towards making an anonymous and one-stop online reporting system for third-world countries

1
Towards Making an Anonymous and One-Stop Online Reporting System for Third-World Countries Tarik Reza Toha 1 , Md. Moyeen Uddin 2 , MD. Nayeem Reza 3 , Md. Abdullah Al Maruf 4 , Amit Chakraborty 5 , and A. B. M. Alim Al Islam 6 Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Dhaka-1000, Bangladesh Email: { 1 tarik.toha, 2 moyeen.neeyom.crv, 3 reza.uranium, 4 ropymaruf2010, 5 amitchakraborty074}@gmail.com, and 6 [email protected] Background •The main obstacles of national development in third-world countries are corruption [1, 2], crime [2], violence [3], abuses against women [4, 5], etc. ‒ Such problems are not often considered with utmost significance •One of the most prominent reasons behind failure to solve these social problems is under-reporting ‒ Sexual violence and rape are the most under-reported crimes [6] ‒ 68% of occurrences of violence against women go unreported in a developing country of South Asia namely Bangladesh [7] Motivation •Some context-specific online reporting systems have been developed to tackle the social problems in an isolated manner I Paid A Bribe [8] focuses on bribery only Ushahidi [9] allows to report violence only Protibadi [10] covers violence against women only •In order to facilitate minimizing the extent of under-reporting, an anonymous and one-stop online reporting system needs to be developed for general people of third-world countries, which is yet to be developed to the best of our knowledge System Implementation Conclusion and Future Work •We develop a one-stop online reporting platform with an option for anonymity that can empower the general mass, especially living in third-world countries, with a powerful tool to achieve their rights more comfortably ‒It can also help the respective authorities to address various problems in a more systematic manner •Report reviewing and public reporting subsystems are yet to be analyzed, designed, and implemented ‒ According to studies [11, 12, 13, 14], at present, there is no structured way to validate crowd sourced data •We plan to analyze whether anonymity decreases credibility ‒ Our goal is to devise a method to provide anonymity without compromising credibility References 1. G. F. Integrity. Illicit financial flows from developing countries: 2002-2011. http://gfintegrity.org/wp-content/ uploads/2014/05/IllicitFinancial Flows from Developing Countries 2002-2011-HighRes.pdf, 2013. Accessed: Sep. 5, 2016. 2. P. R. Center. Pew research center survey. http://pewrsr.ch/13MEhBV. Accessed: Sep. 5, 2016. 3. J. C. Andvig and O.-H. Fjeldstad. Crime, poverty and police corruption in developing countries. Chr. Michelsen Institute, 2008. 4. M. Donohoe. Violence and human rights abuses against women in the developing world. MedscapeOb/Gyn and Women’s Health, 8(2):16-25, 2003. 5. L. L. Heise, A. Raikes, C. H. Watts, and A. B. Zwi. Violence against women: a neglected public health issue in less developed countries. Social science & medicine, 39(9):1165-1179, 1994. 6. L. Kelly, J. Lovett, and L. Regan. A gap or a chasm?: attrition in reported rape cases. Home Office Research, Development and Statistics Directorate London, 2005. 7. DhakaTribune. The truth is in the numbers. https://goo.gl/kV5aDw. Accessed: Sep. 5, 2016. 8. Janaagraha. I paid a bribe j report now. http://www.ipaidabribe.com/. Accessed: Sep. 5, 2016. 9. O. Okolloh. Ushahidi, or 'testimony': Web 2.0 tools for crowdsourcing crisis information. Participatory learning and action, 59(1):65-70, 2009. 10. S. I. Ahmed, S. J. Jackson, N. Ahmed, H. S. Ferdous, M. R. Rifat, A. Rizvi, S. Ahmed, and R. S. Mansur. Protibadi: a platform for fighting sexual harassment in urban bangladesh. In Proceedings of the 32nd annual ACM conference on Human factors in computing systems, pp. 2695-2704. ACM, 2014. 11. M. Hirth, T. Hoßfeld, and P. Tran-Gia. Analyzing costs and accuracy of validation mechanisms for crowdsourcing platforms. Mathematical and Computer Modelling, 57(11):2918-2932, 2013. 12. Y. Baveye, C. Chamaret, E. Dellandr´ea, and L. Chen. A protocol for cross-validating large crowdsourced data: The case of the liris-accede affective video dataset. In Proceedings of the 2014 International ACM Workshop on Crowdsourcing for Multimedia, pp. 3-8. ACM, 2014. 13. L. See, A. Comber, C. Salk, S. Fritz, M. van der Velde, C. Perger, C. Schill, I. McCallum, F. Kraxner, and M. Obersteiner. Comparing the quality of crowdsourced data contributed by expert and non-experts. PloS one, 8(7):e69958, 2013. 14. W. Willett, J. Heer, and M. Agrawala. Strategies for crowdsourcing social data analysis. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 227-236. ACM, 2012. Figure: Our crowd sourcing subsystem providing a general anonymous reporting platform (http://cse.buet.ac.bd/ureporter/public/index.php/report/create ) Proposed Methodology Figure: Process flow of our proposed reporting system Figure: Block diagram of our proposed reporting system Central Repository System ... Crime Corruption Terrorism Harassment Hassle ... Review ... Human Rights Commissions Policy Makers Law Enforcement Agencies ... Crowd Sourcing Report Reviewing Public Reporting Summary: Total submitted reports = 14 (unnamed = 5, named = 9) ACM DEV 2016, Nairobi, Kenya

Upload: tarik-toha

Post on 11-Feb-2017

9 views

Category:

Internet


0 download

TRANSCRIPT

Page 1: Towards Making an Anonymous and One-Stop Online Reporting System for Third-World Countries

Towards Making an Anonymous and One-Stop Online Reporting

System for Third-World Countries

Tarik Reza Toha1, Md. Moyeen Uddin2, MD. Nayeem Reza3, Md. Abdullah Al Maruf4, Amit Chakraborty5, and A. B. M. Alim Al Islam6

Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Dhaka-1000, Bangladesh

Email: {1tarik.toha, 2moyeen.neeyom.crv, 3reza.uranium, 4ropymaruf2010, 5amitchakraborty074}@gmail.com, and [email protected]

Background•The main obstacles of national development in third-world

countries are corruption [1, 2], crime [2], violence [3], abusesagainst women [4, 5], etc.

‒ Such problems are not often considered with utmost significance

•One of the most prominent reasons behind failure to solve thesesocial problems is under-reporting

‒ Sexual violence and rape are the most under-reported crimes [6]

‒ 68% of occurrences of violence against women go unreported in adeveloping country of South Asia namely Bangladesh [7]

1. Google Glass Snoopers Can Steal Your Passcode With a Glance, March, 2015. Available:

http://www.wired.com/2014/06/google-glass-snoopers-can-steal-your-passcode-with-a-

glance/

2. B. Hoanca and K. Mock. Password Entry Scheme Resistant to Eavesdropping, Security and

Management, Las Vegas, Nevada, 2008, pp. 119-125.

3. L. Sobrado, J. C. Birget, "Graphical passwords", The Rutgers Scholar, An Electronic Bulletin

for Undergraduate Research, vol. 4 (2002).

4. N. Hopper and M. Blum. A Secure Human-Computer Authentication Scheme. Technical Re-

port CMU-CS-00-139, Carnegie Mellon University, 2000.

Motivation•Some context-specific online reporting systems have been

developed to tackle the social problems in an isolated manner

‒ I Paid A Bribe [8] focuses on bribery only

‒Ushahidi [9] allows to report violence only

‒ Protibadi [10] covers violence against women only

•In order to facilitate minimizing the extent of under-reporting,an anonymous and one-stop online reporting system needs tobe developed for general people of third-world countries, whichis yet to be developed to the best of our knowledge

System Implementation Conclusion and Future Work•We develop a one-stop online reporting platform with an

option for anonymity that can empower the generalmass, especially living in third-world countries, with apowerful tool to achieve their rights more comfortably

‒ It can also help the respective authorities to address variousproblems in a more systematic manner

•Report reviewing and public reporting subsystems areyet to be analyzed, designed, and implemented

‒According to studies [11, 12, 13, 14], at present, there is nostructured way to validate crowd sourced data

•We plan to analyze whether anonymity decreasescredibility

‒Our goal is to devise a method to provide anonymity withoutcompromising credibility

References1. G. F. Integrity. Illicit financial flows from developing countries: 2002-2011. http://gfintegrity.org/wp-content/

uploads/2014/05/IllicitFinancial Flows from Developing Countries 2002-2011-HighRes.pdf, 2013. Accessed: Sep. 5, 2016.

2. P. R. Center. Pew research center survey. http://pewrsr.ch/13MEhBV. Accessed: Sep. 5, 2016.

3. J. C. Andvig and O.-H. Fjeldstad. Crime, poverty and police corruption in developing countries. Chr. Michelsen Institute,

2008.

4. M. Donohoe. Violence and human rights abuses against women in the developing world. MedscapeOb/Gyn and

Women’s Health, 8(2):16-25, 2003.

5. L. L. Heise, A. Raikes, C. H. Watts, and A. B. Zwi. Violence against women: a neglected public health issue in less

developed countries. Social science & medicine, 39(9):1165-1179, 1994.

6. L. Kelly, J. Lovett, and L. Regan. A gap or a chasm?: attrition in reported rape cases. Home Office Research,

Development and Statistics Directorate London, 2005.

7. DhakaTribune. The truth is in the numbers. https://goo.gl/kV5aDw. Accessed: Sep. 5, 2016.

8. Janaagraha. I paid a bribe j report now. http://www.ipaidabribe.com/. Accessed: Sep. 5, 2016.

9. O. Okolloh. Ushahidi, or 'testimony': Web 2.0 tools for crowdsourcing crisis information. Participatory learning and action,

59(1):65-70, 2009.

10. S. I. Ahmed, S. J. Jackson, N. Ahmed, H. S. Ferdous, M. R. Rifat, A. Rizvi, S. Ahmed, and R. S. Mansur. Protibadi: a

platform for fighting sexual harassment in urban bangladesh. In Proceedings of the 32nd annual ACM conference on

Human factors in computing systems, pp. 2695-2704. ACM, 2014.

11. M. Hirth, T. Hoßfeld, and P. Tran-Gia. Analyzing costs and accuracy of validation mechanisms for crowdsourcing

platforms. Mathematical and Computer Modelling, 57(11):2918-2932, 2013.

12. Y. Baveye, C. Chamaret, E. Dellandr´ea, and L. Chen. A protocol for cross-validating large crowdsourced data: The

case of the liris-accede affective video dataset. In Proceedings of the 2014 International ACM Workshop on

Crowdsourcing for Multimedia, pp. 3-8. ACM, 2014.

13. L. See, A. Comber, C. Salk, S. Fritz, M. van der Velde, C. Perger, C. Schill, I. McCallum, F. Kraxner, and M.

Obersteiner. Comparing the quality of crowdsourced data contributed by expert and non-experts. PloS one,

8(7):e69958, 2013.

14. W. Willett, J. Heer, and M. Agrawala. Strategies for crowdsourcing social data analysis. In Proceedings of the SIGCHI

Conference on Human Factors in Computing Systems, pp. 227-236. ACM, 2012.

Figure: Our crowd sourcing subsystem providing a general anonymous reporting platform (http://cse.buet.ac.bd/ureporter/public/index.php/report/create)

Proposed Methodology

Figure: Process flow of our proposed reporting systemFigure: Block diagram of our proposed reporting system

Central Repository

System

...

Crime

Corruption

Terrorism

Harassment

Hassle

...

Review

...

Human Rights Commissions

Policy Makers

Law Enforcement

Agencies

...

Crowd Sourcing Report Reviewing Public Reporting

• Summary: Total submitted reports = 14 (unnamed = 5, named = 9)

ACM DEV 2016, Nairobi, Kenya