Knight News Challenge How might we make data work for individuals and communities PI is supported by.

Slides:



Advertisements
Similar presentations
Adult HIV Outpatient PBR Tariff Development National Reference Group Meeting 21/05/10.
Advertisements

Overview of IS Controls, Auditing, and Security Fall 2005.
Addressing spam and enforcing a Do Not Registry using a Certified Electronic Mail System Information Technology Advisory Group, Inc.
Security that is... Ergonomic, Economical and Efficient! In every way! Stonesoft SSL VPN SSL VPN.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Facebook for RSVP’ers You can do it!. What Questions Do You Have? What are you wanting to learn at this training?
Information Security Policies and Standards
Service Layer Session Management Group Name: WG2-ARC Source: IDCC, LGE, ZTE Meeting Date: TP16 Agenda Item:
Google Tools and your Library - the Possibilities are Exponential Google CSE Google CSE Google Scholar Google Scholar Google My Library Google.
Computer Security: Principles and Practice
Security and Privacy in Ubiquitous Computing. Agenda Project issues? Project issues? Ubicomp quick overview Ubicomp quick overview Privacy and security.
© 2014 Cengage Learning. All Rights Reserved. May not be scanned, copied or duplicated, or posted to a publicly accessible website, in whole or in part.
© FSAI Administrative Assistance and Cooperation – a role for FLEP? FLEP Meeting BfR, Berlin 18 th -19 th February 2015 Dorothy Guina Dornan.
Voluntary Design Guidelines for Online Warnings Presented by Eliot Christian at the 2014 CAP Implementation Workshop Negombo, Sri Lanka 18 June 2014.
Two Ways to Know if a Tsunami is Coming: Natural Warnings ground shaking, a loud ocean roar, or the water receding unusually far exposing the sea floor.
Software Development Unit 2 Databases What is a database? A collection of data organised in a manner that allows access, retrieval and use of that data.
July 25, 2005 PEP Workshop, UM A Single Sign-On Identity Management System Without a Trusted Third Party Brian Richardson and Jim Greer ARIES Lab.
THE FEEDBACK SYSTEM: Enabling dialogue with beneficiaries & easy access to efficient complaints mechanisms.
Project Proposal: Academic Job Market and Application Tracker Website Project designed by: Cengiz Gunay Client: Cengiz Gunay Audience: PhD candidates and.
Towards a renewed UNESCO Website BPI/WEB – Juin 2003.
Use of OCAN in Crisis Intervention Webinar October, 2014.
S New Security Developments in DICOM Lawrence Tarbox, Ph.D Chair, DICOM WG 14 (Security) Siemens Corporate Research.
Minnesota Alliance for Patient Safety LEAPT Grant Update October, 2013.
Software Inspection A basic tool for defect removal A basic tool for defect removal Urgent need for QA and removal can be supported by inspection Urgent.
INFORMATION SYSTEMS Overview
OHT 11.1 © Marketing Insights Limited 2004 Chapter 9 Analysis and Design EC Security.
Module 7: Fundamentals of Administering Windows Server 2008.
Detecting Semantic Cloaking on the Web Baoning Wu and Brian D. Davison Lehigh University, USA WWW 2006.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
Accessibility Violations Group 6. Description Everyone naturally has right of accessibility to the places which all people can access. However, some people.
University of Toronto Department of Computer Science © Steve Easterbrook. This presentation is available free for non-commercial use with attribution.
1 Action Automated Security Breach Reporting and Corrections.
Implementation In this presentation… –Methodology –Software Development Life Cycle.
1 SMT Format Short Story April 24, 2012 ‘Access, Control & Convenience’
COOP Continuity Operations A Grass Roots Approach COL Ray Horoho OASA M&RA (TRM)
Training by the Office of Library and Information Services Contact for more information: karen.gardner- or
Future ICT Landscapes – Security and Privacy Challenges & Requirements Simone Fischer-Hübner IVA Workshop, Stockholm 24th May 2012.
Annual Monitoring & Review THE CRIMEA PILOT Continuous Review for Improvement and the Monitoring of Enhancement Activities Quality Assurance Services.
I Robot.
Analysis. Solution Requirements 1. Identify the functions and attributes of the website. 2. Write a problem statement. (What is the problem? What will.
University of Toronto at Scarborough © Kersti Wain-Bantin CSCC40 user dialogue 1 why good interface design? reduces input and usage errors lowers the cost.
Microsoft Management Seminar Series SMS 2003 Change Management.
Course # Unit 2 - OEP and PEMS. Unit 2 OEP and PEMS HQ OEP  OEP Mission  EP Website PEMS  Overview  Benefits  Current Functionality 
INDIANAUNIVERSITYINDIANAUNIVERSITY Indiana University Update Tom Zeller
The common structure and ISO 9001:2015 additions
MANAGEMENT INFORMATION, INFORMATION MANAGEMENT AND A PERFORMANCE MANAGEMENT STRATEGY YSDF THURSDAY 12, NOVEMBER, 2009.
UNCLASSIFIED – For Official Use Only 1 Contract Load Notification “Fly-in” Action ( Continue to Page Down/Click on each page…) Electronic Document Access.
Managing Agriculture KnowledgeThrough Localized CommunityExpert System Managing Agriculture Knowledge Through Localized Community Expert System A Research.
Speech Processing 1 Introduction Waldemar Skoberla phone: fax: WWW:
Building a Social Media Presence Participants will look at the BCPS social media outlets (Twitter, Facebook, Flickr, Vimeo, Instagram, blogs) and relevant.
JRA1 Meeting – 09/02/ Software Configuration Management and Integration EGEE is proposed as a project funded by the European Union under contract.
What’s Trending at EMS March 16, 2016 Emily Lager Sixth Grade School Counselor Michelle Ebert Teen Talk Counselor.
5/29/2001Y. D. Wu & M. Liu1 Content Management for Digital Library May 29, 2001.
Observations on Farmers’ Portal Portal should be in regional language. A module is to be developed where English data entry should automatically be converted.
CHRIS LEEDOM. Why Use Textmaxx Pro? Optimized for Auto Dealership Environment – Convenient and Easy – drives customer experience – Open rates.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 17 – IT Security.
SMS module HDL-MGSM.431.
Background and Overview
ServiceNow Implementation Knowledge Management
SECURITY INFORMATION AND EVENT MANAGEMENT
Social Networking Script | PHP Social Network Script - Open Source Social Networking Script- Open source social network PHP.
Unit 27: Network Operating Systems
Ethical questions on the use of big data in official statistics
Partnerships and networks
ECVAM as EU-RL according to 2010/63
SMS The following presentation will provide a brief synopsis of the key functions of the FltPlan.com FRAT system and your SMS program.
University of Kentucky E-IRB
Maintaining order and safety in a city is no small task
Development roadmap of Suomi.fi-services
Wide Ideas Idea Management Software Idea Management Process
Presentation transcript:

Knight News Challenge How might we make data work for individuals and communities PI is supported by

Watch this video and ask yourself, what is it you don’t know? THE PROBLEM

Information quality THE PROBLEM Resource intensive Lack of feedback Lack of security

Shifting the paradigm: From monologues to conversations From unstructured to structured data THE SOLUTION

Guided Collection THE SOLUTION When? What? How do you know? Number of victims? How do you know?Who? Where?

Automated Feedback Early Warning Queries THE SOLUTION Location Date and Time Type of incident PEP Kit Nearest IDP camp Fresh water

Automated Evaluation THE SOLUTION Relevance Source reliability Information credibility

Networked Verification THE SOLUTION When: Day-Month-Year Where: Location ABC What? Who? Number of victims? How do you know?

Smart analytics Machine learning Micro tasking THE TECHNOLOGY

USSD & SMS ACCESSIBILITY Smart “App” IVR & Call Centre

Humanitarian Charter and Protection Principles ETHICS

THE IMPLEMENTATION – STAKEHOLDERS

LIST OF MAIN FEATURES Collection What a source can do with PI: Initiate a dialogue Dialogue (Q&A) Query What a PI admin user can do with PI Initiate Define modify ad-hoc dialogue (Q&A) logic using natural language Call back or text-back with consent of the source (see Identification and evaluation of sources) What PI does Create unique references for each new dialogue

LIST OF MAIN FEATURES Identification and evaluation of sources What a source can do with PI: Provide identification information (person, device) Provide consent for contact Provide consent for data use What a PI admin user can do with PI Review and modify sources evaluation by PI Manually rate sources Add and link sources Blacklist spammers What PI does Deduplication/Identification of same sources Evaluate source reliability over time and per information (reliability points) Maintain list of sources who consented on being contacted Detect potential spammers

LIST OF MAIN FEATURES Evaluation of information What a PI admin user can do with PI: Maintain categories of events, relevant keywords, questions, associated feedback Sort reported information Review and modify information evaluation by PI Manually rate information Add and link information What PI does PI evaluates the relevance and credibility of information – Natural language processing (Eng/Fr for a start) – Event recognition – Typo correction – Triangulation – Tagging of information

LIST OF MAIN FEATURES Verification of information What a source can do with PI: Receive alerts to (manually) verify information Send new information related to an alert What a PI admin user can do with PI: Receive alerts to (manually) verify information Add new information related to an alert What PI does Alert about information that need to be verified

LIST OF MAIN FEATURES Feedback to sources What a source can do with PI: Subscribe to alerts (time bound, thematic) Query information (e.g. collected info, service providers) What a PI admin user can do with PI: Add and modify the feedback to a source Maintain updated information about available service providers (3W) What PI does Send messages to sources (e.g. collected info, service providers, contingency measures) Alert to give manual input to feedback

LIST OF MAIN FEATURES Output for organizations What a PI admin user can do with PI: Authorize alerts and set thresholds Subscribe to alerts (time bound, thematic) Query information (e.g. collected info, service providers (3W), dashboard) What PI does Produce info graphics Send alerts about emerging trends, dangers Propose actions to be taken Log all actions taken on reported information

LIST OF MAIN FEATURES Sharing data What a PI admin user can do with PI: Define redaction rules Validate redactions prior to sharing Define sharing and querying rules (incl. consent) Validate sharing What PI does: Redacts data according to redaction rules Shares data according to sharing and querying rules (incl. consent)

LIST OF MAIN FEATURES Privacy and security What a source can do with PI: Ask for her/his information to be destroyed Provide information anonymously What a PI admin user can do with PI: Define access rights, roles, etc. for data sharing and access to PI functions What PI does: Provide access and data security Devise dissimulation tactics (establish dialogue from another telephone line, blur important communication by making PI number a one shop all number e.g. weather, market prices, good news section)

THE IMPLEMENTATION – USER STORIES Family Tracing Camp Management Incident Report

Contact us Christophe Billen - Project Leader This work by Stichting People’s Intelligence (KvK: ) is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. To view a copy of this license, visit