Privacy, Security and Motivation of Crowds

9
Jon Gosier, Director SwiftRiver @jongos PRIVACY, SECURITY, MOTIVATION OF CROWDS

description

Short talk on the ethics of security and privacy as it relates to Ushahidi deployments.

Transcript of Privacy, Security and Motivation of Crowds

Page 1: Privacy, Security and Motivation of Crowds

Jon Gosier, Director SwiftRiver@jongos

PRIVACY, SECURITY, MOTIVATIONOF CROWDS

Page 2: Privacy, Security and Motivation of Crowds

About UshahidiUshahidi is a free, open-source platform used for crowdsourcing and visualizing data geospatially. It was born out of the 2008 election unrest when founders Juliana Rotich, Erik Hersman, Ory Okolloh and David Kobia wanted to allow Kenyan citizens a way to SMS reports of incident to know what was occurring around them. This was one of the earliest uses of crowdsourcing for crisis response.

Notable UsesUshahidi has been deployed in major global crisis scenarios, allowing organizations to draw situational awareness from the crowd. To date it ’s been downloaded over 15,000 times.

Some of the more notable deployments include recently in Egypt, the Haiti earthquakes, the fires in Russia, the Queensland floods in Australia.

The ChallengeA s t h e a m o u n t s o f d a t a aggregated by Ushahidi users grows, they face a common problem. How do they effectively manage this realtime data? How can we help them discover credible and actionable info from the deluge of reports they’ll get from the public? The SwiftRiver initiative was created to begin to answer some of these questions for Ushahidi deployers.

Page 3: Privacy, Security and Motivation of Crowds
Page 4: Privacy, Security and Motivation of Crowds

NETWORK DYNAMICS

Good crowdsourcing campaigns build upon the existing ties between people and their networks. There’s a natural mult-iplier, where the people in the original network become nodes for new networks and so on.

Page 5: Privacy, Security and Motivation of Crowds

❖ Participation is permission❖ Consent is not carte blanche❖ Clarity is critical❖ Trust is Earned or Burned❖ Transparency is hard to teach

EARNING TRUST

Page 6: Privacy, Security and Motivation of Crowds

❖ Protection of data is different than the protection of people/identity❖ Standards like HTTPS or SSL❖ Encryption❖ Anonymity is not a given (TOR Project)❖ The usual fail-points are still threats (weak passwords, compromised servers, careless employees)

PRIVACY

Page 7: Privacy, Security and Motivation of Crowds

❖ Verify factual occurrences (location, time, date)❖ Verify contributor identity (who?)❖ Verify contributor credentials

VALIDATION

Everything beyond these three points is an educated guess. Anyone looking to game the campaign will only be affective if they are able to compromise the aforementioned.

Page 8: Privacy, Security and Motivation of Crowds

❖ Ease of participation❖ Low risk of failure or shame❖ Social Capital ❖ Repute & Accolade❖ Barter❖ Strategic Spending ($)❖ Data Sharing❖ Altruism & Charity

MOTIVATION

Page 9: Privacy, Security and Motivation of Crowds

http://swiftly.org

PRIVACY, SECURITY, MOTIVATIONOF CROWDS