Download presentation
Presentation is loading. Please wait.
Published byBaldric Daniels Modified over 9 years ago
1
Knight News Challenge How might we make data work for individuals and communities PI is supported by
2
Watch this video and ask yourself, what is it you don’t know? THE PROBLEM
3
Information quality THE PROBLEM Resource intensive Lack of feedback Lack of security
4
Shifting the paradigm: From monologues to conversations From unstructured to structured data THE SOLUTION
5
Guided Collection THE SOLUTION When? What? How do you know? Number of victims? How do you know?Who? Where?
6
Automated Feedback Early Warning Queries THE SOLUTION Location Date and Time Type of incident PEP Kit Nearest IDP camp Fresh water
7
Automated Evaluation THE SOLUTION Relevance Source reliability Information credibility
8
Networked Verification THE SOLUTION When: Day-Month-Year Where: Location ABC What? Who? Number of victims? How do you know?
9
Smart analytics Machine learning Micro tasking THE TECHNOLOGY
10
USSD & SMS ACCESSIBILITY Smart “App” IVR & Call Centre
11
Humanitarian Charter and Protection Principles ETHICS
12
THE IMPLEMENTATION – STAKEHOLDERS
13
LIST OF MAIN FEATURES Collection What a source can do with PI: Initiate a dialogue Dialogue (Q&A) Query What a PI admin user can do with PI Initiate Define modify ad-hoc dialogue (Q&A) logic using natural language Call back or text-back with consent of the source (see Identification and evaluation of sources) What PI does Create unique references for each new dialogue
14
LIST OF MAIN FEATURES Identification and evaluation of sources What a source can do with PI: Provide identification information (person, device) Provide consent for contact Provide consent for data use What a PI admin user can do with PI Review and modify sources evaluation by PI Manually rate sources Add and link sources Blacklist spammers What PI does Deduplication/Identification of same sources Evaluate source reliability over time and per information (reliability points) Maintain list of sources who consented on being contacted Detect potential spammers
15
LIST OF MAIN FEATURES Evaluation of information What a PI admin user can do with PI: Maintain categories of events, relevant keywords, questions, associated feedback Sort reported information Review and modify information evaluation by PI Manually rate information Add and link information What PI does PI evaluates the relevance and credibility of information – Natural language processing (Eng/Fr for a start) – Event recognition – Typo correction – Triangulation – Tagging of information
16
LIST OF MAIN FEATURES Verification of information What a source can do with PI: Receive alerts to (manually) verify information Send new information related to an alert What a PI admin user can do with PI: Receive alerts to (manually) verify information Add new information related to an alert What PI does Alert about information that need to be verified
17
LIST OF MAIN FEATURES Feedback to sources What a source can do with PI: Subscribe to alerts (time bound, thematic) Query information (e.g. collected info, service providers) What a PI admin user can do with PI: Add and modify the feedback to a source Maintain updated information about available service providers (3W) What PI does Send messages to sources (e.g. collected info, service providers, contingency measures) Alert to give manual input to feedback
18
LIST OF MAIN FEATURES Output for organizations What a PI admin user can do with PI: Authorize alerts and set thresholds Subscribe to alerts (time bound, thematic) Query information (e.g. collected info, service providers (3W), dashboard) What PI does Produce info graphics Send alerts about emerging trends, dangers Propose actions to be taken Log all actions taken on reported information
19
LIST OF MAIN FEATURES Sharing data What a PI admin user can do with PI: Define redaction rules Validate redactions prior to sharing Define sharing and querying rules (incl. consent) Validate sharing What PI does: Redacts data according to redaction rules Shares data according to sharing and querying rules (incl. consent)
20
LIST OF MAIN FEATURES Privacy and security What a source can do with PI: Ask for her/his information to be destroyed Provide information anonymously What a PI admin user can do with PI: Define access rights, roles, etc. for data sharing and access to PI functions What PI does: Provide access and data security Devise dissimulation tactics (establish dialogue from another telephone line, blur important communication by making PI number a one shop all number e.g. weather, market prices, good news section)
21
THE IMPLEMENTATION – USER STORIES Family Tracing Camp Management Incident Report
22
Contact us Christophe Billen - Project Leader www.peoples-intelligence.org info@peoples-intelligence.org +31 654 763 670 This work by Stichting People’s Intelligence (KvK: 58728929) is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_US.
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.