knight news challenge how might we make data work for individuals and communities pi is supported by
Post on 31-Dec-2015
217 Views
Preview:
TRANSCRIPT
Peoples Intelligence
Knight News ChallengeHow might we make data work for individuals and communities
PIis supported by
1Geneva 23-25 July 2014Watch this video and ask yourself, what is it you dont know? THE Problem
Geneva 23-25 July 20142Information qualityTHE ProblemResource intensiveLack of feedbackLack of security
Geneva 23-25 July 20143Shifting the paradigm:From monologues to conversationsFrom unstructured to structured data
THE SOLUTIONGuided CollectionTHE SOLUTIONWhen?What?
How do you know?
Number of victims?
How do you know?
Who?
Where?
5Geneva 23-25 July 2014Automated FeedbackEarly WarningQueries
THE SOLUTIONLocationDate and TimeType of incident
PEP KitNearest IDP campFresh water
Automated EvaluationTHE SOLUTIONRelevanceSource reliability
Information credibility
Networked VerificationTHE SOLUTIONWhen:Day-Month-YearWhere:Location ABCWhat?
Who?
Number of victims?
How do you know?
Smart analytics
Machine learning
Micro tasking
THE TECHNOLOGY
USSD & SMS
ACCESSIBILITYSmart App
IVR & Call Centre
Humanitarian Charter and Protection Principles
Ethics
THE IMPLEMENTATION STAKEHOLDERS
List of main featuresCollectionWhat a source can do with PI: Initiate a dialogueDialogue (Q&A)QueryWhat a PI admin user can do with PIInitiateDefine modify ad-hoc dialogue (Q&A) logic using natural languageCall back or text-back with consent of the source (see Identification and evaluation of sources)What PI doesCreate unique references for each new dialogue
List of main featuresIdentification and evaluation of sourcesWhat a source can do with PI: Provide identification information (person, device)Provide consent for contactProvide consent for data useWhat a PI admin user can do with PIReview and modify sources evaluation by PIManually rate sourcesAdd and link sourcesBlacklist spammersWhat PI doesDeduplication/Identification of same sourcesEvaluate source reliability over time and per information (reliability points) Maintain list of sources who consented on being contactedDetect potential spammers
List of main featuresEvaluation of informationWhat a PI admin user can do with PI:Maintain categories of events, relevant keywords, questions, associated feedbackSort reported informationReview and modify information evaluation by PIManually rate informationAdd and link informationWhat PI doesPI evaluates the relevance and credibility of information Natural language processing (Eng/Fr for a start)Event recognitionTypo correctionTriangulationTagging of information
List of main featuresVerification of informationWhat a source can do with PI:Receive alerts to (manually) verify informationSend new information related to an alert What a PI admin user can do with PI:Receive alerts to (manually) verify informationAdd new information related to an alertWhat PI doesAlert about information that need to be verifiedList of main featuresFeedback to sourcesWhat a source can do with PI:Subscribe to alerts (time bound, thematic) Query information (e.g. collected info, service providers) What a PI admin user can do with PI:Add and modify the feedback to a sourceMaintain updated information about available service providers (3W)What PI doesSend messages to sources (e.g. collected info, service providers, contingency measures)Alert to give manual input to feedback
List of main featuresOutput for organizationsWhat a PI admin user can do with PI:Authorize alerts and set thresholdsSubscribe to alerts (time bound, thematic) Query information (e.g. collected info, service providers (3W), dashboard) What PI doesProduce info graphicsSend alerts about emerging trends, dangersPropose actions to be takenLog all actions taken on reported information
List of main featuresSharing dataWhat a PI admin user can do with PI:Define redaction rulesValidate redactions prior to sharingDefine sharing and querying rules (incl. consent)Validate sharingWhat PI does:Redacts data according to redaction rulesShares data according to sharing and querying rules (incl. consent)List of main featuresPrivacy and securityWhat a source can do with PI:Ask for her/his information to be destroyedProvide information anonymouslyWhat a PI admin user can do with PI:Define access rights, roles, etc. for data sharing and access to PI functionsWhat PI does:Provide access and data security Devise dissimulation tactics (establish dialogue from another telephone line, blur important communication by making PI number a one shop all number e.g. weather, market prices, good news section)
THE IMPLEMENTATION User Stories
Family TracingCamp Management
Incident Report
ICRC Family TracingI am safe and wellI am searching for a missing personI recognized a childManaging volunteers
IOM-UNHCR Camp ManagementCamp profiling and managementQuerying PI about availability of servicesMaintain 3W info up to datePopulation movements
FPU Incident ReportI am afraid
Geneva 23-25 July 201421Contact usChristophe Billen - Project Leaderwww.peoples-intelligence.orginfo@peoples-intelligence.org +31 654 763 670
This work by Stichting Peoples Intelligence (KvK: 58728929) is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License. To view a copy of this license, visit http://creativecommons.org/licenses/by-nc-sa/4.0/deed.en_US.
top related