SlideShare a Scribd company logo
Panel Discussion:
Liability & Reliability of Crowdsourced & Volunteer Information
                      in Disaster Management
          Part 1 - Domestic Emergency Preparedness

               Woodrow Wilson Center for International Scholars and
                             NAPSG Foundation
                               August 30, 2011
                               Washington DC

                                Deborah Shaddon
CrisisCommons Technology Community Infrastructure Lead and Insurance IT Professional
                             www.crisiscommons.org
                          deborah@crisiscommons.org
                        Twitter/Skype: @deborahshaddon
CrisisCommons
Crisis Commons is a global network of volunteers
   who use creative problem solving and open
technologies to help people and communities in
           times and places of crisis.

  Crisis Commons members organize response
           events called CrisisCamps.

       Haiti and Chili Response: 90 days
    8 countries,
50 events
+2000 volunteers
VTC: Volunteer
                        Technology Communities
•    Volunteer Technical Communities

    1 Sahana Foundation
    2 Ushahidi, Swift River and Crowdmap
    3 OpenStreetMap, HotOSM
    4 Frontline SMS
    5 Crisismappers, SBTF
    6 CrisisCommons
    7 Random Hacks of Kindness
    8 Humanity Road
    9 Geeks without Bounds
    10 Geo-CAN
    11 HFOSS and more
Crowdsource
                Mapping 101
Ushahidi 101:

Ask: What do you see? What do you need?

Bubbles = # of reports

Each report has a category or categories.

Volunteers research, add and verify these reports.

Reports can be submitted by email, social media, web
 form, or SMS.
Hurricane Irene Recovery
           Map
Crowd Mapped Data - Verifiability
      and Reliability Concerns
• Who in the crowd is submitting the data:
  • Verifiable sources?
  • Trusted sources?
  • Trained sources?
  • Sustainability and reach of the ‘crowd’?
• Quality of Data:
  • Timeliness, Completeness,Validated?
  • Implicit or Explicit quality?
  • Accuracy of data sources?
Even non-crowdsourced
 map data can be wrong
            * Google Maps - OK
            (public domain, private
            licensed)
            * OpenStreetMaps - OK
            (public domain, public
            crowdsourced)


            * Vehicle GPS - Wrong (private
            domain private license)
Crowd Mapped Data - Verifiability
     and Reliability Approaches
• Multiple layers of validation (triangulation)
• Training and Trust (SBTF, Humanity Road)
• Cross/Multiple-source Validation
• Crowd correctness measures (self correcting for
  sustainable crowds)

•   Automation (SwiftRiver)

•   Proven methodologies

•   Combination of techniques
Data Risk and Liability Concerns
           to Address Today

•   Risk to Volunteers: Affiliated and unaffiliated
    “volunteers” (domestic/by-state good-samaritan may not
    cover virtual volunteers)? Volunteer and source traceability?

•   Risk to EM Community: Bad data could compromise
    preparedenss allocation, and emergency response?

•   Risks to Public: Public makes decisions based unverifiable or
    purposely incorrect data?

More Related Content

Viewers also liked

RHoK 2 Chicago - Person finder
RHoK 2 Chicago - Person finderRHoK 2 Chicago - Person finder
RHoK 2 Chicago - Person finder
Deborah Shaddon
 
RHoK 2 Chicago - Open data project-1
RHoK 2 Chicago - Open data project-1RHoK 2 Chicago - Open data project-1
RHoK 2 Chicago - Open data project-1
Deborah Shaddon
 
RHoK 2 Chicago - Mossaic presentation
RHoK 2 Chicago - Mossaic presentationRHoK 2 Chicago - Mossaic presentation
RHoK 2 Chicago - Mossaic presentation
Deborah Shaddon
 
RHoK 2 Chicago - IMOK/IMNotOk
RHoK 2 Chicago - IMOK/IMNotOkRHoK 2 Chicago - IMOK/IMNotOk
RHoK 2 Chicago - IMOK/IMNotOk
Deborah Shaddon
 
Rhok 2 Chicago - urban search_and_rescue
Rhok 2 Chicago - urban search_and_rescueRhok 2 Chicago - urban search_and_rescue
Rhok 2 Chicago - urban search_and_rescue
Deborah Shaddon
 
Elaboracion de un marco teorico para proyectos educativos Universidad America...
Elaboracion de un marco teorico para proyectos educativos Universidad America...Elaboracion de un marco teorico para proyectos educativos Universidad America...
Elaboracion de un marco teorico para proyectos educativos Universidad America...
Javier Armendariz
 

Viewers also liked (8)

RHoK 2 Chicago - Person finder
RHoK 2 Chicago - Person finderRHoK 2 Chicago - Person finder
RHoK 2 Chicago - Person finder
 
RHoK 2 Chicago - Open data project-1
RHoK 2 Chicago - Open data project-1RHoK 2 Chicago - Open data project-1
RHoK 2 Chicago - Open data project-1
 
Cc chicagocounts2
Cc chicagocounts2Cc chicagocounts2
Cc chicagocounts2
 
RHoK 2 Chicago - Mossaic presentation
RHoK 2 Chicago - Mossaic presentationRHoK 2 Chicago - Mossaic presentation
RHoK 2 Chicago - Mossaic presentation
 
RHoK 2 Chicago - IMOK/IMNotOk
RHoK 2 Chicago - IMOK/IMNotOkRHoK 2 Chicago - IMOK/IMNotOk
RHoK 2 Chicago - IMOK/IMNotOk
 
Open data project-1
Open data project-1Open data project-1
Open data project-1
 
Rhok 2 Chicago - urban search_and_rescue
Rhok 2 Chicago - urban search_and_rescueRhok 2 Chicago - urban search_and_rescue
Rhok 2 Chicago - urban search_and_rescue
 
Elaboracion de un marco teorico para proyectos educativos Universidad America...
Elaboracion de un marco teorico para proyectos educativos Universidad America...Elaboracion de un marco teorico para proyectos educativos Universidad America...
Elaboracion de un marco teorico para proyectos educativos Universidad America...
 

Similar to 08302011 cc vtc_risk

Crisis Mapping, Citizen Sensing and Social Media Analytics: Leveraging Citize...
Crisis Mapping, Citizen Sensing and Social Media Analytics: Leveraging Citize...Crisis Mapping, Citizen Sensing and Social Media Analytics: Leveraging Citize...
Crisis Mapping, Citizen Sensing and Social Media Analytics: Leveraging Citize...
Artificial Intelligence Institute at UofSC
 
Emergency Risk Communication
Emergency Risk CommunicationEmergency Risk Communication
Emergency Risk CommunicationHeather Blanchard
 
Scraping the Social Graph with Ushahidi and SwiftRiver
Scraping the Social Graph with Ushahidi and SwiftRiverScraping the Social Graph with Ushahidi and SwiftRiver
Scraping the Social Graph with Ushahidi and SwiftRiver
Ushahidi
 
ICCM 2014 -- Ignite Talks -- Session 2
ICCM 2014 -- Ignite Talks -- Session 2ICCM 2014 -- Ignite Talks -- Session 2
ICCM 2014 -- Ignite Talks -- Session 2
International Network of Crisis Mappers
 
Evolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data EcosystemEvolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data Ecosystem
Sara-Jayne Terp
 
Technology and Disaster Relief
Technology and Disaster ReliefTechnology and Disaster Relief
Technology and Disaster Relief
Erica Schlaikjer
 
Transforming Social Big Data into Timely Decisions and Actions for Crisis Mi...
Transforming Social Big Data into Timely Decisions  and Actions for Crisis Mi...Transforming Social Big Data into Timely Decisions  and Actions for Crisis Mi...
Transforming Social Big Data into Timely Decisions and Actions for Crisis Mi...
Amit Sheth
 
Crowdsourcing Communications
Crowdsourcing CommunicationsCrowdsourcing Communications
Web 2.0 Technology Building Situational Awareness: Free and Open Source Too...
Web 2.0 Technology  Building Situational Awareness:  Free and Open Source Too...Web 2.0 Technology  Building Situational Awareness:  Free and Open Source Too...
Web 2.0 Technology Building Situational Awareness: Free and Open Source Too...
Connie White
 
Crowds, Maps and Hacks: Digital Volunteerism and Multi-Sector Collaboration
Crowds, Maps and Hacks: Digital Volunteerism and Multi-Sector CollaborationCrowds, Maps and Hacks: Digital Volunteerism and Multi-Sector Collaboration
Crowds, Maps and Hacks: Digital Volunteerism and Multi-Sector Collaboration
International Federation of Red Cross and Red Crescent Societies
 
Saving Lives with Big Data from Social Media in Emergencies
Saving Lives with Big Data from Social Media in EmergenciesSaving Lives with Big Data from Social Media in Emergencies
Saving Lives with Big Data from Social Media in Emergencies
Thomas Dybro Lundorf
 
Privacy, Security and Motivation of Crowds
Privacy, Security and Motivation of CrowdsPrivacy, Security and Motivation of Crowds
Privacy, Security and Motivation of Crowds
Ushahidi
 
Refugees, connectivity, dignity
Refugees, connectivity, dignityRefugees, connectivity, dignity
Refugees, connectivity, dignity
Rakesh Bharania
 
New/Social Media & Emergencies
New/Social Media & EmergenciesNew/Social Media & Emergencies
Know4 drr shadrock_roberts_may2015
Know4 drr shadrock_roberts_may2015Know4 drr shadrock_roberts_may2015
Know4 drr shadrock_roberts_may2015
know4drr
 
Emergency relief services in the social media age
Emergency relief services in the social media ageEmergency relief services in the social media age
Emergency relief services in the social media age
EvanMeduna
 
New media: Potential for the ICRC
New media: Potential for the ICRCNew media: Potential for the ICRC
New media: Potential for the ICRC
Sanjana Hattotuwa
 
Iscram 2007 humanitarian-foss case disaster management
Iscram 2007 humanitarian-foss case disaster managementIscram 2007 humanitarian-foss case disaster management
Iscram 2007 humanitarian-foss case disaster management
Chamindra de Silva
 
08 31 10 berkman presentation
08 31 10 berkman presentation08 31 10 berkman presentation
08 31 10 berkman presentationHeather Blanchard
 
Tools and processes in digital voluntarism
Tools and processes in digital voluntarismTools and processes in digital voluntarism
Tools and processes in digital voluntarism
peraarvik
 

Similar to 08302011 cc vtc_risk (20)

Crisis Mapping, Citizen Sensing and Social Media Analytics: Leveraging Citize...
Crisis Mapping, Citizen Sensing and Social Media Analytics: Leveraging Citize...Crisis Mapping, Citizen Sensing and Social Media Analytics: Leveraging Citize...
Crisis Mapping, Citizen Sensing and Social Media Analytics: Leveraging Citize...
 
Emergency Risk Communication
Emergency Risk CommunicationEmergency Risk Communication
Emergency Risk Communication
 
Scraping the Social Graph with Ushahidi and SwiftRiver
Scraping the Social Graph with Ushahidi and SwiftRiverScraping the Social Graph with Ushahidi and SwiftRiver
Scraping the Social Graph with Ushahidi and SwiftRiver
 
ICCM 2014 -- Ignite Talks -- Session 2
ICCM 2014 -- Ignite Talks -- Session 2ICCM 2014 -- Ignite Talks -- Session 2
ICCM 2014 -- Ignite Talks -- Session 2
 
Evolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data EcosystemEvolution of the Humanitarian Data Ecosystem
Evolution of the Humanitarian Data Ecosystem
 
Technology and Disaster Relief
Technology and Disaster ReliefTechnology and Disaster Relief
Technology and Disaster Relief
 
Transforming Social Big Data into Timely Decisions and Actions for Crisis Mi...
Transforming Social Big Data into Timely Decisions  and Actions for Crisis Mi...Transforming Social Big Data into Timely Decisions  and Actions for Crisis Mi...
Transforming Social Big Data into Timely Decisions and Actions for Crisis Mi...
 
Crowdsourcing Communications
Crowdsourcing CommunicationsCrowdsourcing Communications
Crowdsourcing Communications
 
Web 2.0 Technology Building Situational Awareness: Free and Open Source Too...
Web 2.0 Technology  Building Situational Awareness:  Free and Open Source Too...Web 2.0 Technology  Building Situational Awareness:  Free and Open Source Too...
Web 2.0 Technology Building Situational Awareness: Free and Open Source Too...
 
Crowds, Maps and Hacks: Digital Volunteerism and Multi-Sector Collaboration
Crowds, Maps and Hacks: Digital Volunteerism and Multi-Sector CollaborationCrowds, Maps and Hacks: Digital Volunteerism and Multi-Sector Collaboration
Crowds, Maps and Hacks: Digital Volunteerism and Multi-Sector Collaboration
 
Saving Lives with Big Data from Social Media in Emergencies
Saving Lives with Big Data from Social Media in EmergenciesSaving Lives with Big Data from Social Media in Emergencies
Saving Lives with Big Data from Social Media in Emergencies
 
Privacy, Security and Motivation of Crowds
Privacy, Security and Motivation of CrowdsPrivacy, Security and Motivation of Crowds
Privacy, Security and Motivation of Crowds
 
Refugees, connectivity, dignity
Refugees, connectivity, dignityRefugees, connectivity, dignity
Refugees, connectivity, dignity
 
New/Social Media & Emergencies
New/Social Media & EmergenciesNew/Social Media & Emergencies
New/Social Media & Emergencies
 
Know4 drr shadrock_roberts_may2015
Know4 drr shadrock_roberts_may2015Know4 drr shadrock_roberts_may2015
Know4 drr shadrock_roberts_may2015
 
Emergency relief services in the social media age
Emergency relief services in the social media ageEmergency relief services in the social media age
Emergency relief services in the social media age
 
New media: Potential for the ICRC
New media: Potential for the ICRCNew media: Potential for the ICRC
New media: Potential for the ICRC
 
Iscram 2007 humanitarian-foss case disaster management
Iscram 2007 humanitarian-foss case disaster managementIscram 2007 humanitarian-foss case disaster management
Iscram 2007 humanitarian-foss case disaster management
 
08 31 10 berkman presentation
08 31 10 berkman presentation08 31 10 berkman presentation
08 31 10 berkman presentation
 
Tools and processes in digital voluntarism
Tools and processes in digital voluntarismTools and processes in digital voluntarism
Tools and processes in digital voluntarism
 

Recently uploaded

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Nexer Digital
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
RinaMondal9
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
mikeeftimakis1
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
Ralf Eggert
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Aggregage
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
nkrafacyberclub
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
Peter Spielvogel
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
ThomasParaiso2
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
Neo4j
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 

Recently uploaded (20)

UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?Elizabeth Buie - Older adults: Are we really designing for our future selves?
Elizabeth Buie - Older adults: Are we really designing for our future selves?
 
Free Complete Python - A step towards Data Science
Free Complete Python - A step towards Data ScienceFree Complete Python - A step towards Data Science
Free Complete Python - A step towards Data Science
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
Introduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - CybersecurityIntroduction to CHERI technology - Cybersecurity
Introduction to CHERI technology - Cybersecurity
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
Generative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionGenerative AI Deep Dive: Advancing from Proof of Concept to Production
Generative AI Deep Dive: Advancing from Proof of Concept to Production
 
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptxSecstrike : Reverse Engineering & Pwnable tools for CTF.pptx
Secstrike : Reverse Engineering & Pwnable tools for CTF.pptx
 
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdfSAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
SAP Sapphire 2024 - ASUG301 building better apps with SAP Fiori.pdf
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...GridMate - End to end testing is a critical piece to ensure quality and avoid...
GridMate - End to end testing is a critical piece to ensure quality and avoid...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
GraphSummit Singapore | Graphing Success: Revolutionising Organisational Stru...
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 

08302011 cc vtc_risk

  • 1. Panel Discussion: Liability & Reliability of Crowdsourced & Volunteer Information in Disaster Management Part 1 - Domestic Emergency Preparedness Woodrow Wilson Center for International Scholars and NAPSG Foundation August 30, 2011 Washington DC Deborah Shaddon CrisisCommons Technology Community Infrastructure Lead and Insurance IT Professional www.crisiscommons.org deborah@crisiscommons.org Twitter/Skype: @deborahshaddon
  • 2. CrisisCommons Crisis Commons is a global network of volunteers who use creative problem solving and open technologies to help people and communities in times and places of crisis. Crisis Commons members organize response events called CrisisCamps. Haiti and Chili Response: 90 days 8 countries,
50 events
+2000 volunteers
  • 3. VTC: Volunteer Technology Communities • Volunteer Technical Communities 1 Sahana Foundation 2 Ushahidi, Swift River and Crowdmap 3 OpenStreetMap, HotOSM 4 Frontline SMS 5 Crisismappers, SBTF 6 CrisisCommons 7 Random Hacks of Kindness 8 Humanity Road 9 Geeks without Bounds 10 Geo-CAN 11 HFOSS and more
  • 4. Crowdsource Mapping 101 Ushahidi 101: Ask: What do you see? What do you need? Bubbles = # of reports Each report has a category or categories. Volunteers research, add and verify these reports. Reports can be submitted by email, social media, web form, or SMS.
  • 6. Crowd Mapped Data - Verifiability and Reliability Concerns • Who in the crowd is submitting the data: • Verifiable sources? • Trusted sources? • Trained sources? • Sustainability and reach of the ‘crowd’? • Quality of Data: • Timeliness, Completeness,Validated? • Implicit or Explicit quality? • Accuracy of data sources?
  • 7. Even non-crowdsourced map data can be wrong * Google Maps - OK (public domain, private licensed) * OpenStreetMaps - OK (public domain, public crowdsourced) * Vehicle GPS - Wrong (private domain private license)
  • 8. Crowd Mapped Data - Verifiability and Reliability Approaches • Multiple layers of validation (triangulation) • Training and Trust (SBTF, Humanity Road) • Cross/Multiple-source Validation • Crowd correctness measures (self correcting for sustainable crowds) • Automation (SwiftRiver) • Proven methodologies • Combination of techniques
  • 9. Data Risk and Liability Concerns to Address Today • Risk to Volunteers: Affiliated and unaffiliated “volunteers” (domestic/by-state good-samaritan may not cover virtual volunteers)? Volunteer and source traceability? • Risk to EM Community: Bad data could compromise preparedenss allocation, and emergency response? • Risks to Public: Public makes decisions based unverifiable or purposely incorrect data?

Editor's Notes

  1. \n
  2. \n
  3. Recognize that everyone here is dedicated to making businesses and organizations better prepared for the unexpected\n Recognize that the marketplace expects (and relies upon) uptime and continuation of service\n
  4. \n
  5. \n
  6. \n
  7. \n
  8. \n
  9. \n