Upload
tarik-toha
View
9
Download
0
Embed Size (px)
Citation preview
Towards Making an Anonymous and One-Stop Online Reporting
System for Third-World Countries
Tarik Reza Toha1, Md. Moyeen Uddin2, MD. Nayeem Reza3, Md. Abdullah Al Maruf4, Amit Chakraborty5, and A. B. M. Alim Al Islam6
Department of Computer Science and Engineering, Bangladesh University of Engineering and Technology, Dhaka-1000, Bangladesh
Email: {1tarik.toha, 2moyeen.neeyom.crv, 3reza.uranium, 4ropymaruf2010, 5amitchakraborty074}@gmail.com, and [email protected]
Background•The main obstacles of national development in third-world
countries are corruption [1, 2], crime [2], violence [3], abusesagainst women [4, 5], etc.
‒ Such problems are not often considered with utmost significance
•One of the most prominent reasons behind failure to solve thesesocial problems is under-reporting
‒ Sexual violence and rape are the most under-reported crimes [6]
‒ 68% of occurrences of violence against women go unreported in adeveloping country of South Asia namely Bangladesh [7]
1. Google Glass Snoopers Can Steal Your Passcode With a Glance, March, 2015. Available:
http://www.wired.com/2014/06/google-glass-snoopers-can-steal-your-passcode-with-a-
glance/
2. B. Hoanca and K. Mock. Password Entry Scheme Resistant to Eavesdropping, Security and
Management, Las Vegas, Nevada, 2008, pp. 119-125.
3. L. Sobrado, J. C. Birget, "Graphical passwords", The Rutgers Scholar, An Electronic Bulletin
for Undergraduate Research, vol. 4 (2002).
4. N. Hopper and M. Blum. A Secure Human-Computer Authentication Scheme. Technical Re-
port CMU-CS-00-139, Carnegie Mellon University, 2000.
Motivation•Some context-specific online reporting systems have been
developed to tackle the social problems in an isolated manner
‒ I Paid A Bribe [8] focuses on bribery only
‒Ushahidi [9] allows to report violence only
‒ Protibadi [10] covers violence against women only
•In order to facilitate minimizing the extent of under-reporting,an anonymous and one-stop online reporting system needs tobe developed for general people of third-world countries, whichis yet to be developed to the best of our knowledge
System Implementation Conclusion and Future Work•We develop a one-stop online reporting platform with an
option for anonymity that can empower the generalmass, especially living in third-world countries, with apowerful tool to achieve their rights more comfortably
‒ It can also help the respective authorities to address variousproblems in a more systematic manner
•Report reviewing and public reporting subsystems areyet to be analyzed, designed, and implemented
‒According to studies [11, 12, 13, 14], at present, there is nostructured way to validate crowd sourced data
•We plan to analyze whether anonymity decreasescredibility
‒Our goal is to devise a method to provide anonymity withoutcompromising credibility
References1. G. F. Integrity. Illicit financial flows from developing countries: 2002-2011. http://gfintegrity.org/wp-content/
uploads/2014/05/IllicitFinancial Flows from Developing Countries 2002-2011-HighRes.pdf, 2013. Accessed: Sep. 5, 2016.
2. P. R. Center. Pew research center survey. http://pewrsr.ch/13MEhBV. Accessed: Sep. 5, 2016.
3. J. C. Andvig and O.-H. Fjeldstad. Crime, poverty and police corruption in developing countries. Chr. Michelsen Institute,
2008.
4. M. Donohoe. Violence and human rights abuses against women in the developing world. MedscapeOb/Gyn and
Women’s Health, 8(2):16-25, 2003.
5. L. L. Heise, A. Raikes, C. H. Watts, and A. B. Zwi. Violence against women: a neglected public health issue in less
developed countries. Social science & medicine, 39(9):1165-1179, 1994.
6. L. Kelly, J. Lovett, and L. Regan. A gap or a chasm?: attrition in reported rape cases. Home Office Research,
Development and Statistics Directorate London, 2005.
7. DhakaTribune. The truth is in the numbers. https://goo.gl/kV5aDw. Accessed: Sep. 5, 2016.
8. Janaagraha. I paid a bribe j report now. http://www.ipaidabribe.com/. Accessed: Sep. 5, 2016.
9. O. Okolloh. Ushahidi, or 'testimony': Web 2.0 tools for crowdsourcing crisis information. Participatory learning and action,
59(1):65-70, 2009.
10. S. I. Ahmed, S. J. Jackson, N. Ahmed, H. S. Ferdous, M. R. Rifat, A. Rizvi, S. Ahmed, and R. S. Mansur. Protibadi: a
platform for fighting sexual harassment in urban bangladesh. In Proceedings of the 32nd annual ACM conference on
Human factors in computing systems, pp. 2695-2704. ACM, 2014.
11. M. Hirth, T. Hoßfeld, and P. Tran-Gia. Analyzing costs and accuracy of validation mechanisms for crowdsourcing
platforms. Mathematical and Computer Modelling, 57(11):2918-2932, 2013.
12. Y. Baveye, C. Chamaret, E. Dellandr´ea, and L. Chen. A protocol for cross-validating large crowdsourced data: The
case of the liris-accede affective video dataset. In Proceedings of the 2014 International ACM Workshop on
Crowdsourcing for Multimedia, pp. 3-8. ACM, 2014.
13. L. See, A. Comber, C. Salk, S. Fritz, M. van der Velde, C. Perger, C. Schill, I. McCallum, F. Kraxner, and M.
Obersteiner. Comparing the quality of crowdsourced data contributed by expert and non-experts. PloS one,
8(7):e69958, 2013.
14. W. Willett, J. Heer, and M. Agrawala. Strategies for crowdsourcing social data analysis. In Proceedings of the SIGCHI
Conference on Human Factors in Computing Systems, pp. 227-236. ACM, 2012.
Figure: Our crowd sourcing subsystem providing a general anonymous reporting platform (http://cse.buet.ac.bd/ureporter/public/index.php/report/create)
Proposed Methodology
Figure: Process flow of our proposed reporting systemFigure: Block diagram of our proposed reporting system
Central Repository
System
...
Crime
Corruption
Terrorism
Harassment
Hassle
...
Review
...
Human Rights Commissions
Policy Makers
Law Enforcement
Agencies
...
Crowd Sourcing Report Reviewing Public Reporting
• Summary: Total submitted reports = 14 (unnamed = 5, named = 9)
ACM DEV 2016, Nairobi, Kenya