skip to main content
10.1145/2691195.2691208acmotherconferencesArticle/Chapter ViewAbstractPublication PagesicegovConference Proceedingsconference-collections
research-article

Crowdsourcing collection of data for crisis governance in the post-2015 world: potential offers and crucial challenges

Published: 27 October 2014 Publication History

Abstract

The practice of 'crowdsourcing' under the new technological regime has opened doors of huge data repositories. In recent years, crowdsourcing have expanded rapidly allowing citizens to connect with each other, governments to connect with common mass, to coordinate disaster response work, to map political conflicts, acquiring information quickly and participating in issues that affect day-to-day life of citizens. Crowdsourcing has the potentiality to offer smart governance by gathering and analyzing massive data from citizens. As data is a key enabler to proper public governance, this paper aims to provide a picture of potential offers that 'crowdsourcing' could make in support of crisis governance in the Post-2015 World, while it illustrates some critical challenges of data protection and privacy in different service sectors. Lastly, with a brief analysis on privacy, online data protection; and safety level of some crowdsourcing tools, this paper proposes brief guidelines for different stakeholders and some future works to avoid some mismanagement of crowdsourced data to protect data, privacy and security of end users.

References

[1]
Barbier, G., Zafarani, R., Gao, H., Fung, G. and Liu, H. 2012. Maximizing benefits from crowdsourced data, In Computational and Mathematical Organization Theory, September 2012, Volume 18, Issue 3, pp 257--279
[2]
Bloome D, Sheridan D, Street BV (1993) Reading mass-observation writing. University of Sussex Library, Brighton.
[3]
Bott, M., Gigler, B., and Young, G., 2014. The Role of Crowdsourcing for Better Governance in Fragile State Contexts. 2014 International Bank for Reconstruction and Development / The World Bank. 1818 H Street NW, Washington DC 20433.
[4]
Brabham, D C., 2013. Using Crowdsourcing In Government, pp 10--20. Collaboration Across Boundaries Series, IBM Center for The Business of Government, Washington, DC 20005.
[5]
Branigan, T., 2011. China boosts internet surveillance. Available at http://bit.ly/1lCnU2T
[6]
Brey, P., 2006. Editorial introduction -- Surveillance and privacy in Ethics and Information Technology (2005) 7: 183--184. DOI 10.1007/s10676-006-0015-1
[7]
Brown, I., 2012. Government Access to Private-Sector Data in the United Kingdom. International Data Privacy Law 2, no. 4: 230--238.
[8]
Clift, S. 2003. "E-Democracy, E-Governance and Public NetWork." Publicus, September. http://www.publicus.net
[9]
Cuijpers, C., Nadezhda, N. and Eleni, K., 2014. Data Protection Reform and the Internet: The Draft Data Protection Regulation. Forthcoming in Savin, A., Trzaskowski, J., (eds) Research Handbook on EU Internet Law (Edward Elgar 2014); Tilburg Law School Research Paper No. 03/2014. Available at SSRN: http://bit.ly/1qrLePx
[10]
Cushing, T., 2014. Los Angeles Law Enforcement Looking To Crowdsource Surveillance, (Mis)Uses of Technology. Published at http://bit.ly/S4d6wE accessed on 12/05/14
[11]
Dharmakumar, R., 2013. India's Internet Privacy Woes. Available at http://bit.ly/1qfRIlM accessed on 12/05/2014.
[12]
Fact Sheet, EC., 2012. Why do we need an EU data protection reform' in Factsheets on data protection reform. Available http://bit.ly/1pXq1hM accessed on 14/05/2014.
[13]
Farrier, C., 2010. Internet Eyes Citizen Spy Game -- The New Stasi? Available at http://bit.ly/1gGVvpM
[14]
George, S., 2011. Key Deployment Report -- March 2011. Ushahidi 1100 North Glebe Rd. 22201 http://ushahidi.com
[15]
Goolsby, R., 2010. Social media as crisis platform: The future of community maps/crisis maps. ACM Trans. Intell. Syst. Technol. 1(1), 1--11 (2010).
[16]
Halder, B. 2013. Mobile-based Crowdsourcing Platform for Post-2015 Governance: Possibilities for Developing Countries available at http://bit.ly/1vzmwRE
[17]
Howe, J.: The Rise of Crowdsourcing accessed on 20/10/13 from http://wrd.cm/1rH4vjv
[18]
Jain, B., 2011. 8,736 phone and e-mail accounts tapped by different government agencies in July. Available at: http://bit.ly/1lCo8qw
[19]
Jeffery, S., 2011, Ushahidi: crowdmapping collective that exposed Kenyan election killings. Available from: http://bit.ly/1vXT7Ot accessed on 21/11/2012
[20]
Johnson, L., 2013. George W. Bush Defends PRISM: 'I Put That Program in Place to Protect the Country'. The Huffington Post. Retrieved on May 25, 2014 and Available at http://huff.to/1wVgE6O
[21]
Lee, T. B., 2013. How Congress Unknowingly Legalized PRISM in 2007. Wonkblog (blog of The Washington Post). Available at http://wapo.st/1pXqPDd Accessed on 25/05/14.
[22]
Linklaters., 2013. China -- Progress towards national privacy regulation in Technology, Media & Telecommunications News. pp 10--14. Available at http://bit.ly/1lCoiym
[23]
Liu, S. & Palen, L., (2009) Spatiotemporal Mashups: a survey of current tools to inform next generation crisis support. In: Proceedings of the 6th international ISCRAM conference, Gothenburg, Sweden.
[24]
Mason, P., 2007. Kenya in crisis, BBC News Report accessed on 12/05/2014 from http://bbc.in/1tle73o
[25]
Meier, P., 2013. Data Protection Protocols for Crisis Mapping available at http://bit.ly/1u11vfN
[26]
OECD/International Telecommunication Union (2011), M-Government: Mobile Technologies for Responsive Governments and Connected Societies, p 36, OECD Publishing. http://dx.doi.org/10.1787/9789264118706-en
[27]
Paul McCormack and Kate Lucente,. 2014. Data Protection Laws of World Handbook. DLA Piper, London. http://bit.ly/VXjIP4
[28]
Poblet, M. (ed.), 2011. Mobile Technologies for Conflict Management: Online Dispute Resolution, Governance, Participation, Law, Governance and Technology Series 2, DOI 10.1007/978-94-007-1384-0_4, © Springer Science+Business Media B. V. 2011
[29]
Privacy International., 2012. Chapter: II. Surveillance policy in 'Country Report-China' under the 'Privacy in the Developing World'. Available at http://bit.ly/1lpq85f
[30]
Qinglian, H., 2006. The Hijacked Potential of China's Internet in China's Right's Forum. Special Book Review. pp 33--35.
[31]
Roberts, A. 2014. A true sea shanty: the story behind the Longitude prize. Accessed on 19/05/2014 from http://bit.ly/1ndqO9m
[32]
Shirky, C. 2008. Here Comes Everybody: The Power of Organizing without Organizations. New York: Penguin Press.
[33]
Singh, S., 2013. Govt. violates privacy safeguards to secretly monitor Internet traffic. Available at http://bit.ly/1tleESR
[34]
South African Government. 2002. Electronic Communications and Transactions Act, 2002, No. 25 of 2002 {Online}. Accessed on 25/05/2014 and available from: http://www.internet.org.za/ect_act.html
[35]
Spellman, J., 2010. Heading off disaster, one tweet at a time. http://bit.ly/1tleESR Turner Broadcasting System, Inc.
[36]
The Economic Times. 2013. Action to be taken in 'phone tapping' during BJP rule: Virbhadra Singh. Available at: http://bit.ly/1ovmH7W
[37]
Verma, J. S., 2013. Report of the Commmittee on Amendments to Criminal Law. Available at http://bit.ly/1wVi7df
[38]
Walton, G., 2001. China's Golden Shield: Corporations and the Development of Surveillance Technology in the People's Republic of China 9 (Rights and Democracy, 2001). Available at http://www.totse.com/en/privacy/pucc.html
[39]
Wepster, S. A., 2010. Between Theory and Observations; pp 34--37. ISBN 978-1-4419-1313-5; Springer New York Dordrecht Heidelberg London.
[40]
Young. C., 2014. HarassMap: Using Crowdsourced Data to Map Sexual Harassment in Egypt. Available at http://bit.ly/1qfTd39
[41]
Zimmermann, D. and Costa, J., 2014. Brazil: Brazil Is Passing Legislation Aimed At Guaranteeing The Protection And Privacy Of Internet Users. Accessed on 21/05/2012 and available at http://bit.ly/1tx1fEz
[42]
Zittoun, T., Alex, G., Flora, C. and Aveling, E. 2008. Using Social Knowledge: A Case Study of a Diarist's Meaning Making During World War II, 163--179.

Cited By

View all
  • (2024)Challenges, Citizens' Trust and Privacy Protection Models in e-Government Systems: Security and Privacy Perspective: Student paper2024 23rd International Symposium INFOTEH-JAHORINA (INFOTEH)10.1109/INFOTEH60418.2024.10495931(1-6)Online publication date: 20-Mar-2024
  • (2020)Cidades Inteligentes: O valor público da inovação disruptiva para geogovernançaBlucher Engineering Proceedings10.5151/singeurb2019-23(142-150)Online publication date: Jan-2020
  • (2018)An assessment of privacy preservation in crowdsourcing approaches: Towards GDPR compliance2018 12th International Conference on Research Challenges in Information Science (RCIS)10.1109/RCIS.2018.8406643(1-9)Online publication date: May-2018

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICEGOV '14: Proceedings of the 8th International Conference on Theory and Practice of Electronic Governance
October 2014
563 pages
ISBN:9781605586113
DOI:10.1145/2691195
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

  • Macao Foundation, Macao SAR Govt: Macao Foundation, Macao SAR Government
  • Municipio de Guimarães: Municipio de Guimarães

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 27 October 2014

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. PET
  2. big data
  3. crisis governance
  4. data
  5. online data protection
  6. policy
  7. privacy
  8. public governance

Qualifiers

  • Research-article

Conference

ICEGOV2014
Sponsor:
  • Macao Foundation, Macao SAR Govt
  • Municipio de Guimarães

Acceptance Rates

ICEGOV '14 Paper Acceptance Rate 30 of 73 submissions, 41%;
Overall Acceptance Rate 350 of 865 submissions, 40%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)5
  • Downloads (Last 6 weeks)0
Reflects downloads up to 22 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Challenges, Citizens' Trust and Privacy Protection Models in e-Government Systems: Security and Privacy Perspective: Student paper2024 23rd International Symposium INFOTEH-JAHORINA (INFOTEH)10.1109/INFOTEH60418.2024.10495931(1-6)Online publication date: 20-Mar-2024
  • (2020)Cidades Inteligentes: O valor público da inovação disruptiva para geogovernançaBlucher Engineering Proceedings10.5151/singeurb2019-23(142-150)Online publication date: Jan-2020
  • (2018)An assessment of privacy preservation in crowdsourcing approaches: Towards GDPR compliance2018 12th International Conference on Research Challenges in Information Science (RCIS)10.1109/RCIS.2018.8406643(1-9)Online publication date: May-2018

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media