy
Citizen pollution mapping made easy Citizen pollution mapping made easy
Citizen pollution mapping made easy
 
Map it, Change it
Map it, Change itMap it, Change it
Map it, Change it
 
Re-imagining Citizen Engagement
Re-imagining Citizen EngagementRe-imagining Citizen Engagement
Re-imagining Citizen Engagement
 
Ushahidi Research Seminar 11.11.11
Ushahidi Research Seminar 11.11.11Ushahidi Research Seminar 11.11.11
Ushahidi Research Seminar 11.11.11
 
What's in the toolkit (Ushahidi at ETHz)
What's in the toolkit (Ushahidi at ETHz)What's in the toolkit (Ushahidi at ETHz)
What's in the toolkit (Ushahidi at ETHz)
 
Volunteer Mappers: Building community resilience with citizen media
Volunteer Mappers: Building community resilience with citizen mediaVolunteer Mappers: Building community resilience with citizen media
Volunteer Mappers: Building community resilience with citizen media
 
Ushahidi Deployment - Implementation Toolbox
Ushahidi Deployment - Implementation ToolboxUshahidi Deployment - Implementation Toolbox
Ushahidi Deployment - Implementation Toolbox
 
I hub research_jc
I hub research_jcI hub research_jc
I hub research_jc
 

Recently uploaded

Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...FIDO Alliance
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideStefan Dietze
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jNeo4j
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftshyamraj55
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsLeah Henrickson
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform EngineeringMarcus Vechiato
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...marcuskenyatta275
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimaginedpanagenda
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch TuesdayIvanti
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxFIDO Alliance
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfFIDO Alliance
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!Memoori
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfSrushith Repakula
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfFIDO Alliance
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfFIDO Alliance
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...FIDO Alliance
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireExakis Nelite
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessUXDXConf
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfFIDO Alliance
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfFIDO Alliance
 

Recently uploaded (20)

Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
Choosing the Right FDO Deployment Model for Your Application _ Geoffrey at In...
 
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The InsideCollecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
Collecting & Temporal Analysis of Behavioral Web Data - Tales From The Inside
 
Your enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4jYour enemies use GenAI too - staying ahead of fraud with Neo4j
Your enemies use GenAI too - staying ahead of fraud with Neo4j
 
Oauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoftOauth 2.0 Introduction and Flows with MuleSoft
Oauth 2.0 Introduction and Flows with MuleSoft
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
Working together SRE & Platform Engineering
Working together SRE & Platform EngineeringWorking together SRE & Platform Engineering
Working together SRE & Platform Engineering
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
2024 May Patch Tuesday
2024 May Patch Tuesday2024 May Patch Tuesday
2024 May Patch Tuesday
 
ADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptxADP Passwordless Journey Case Study.pptx
ADP Passwordless Journey Case Study.pptx
 
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdfThe Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
The Value of Certifying Products for FDO _ Paul at FIDO Alliance.pdf
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
Microsoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - QuestionnaireMicrosoft CSP Briefing Pre-Engagement - Questionnaire
Microsoft CSP Briefing Pre-Engagement - Questionnaire
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdfSimplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
Simplified FDO Manufacturing Flow with TPMs _ Liam at Infineon.pdf
 

Privacy, Security and Motivation of Crowds

  • 1. PRIVACY, SECURITY, MOTIVATION OF CROWDS Jon Gosier, Director SwiftRiver @jongos
  • 2. About Ushahidi Notable Uses The Challenge Ushahidi is a free, open-source Ushahidi has been deployed in As the amounts of data platform used for crowdsourcing major global crisis scenarios, aggregated by Ushahidi users and visualizing data geospatially. allowing organizations to draw grows, they face a common It was born out of the 2008 situational awareness from the problem. How do they effectively election unrest when founders crowd. To date it’s been manage this realtime data? How Juliana Rotich, Erik Hersman, Ory downloaded over 15,000 times. can we help them discover Okolloh and David Kobia wanted credible and actionable info from to allow Kenyan citizens a way to S o m e o f t h e m o re n o t a b l e the deluge of reports they’ll get SMS reports of incident to know deployments include recently in from the public? The SwiftRiver what was occurring around them. Egypt, the Haiti earthquakes, the initiative was created to begin to This was one of the earliest uses fires in Russia, the Queensland answer some of these questions of crowdsourcing for crisis floods in Australia. for Ushahidi deployers. response.
  • 3.
  • 4. NETWORK DYNAMICS Good crowdsourcing campaigns build upon the existing ties between people and their networks. There’s a natural mult- iplier, where the people in the original network become nodes for new networks and so on.
  • 5. EARNING TRUST ❖ Participation is permission ❖ Consent is not carte blanche ❖ Clarity is critical ❖ Trust is Earned or Burned ❖ Transparency is hard to teach
  • 6. PRIVACY ❖ Protection of data is different than the protection of people/identity ❖ Standards like HTTPS or SSL ❖ Encryption ❖ Anonymity is not a given (TOR Project) ❖ The usual fail-points are still threats (weak passwords, compromised servers, careless employees)
  • 7. VALIDATION ❖ Verify factual occurrences (location, time, date) ❖ Verify contributor identity (who?) ❖ Verify contributor credentials Everything beyond these three points is an educated guess. Anyone looking to game the campaign will only be affective if they are able to compromise the aforementioned.
  • 8. MOTIVATION ❖ Ease of participation ❖ Low risk of failure or shame ❖ Social Capital ❖ Repute & Accolade ❖ Barter ❖ Strategic Spending ($) ❖ Data Sharing ❖ Altruism & Charity
  • 9. PRIVACY, SECURITY, MOTIVATION OF CROWDS http://swiftly.org