The Technologist’s Dilemma Ethical Challenges of Using Crowdsourcing Technology in Conflict and Disaster-Affected Regions

S-CAR Journal Article
Charles Martin-Shields
Charles Martin-Shields
+ More
The Technologist’s Dilemma Ethical Challenges of Using Crowdsourcing Technology in Conflict and Disaster-Affected Regions
Issue: 14.2
URL:
Abstract

The growth of mobile phone technology and Internet access globally has affected peoples’ lives in various ways. For the field of governance and conflict management, this has meant unprecedented levels of information sharing from within conflict and crisis zones. As Internet access has expanded across Africa, entities like Kenya’s Ushahidi—which build digital maps to publicly display real-time SMS text messages and social media feeds geographically—have been changing the way that citizens share their experiences of violence as they are happening. Probably the most important of these technologies—mobile phones— have expanded exponentially across the developing world; many countries in Africa, Asia and the Pacific have mobile phone market saturation rates of over 100 percent. The international development community has been actively developing tools and methods for using mobile phones for outreach and project monitoring for years; the governance and conflict management fields are beginning to find effec- tive ways to use mobile phones and SMS text messaging.

While there has been excitement about the way these technologies can improve the work of conflict resolution and governance professionals, less popular attention has been paid to the unique risks and ethical challenges associated with using these tools in highly unstable political and social environments such as conflict zones. In these types of situations, crowdsourcing raises ethical issues of privacy, transparency of purpose and data protection. However, having secure technical data collection and storage procedures are not suffi- cient because most security failures are due to human error. To ethically run a crowdsourcing program in a conflict or disaster-affected environment, organizations need to ensure that their staffs and the “crowd” participating in the project have been trained to use the technologies and assess the unique risks of the digital information envi- ronment. This article will review the literature on digital information regulation, explore how the crisis response and crowdsourcing fields have evolved their data protection procedures and review the current state of practice for humanitarian crowdsourcing ethics and data security.

S-CAR.GMU.EDU | Copyright © 2017