SlideShare uma empresa Scribd logo
1 de 46
Panel 3
@CrisisMappers

#ICCM
You Can't Get There from Here:
Generating, Analyzing & Using Information
from Hard-to-Access Areas
Michael Kleinman
@HumanityUnited
Aditya Vashistha
@adityavash
Enabling Robust Multi-way
Communication in Crisis Scenarios
Aditya Vashistha
University of Washington
Joint work with Bill Thies at Microsoft Research India

www.ivrjunction.org
@ivrjunction
Voice Remains Primary Interface
for Mobile Subscribers
Most subscribers lack smart phones
Smart Phone: ~ 5%

Feature Phone: 50-70%
(e.g., music player)

Basic Phone: 30-50%

Mobile Internet: < 3% of subscribers

Internet Penetration is expected to be 19% in 2014
Literacy and Language Barriers
Literate
in English

Language
Known
Literate in
Other
Language

Non-Literate
Text interfaces are hindered by low literacy and language diversity!
How can we reach out to people who are low-literate?
How can we reach out to literate tribal people (limited font support)?
Designing Technology for People
Low-literate
Low SES
Dumb Phone
No Internet

Image Credit: Jayanta Shaw/Reuters/Corbis
Interactive Voice Response Systems
Connecting Unheard
Voices to Global Social Media
Phone
call

Internet
Distributed Architecture
Mumbai

New
Delhi

USA

Kenya

Affordability

Uganda

Scalability

Resilience

Coordinate Efforts in Multiple Regions
More Advantages!
• Easy to Install, Configure and Maintain
• Resilient to Intermittent Power & Internet Outages
• Resilient to Internet Crackdown by Network
Provider or Internet
• All hardware fit in a laptop bag
Setting Up ‘Your’ Voice Forum
• Laptop
• Windows OS
• Internet
• IVR Junction Software (free)

• Free Web services
• YouTube account
• SkyDrive or Dropbox account
• Facebook page

• Paid Components
• GSM or Fixed line modem
($100 per port)
• Voxeo Prophecy 11
(free for 2 ports, $298 for 4 ports)
Protect Indian Women Voice Petition
Giving Voice to the Protestors in India

IVR Junction has enabled women rights activists from all
economic backgrounds and varied literacy levels to raise their
voice for advocating women safety and empowerment.
Vehicle for Civic Engagement and
Political Stability in Somaliland
Getting News to and from Mali
Lessons Learnt
Technology Amplifies Human Intent and Capacity; It
Doesn’t Substitute for Them - Kentaro Toyoma
Use technology only when necessary!
End Users Must Trust the (Technology) System
Work with “trusted” grassroots organizations!
Lessons Learnt
More Data is not Always Good; BAD Data Hurts!
Facts verification is critical especially in crisis
mapping!
Don’t Overestimate or Underestimate End Users
Some people struggle with even IVR and SMS;
Intrinsic motivation and intermediated use enable
some to perform complex tasks
Over 20,000 Voices Heard

Thank you!

@adityavash
Christophe Billen
@PeopleIntel
Limits to crowdsourcing HR
violations
• Lack of quality information
• No (standard) taxonomy
• Lack of source evaluation
• Deduplication, verification and analysis
hampered

• Lack of feedback loops and empowerment
• Data security and users’ safety
How to address these
issues?
• Paradigm shift: from monologue to dialogue
• Low-tech (SMS or USSD)
• 5W1H questions
• Semantic and syntactic analyses combined with
machine learning and micro-tasking

• Ethics
Challenges
• Users’ safety and data security (USSD?)
• Low literacy rates and vernacular languages
(IVR + microtasking)

• Sensitization of user base
• Buy-in from NGOs and IOs
• Funding
Next steps
• ICCM Self-organized session @ 15:30 Room 7
• Finalize market research/SWOT analysis with OSJI
• Requirement analysis + Feasibility plan
• First prototype
• Pilot in situations
Web: www.peoples-intelligence.org
Mail: c.billen@peoples-intelligence.org

Twitter: @PeopleIntel
Call: +31 654 76 36 70
Nathaniel Raymond
@nattyray11
Nat Walker
@nat_EWER
Generating, Mapping and Analyzing
Conflict Data
An Overview of Civil Society, Liberian
Government and United Nations
Collaboration in Liberia
Early Warning / Early Response
Actors
 Comprise of civil society organizations, government
agencies, UN agencies and other international partners
working on issues of peacebuilding and conflict
prevention.
 With support from Humanity United and other
partners, the Liberia Peacebuilding Office coordinates
the group
 EWER Working Group comprises of 27 plus
organizations and a large network of communitybased reporters that work to provide relevant data via
frontline sms for the EWER incident-reporting
map, developed by Ushahidi (www.lern.ushahidi.com)
How does the group Work?
Organizations are grouped into clusters according
to their individual thematic focus ( some
organizations are in more than one cluster):

1. Warning
2. Response
3. Technology
4. Research
Strategic Approach to EWER in
Liberia
SA #1
The creation and support of a nationwide network
comprising of civil society, government and United
Nation organizations that are:
a. Collaborating and sharing information relating to
issues that could lead to widespread violence while
b. Formulating recommendations for policy makers on
ways of addressing those issues that threaten
peace and national security
Strategic Approach to EWER in
Liberia
SA #2
• The development of a community based early
warning and early response system involving
county peace committees which help identify
local conflict factors; and resolve and
transform these local conflicts through
mediation, dialogue and other community
initiatives.
SA #3
• Linking community based early warning / early
response actors with the Government’s
regional justice and security system through
rapid response centers in three regional hubs
What are we trying to achieve?
Short Term (1-3 years)

OUTPUS

OUTCOMES

IMPACT

Major potential community
violent conflicts in Liberia are
detected, mapped and dealt with
before escalating to the county
and national level.

1. Peacebuilding Office has the capacity to
collect, mapped assess and communicate
information on potential threat to peace both
at the community and national levels
2. Information from Community based EWER
systems reaches relevant decision makers and
the public, and informs early action in the
form of contingency planning and early
response for national and county level
3. Members of county peace committees are
trained to identify and report on ewer issues
and engage in first stage early response
activities

1. EWER through a
network of civil
society actors (
EWER Working
group)

2. EWER through
county peace
committees and other
community level
actors
How Short term?
Medium term
Existing initiatives

EWER Working group

Establishing a
community
based ewer
mechanism
involving
peace
committees

New initiatives/pilot
studies
EWER small
grants
initiatives to
build
capacity, moti
vate and
enable CSO to
engaged in
response
activities

1. Expand collection
and mapping
capabilities
2. Consolidation
3. Establishing
community managed
rapid response pool
fund
4. Comm-police rapid
response centers at
three regional hubs
ER Course of Action
• Watch – aggregate information as reports come
in
• Inquire – actively seek additional information
for ongoing analysis
• Analyze – conduct in-depth analysis with a view
of generating possible response
options, including setting up task forces to
intervene where necessary
• Refer – make referrals to state security
agencies, peace committees, etc
• Close – the issue is resolved and no further
action is anticipated
A snapshot of the LERN platform
Some Lessons Learned Relating to
Mapping
• One will expect a low tech data collection method
like sms to be simple, but it proved difficult for some
• Constant feedback to reporters on data utilization is
necessary for motivation
• Mapping and even collating conflict trend data is
meaningless unless it comes with recommendations
for possible response
• Individual organization working early warning
achieve far less than when they operate in networks
and integrate their work in a coordinated manner
Contact
•
•
•
•
•

natwalker2002@yahoo.com
nwalker@lpbo.org
+231886944659 (Liberia)
+7736964565(USA)
natwalker2(skype)
Aditya Vashistha
@adityavash

Christophe Billen
@PeopleIntel

Nathaniel Raymond
@nattyray11

Nat Walker
@nat_EWER
Thanks for participating!
@CrisisMappers

#ICCM
CrisisMappers 2013

Many thanks to our sponsors!

Mais conteúdo relacionado

Mais procurados

Native Public Media Presentation 8.10.09
Native Public Media Presentation 8.10.09Native Public Media Presentation 8.10.09
Native Public Media Presentation 8.10.09MidwestRuralAssembly
 
Introduction to Media and Information Literacy
Introduction to Media and Information LiteracyIntroduction to Media and Information Literacy
Introduction to Media and Information LiteracyMaryMaeHero1
 
Internet censorship research paper
Internet censorship research paperInternet censorship research paper
Internet censorship research paperChirine Hamdan
 
Technology, human rights & movement building around the world
Technology, human rights & movement building around the worldTechnology, human rights & movement building around the world
Technology, human rights & movement building around the worldTechSoup Canada
 
Marsden Disinformation Algorithms #IGF2019
Marsden Disinformation Algorithms #IGF2019 Marsden Disinformation Algorithms #IGF2019
Marsden Disinformation Algorithms #IGF2019 Chris Marsden
 

Mais procurados (11)

Internet
InternetInternet
Internet
 
INTS2310_PUNZO_EC
INTS2310_PUNZO_ECINTS2310_PUNZO_EC
INTS2310_PUNZO_EC
 
Mobile Media
Mobile MediaMobile Media
Mobile Media
 
adeel mughal
adeel mughal adeel mughal
adeel mughal
 
Native Public Media Presentation 8.10.09
Native Public Media Presentation 8.10.09Native Public Media Presentation 8.10.09
Native Public Media Presentation 8.10.09
 
Introduction to Media and Information Literacy
Introduction to Media and Information LiteracyIntroduction to Media and Information Literacy
Introduction to Media and Information Literacy
 
Internet censorship research paper
Internet censorship research paperInternet censorship research paper
Internet censorship research paper
 
Brooks18
Brooks18Brooks18
Brooks18
 
Technology, human rights & movement building around the world
Technology, human rights & movement building around the worldTechnology, human rights & movement building around the world
Technology, human rights & movement building around the world
 
Empowerment technologies
Empowerment technologiesEmpowerment technologies
Empowerment technologies
 
Marsden Disinformation Algorithms #IGF2019
Marsden Disinformation Algorithms #IGF2019 Marsden Disinformation Algorithms #IGF2019
Marsden Disinformation Algorithms #IGF2019
 

Destaque

ICCM 2013 Panel 1: What's so Big about Big Data?
ICCM 2013 Panel 1: What's so Big about Big Data?ICCM 2013 Panel 1: What's so Big about Big Data?
ICCM 2013 Panel 1: What's so Big about Big Data?Tom Weinandy
 
ICCM 2013 Ignite Session 2
ICCM 2013 Ignite Session 2ICCM 2013 Ignite Session 2
ICCM 2013 Ignite Session 2Tom Weinandy
 
ICCM 2013 Panel 2: Crisis Mapping for Conflict Management
ICCM 2013 Panel 2: Crisis Mapping for Conflict ManagementICCM 2013 Panel 2: Crisis Mapping for Conflict Management
ICCM 2013 Panel 2: Crisis Mapping for Conflict ManagementTom Weinandy
 
ICCM 2013 Keynote: Andrej Verity
ICCM 2013 Keynote: Andrej VerityICCM 2013 Keynote: Andrej Verity
ICCM 2013 Keynote: Andrej VerityTom Weinandy
 
ICCM 2013 Westgate Panel Slides
ICCM 2013 Westgate Panel SlidesICCM 2013 Westgate Panel Slides
ICCM 2013 Westgate Panel SlidesTom Weinandy
 

Destaque (7)

ICCM 2013 Panel 1: What's so Big about Big Data?
ICCM 2013 Panel 1: What's so Big about Big Data?ICCM 2013 Panel 1: What's so Big about Big Data?
ICCM 2013 Panel 1: What's so Big about Big Data?
 
ICCM 2013 Ignite Session 2
ICCM 2013 Ignite Session 2ICCM 2013 Ignite Session 2
ICCM 2013 Ignite Session 2
 
Crisis Mapping
Crisis MappingCrisis Mapping
Crisis Mapping
 
Complementary and Alternative Therapies for Lupus
Complementary and Alternative Therapies for LupusComplementary and Alternative Therapies for Lupus
Complementary and Alternative Therapies for Lupus
 
ICCM 2013 Panel 2: Crisis Mapping for Conflict Management
ICCM 2013 Panel 2: Crisis Mapping for Conflict ManagementICCM 2013 Panel 2: Crisis Mapping for Conflict Management
ICCM 2013 Panel 2: Crisis Mapping for Conflict Management
 
ICCM 2013 Keynote: Andrej Verity
ICCM 2013 Keynote: Andrej VerityICCM 2013 Keynote: Andrej Verity
ICCM 2013 Keynote: Andrej Verity
 
ICCM 2013 Westgate Panel Slides
ICCM 2013 Westgate Panel SlidesICCM 2013 Westgate Panel Slides
ICCM 2013 Westgate Panel Slides
 

Semelhante a Generating, Analyzing & Using Information from Hard-to-Access Areas

Exploring Examples of Mobile Technologies in Development
Exploring Examples of Mobile Technologies in DevelopmentExploring Examples of Mobile Technologies in Development
Exploring Examples of Mobile Technologies in DevelopmentDevelopment Innovations
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copySara-Jayne Terp
 
Report on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhiReport on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhiShreedeep Rayamajhi
 
Digital citizen feedback report final
Digital citizen feedback report finalDigital citizen feedback report final
Digital citizen feedback report finalLoren Treisman
 
ICT4D Plan US Workshop Sept 09
ICT4D Plan US Workshop Sept 09ICT4D Plan US Workshop Sept 09
ICT4D Plan US Workshop Sept 09Linda Raftree
 
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraeParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraVictor van R
 
ICT4D Principle 6 - Open Standards, Open Data, Open Source, & Open Innovation
ICT4D Principle 6 - Open Standards, Open Data, Open Source, & Open InnovationICT4D Principle 6 - Open Standards, Open Data, Open Source, & Open Innovation
ICT4D Principle 6 - Open Standards, Open Data, Open Source, & Open Innovationmsissine
 
Countering Electoral Interference
Countering Electoral InterferenceCountering Electoral Interference
Countering Electoral InterferenceOECD Governance
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umarylandSara-Jayne Terp
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTAimee Shuck
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Managementguestc9f21b
 
Contributing to evidence-based policy making
Contributing to evidence-based policy making  Contributing to evidence-based policy making
Contributing to evidence-based policy making ILRI
 
No Money, No Problem - A Scalable Approach to Social Media Monitoring
No Money, No Problem - A Scalable Approach to Social Media MonitoringNo Money, No Problem - A Scalable Approach to Social Media Monitoring
No Money, No Problem - A Scalable Approach to Social Media MonitoringTamer Hadi
 
Homelessness Prevention Project and Prototypes
Homelessness Prevention Project and PrototypesHomelessness Prevention Project and Prototypes
Homelessness Prevention Project and PrototypesPolicy Lab
 
Importance of information system in raising public awareness about domestic v...
Importance of information system in raising public awareness about domestic v...Importance of information system in raising public awareness about domestic v...
Importance of information system in raising public awareness about domestic v...Masum Hussain
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureAnn Treacy
 

Semelhante a Generating, Analyzing & Using Information from Hard-to-Access Areas (20)

Exploring Examples of Mobile Technologies in Development
Exploring Examples of Mobile Technologies in DevelopmentExploring Examples of Mobile Technologies in Development
Exploring Examples of Mobile Technologies in Development
 
Challenge of Technology Mediated Social Participation
Challenge of Technology Mediated Social ParticipationChallenge of Technology Mediated Social Participation
Challenge of Technology Mediated Social Participation
 
2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy2019 11 terp_mansonbulletproof_master copy
2019 11 terp_mansonbulletproof_master copy
 
Report on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhiReport on cyber security fishbowl by shreedeep rayamajhi
Report on cyber security fishbowl by shreedeep rayamajhi
 
Digital citizen feedback report final
Digital citizen feedback report finalDigital citizen feedback report final
Digital citizen feedback report final
 
ICT4D Plan US Workshop Sept 09
ICT4D Plan US Workshop Sept 09ICT4D Plan US Workshop Sept 09
ICT4D Plan US Workshop Sept 09
 
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu MatoraeParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
eParticipation in East Africa: Theory, platforms and cases - Amahoro Mu Matora
 
ICT4D Principle 6 - Open Standards, Open Data, Open Source, & Open Innovation
ICT4D Principle 6 - Open Standards, Open Data, Open Source, & Open InnovationICT4D Principle 6 - Open Standards, Open Data, Open Source, & Open Innovation
ICT4D Principle 6 - Open Standards, Open Data, Open Source, & Open Innovation
 
Maverick
MaverickMaverick
Maverick
 
Countering Electoral Interference
Countering Electoral InterferenceCountering Electoral Interference
Countering Electoral Interference
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
 
CybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINTCybersecurityTFReport2016 PRINT
CybersecurityTFReport2016 PRINT
 
An Online Social Network for Emergency Management
An Online Social Network for Emergency ManagementAn Online Social Network for Emergency Management
An Online Social Network for Emergency Management
 
Contributing to evidence-based policy making
Contributing to evidence-based policy making  Contributing to evidence-based policy making
Contributing to evidence-based policy making
 
No Money, No Problem - A Scalable Approach to Social Media Monitoring
No Money, No Problem - A Scalable Approach to Social Media MonitoringNo Money, No Problem - A Scalable Approach to Social Media Monitoring
No Money, No Problem - A Scalable Approach to Social Media Monitoring
 
2007 un dss class before one briefing
2007 un dss class before one briefing2007 un dss class before one briefing
2007 un dss class before one briefing
 
Six Degrees of Seperation: Using network theory to influence decision-making
Six Degrees of Seperation: Using network theory to influence decision-makingSix Degrees of Seperation: Using network theory to influence decision-making
Six Degrees of Seperation: Using network theory to influence decision-making
 
Homelessness Prevention Project and Prototypes
Homelessness Prevention Project and PrototypesHomelessness Prevention Project and Prototypes
Homelessness Prevention Project and Prototypes
 
Importance of information system in raising public awareness about domestic v...
Importance of information system in raising public awareness about domestic v...Importance of information system in raising public awareness about domestic v...
Importance of information system in raising public awareness about domestic v...
 
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband InfrastrcutureSecurity, Vulnerability & Redundancy in MN Broadband Infrastrcuture
Security, Vulnerability & Redundancy in MN Broadband Infrastrcuture
 

Mais de Tom Weinandy

Big Data Hubris: Limitations in Aggregating Uber and Google Data
Big Data Hubris: Limitations in Aggregating Uber and Google DataBig Data Hubris: Limitations in Aggregating Uber and Google Data
Big Data Hubris: Limitations in Aggregating Uber and Google DataTom Weinandy
 
Is a Recession Coming? The Good, the Bad and the Ugly of Economic Trends
Is a Recession Coming? The Good, the Bad and the Ugly of Economic TrendsIs a Recession Coming? The Good, the Bad and the Ugly of Economic Trends
Is a Recession Coming? The Good, the Bad and the Ugly of Economic TrendsTom Weinandy
 
ICCM 2013 Ignite Session 1
ICCM 2013 Ignite Session 1ICCM 2013 Ignite Session 1
ICCM 2013 Ignite Session 1Tom Weinandy
 
ICCM 2013 Opening Remarks
ICCM 2013 Opening RemarksICCM 2013 Opening Remarks
ICCM 2013 Opening RemarksTom Weinandy
 
Major in Social Entrepreneurship Proposal
Major in Social Entrepreneurship ProposalMajor in Social Entrepreneurship Proposal
Major in Social Entrepreneurship ProposalTom Weinandy
 
The Impact of Domestic and International Immersion Experiences on Students
The Impact of Domestic and International Immersion Experiences on StudentsThe Impact of Domestic and International Immersion Experiences on Students
The Impact of Domestic and International Immersion Experiences on StudentsTom Weinandy
 
A Major in Social Entrepreneurship
A Major in Social EntrepreneurshipA Major in Social Entrepreneurship
A Major in Social EntrepreneurshipTom Weinandy
 
How Do You View the World?
How Do You View the World?How Do You View the World?
How Do You View the World?Tom Weinandy
 
Social entrepreneurship
Social entrepreneurshipSocial entrepreneurship
Social entrepreneurshipTom Weinandy
 

Mais de Tom Weinandy (9)

Big Data Hubris: Limitations in Aggregating Uber and Google Data
Big Data Hubris: Limitations in Aggregating Uber and Google DataBig Data Hubris: Limitations in Aggregating Uber and Google Data
Big Data Hubris: Limitations in Aggregating Uber and Google Data
 
Is a Recession Coming? The Good, the Bad and the Ugly of Economic Trends
Is a Recession Coming? The Good, the Bad and the Ugly of Economic TrendsIs a Recession Coming? The Good, the Bad and the Ugly of Economic Trends
Is a Recession Coming? The Good, the Bad and the Ugly of Economic Trends
 
ICCM 2013 Ignite Session 1
ICCM 2013 Ignite Session 1ICCM 2013 Ignite Session 1
ICCM 2013 Ignite Session 1
 
ICCM 2013 Opening Remarks
ICCM 2013 Opening RemarksICCM 2013 Opening Remarks
ICCM 2013 Opening Remarks
 
Major in Social Entrepreneurship Proposal
Major in Social Entrepreneurship ProposalMajor in Social Entrepreneurship Proposal
Major in Social Entrepreneurship Proposal
 
The Impact of Domestic and International Immersion Experiences on Students
The Impact of Domestic and International Immersion Experiences on StudentsThe Impact of Domestic and International Immersion Experiences on Students
The Impact of Domestic and International Immersion Experiences on Students
 
A Major in Social Entrepreneurship
A Major in Social EntrepreneurshipA Major in Social Entrepreneurship
A Major in Social Entrepreneurship
 
How Do You View the World?
How Do You View the World?How Do You View the World?
How Do You View the World?
 
Social entrepreneurship
Social entrepreneurshipSocial entrepreneurship
Social entrepreneurship
 

Último

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 

Último (20)

The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 

Generating, Analyzing & Using Information from Hard-to-Access Areas

  • 2. You Can't Get There from Here: Generating, Analyzing & Using Information from Hard-to-Access Areas
  • 5. Enabling Robust Multi-way Communication in Crisis Scenarios Aditya Vashistha University of Washington Joint work with Bill Thies at Microsoft Research India www.ivrjunction.org @ivrjunction
  • 6. Voice Remains Primary Interface for Mobile Subscribers Most subscribers lack smart phones Smart Phone: ~ 5% Feature Phone: 50-70% (e.g., music player) Basic Phone: 30-50% Mobile Internet: < 3% of subscribers Internet Penetration is expected to be 19% in 2014
  • 7. Literacy and Language Barriers Literate in English Language Known Literate in Other Language Non-Literate Text interfaces are hindered by low literacy and language diversity! How can we reach out to people who are low-literate? How can we reach out to literate tribal people (limited font support)?
  • 8. Designing Technology for People Low-literate Low SES Dumb Phone No Internet Image Credit: Jayanta Shaw/Reuters/Corbis
  • 9.
  • 11. Connecting Unheard Voices to Global Social Media Phone call Internet
  • 13. More Advantages! • Easy to Install, Configure and Maintain • Resilient to Intermittent Power & Internet Outages • Resilient to Internet Crackdown by Network Provider or Internet • All hardware fit in a laptop bag
  • 14. Setting Up ‘Your’ Voice Forum • Laptop • Windows OS • Internet • IVR Junction Software (free) • Free Web services • YouTube account • SkyDrive or Dropbox account • Facebook page • Paid Components • GSM or Fixed line modem ($100 per port) • Voxeo Prophecy 11 (free for 2 ports, $298 for 4 ports)
  • 15. Protect Indian Women Voice Petition Giving Voice to the Protestors in India IVR Junction has enabled women rights activists from all economic backgrounds and varied literacy levels to raise their voice for advocating women safety and empowerment.
  • 16. Vehicle for Civic Engagement and Political Stability in Somaliland
  • 17.
  • 18. Getting News to and from Mali
  • 19. Lessons Learnt Technology Amplifies Human Intent and Capacity; It Doesn’t Substitute for Them - Kentaro Toyoma Use technology only when necessary! End Users Must Trust the (Technology) System Work with “trusted” grassroots organizations!
  • 20. Lessons Learnt More Data is not Always Good; BAD Data Hurts! Facts verification is critical especially in crisis mapping! Don’t Overestimate or Underestimate End Users Some people struggle with even IVR and SMS; Intrinsic motivation and intermediated use enable some to perform complex tasks
  • 21. Over 20,000 Voices Heard Thank you! @adityavash
  • 23. Limits to crowdsourcing HR violations • Lack of quality information • No (standard) taxonomy • Lack of source evaluation • Deduplication, verification and analysis hampered • Lack of feedback loops and empowerment • Data security and users’ safety
  • 24. How to address these issues? • Paradigm shift: from monologue to dialogue • Low-tech (SMS or USSD) • 5W1H questions • Semantic and syntactic analyses combined with machine learning and micro-tasking • Ethics
  • 25.
  • 26.
  • 27. Challenges • Users’ safety and data security (USSD?) • Low literacy rates and vernacular languages (IVR + microtasking) • Sensitization of user base • Buy-in from NGOs and IOs • Funding
  • 28. Next steps • ICCM Self-organized session @ 15:30 Room 7 • Finalize market research/SWOT analysis with OSJI • Requirement analysis + Feasibility plan • First prototype • Pilot in situations
  • 32. Generating, Mapping and Analyzing Conflict Data An Overview of Civil Society, Liberian Government and United Nations Collaboration in Liberia
  • 33. Early Warning / Early Response Actors  Comprise of civil society organizations, government agencies, UN agencies and other international partners working on issues of peacebuilding and conflict prevention.  With support from Humanity United and other partners, the Liberia Peacebuilding Office coordinates the group  EWER Working Group comprises of 27 plus organizations and a large network of communitybased reporters that work to provide relevant data via frontline sms for the EWER incident-reporting map, developed by Ushahidi (www.lern.ushahidi.com)
  • 34. How does the group Work? Organizations are grouped into clusters according to their individual thematic focus ( some organizations are in more than one cluster): 1. Warning 2. Response 3. Technology 4. Research
  • 35. Strategic Approach to EWER in Liberia SA #1 The creation and support of a nationwide network comprising of civil society, government and United Nation organizations that are: a. Collaborating and sharing information relating to issues that could lead to widespread violence while b. Formulating recommendations for policy makers on ways of addressing those issues that threaten peace and national security
  • 36. Strategic Approach to EWER in Liberia SA #2 • The development of a community based early warning and early response system involving county peace committees which help identify local conflict factors; and resolve and transform these local conflicts through mediation, dialogue and other community initiatives.
  • 37. SA #3 • Linking community based early warning / early response actors with the Government’s regional justice and security system through rapid response centers in three regional hubs
  • 38. What are we trying to achieve? Short Term (1-3 years) OUTPUS OUTCOMES IMPACT Major potential community violent conflicts in Liberia are detected, mapped and dealt with before escalating to the county and national level. 1. Peacebuilding Office has the capacity to collect, mapped assess and communicate information on potential threat to peace both at the community and national levels 2. Information from Community based EWER systems reaches relevant decision makers and the public, and informs early action in the form of contingency planning and early response for national and county level 3. Members of county peace committees are trained to identify and report on ewer issues and engage in first stage early response activities 1. EWER through a network of civil society actors ( EWER Working group) 2. EWER through county peace committees and other community level actors
  • 39. How Short term? Medium term Existing initiatives EWER Working group Establishing a community based ewer mechanism involving peace committees New initiatives/pilot studies EWER small grants initiatives to build capacity, moti vate and enable CSO to engaged in response activities 1. Expand collection and mapping capabilities 2. Consolidation 3. Establishing community managed rapid response pool fund 4. Comm-police rapid response centers at three regional hubs
  • 40. ER Course of Action • Watch – aggregate information as reports come in • Inquire – actively seek additional information for ongoing analysis • Analyze – conduct in-depth analysis with a view of generating possible response options, including setting up task forces to intervene where necessary • Refer – make referrals to state security agencies, peace committees, etc • Close – the issue is resolved and no further action is anticipated
  • 41. A snapshot of the LERN platform
  • 42. Some Lessons Learned Relating to Mapping • One will expect a low tech data collection method like sms to be simple, but it proved difficult for some • Constant feedback to reporters on data utilization is necessary for motivation • Mapping and even collating conflict trend data is meaningless unless it comes with recommendations for possible response • Individual organization working early warning achieve far less than when they operate in networks and integrate their work in a coordinated manner
  • 46. CrisisMappers 2013 Many thanks to our sponsors!

Notas do Editor

  1. No data connection. Though overtime people will have more smart phones, it will still take a decade or two to fix the illiteracy problem. Internet penetration is very low even in small towns. But it is not a question of device. It’s a question of how people use a phone. People will continue to use the phone for voice communication
  2. Stress on language diversity as well. How to customize UI?
  3. Various socio-economic constraints: Earn less than $100 a monthDevice constraints: Basic mobile phone,No GPSHave no or low-literacy
  4. Great Adoption!Intuitive to UseExpensiveIsolatedExtremely Hard toInstallConfigureMaintain
  5. There are now 6 billion mobile phone subscribers around the world. The vast majority of these users are in the developing world.However, the capabilities of most mobile subscribers is far less than what we enjoy in rich countries. Most mobile subscribers have basic phones that support only voice calls and SMS. While they can use their phones to consume information – news, weather, sports, etc. – it is difficult or impossible for low-income users to be producers of information. In the world of the Internet, what proved most transformative was the ability for everyone to become a producer of user-generated content. How can we enable everyone to have a voice on the Internet, even if they have only a basic cell phone and limited literacy?IVR Junction accomplishes this goal by connecting an Interactive Voice Response (IVR) system with global social media.Using IVR Junction, users place a phone call to a server, which anyone can configure using our software, a laptop, and an off-the-shelf modem. IVR Junction synchronizes these recordings with standard cloud-based services, including Facebook, YouTube, and SkyDrive. This enables anyone with a mobile phone to gain a global audience of millions of people. It also enables optional moderation of content using administrator features on YouTube.
  6. The distributed architecture of IVR Junction enables not only affordability, but also flexibility and resilience to crackdown. Suppose that the physical location of one of the IVR Junction nodes is compromised. In this case, voice forum facilitators don’t need to shut down the whole service. What they need to do is to set up another node in the same geographic location. As soon as the new node (i.e., a new installation on a different laptop) is connected to the other nodes, it will automatically recover all the data, will be functional and start servicing the users of that geographic region/calling region of the crisis-ridden country immediately. Even if one node is compromised and is controlled by the people who are trying to shut down the service, the compromised node will be unable to distort or destroy the data collected using other nodes of IVR Junction. The only way to destroy or distort the data collected using all nodes of IVR Junction would be to take control of the master ship, which in this case is the content moderation channel (YouTube) which can be controlled from anywhere in the world and is resilient to local crackdown.
  7. The biggest strength of our solution is that any individual or organization can set up a robust two-way communication portal in a few hours and run the whole IVR system just from an ordinary Windows-based laptop (no fancy servers required!). In most of the developing countries and crisis ridden countries, many geographic locations have intermittent availability of electricity and Internet connectivity. IVR Junction is designed to run on a low-end laptop or computer. The low cost, ease of deployment and mobility of the laptop enables non-expert users to set up the system by themselves. Also, while the GSM modem requires an electrical outlet, the remainder of IVR Junction is tolerant to intermittent power and Internet outages. The modems are low-powered and can work with an external battery or solar panel in case of power outages. Each local repository is synchronized with the cloud in an opportunistic manner, depending on the available Internet connectivity. The access points of IVR Junction can be scaled up to support many parallel callers. Modems can be added incrementally, with calls forwarded between numbers that are busy (i.e. by using line hunting logic). The whole IVR system and hardware, laptop installed with IVR Junction, GSM modems, GSM SIM cards, external battery or solar panel and USB dongle for Internet, can fit into a laptop bag. This provides an excellent opportunity to change the location and set it up again in case of threat of natural disaster or physical crackdown Conflicts and crises often occur in places where existing telecommunications and Internet infrastructure can become unreliable, compromised and even manipulated by those seeking to do harm during a crisis. In the extreme scenario of a long-term, nationwide crackdown on Internet services within a country, the IVR Junction server and data can easily be ported to a Universal International Freephone Number15 which is hosted in a different country.
  8. Explain the components as you are describing themi.e. Utility of Dropbox/SkyDrive, YouTube Channel, Prophecy etc.
  9. IVR Junction is enabling women rights activists from all economic backgrounds and varied literacy levels to use their phones to raise their voice for advocating women safety and empowerment.IVR Junction is used to create a new kind of petition which is:More persuasiveWell articulated Emotionally effectiveAnd displays stronger association with a cause
  10. Somaliland has a functioning and organic democracy that combines the traditional tribal representation and elected parliamentarians.But there is a disconnectbetween ruling elites and the public which leads to instability and misinformationbecause of the fragile tribal structure in the region. Commerce and media outlets are concentrated in cities like Hargeisa, Barbra and Burco. This imbalance of regions creates a sense of political alienation between rural communities and the capital city.a) The state-owned radio, newspapers do not reach remote areasb) Newspapers have regional, tribal and political affiliation. This leads to facts distortion and misinterpretation. This media fragmentation causes instability especially in tribal and conflict zones as study commissioned by Somaliland’s Academy of Peace and Development.Newspapers are the main source of critical information, but literacy level is too low, which makes it difficult for majority of the population to get accurate information. We want to examine how audio feed of public institutions and important figures can decrease misinformation, which a major problem in Somaliland.
  11. IVR Junction has enabled a live audio discussion forum on the official parliament website of Somaliland! Both members of parliament as well as ordinary citizens discussed on the issues related to governance.  This webpage is just one click away from the parliament home page. (About the Parliament -&gt; Public Feedback).
  12. People in Mali can now call a number to listen 3 minute news broadcast by Voice of AmericaThey can also record their feedback, comments, questions and news itemsAll user generated recordings are accessible on a YouTube channel for global audience
  13. We are deploying IVR Junction with numerous partners around the world. Example deployments include:In Mali, the Voice of America is using IVR Junction to disseminate news and collect feedback from listeners.In Somaliland, the parliament is using IVR Junction to foster two-way communication between legislators and the rural population.In India, we are using IVR Junction in support of women’s rights dialogues as well as a cultural channel for the visually impaired.Collectively the system has recorded messages from over 20,000 callers.