SlideShare a Scribd company logo
PRIVACY, SECURITY, MOTIVATION
          OF CROWDS


    Jon Gosier, Director SwiftRiver
                @jongos
About Ushahidi                       Notable Uses                             The Challenge
Ushahidi is a free, open-source      Ushahidi has been deployed in            As the amounts of data
platform used for crowdsourcing      major global crisis scenarios,           aggregated by Ushahidi users
and visualizing data geospatially.   allowing organizations to draw           grows, they face a common
It was born out of the 2008          situational awareness from the           problem. How do they effectively
election unrest when founders        crowd.      To date it’s been            manage this realtime data? How
Juliana Rotich, Erik Hersman, Ory    downloaded over 15,000 times.            can we help them discover
Okolloh and David Kobia wanted                                                credible and actionable info from
to allow Kenyan citizens a way to    S o m e o f t h e m o re n o t a b l e   the deluge of reports they’ll get
SMS reports of incident to know      deployments include recently in          from the public? The SwiftRiver
what was occurring around them.      Egypt, the Haiti earthquakes, the        initiative was created to begin to
This was one of the earliest uses    fires in Russia, the Queensland           answer some of these questions
of crowdsourcing for crisis          floods in Australia.                      for Ushahidi deployers.
response.
NETWORK DYNAMICS




Good crowdsourcing campaigns build upon the existing ties
between people and their networks. There’s a natural mult-
iplier, where the people in the original network become
nodes for new networks and so on.
EARNING TRUST
❖ Participation is permission
❖ Consent is not carte blanche
❖ Clarity is critical
❖ Trust is Earned or Burned
❖ Transparency is hard to teach
PRIVACY
❖ Protection of data is different than the
protection of people/identity
❖ Standards like HTTPS or SSL
❖ Encryption
❖ Anonymity is not a given (TOR Project)
❖ The usual fail-points are still threats (weak
passwords, compromised servers, careless
employees)
VALIDATION
 ❖ Verify   factual occurrences (location, time,
 date)
 ❖ Verify contributor identity (who?)
 ❖ Verify contributor credentials



Everything beyond these three points is an educated
guess. Anyone looking to game the campaign will only
be affective if they are able to compromise the
aforementioned.
MOTIVATION
❖ Ease of participation
❖ Low risk of failure or shame
❖ Social Capital
❖ Repute & Accolade
❖ Barter
❖ Strategic Spending ($)
❖ Data Sharing
❖ Altruism & Charity
PRIVACY, SECURITY, MOTIVATION
          OF CROWDS


         http://swiftly.org

More Related Content

What's hot (7)

Socialmediapublicsavety
SocialmediapublicsavetySocialmediapublicsavety
Socialmediapublicsavety
 
What Is Social Media?
What Is Social Media?What Is Social Media?
What Is Social Media?
 
Trust sharing economy-part_I-introduction
Trust sharing economy-part_I-introductionTrust sharing economy-part_I-introduction
Trust sharing economy-part_I-introduction
 
The WikiLeaks Conundrum
The WikiLeaks ConundrumThe WikiLeaks Conundrum
The WikiLeaks Conundrum
 
Extending the Digital Self
Extending the Digital SelfExtending the Digital Self
Extending the Digital Self
 
Transparency On Linkedin
Transparency   On LinkedinTransparency   On Linkedin
Transparency On Linkedin
 
E revolution summary
E revolution summaryE revolution summary
E revolution summary
 

Viewers also liked

2011 ushahidi deployment-partners
2011 ushahidi deployment-partners2011 ushahidi deployment-partners
2011 ushahidi deployment-partners
Ushahidi
 
Pivoting An African Open Source Project
Pivoting An African Open Source ProjectPivoting An African Open Source Project
Pivoting An African Open Source Project
Ushahidi
 
Haiti slides v1
Haiti slides v1Haiti slides v1
Haiti slides v1
Ushahidi
 
SwiftRiver Overview
SwiftRiver OverviewSwiftRiver Overview
SwiftRiver Overview
Ushahidi
 

Viewers also liked (20)

Ushahidi Toolbox - Assessment
Ushahidi Toolbox - AssessmentUshahidi Toolbox - Assessment
Ushahidi Toolbox - Assessment
 
Intro to Ushahidi for Developers
Intro to Ushahidi for DevelopersIntro to Ushahidi for Developers
Intro to Ushahidi for Developers
 
2011 ushahidi deployment-partners
2011 ushahidi deployment-partners2011 ushahidi deployment-partners
2011 ushahidi deployment-partners
 
Ushahidi Deployment - Assessment Toolbox
Ushahidi Deployment - Assessment ToolboxUshahidi Deployment - Assessment Toolbox
Ushahidi Deployment - Assessment Toolbox
 
QR Codes and the Ushahidi Platform
QR Codes and the Ushahidi PlatformQR Codes and the Ushahidi Platform
QR Codes and the Ushahidi Platform
 
What if Citizens Mapped Health?
What if Citizens Mapped Health?What if Citizens Mapped Health?
What if Citizens Mapped Health?
 
Greeneworks
GreeneworksGreeneworks
Greeneworks
 
Ushahidi Lessons Learned
Ushahidi Lessons LearnedUshahidi Lessons Learned
Ushahidi Lessons Learned
 
Ihub Research
Ihub ResearchIhub Research
Ihub Research
 
Pivoting An African Open Source Project
Pivoting An African Open Source ProjectPivoting An African Open Source Project
Pivoting An African Open Source Project
 
Haiti slides v1
Haiti slides v1Haiti slides v1
Haiti slides v1
 
Pem Fuel Cell For A Rc Aircraft
Pem Fuel Cell For A Rc AircraftPem Fuel Cell For A Rc Aircraft
Pem Fuel Cell For A Rc Aircraft
 
Kenya Ushahidi Evaluation: Unsung Peace Heros/Building Bridges
Kenya Ushahidi Evaluation: Unsung Peace Heros/Building BridgesKenya Ushahidi Evaluation: Unsung Peace Heros/Building Bridges
Kenya Ushahidi Evaluation: Unsung Peace Heros/Building Bridges
 
Ushahidi Deployment - Output Toolbox
Ushahidi Deployment - Output ToolboxUshahidi Deployment - Output Toolbox
Ushahidi Deployment - Output Toolbox
 
Ushahidi personas scenarios
Ushahidi personas scenariosUshahidi personas scenarios
Ushahidi personas scenarios
 
Map it, Make it, Hack it
Map it, Make it, Hack itMap it, Make it, Hack it
Map it, Make it, Hack it
 
Testimony
TestimonyTestimony
Testimony
 
SwiftRiver Overview
SwiftRiver OverviewSwiftRiver Overview
SwiftRiver Overview
 
Data Science for Social Good and Ushahidi - Final Presentation
Data Science for Social Good and Ushahidi - Final PresentationData Science for Social Good and Ushahidi - Final Presentation
Data Science for Social Good and Ushahidi - Final Presentation
 
Ushahidi Toolbox - Real-time Evaluation
Ushahidi Toolbox - Real-time EvaluationUshahidi Toolbox - Real-time Evaluation
Ushahidi Toolbox - Real-time Evaluation
 

Similar to Privacy, Security and Motivation of Crowds

INTRODUCTION TO TV NEWS GATHERING
INTRODUCTION TO TV NEWS GATHERINGINTRODUCTION TO TV NEWS GATHERING
INTRODUCTION TO TV NEWS GATHERING
Nayif AbuTayeh
 
Delivering value through data future agenda 2019
Delivering value through data   future agenda 2019Delivering value through data   future agenda 2019
Delivering value through data future agenda 2019
Future Agenda
 
Presentation ppt
Presentation pptPresentation ppt
Presentation ppt
Tina Moore
 

Similar to Privacy, Security and Motivation of Crowds (20)

Ushahidi and Crowdmap Checkins
Ushahidi and Crowdmap CheckinsUshahidi and Crowdmap Checkins
Ushahidi and Crowdmap Checkins
 
Crowdsourcing and Crowdfeeding
Crowdsourcing and CrowdfeedingCrowdsourcing and Crowdfeeding
Crowdsourcing and Crowdfeeding
 
2600 v19 n3 (autumn 2002)
2600 v19 n3 (autumn 2002)2600 v19 n3 (autumn 2002)
2600 v19 n3 (autumn 2002)
 
CKX: The Dark Side of Data
CKX: The Dark Side of DataCKX: The Dark Side of Data
CKX: The Dark Side of Data
 
Data-driven journalism (GIJC, Geneva April 2010) #ddj
Data-driven journalism (GIJC, Geneva April 2010) #ddjData-driven journalism (GIJC, Geneva April 2010) #ddj
Data-driven journalism (GIJC, Geneva April 2010) #ddj
 
08302011 cc vtc_risk
08302011 cc vtc_risk08302011 cc vtc_risk
08302011 cc vtc_risk
 
Ushahidi: Made in Africa
Ushahidi: Made in AfricaUshahidi: Made in Africa
Ushahidi: Made in Africa
 
FILM260 Flipbook Assignment
FILM260 Flipbook AssignmentFILM260 Flipbook Assignment
FILM260 Flipbook Assignment
 
Ushahidi esri juliana
Ushahidi esri julianaUshahidi esri juliana
Ushahidi esri juliana
 
Usahidi
UsahidiUsahidi
Usahidi
 
INTRODUCTION TO TV NEWS GATHERING
INTRODUCTION TO TV NEWS GATHERINGINTRODUCTION TO TV NEWS GATHERING
INTRODUCTION TO TV NEWS GATHERING
 
Delivering value through data future agenda 2019
Delivering value through data   future agenda 2019Delivering value through data   future agenda 2019
Delivering value through data future agenda 2019
 
On Languages and Sharing (open data), Eliana Trinaistic & Veronica Costea
On Languages and Sharing (open data), Eliana Trinaistic & Veronica CosteaOn Languages and Sharing (open data), Eliana Trinaistic & Veronica Costea
On Languages and Sharing (open data), Eliana Trinaistic & Veronica Costea
 
From Fortresses to Sponges
From Fortresses to SpongesFrom Fortresses to Sponges
From Fortresses to Sponges
 
Small Ideas for ICRC
Small Ideas for ICRCSmall Ideas for ICRC
Small Ideas for ICRC
 
Presentation ppt
Presentation pptPresentation ppt
Presentation ppt
 
Applying citizen science model to disaster management
Applying citizen science model to disaster managementApplying citizen science model to disaster management
Applying citizen science model to disaster management
 
Research Revolution: Big Data, Open Research and Post-Truth
Research Revolution: Big Data, Open Research and Post-TruthResearch Revolution: Big Data, Open Research and Post-Truth
Research Revolution: Big Data, Open Research and Post-Truth
 
Online Journalism Story Ideas Feb12 2008[1]
Online Journalism Story Ideas Feb12 2008[1]Online Journalism Story Ideas Feb12 2008[1]
Online Journalism Story Ideas Feb12 2008[1]
 
ICCM 2014 -- Ignite Talks -- Session 2
ICCM 2014 -- Ignite Talks -- Session 2ICCM 2014 -- Ignite Talks -- Session 2
ICCM 2014 -- Ignite Talks -- Session 2
 

More from Ushahidi

I hub research_jc
I hub research_jcI hub research_jc
I hub research_jc
Ushahidi
 

More from Ushahidi (16)

Corruption mapping (april 2013, part 2)
Corruption mapping (april 2013, part 2)Corruption mapping (april 2013, part 2)
Corruption mapping (april 2013, part 2)
 
Anti-Corruption Mapping (April 2013, part 1)
Anti-Corruption Mapping (April 2013, part 1)Anti-Corruption Mapping (April 2013, part 1)
Anti-Corruption Mapping (April 2013, part 1)
 
Ushahdi 3.0 Design Framework
Ushahdi 3.0 Design Framework Ushahdi 3.0 Design Framework
Ushahdi 3.0 Design Framework
 
Around the Globe Corruption Mapping (part 2)
Around the Globe Corruption Mapping (part 2)Around the Globe Corruption Mapping (part 2)
Around the Globe Corruption Mapping (part 2)
 
Around the Globe Corruption Mapping (part 1)
Around the Globe Corruption Mapping (part 1)Around the Globe Corruption Mapping (part 1)
Around the Globe Corruption Mapping (part 1)
 
Ushahidi Toolbox - Implementation
Ushahidi Toolbox - ImplementationUshahidi Toolbox - Implementation
Ushahidi Toolbox - Implementation
 
Kenya Ushahidi Evaluation: Uchaguzi
Kenya Ushahidi Evaluation: UchaguziKenya Ushahidi Evaluation: Uchaguzi
Kenya Ushahidi Evaluation: Uchaguzi
 
Kenya Ushahidi Evaluation: Blog Series
Kenya Ushahidi Evaluation: Blog SeriesKenya Ushahidi Evaluation: Blog Series
Kenya Ushahidi Evaluation: Blog Series
 
Citizen pollution mapping made easy
Citizen pollution mapping made easy Citizen pollution mapping made easy
Citizen pollution mapping made easy
 
Map it, Change it
Map it, Change itMap it, Change it
Map it, Change it
 
Re-imagining Citizen Engagement
Re-imagining Citizen EngagementRe-imagining Citizen Engagement
Re-imagining Citizen Engagement
 
Ushahidi Research Seminar 11.11.11
Ushahidi Research Seminar 11.11.11Ushahidi Research Seminar 11.11.11
Ushahidi Research Seminar 11.11.11
 
What's in the toolkit (Ushahidi at ETHz)
What's in the toolkit (Ushahidi at ETHz)What's in the toolkit (Ushahidi at ETHz)
What's in the toolkit (Ushahidi at ETHz)
 
Volunteer Mappers: Building community resilience with citizen media
Volunteer Mappers: Building community resilience with citizen mediaVolunteer Mappers: Building community resilience with citizen media
Volunteer Mappers: Building community resilience with citizen media
 
Ushahidi Deployment - Implementation Toolbox
Ushahidi Deployment - Implementation ToolboxUshahidi Deployment - Implementation Toolbox
Ushahidi Deployment - Implementation Toolbox
 
I hub research_jc
I hub research_jcI hub research_jc
I hub research_jc
 

Recently uploaded

Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
Bhaskar Mitra
 

Recently uploaded (20)

When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...When stars align: studies in data quality, knowledge graphs, and machine lear...
When stars align: studies in data quality, knowledge graphs, and machine lear...
 
How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...How world-class product teams are winning in the AI era by CEO and Founder, P...
How world-class product teams are winning in the AI era by CEO and Founder, P...
 
UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2UiPath Test Automation using UiPath Test Suite series, part 2
UiPath Test Automation using UiPath Test Suite series, part 2
 
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
De-mystifying Zero to One: Design Informed Techniques for Greenfield Innovati...
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová10 Differences between Sales Cloud and CPQ, Blanka Doktorová
10 Differences between Sales Cloud and CPQ, Blanka Doktorová
 
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Introduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG EvaluationIntroduction to Open Source RAG and RAG Evaluation
Introduction to Open Source RAG and RAG Evaluation
 
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptxIOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
IOS-PENTESTING-BEGINNERS-PRACTICAL-GUIDE-.pptx
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi"Impact of front-end architecture on development cost", Viktor Turskyi
"Impact of front-end architecture on development cost", Viktor Turskyi
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya HalderCustom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
Custom Approval Process: A New Perspective, Pavel Hrbacek & Anindya Halder
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone KomSalesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
Salesforce Adoption – Metrics, Methods, and Motivation, Antone Kom
 
In-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT ProfessionalsIn-Depth Performance Testing Guide for IT Professionals
In-Depth Performance Testing Guide for IT Professionals
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Search and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical FuturesSearch and Society: Reimagining Information Access for Radical Futures
Search and Society: Reimagining Information Access for Radical Futures
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 

Privacy, Security and Motivation of Crowds

  • 1. PRIVACY, SECURITY, MOTIVATION OF CROWDS Jon Gosier, Director SwiftRiver @jongos
  • 2. About Ushahidi Notable Uses The Challenge Ushahidi is a free, open-source Ushahidi has been deployed in As the amounts of data platform used for crowdsourcing major global crisis scenarios, aggregated by Ushahidi users and visualizing data geospatially. allowing organizations to draw grows, they face a common It was born out of the 2008 situational awareness from the problem. How do they effectively election unrest when founders crowd. To date it’s been manage this realtime data? How Juliana Rotich, Erik Hersman, Ory downloaded over 15,000 times. can we help them discover Okolloh and David Kobia wanted credible and actionable info from to allow Kenyan citizens a way to S o m e o f t h e m o re n o t a b l e the deluge of reports they’ll get SMS reports of incident to know deployments include recently in from the public? The SwiftRiver what was occurring around them. Egypt, the Haiti earthquakes, the initiative was created to begin to This was one of the earliest uses fires in Russia, the Queensland answer some of these questions of crowdsourcing for crisis floods in Australia. for Ushahidi deployers. response.
  • 3.
  • 4. NETWORK DYNAMICS Good crowdsourcing campaigns build upon the existing ties between people and their networks. There’s a natural mult- iplier, where the people in the original network become nodes for new networks and so on.
  • 5. EARNING TRUST ❖ Participation is permission ❖ Consent is not carte blanche ❖ Clarity is critical ❖ Trust is Earned or Burned ❖ Transparency is hard to teach
  • 6. PRIVACY ❖ Protection of data is different than the protection of people/identity ❖ Standards like HTTPS or SSL ❖ Encryption ❖ Anonymity is not a given (TOR Project) ❖ The usual fail-points are still threats (weak passwords, compromised servers, careless employees)
  • 7. VALIDATION ❖ Verify factual occurrences (location, time, date) ❖ Verify contributor identity (who?) ❖ Verify contributor credentials Everything beyond these three points is an educated guess. Anyone looking to game the campaign will only be affective if they are able to compromise the aforementioned.
  • 8. MOTIVATION ❖ Ease of participation ❖ Low risk of failure or shame ❖ Social Capital ❖ Repute & Accolade ❖ Barter ❖ Strategic Spending ($) ❖ Data Sharing ❖ Altruism & Charity
  • 9. PRIVACY, SECURITY, MOTIVATION OF CROWDS http://swiftly.org