22
Knight News Challenge How might we make data work for individuals and communities is supported by

Knight News Challenge How might we make data work for individuals and communities PI is supported by

Embed Size (px)

Citation preview

Peoples Intelligence

Knight News ChallengeHow might we make data work for individuals and communities

PIis supported by

1Geneva 23-25 July 2014Watch this video and ask yourself, what is it you dont know? THE Problem

Geneva 23-25 July 20142Information qualityTHE ProblemResource intensiveLack of feedbackLack of security

Geneva 23-25 July 20143Shifting the paradigm:From monologues to conversationsFrom unstructured to structured data

THE SOLUTIONGuided CollectionTHE SOLUTIONWhen?What?

How do you know?

Number of victims?

How do you know?

Who?

Where?

5Geneva 23-25 July 2014Automated FeedbackEarly WarningQueries

THE SOLUTIONLocationDate and TimeType of incident

PEP KitNearest IDP campFresh water

Automated EvaluationTHE SOLUTIONRelevanceSource reliability

Information credibility

Networked VerificationTHE SOLUTIONWhen:Day-Month-YearWhere:Location ABCWhat?

Who?

Number of victims?

How do you know?

Smart analytics

Machine learning

Micro tasking

THE TECHNOLOGY

USSD & SMS

ACCESSIBILITYSmart App

IVR & Call Centre

Humanitarian Charter and Protection Principles

Ethics

THE IMPLEMENTATION STAKEHOLDERS

List of main featuresCollectionWhat a source can do with PI: Initiate a dialogueDialogue (Q&A)QueryWhat a PI admin user can do with PIInitiateDefine modify ad-hoc dialogue (Q&A) logic using natural languageCall back or text-back with consent of the source (see Identification and evaluation of sources)What PI doesCreate unique references for each new dialogue

List of main featuresIdentification and evaluation of sourcesWhat a source can do with PI: Provide identification information (person, device)Provide consent for contactProvide consent for data useWhat a PI admin user can do with PIReview and modify sources evaluation by PIManually rate sourcesAdd and link sourcesBlacklist spammersWhat PI doesDeduplication/Identification of same sourcesEvaluate source reliability over time and per information (reliability points) Maintain list of sources who consented on being contactedDetect potential spammers

List of main featuresEvaluation of informationWhat a PI admin user can do with PI:Maintain categories of events, relevant keywords, questions, associated feedbackSort reported informationReview and modify information evaluation by PIManually rate informationAdd and link informationWhat PI doesPI evaluates the relevance and credibility of information Natural language processing (Eng/Fr for a start)Event recognitionTypo correctionTriangulationTagging of information

List of main featuresVerification of informationWhat a source can do with PI:Receive alerts to (manually) verify informationSend new information related to an alert What a PI admin user can do with PI:Receive alerts to (manually) verify informationAdd new information related to an alertWhat PI doesAlert about information that need to be verifiedList of main featuresFeedback to sourcesWhat a source can do with PI:Subscribe to alerts (time bound, thematic) Query information (e.g. collected info, service providers) What a PI admin user can do with PI:Add and modify the feedback to a sourceMaintain updated information about available service providers (3W)What PI doesSend messages to sources (e.g. collected info, service providers, contingency measures)Alert to give manual input to feedback

List of main featuresOutput for organizationsWhat a PI admin user can do with PI:Authorize alerts and set thresholdsSubscribe to alerts (time bound, thematic) Query information (e.g. collected info, service providers (3W), dashboard) What PI doesProduce info graphicsSend alerts about emerging trends, dangersPropose actions to be takenLog all actions taken on reported information

List of main featuresSharing dataWhat a PI admin user can do with PI:Define redaction rulesValidate redactions prior to sharingDefine sharing and querying rules (incl. consent)Validate sharingWhat PI does:Redacts data according to redaction rulesShares data according to sharing and querying rules (incl. consent)List of main featuresPrivacy and securityWhat a source can do with PI:Ask for her/his information to be destroyedProvide information anonymouslyWhat a PI admin user can do with PI:Define access rights, roles, etc. for data sharing and access to PI functionsWhat PI does:Provide access and data security Devise dissimulation tactics (establish dialogue from another telephone line, blur important communication by making PI number a one shop all number e.g. weather, market prices, good news section)

THE IMPLEMENTATION User Stories

Family TracingCamp Management

Incident Report

ICRC Family TracingI am safe and wellI am searching for a missing personI recognized a childManaging volunteers

IOM-UNHCR Camp ManagementCamp profiling and managementQuerying PI about availability of servicesMaintain 3W info up to datePopulation movements

FPU Incident ReportI am afraid

Geneva 23-25 July 201421Contact usChristophe Billen - Project [email protected] +31 654 763 670

This work by Stichting Peoples Intelligence (KvK: 58728929) is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_US.