Sie sind auf Seite 1von 54

|ndex

#ICT4HR
Information and Communication Technologies
for Human Rights

by Molly Land, Patrick Meier, Mark Belinsky, and Emily Jacobi


Disclaimer: The findings, interpretations, and conclusions expressed in this report are entirely those of the authors.
They do not necessarily represent the views of the World Bank and its affiliated organizations, or those of the
Executive Directors of the World Bank or the governments they represent.
FOREWORD

This study aims to provide new knowledge and experience of the nexus between protection
and promotion of human rights and the use of Information and Communication Technologies,
a subject that has not received a lot of attention until recently. This particular ICT4Gov-ODTA
project at the World Bank Institute (WBI) has now run for nearly three years, supported by
the Nordic Trust Fund and directed by WBI’s Senior Governance Specialist Boris Weber. While
most of the work of the project highlighted in this report focuses on country activities in the
intersection of governance and human rights, the report opens the space for learning at a general
and cross-cutting level, including reports from a number of country case studies in Eastern Africa,
in Central America, and globally.

The study has been led by Professor Molly Land at New York Law School and her colleagues.
Within the World Bank, Tiago Peixoto from the WBI and Hans-Otto Sano of the Nordic Trust
Fund were involved in commissioning the work. A series of consultations were held between the
World Bank staff and Professor Land and her colleagues, including other members of the writing
team — Patrick Meier, Mark Belinsky and Emily Jacobi. After a review of the draft in May 2012
by Mr. Weber, Mr. Peixoto and Mr. Sano, the final report was presented by Professor Land at a
broader World Bank team on July 17th, 2012*.

In addition to the report, I invite you to watch the lead author discuss ICT and human rights in a
video interview (bit.ly/ICT4HRintro). Also, feel free to join the conversation via Twitter at #ICT4HR.

I hope you enjoy this study.

Robert R. Hunja

Manager, Open Governance Practice


World Bank Institute

* Read a blog post about the presentation on the World Bank’s website: http://bit.ly/ICT4HRblog
This paper was authored by Molly Land, Patrick Meier, Mark Belinsky, and Emily Jacobi. Patrick Boyle, Christoph
Doellefeld, Adam Gartenberg, Meredith Hutchison, John Kelly, Joe Raffanello and Carl Zander provided excellent
research and drafting assistance. At the World Bank, this study was coordinated by Hans-Otto Sano, Tiago Peixoto
and Boris Weber, and was sponsored by:

r OPCS Nordic Trust Fund (http://worldbank.org/nordictrustfund)


r Open Development Technology Alliance (http://opendta.org)
r ICT4Gov (http://ict4gov.net)
r World Bank Institute (http://wbi.worldbank.org)

This paper is licensed under a Creative Commons Attribution-NonCommercial-ShareAlike Unported 3.0 License.
Join the conversation at #ICT4HR.

Photos: Emily Jacobi


Graphic design: Hernan Gigena

November 2012
TABLE OF CONTENTS
Executive Summary ...............................................................................................1
I.Background ........................................................................................................3
A.Social Media ................................................................................... 3
B.Mobile Phones ................................................................................ 4
II.Case Studies......................................................................................................7
Uchaguzi (Kenya)............................................................................... 7
Uwiano (Kenya) ................................................................................. 7
Map Kibera (Kenya) ............................................................................ 8
Sisi Ni Amani (“We Are Peace”) (Kenya) ................................................ 8
Voix des Kivus (DRC) .......................................................................... 8
Piga Simu (DRC) ................................................................................ 9
Amnesty International Science for Human Rights Program (Int’l) ............... 9
AAAS Remote Sensing (DRC) ............................................................... 9
ICT4GOV – South Kivu (DRC) ............................................................... 9
Educación Digna (Dominican Republic) ................................................ 10
Dominicana Contaminada (Dominican Republic).................................... 10
Medic Mobile (Int’l) ........................................................................... 10
III.ICTs and Human Rights .....................................................................................13
A.Supporting the Implementation of Rights............................................ 13
Freedom of Expression ............................................................. 13
Freedom of Association and Assembly ........................................ 14
Right to Participate in Public Affairs ............................................ 14
Economic, Social and Cultural Rights .......................................... 14
Rights of Vulnerable Populations ................................................ 15
B.Enforcing Rights ............................................................................ 16
Naming and Shaming ............................................................... 16
Organizing and Advocacy .......................................................... 16
C.Social Accountability ....................................................................... 18
IV.Human Rights Challenges..................................................................................21
A.Accuracy ...................................................................................... 21
B.Security ........................................................................................ 26
C.Inequality ...................................................................................... 29
D.Response ..................................................................................... 32
V.Recommendations .............................................................................................33
#ICT4HR NOV EMBER 2012

|ndex

Promoting and Protecting


the Right to Freedom of
Opinion and Expression

8 WWW.OPEN DTA. ORG


I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I G H T S #ICT4HR

Executive Summary

N
ew technologies have been heralded as Although new technologies can reduce the cost of
revolutionizing activism and government, information gathering, it can be difficult to ensure
providing a means for citizens to engage the accuracy of the information generated, and
with others and with their government faster the associated volume can make it challenging
and more simply than ever before. As the Special and expensive to identify relevant data. There is
Rapporteur on the Promotion and Protection of also no guarantee that increased participation
the Right to Freedom of Opinion and Expression, or information will be translated into action or
Frank LaRue, has explained, “the Internet is one concrete outcomes for the community.
of the most powerful instruments of the 21st
century for increasing transparency in the conduct The use of new technologies can also
of the powerful, access to information, and for exacerbate human rights risks. Reliance on new
facilitating active citizen participation in building technologies can replicate and even increase
democratic societies.”1 existing inequalities and barriers to participation.
Given the ease of information sharing in the digital
Considerable attention has been focused on context and the availability of tools to track and
the opportunities presented by new information identify users, it can be especially difficult to
|ndex
and communication technologies for development ensure participant anonymity. The involvement
(“ICT4D”2) and for government (“ICT4GOV”3). of ordinary individuals in collecting information
The purpose of this report is to analyze their impact also presents particular challenges for security,
on human rights (“ICT4HR”). As Philip Alston, because these individuals may lack the necessary
the former Special Rapporteur on Extrajudicial, training or professional protocols for assessing
Summary or Arbitrary Executions, explained in a and taking measures to ensure security. Managing
report to the General Assembly: “New technologies these risks is complicated by a tension between
offer a great many potential solutions to some of the approaches of human rights and technology
[the] problems [in human rights fact-finding], and experts. For example, the values and modus
offer significant improvements in existing fact- operandi of the technology field—a willingness
finding methodologies.”4 He notes, however, that to experiment and “to fail, adopt, and iterate”6—
there has been “[l]ittle sustained work . . . by the can be in some tension with the need to develop
human rights community as a whole to apply considered and reasoned security protocols ahead
existing technologies or to study their potential uses of time. In other worEs, while hacking is
and problems.”5 This report aims to remedy that an iterative process, security is not.
gap. Using case studies largely from three countries,
Kenya, the Democratic Republic of Congo, and The report concludes by presenting several
the Dominican Republic, the report considers recommendations designed to respond at least
both the opportunities and risks presented by new in part to the human rights risks identified in the
technologies for human rights. report. The report does not purport to provide a
blueprint for all projects seeking to employ new
The report concludes there are benefits that technologies in furtherance of human rights or
can be realized through the deployment of new development goals. The challenges that arise in
technologies in human rights projects. New any particular project will be context specific and
technologies offer the potential to reduce the cost beyond the scope of this report. Rather, the report
of collecting information about human rights seeks to identify, in a preliminary manner, some
issues and to increase participation in human rights of the questions that might be asked at the outset
advocacy efforts. Each of these possible benefits, in order to respond to concerns about accuracy,
however, gives rise to new risks and challenges. security, and participation.

T H E W O R L D B A N K G R OU P 1
#ICT4HR NOV EMBER 2012

|ndex

Managing, Processing and


Disseminating Information
in Social Media and
by Mobile Phone

2 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

I. Background

B
roadly understood, information and individuals participating in protests in Spain
communication technologies (ICTs) are following the 2004 bombing in Madrid were only
“technologies used in the conveying, sending text messages about the protest to people
manipulation and storage of data by electronic they knew, the social media connections between
means.”7 ICTs include a variety of tools, platforms, these smaller groups allowed the messages to be
and technologies that can be used to manage, diffused outwards to an exponentially growing
disseminate, and process information, and include, community of interest.13 Third, individuals may
among other things, the telephone, cell phones, turn to social media platforms for organizing
radio, television, email, and the Internet. ICTs because they are familiar with them through social
have long played a central role in the protection uses and because they provide networks that are
of human rights. Human rights NGOs use email “already embedded in trusted networks of family
to network, build coalitions, and communicate and friends.”14
with relevant constituencies. They use radio to
disseminate messages to far-flung constituencies. The rise of social media networks has also
More recent ICTs such as mobile phones and been accompanied by two important changes in
the Internet have played a particularly important methods of production. First, ordinary individuals
role because they provide advantages in “speed, are increasingly engaging in activities that used |ndex

cost, scope, and interactivity”8 over prior forms to be the domain of professionals—journalists,
of technology. The World Bank has asked us to photographers, critics, and writers. Now, ordinary
focus in this report on the human rights impact of citizens are posting their pictures to Flickr and
two particular developments in the area of ICTs— video to YouTube, blogging about their lives on
social media and mobile phones. the many low-cost or free blog hosting services,
and writing encyclopedia entries on Wikipedia.
A. Social Media The development of open platforms that allow
individuals to post their own content, coupled
“Social media” refers to online platforms with greater access to the Internet and increasing
that allow interaction between individuals and bandwidth, has led individuals to become (and
groups.9 Much of the literature in the area of view themselves as) creators of, rather than
new ICTs has focused on the emergence of social simply the recipients of, creative content.15 The
media as an important “space” for political emergence of such “user-generated content” has
organizing.10 Social media platforms facilitate the been facilitated by the increasing digitization of
ability to find and communicate with like-minded cultural material and greater availability of tools
individuals in several ways. First, many of these individuals can use to manipulate or remix that
platforms employ “content tagging,” by which content and post the results online.16
content creators or recipients add tags (essentially
digital “labels”) to content they view online. Tags Second, individuals—both citizens and
allow others to quickly find relevant information professionals—are increasingly coming together to
and others with common interests. Second, social produce cultural works and social goods without
media platforms foster the broad dissemination the need for organizations. Yochai Benkler calls this
of information because they encourage both a “new modality of organizing production: radically
strong and weak ties—connections both within decentralized, collaborative, and nonproprietary;
and between groups.11 Weak ties, or connections based on sharing resources and outputs among
between groups, allow messages to be quickly widely distributed, loosely connected individuals
diffused outward.12 For example, even though who cooperate with each other without relying on

T H E W O R L D B A N K G R OU P 3
#ICT4HR NOV EMBER 2012

either market signals or managerial commands.”17 Mobile phones also differ from land lines
This new mode of production, often called “peer in three other important respects: First, they
production,” is a form of production undertaken by accompany individuals wherever they go, which
a group of self-organized professional or amateur means that they can be used to collect real-time,
volunteers.18 In other words, the revolutionary on the ground information. Second, they can be
potential of these new technological tools is not linked to a specific geographic location via GPS
the tools themselves but rather how people are technology, which can facilitate the automatic
using them—the development of social practices classification and management of incoming
in which ordinary citizens are becoming human content. Third, many mobile phones today have
rights researchers and activists, engaging with each still and video cameras built into them, which
other and with governments, corporations and allows the holders of these phones to capture still
international institutions. photos and video. Fourth, even the most basic
mobile phones can send text or SMS messages
B. Mobile Phones in addition to voice transmission, allowing
individuals to send brief snippets of information
The proliferation of mobile phones has extended without the need for a phone call. Five, they
the benefits of information and communication lack basic security precautions unless specifically
technologies and new modes of production far added. Unauthorized programs and people can
more broadly than ever before. Historically, the often freely access personal information, including
ability to use ICTs for development or human contacts, that can be sensitive in a human rights
rights has been limited by the “digital divide” context.
—the fact that much of the developing world
|ndex is not wired for telephone or Internet access. In The broad dissemination of mobile phones
many countries, however, mobile phones are has been accompanied by the emergence of
quickly overtaking landlines as a primary mode new methods for collecting information such
of connection.19 This “leapfrogging” directly to as crowdsourcing. Jeff Howe coined the term
mobile phone technology has connected remote “crowdsourcing” in 2006, defining it as “the act of
locations at relatively low cost. Mobile phones taking a job traditionally performed by a designated
operate on cellular networks, thus reaching agent (usually an employee) and outsourcing it to
areas that have not yet been connected by cable an undefined, generally large group of people in
to telephone or broadband networks. (Some the form of an open call.”20 Crowdsourcing can
mobile phones also offer access to the Internet, be used to collect and aggregate information,
either through these same cellular networks which services a variety of functions; among
or through a wireless connection to a server; other things, the responses of a group can take
the second of these, however, requires a wired advantage of latent or unrecognized knowledge
infrastructure.) and can eliminate the idiosyncratic aspects of an
individual’s particular decision-making process.21

4 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

|ndex

T H E W O R L D B A N K G R OU P 5
#ICT4HR NOV EMBER 2012

|ndex

Democratic Republic of Congo,


Dominican Republic, and Kenya

6 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

II. Case Studies

T
his report draws its conclusions and The report also excluded consideration of the use
recommendations from case studies of information collected via new technologies
primarily drawn from three country and methodologies in legal proceedings. With the
contexts: the Democratic Republic of Congo, the exception of participatory budgeting, the report
Dominican Republic, and Kenya. In consultation also does not focus on e-governance initiatives.
with the World Bank, the research team chose to
focus on these three countries in order to ensure a Uchaguzi (Kenya)
manageable scope for the report and facilitate more
in-depth analysis while still providing some diversity Uchaguzi was designed to allow “citizens and
in terms of geography, levels of technological and civil society to report on electoral offenses such
economic development, and types of human rights as intimidation, hate speech, vote buying, electoral
issues. Each of the projects reviewed is summarized offenses, misinformation, as well as alert authorities
briefly below. Additional discussion of each project to raising tensions and acts of violence” during
is provided throughout the report to illustrate Kenya’s 2010 Constitutional Referendum.22
and provide support for specific conclusions and Uchaguzi was built on the Ushahidi platform23 and
recommendations. relied on crowdsourcing via SMS to map incidents
|ndex
of electoral disruption. The project established
The team and the World Bank chose the an SMS short code that individuals could use to
particular projects profiled in this report as projects send reports via mobile phones and also fielded
that were relatively well documented and which reports through the Internet and Twitter.24 It also
illustrated a range of challenges and innovations. sent monitors into the field to observe and send
The research methodology was qualitative. In the back messages via SMS. Uchaguzi mapped these
fall of 2011, the team engaged in background and data points and made the information and maps
secondary source research, conducted interviews available online. They also fed reports to local
with key informants via phone and email, and wrote authorities who were able to respond to specific
case studies of each of the projects. In the spring and incidents of electoral irregularities.25
early summer of 2012, the team conducted follow
up key informant phone and email interviews and Uwiano (Kenya)
drafted the report.
The limitations of this report follow from the Uwiano used SMS messaging to collect citizen
above choices. The cases are illustrative but not reports about problems during Kenya’s 2010
representative. Interviews were conducted with one Constitutional Referendum.26 Uwiano received
key informant for each project; no interviews were over 20,000 SMS messages in the weeks and days
conducted with participants. The cases were also not leading up to the referendum, and it tracked and
initially selected using a human rights framework. responded to 122 incidents.27 Uwiano collected
As a result, some rights were not featured in the messages using both volunteers and trusted
initial set of case studies, including economic, social monitors.28 The project focused on reports of
and cultural rights and voting rights. The team violence, rather than election irregularities as a
used secondary literature to add profiles of selected whole.29 Although information about incidents
projects in the area of economic, social and cultural was shared with authorities, “[u]nless granted
rights, but this research was very limited and did permission from those submitting the information,
not include interviews. Due to time constraints, the identities were not provided to the responders,
research team also decided to exclude the issues of not even law enforcement.”30 The project was run
e-voting, e-government, mobile banking, and open by a partnership between the government, NGOs,
data, which have been well documented by others. and international development agencies.31

T H E W O R L D B A N K G R OU P 7
#ICT4HR NOV EMBER 2012

Map Kibera (Kenya) behavior change for the prevention of violent


conflict. Mobile messaging has proven particularly
Map Kibera is a participatory community effective in catalyzing behavior change vis-a-vis
mapping project in Kibera, one of the world’s largest public health issues. PeaceTXT seeks to replicate
slums, in Nairobi, Kenya. The project began as an this success within the context of peace and
effort to empower residents of Kibera to map their conflict issues. Violence is often grounded in the
own community and to see themselves as valuable stories and narratives that people tell themselves
contributors and holders of important information and the emotions that these stories generate.
about their community.32 In its initial phase, Map Narratives shape identity and the social construct
Kibera recruited a group of thirteen volunteers, of reality—we interpret our lives through stories.
provided them with training on GPS devices, and These have the power to transform relationships
sent them into the field to collect information and communities. PeaceTXT seeks to catalyze
about “points of interest.” The volunteers then behavior change vis-a-vis issues of violence at the
contributed this data to Open Street Map (OSM), community level by amplifying new narratives
a free and open-source mapping project that relies via SMS. To this end, customized SMS broadcast
on mapping contributions from volunteers,33 by messages are developed in partnership with local
uploading GPS coordinates and descriptions to the partners in Kenya to change the way people
online OSM map.34 Realizing it was difficult for think and react to highly contentious issues in the
Kibera residents to access the map online, the team respective regions.41
also made printouts of the map and distributed
them throughout the community.35 In later phases, Voix des Kivus (DRC)
the mapping team began issue-specific mapping—
|ndex mapping points of interest related to issues such Voix des Kivus was a monitoring and evaluation
as health, security, education, and water and (M&E) project funded by USAID and run by a
sanitation.36 Map Kibera also expanded to include group of researchers from the Center for the Study
a geo-located citizen journalism project, Voice of Development Strategies at Columbia University
of Kibera, as well as a collaborative community to evaluate the feasibility of using a decentralized
video news channel, Kibera News Network.37 data collection system to generate representative
Map Kibera has now started work in Mathare and information about events in areas of the DRC that
Mukuru slums.38 were inaccessible because of the ongoing conflict.42
The project leaders developed the concept of
Sisi Ni Amani (“We Are Peace”) (Kenya) “crowdseeding” and applied this methodology
to collect conflict event-data in the Kivus.43 The
SNA-K seeks to strengthen networks between project used random sampling to select eighteen
local peace leaders as a way to prevent and de- villages in South Kivu and provided people in
escalate violence.39 SNA-K employs SMS messaging those villages with the ability to post accounts
to provide outlets for positive civic engagement in of events that affected their daily lives, such as
marginalized communities and to monitor and disease outbreaks or attacks from rebel groups.44
respond to signs of conflict. SNA-K works with Three individuals in each village were provided
local chapters, comprised of local peace leaders, with a cell phone they could use to send text
to conduct a local conflict analysis and to plan messages about these events. Phoneholders were
activities to prevent and de-escalate conflict in their asked to act as the representatives of their villages
communities. Each chapter gets a phone number and to send information about anything they felt
to which community members can subscribe and comfortable reporting.45 The project used the
then builds a database of subscribers in their FrontlineSMS platform to collate this information.
community with whom they can communicate In January 2010, Voix des Kivus introduced
through an SMS platform.40 SNA-K is also additional functionality that sent prices of local
partnering with PopTech and partners on a project goods to phone holders and allowed those sending
called PeaceTXT. The purpose of PeaceTXT is SMS messages to code the messages according to
to leverage mobile messaging (SMS) to catalyze sensitivity.46 Although the project was initially

8 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

designed only to collect information for research Force (SBTF) to crowdsource the analysis of satellite
purposes, the research team felt an obligation to imagery for three key cities in Syria to identify
try to share information with those who could and corroborate further evidence of human rights
use it.47 The team developed a system by which violations in the country.56
data without village identifiers was made available
online as PDF bulletins and more detailed data was AAAS Remote Sensing (DRC)
made available (with village consent) on a weekly
basis to organizations in a position to respond to The American Association for the Advancement
appeals.48 The system allowed internal validation of Science’s (AAAS) Geospatial Technologies and
and had a very high usage rate.49 Human Rights Program uses tools such as satellite
images, geographic information systems (GIS), and
Piga Simu (DRC) global positioning systems (GPS) to map and analyze
areas where human rights abuses are alleged to have
Piga Simu, which means “call” or “talk on occurred.57 Geospatial tools can provide information
the phone” in Kiswahaili, is a project run by the about human rights violations in remote, isolated
DRC advocacy group Si Jeunesse Savait (SJS). SJS areas for which information is otherwise unavailable.
uses the voice-based communications platform Remote sensing using geospatial technologies can
Freedom Fone50 to provide an interactive menu also be used to corroborate on-the-ground reporting
system with pre-recorded information about of conflicts and natural disasters affecting human
sexual assault and resources. Interested parties rights. In May 2009, Human Rights Watch asked
can call to learn more about their rights, how to AAAS to use satellite images to document and
file court claims, and health information.51 SJS corroborate violence targeting civilians in the area of
developed the project to provide women with a Busurungi in the DRC. AAAS acquired and analyzed |ndex
means for accessing information anonymously, satellite imagery of 100 square kilometers in the
without risking stigma. SJS also provides a “call area and was able to conclude that 1,494 structures
back” function that allows women to leave their had been destroyed. Satellite imagery showing the
information and receive a call back from a trained destruction of a village some time between August
specialist and in a language they prefer.52 Because of 31 and September 22 also indicated recent violence.58
the risks faced by women’s human rights defenders,
SJS has also created functionality to link women’s ICT4GOV – South Kivu (DRC)
human rights defenders with organizations who
might provide them with support.53 The ICT4GOV project in South Kivu in the
DRC employs SMS messaging as part of its
Amnesty International Science for Human participatory budgeting work. The project is aimed
Rights Program (International) at “facilitate[ing] decentralization by empowering
stakeholders to participate in the process of
The Science for Human Rights (SHR) project at participatory budgeting through the use of ICT.”59
Amnesty International (AI) leverages technological The project uses SMS messages in four ways: to
and scientific progress for human rights advocacy and communicate information to participants, collect
campaigning.54 More specifically, SHR uses geospatial votes from those who are not present about their
technologies like satellite imagery for human rights preferences and priorities for public projects, report
monitoring and conflict prevention. Satellite imagery back on projects that were undertaken, and engage
enables “access to previously inaccessible conflict in monitoring and evaluation of ongoing projects.60
zones, provide compelling visual evidence and Monitoring is accomplished through the use of
present information in a new and engaging way, all observers: Civil society organizations monitor and
of which assists our activists in their campaigning report on the projects, and this information is then
efforts.”55 The team at SHR has used satellite imagery disseminated to the community via SMS.61 The
to document human rights violations in dozens of project is also in the process of building an automated
conflicts around the world including Chad, Darfur, system that will collect predefined information via
Kyrgyzstan, North Korea and Sri Lanka. In 2011, SMS about the status of public works projects and
SHR partnered with the Standby Volunteer Task make this information available on a website.62

T H E W O R L D B A N K G R OU P 9
#ICT4HR NOV EMBER 2012

Educación Digna (Dominican Republic) is a documentary by Jose Maria Cabral that was
disseminated through the Dominicana Contaminada
Educación Digna is a coalition comprised of 199 blog as well as sites such as YouTube68 and Vimeo.69
different organizations seeking to pressure the The campaign also leveraged Dropbox and BBM to
government to enforce the General Education disseminate media content in a cost-effective manner.
Law 66-97, which requires that 4% of GDP in
the national budget be allocated to education. The Medic Mobile (International)
coalition encourages citizen involvement through
its website and via social media (e.g., Facebook, Medic Mobile provides a set of open-source
Twitter, YouTube) and also maintains a database of software tools that facilitate the collection
members and legislators.63 The coalition’s website, and delivery of health care information via
hosted by Wordpress, provides information about mobile phone. In low-resource settings, a lack
events and links to social media websites.64 The of infrastructure and low doctor-patient ratios
website also contains several forums where users can impede the delivery of health services.70
can post comments about experiences, show Community health care workers help address that
support, share poetry, and make suggestions.65 gap, but workers must often travel great distances
to reach isolated patients.71 Medic Mobile develops
Dominicana Contaminada (Dominican Republic) and extends existing mobile phone platforms to
support community health workers in a variety
Dominicana Contaminada is a campaign focused of ways, including “community health worker
on opposition to illegal gold mining in the Dominican coordination and management, community
Republic and its harmful environmental effects. mobilization for vaccination and satellite clinics,
|ndex The Dominicana Contaminada blog provides logistics and supply chain management, referrals,
information about upcoming court processes routine data collection, and mapping of health
related to the mining as well as reports about past services.”72 In addition, the team is developing
and upcoming marches and the activities of the apps for SIM-cards rather than just for smart
mining company, Barrick Gold.66 The campaign phones. Medic Mobile now works with over thirty
has used viral dissemination of video to document partners in fifteen different countries.73
and communicate the human rights impact of the
illegal mining.67 “Mirrors for Gold,” for example,

10 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

|ndex

T H E W O R L D B A N K G R OU P 11
#ICT4HR NOV EMBER 2012

|ndex

An Important Vehicle
for Freedom of Expression

12 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

III. ICTs and Human Rights

I
nternational human rights are protected by both organize information submitted through those
customary international law and human rights means, provides an important vehicle for freedom
treaties. The two primary human rights treaties of expression. Freedom of expression is protected
are the International Covenant on Civil and under Article 19 of the ICCPR. Article 19(2) of
Political Rights (ICCPR) and the International the ICCPR provides that “Everyone shall have
Covenant on Economic Social and Cultural Rights the right to freedom of expression; this right
(ICESCR).74 These treaties are complemented by shall include freedom to seek, receive and impart
seven additional issue-specific treaties.75 Although information and ideas of all kinds, regardless of
contained in two different treaties, the rights frontiers, either orally, in writing or in print, in
protected under the ICCPR and the ICESCR are the form of art, or through any other media of his
interrelated, interdependent, and indivisible.76 choice.”79 Extending the reach of new technologies
via mobile phones and providing ways to organize
Social media and mobile phones can play an that information enables individuals to impart
important role in the protection of individual information and ideas of all kinds—and to do so
human rights. First, these ICTs can support the across vast frontiers.
implementation of rights. For example, individuals
|ndex
can express themselves or engage in the political Voix des Kivus illustrates the role new
life of the community via social media or mobile technologies can play in the fulfillment of the right
phones. Social media and mobile phones can to impart ideas and information across frontiers.
also be used to provide information, such as Although created to gather information about
information about health care, that is necessary atrocities in remote areas of the DRC, the project
for the fulfillment of rights, such as the right to has also proven itself to be an important vehicle
health.77 Second, ICTs can help enforce rights. The for expression: “For participating communities, it
can be used, for example, to collect information provides a system for creating histories, archiving
needed to put pressure on duty-bearers to change testimonies, and communicating with the rest of
their behavior, assess local needs, evaluate the world.”80 Indeed, the Voix des Kivus project
compliance. They can also provide platforms for indicates that the expressive capacity of new
organizing and advocacy. Third, new technologies technologies appears to be a strong motivation for
can also be used to promote social accountability. participation, even apart from project outcomes.
Social accountability is an over-arching concept Although the research team shared information
that “refers to the broad range of actions and with partner organizations, this information was
mechanisms beyond voting that citizens can use not acted upon. The team asked participants why
to hold the state to account, as well as actions on they continued to share information, despite this
the part of government, civil society, media and lack of response. Participants responded that they
other societal actors that promote or facilitate wanted to keep open the possibility of a response
these efforts.”78 and because, in the words of one, “for the first
time, we’re being put on the map.”81
A. Supporting the Implementation
of Rights Citizen journalism can also give effect to
Article 19’s requirement that “everyone” have
Freedom of Expression the right to express ideas and information—not
just professional journalists. Voice of Kibera gives
The broad dissemination of the means for residents of Kibera the opportunity to publish news
communication, such as mobile phones, coupled and information about their community.82 Kibera
with systems designed to capture, preserve, and News Network is a collaborative community video

T H E W O R L D B A N K G R OU P 13
#ICT4HR NOV EMBER 2012

news channel. A dedicated group of participants Right to Participate in Public Affairs


take video of events within Kibera and upload
the videos to YouTube.83 Both of these projects New technologies also provide the means for
enable ordinary community members to express realizing the right to “take part in the conduct of
themselves about happenings in their community. public affairs,” a right protected under Article 25
of the ICCPR. Article 25(a) of the ICCPR provides
New technologies also help fulfill individuals’ that “[e]very citizen shall have the right and the
ability to seek and receive information, both opportunity . . . [t]o take part in the conduct of
of which are protected under Article 19 of the public affairs, directly or through freely chosen
ICCPR.84 For example, mobile phones allow representatives.”89 Mobile phones and social media
individuals to access information they would can provide vehicles through which individuals can
otherwise not have been able to access because of participate directly in government and the conduct
their remote location or the lack of infrastructure of public affairs. The ICT4GOV project in South
in low-resource contexts. Piga Simu and Voix des Kivu, for example, uses SMS messaging to empower
Kivus, for example, push relevant information to stakeholders to take part in the participatory
recipients—about sexual violence and the prices budgeting process. Through SMS messages,
of local goods, respectively. Because of the lack of individuals receive messages about the process, vote
infrastructure in the DRC, it would be otherwise on priorities for public funding, and learn about the
difficult for individuals to obtain this information. progress of public works projects.

Freedom of Association and Assembly New technologies can also foster the ability to
participate in public affairs by generating valuable
|ndex
Social media and other new technologies also information that can provide political leverage. Map
provide a vehicle for the right to freedom of association. Kibera, for example, facilitated the involvement of
Article 22(1) of the ICCPR provides, “Everyone shall Kibera residents in local political processes by giving
have the right to freedom of association with others them a means for generating information that was
. . . .”85 Social media platforms provide a space for valuable to other groups.90 New technologies can
individuals to find and connect—to associate—with help disseminate information about the political
others. Indeed, in early 2011, responding to Egypt’s process, educate voters, and provide a vehicle for
decision in late January of that year to shut down the political conversation. For example, Sisi Ni Amani
Internet, Secretary of State Hillary Clinton delivered conducted civic education and voter education in a
a speech in which she called the Internet “the public Nairobi constituency in connection with the election
space of the 21st century – the world’s town square, of a new Member of Parliament and was able to
classroom, marketplace, coffeehouse, and nightclub.”86 respond with SMS messages to moderate tensions
The case studies also reflect the importance of social that arose with the postponement of the election.91
media for freedom of association. For example, the
movement to oppose illegal mining in the Dominican Economic, Social and Cultural Rights
Republic used the Contaminada Dominicana blog
and social media platforms to connect with others Access to information is critical for the protection
interested in this issue. of many rights, such as rights to health, education,
and an adequate standard of living. ICTs that enable
Social media platforms also facilitate the right to easier and faster exchange of information play an
freedom of assembly in the offline world. Article 21 important role in securing these rights. Mobile
provides that “[t]he right of peaceful assembly shall phones, for example, help improve the delivery of
be recognized.”87 Educación Digna, for example, health information, a critical determinant of the
uses its website and social media platforms to right to health. Article 12 of the ICESCR protects
build and communicate with its constituency and “the right of everyone to the enjoyment of the
organize protests, including “Yellow Monday,” a highest attainable standard of physical and mental
day of country-wide flash mobs wearing yellow and health” and requires that states create “conditions
carrying yellow umbrellas.88 which would assure to all medical service and
medical attention in the event of sickness.”92

14 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

Health information is an essential determinant “keep track of learners who are using the service
of the human right to health. The Committee on and how they are doing with the exercises.”103
Economic, Social and Cultural Rights (ESCR Learners can use the service to obtain additional
Committee), the international body charged with practice and “compare their progress with other
monitoring state compliance with the ICESCR,93 learners in their class, province or country.”104
has made clear that the right to health extends “not The program has since been expanded to more
only to timely and appropriate health care but also schools and learners in South Africa and has been
to the underlying determinants of health, such as . . . deployed in Finland.
access to health-related education and information,
including on sexual and reproductive health.”94 The acquisition of technical or vocational skills
can also be a secondary effect of projects aimed
Mobile technology is helping to deliver health at fulfilling other rights. Under Article 13(2),
information in a variety of ways. Medic Mobile states are obligated to make secondary education,
is using text messaging to help community health “including technical and vocational secondary
workers communicate with clinics and doctors. For education,” both available and accessible to all
example, Medic Mobile technology has been used “by every appropriate means.”105 States are also
in Malawi to track tuberculosis symptoms, report obligated to encourage or intensify fundamental
about patient adherence with drug regimes, send education “as far as possible for those persons
appointment reminders, send alerts about medical who have not received or completed the whole
emergencies, and consult with physicians.95 Medic period of their primary education.”106 One of the
Mobile and other companies are also developing goals of MapKibera, for example, was to provide
technology that can be used to send pictures of participants with computer literacy skills that they
blood samples over cell phones by MMS messaging could use to obtain further opportunities.107 |ndex
(Multimedia Messaging Service) for diagnosis.96
New technologies are also being used to collect and New technologies can also play a role in
organize medical records in low-resource settings.97 fulfilling the right to an adequate standard of
Mobile health or “mHealth” technologies have living. Article 11 of the ICESCR recognizes the
been developed for almost every type of traditional “right of everyone to an adequate standard of
health care including prevention, diagnosis, living for himself and his family.”108 Dissemination
treatment, prenatal care, outbreak mapping, and a of knowledge related to food prices and markets,
number of administrative needs.98 for example, can help farmers obtain better prices
for their crops and thus augment their ability
Mobile technologies are also being used to deliver to maintain an adequate standard of living for
education. Article 13(1) of the ICESCR provides that themselves and their families. Mobile technologies
“States Parties to the present Covenant recognize are currently being employed in a variety of
the right of everyone to education.”99 Both mobile places to help farmers with crop prices. Voix des
phones and social media can be deployed to facilitate Kivus, for example, phone holders can be sent
the right to education. Nokia Mobile Learning for prices of local goods upon request.109 DAI has a
Mathematics (Nokia Momaths), for example, is an project in Afghanistan in which farmers can send
“educational intervention using mobile telephones” in questions about commodities and markets and
first deployed in South Africa.100 A partnership receive phone calls and texts in return with market
between Nokia, several private interests, and a prices and other information.110
number of South African governmental agencies,
Momaths initially ran as a pilot to explore the
efficacy of using mobile technology to “support Rights of Vulnerable Populations
learning of Grade 10 mathematics.”101 The pilot
had two components, “interactive mathematics New technologies can help enable the effective
learning materials using a mobile delivery platform exercise of the rights of vulnerable populations
combined with a social media application for peer- such as women and individuals in rural areas. Piga
to-peer support.”102 Through the mobile platform, Simu, for example, provides recorded messages
teachers can provide additional exercises and about sexual violence resources to individuals who

T H E W O R L D B A N K G R OU P 15
#ICT4HR NOV EMBER 2012

would otherwise have to walk days to obtain that Naming and Shaming
information from a hospital. The use of technology
to reach remote areas—such as mobile phones and One of the most well-established mechanisms for
remote sensing in the DRC—generates information enforcing human rights is “naming and shaming,”
about human rights abuses against rural and the process of gathering information about a duty-
isolated populations that can empower them to bearer’s human rights record and publicizing that
protect their own rights and support efforts to hold information in an effort to pressure or shame the
governments accountable. duty-bearer into changing its conduct.117 Given
the absence of enforcement structures on the
Assuming security precautions are in place, international level, applying pressure by publicizing
technology can also enable greater anonymity, which abuses is one of the most important tools available
can be important in protecting the rights of women to human rights organizations.
and other vulnerable groups. SJS chose Freedom
Fone to provide information about sexual violence Historically, human rights organizations
because it allowed callers to be anonymous. Women employed researchers in the field to gather
didn’t want to talk about violence with people who information about human rights violations. New
knew them, since it was associated with stigma.111 technologies aid in that effort by providing a fast
Providing a way for women to access information and cost-effective means for gathering a significant
without revealing their identities helped overcome amount of information, including from places
what is otherwise a significant barrier to access that may be otherwise inaccessible.118 Voix des
information about sexual violence. Kivu and the AAAS’s remote sensing project in the
DRC both were able to collect information from
|ndex B. Enforcing Rights regions that were inaccessible because of ongoing
conflict. Information is also collected in real-time,
Social media and mobile phones can also allowing faster response times. Uchaguzi’s system,
play an important role in enforcing rights. States for example, enabled rapid communication and
have an obligation to respect and ensure the response, vastly speeding up reporting that would
rights protected by the ICCPR and to respect, have otherwise required days or weeks to transmit
protect, and fulfill the rights protected under the via traditional methods.119 Further, information can
ICESCR.112 This means that states must not only be collected from a much wider geographic area
refrain from violating rights themselves but also and more diverse sources than would be possible
protect populations and groups from violation employing traditional methods.120 In these ways,
of their rights by third parties,113 and “adopt mobile phones and techniques like crowdsourcing
legislative, judicial, administrative, educative and can significantly reduce the cost of information
other appropriate measures in order to fulfil their gathering.121 The information that is collected can
legal obligations.”114 then be used to “name and shame” or otherwise put
pressure on governments to improve their human
Human rights obligations can also operate rights records. Human Rights Watch, for example,
indirectly on private actors such as corporations. used the AAAS’s conclusions about the destruction
Although states are the primary actors under of structures near Busurungi of the DRC to engage
international law, states are obligated to protect in advocacy to protect civilians in the region.122
individuals from violations of their rights by third
parties.115 In addition, the United Nations Secretary Organizing and Advocacy
General’s Special Representative for Business and
Human Rights, John Ruggie, recommends that New technologies also augment enforcement
corporations engage in human rights due diligence efforts by providing additional channels through
to evaluate and minimize the human rights impact which individuals can organize and engage in
of their activities.116 human rights advocacy. Although the record of

16 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

social media tools in facilitating political change has to play a part and reduces the cognitive distance
been mixed and empirical evidence lacking, what is between ordinary individuals and human rights
clear is that these tools are being used for political work.131 On the other, the broad participation
organizing.123 Social media provide a channel for enabled by social media does not seem to foster
communicating with partners and the public at large, the kind of deep political activism needed to
raising awareness about and generating support for achieve social change.132 Some combination of
a movement.124 Social media platforms can provide strong and weak ties online, coupled with strong
convenience, familiarity, and ease of dissemination. ties in the offline context, may help provide both
The Education Digna campaign, for example, chose broad mobilization and deep participation.133
to use social media for its work because those were
the communication channels used by its audience.125 Commentators have also disagreed about
The Contaminada Dominicana project, for example, the extent to which the lack of hierarchy that
disseminated links to the “Mirrors for Gold” video characterizes social media networks fosters or
through social media sites because individuals could undermines efforts to achieve social change. Some
access the video on their own time and spread the argue that social change requires centralization
link to others.126 Networks also facilitate connections and clear leadership structures.134 Others argue
between local and international groups.127 Finally, that social media is valuable precisely because it
the availability of video and camera functionality on enables organization without hierarchy,135 and that
many smart phones means that witnesses can capture leaderless revolutions are stronger because they
images of violations, which can spread on social are harder to target.136 On this issue, as well, the
networks and become a rallying point for a cause.128 truth likely lies somewhere between. As Professor
Sarah Joseph argues, “While loose networks may
Networks and social media also enable wider play a key role in forcing dramatic and profound |ndex
participation in human rights initiatives. The broad political change, more organized hierarchies are
dissemination of the means to capture and share needed to anchor that change . . . .”137
information about what is happening on the ground
makes everyone a potential human rights researcher. New information technologies also help foster
As one human rights organization observes, individuals’ awareness of themselves as rights
holders, a critical precondition to the effective
[N]ew technologies are challenging long- exercise of rights. Participants in Voix des Kivus,
held assumptions about how human rights for example, felt that the ability to share their
documentation and advocacy functions and who stories with the world gave them a “voice.”138
does it. More and more people, including many who Because new technologies provide ordinary
might not see themselves as human rights activists, individuals with the ability to collect information
are now using video and social media to create, themselves, without relying on intermediaries, it
share and organize around issues they care about.129 can serve to strengthen their sense of autonomy and
empowerment. Autonomy and empowerment are
Networks and social media also make possible critical for human rights enforcement because these
broad participation. It is easier than ever before feelings make it more likely that individuals will
for ordinary individuals to support human rights act to protect themselves and demand protection
advocacy campaigns by clicking a button to sign of their rights vis-à-vis duty bearers such as their
a petition or sending a text to donate. At the governments. Participants may even be empowered
same time, there are questions about what the to get involved in their communities in other ways.
broad availability of such “low-cost” activism, For the organizers of the Map Kibera project,
or “clicktivism,”130 contributes to human rights for example, one of the unexpected results of the
advocacy or other social movement efforts. On project was an inspired sense of commitment and
the one hand, low-cost activism enables those who volunteerism from Kibera residents to continually
do not want to or cannot become deeply involved maintain and update the mapping project.139

T H E W O R L D B A N K G R OU P 17
#ICT4HR NOV EMBER 2012

It is difficult to reach conclusions about Social accountability and rights-based approaches


whether social media is “effective” in fostering are complementary and overlapping. The two intersect
activism and social change. In part, this is because precisely at those points at which governments,
there is no single definition or measure of success. recognizing their obligations to respect, protect, and
Further, because each context in which activism ensure the rights of their citizens, involve citizens in
occurs is different, it can be difficult to developed the processes by which this is accomplished. While
generalized theories. Finally, it may not be possible some approaches to human rights enforcement seek
to establish causation.140 As a result, a definitive to pressure governments to comply with international
answer to the question about the relationship obligations, the new generation of social accountability
between social media and social change is not approaches envision a more collaborative role, one in
possible. What is possible, however, are more which citizens are directly involved in oversight of
empirical studies about the role of social media the government’s efforts to respect, protect, and fulfill
in particular situations, such as Professor Joseph’s rights. Among other things, social accountability
study of the uprisings in Tunisia and Egypt, that projects may help the government understand the
focus on the advantages and disadvantages of nature of ongoing human rights violations or provide
using social media in that context.141 Because of citizens with more opportunities to put pressure on
its structure as a survey of several projects over local officials.
three countries, this study was not able to delve
deeply enough into any one case study to reach New technologies can foster social accountability
conclusions of this nature. and thus promote positive human rights outcomes
by reducing the time needed to gather, organize and
|ndex C. Social Accountability transmit to appropriate government responders
the information that they need to protect rights.
New technologies are also important in Uwiano, for example, was a collaboration between
promoting social accountability. Although social government agencies, non-profits and international
accountability can include any method by which development organizations that relied on volunteers
citizens are involved in holding governments and trusted reporters to generate information about
accountable,142 recent initiatives emphasize citizen violence that could be used by first responders,
engagement, particularly through the “expanded including the police. The information that was
use of participatory data collection and analysis generated via SMS messages was filtered and
tools.”143 Social accountability mechanisms can analyzed and provided to the authorities. In one
promote the protection of individual rights, instance, for example, the police set up a buffer
particularly the right to participate in political life, zone at a rally after receiving information that a
and play an important role in enforcing rights. group was going to try to disrupt the event.144

18 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

|ndex

T H E W O R L D B A N K G R OU P 19
#ICT4HR NOV EMBER 2012

|ndex

Accuracy
Security
Inequality
Response

20 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

IV. Human Rights Challenges

A
lthough they offer considerable opportu- is particularly difficult when the sources are
nities for human rights advocacy, these anonymous, since recipients cannot evaluate the
new technologies also present important credentials of the reporter. (And even if provided,
challenges. The very features of social media such credentials may not be accurate.) In many
and mobile phones, as well as new techniques of instances, the government itself may be the source
collecting information such as crowdsourcing, that of misinformation online. During the recent Syrian
make them so valuable, also engender significant conflict, for example, the government spread false
risks. For example, one of the strengths of information over Twitter.147
crowdsourcing via mobile phones is that anyone
can now be a human rights researcher, gathering Moreover, just as social media makes it easier to
information in real time and sharing it with the disseminate the good information, it also makes it
world. On the other hand, that is precisely one easier to disseminate the bad. As Joshua Goldstein
of its greatest risks—anyone can try to be a and Juliana Rotich observed in the context of the
human rights researcher and attempt to engage 2008 Kenyan elections, “mobile phones made
in documentation without the training, protocols hateful and violent messages easier and cheaper to
or support that researchers normally have. This transmit.”148 New technologies can be a “catalyst
|ndex
section evaluates some of the challenges that new to both predatory behavior such as ethnic-based
technologies pose for human rights advocacy. mob violence and to civic behavior such as citizen
journalism and human rights campaigns.”149
A. Accuracy
Because of the risk of politicization, accuracy
Accurate information is critical in human rights may be particularly difficult to ensure in projects
advocacy. Although accuracy is clearly important that seek to evaluate the performance of duty-
in the development and humanitarian contexts, bearers. Map Kibera, for example, had initially
as well, accuracy often plays a different role with wanted to crowdsource reports on the effectiveness
respect to human rights. Accurate information is of local development projects in Kibera. Early on,
important because it provides the “currency” for however, they realized that these reports would
enforcement efforts. The efficacy of naming and be highly politicized and in fact could result in
shaming as an enforcement technique depends liability for the organization.150 Such reporting
critically on the quality of the information could also alienate local NGOs, who provide
gathered. Unless human rights reports are accurate, important channels of communication to local
they will be vulnerable to attack by the states they constituencies.151 When it implements the portion
target and will be ineffective in pressuring states of the project aimed at soliciting information
to change their behavior.145 Accurate reporting is about the status of public works projects by SMS,
also important in mobilizing the press and public the ICT4GOV project in South Kivu plans to try
opinion, since the public is more likely to support to minimize the risk of politicization by ensuring
information it finds legitimate and credible.146 that the questions are purely factual.152

Information submitted by ordinary citizens Even if accurate, information might also be


can be particularly vulnerable to errors. The taken out of context. Human rights investigators
information may be mistaken, wrong, exaggerated, and journalists are trained to understand the
or even intentionally misleading or distorted. Once importance of context—that information has
reported, inaccurate information can be picked up relevance and meaning in part because of the
by other sources, vaulting faulty information to the context in which it occurs. Citizen reporters may
headlines in an echo-chamber effect. Verification not necessarily report the full context that would

T H E W O R L D B A N K G R OU P 21
#ICT4HR NOV EMBER 2012

be necessary to evaluate the information provided. was the case in Voix des Kivus, or by gathering
Further, social media and digitization make it information about the reporter through his or her
extremely easy to take material out of context, online identity.158 Uchaguzi and Uwiano also relied
remix it with other images, and redistribute: on information from trusted reporters, in addition
“Appropriating existing content (music/images/ to information from the crowd.159 Bounded
videos) and mixing it with fresh content in new crowdsourcing and crowdseeding may result in
ways is a cheap, effective, and popular form of more accurate information because the reporters
political expression. However, remixing often relies are known and thus their credibility can be assessed.
on de-contextualizing footage that has a specific As in Voix des Kivus, a long-term relationship
human rights purpose.”153 with the project may lead them to be more
reliable reporters.160 Because they are identified in
Despite these limitations, the case studies illustrate advance, they can also be trained and selected from
a variety of approaches for verifying and providing representative geographic locations.161 Identifying
context for crowdsourced information. Broadly, reporters in advance may, however, make it easier to
these approaches seek to validate information by identify the individuals providing information and
authenticating the data itself or by establishing trust thus increase their security risk.162
in the reporter. Ideally, the best verification systems
would do both and a corpus of strategies to verify Information can be corroborated by information
crowdsourced information, called “information from other unknown sources, trained observers, or
forensics,” is becoming increasingly available.154 mainstream media. Voix des Kivus, for example,
selected three individuals as trusted reporters in
Bounded crowdsourcing or “community part to be able to triangulate their reports against
|ndex sourcing,” relies on reporting not from the general one another.163 In addition to verification through
public but from a growing network of trusted its trusted sources, Uchaguzi also compared
reporters.155 This methodology is similar to incoming reports to reports from the mainstream
“snowball” sampling in survey research. Another media.164 Although this aspect of the project has
approach is “crowdseeding” which extends the not yet been implemented, the ICT4GOV project
concept of bounded crowdsourcing to produce a plans to verify information received through
statistically representative sample. Crowdseeding SMS messages about the status of public works
provides three advantages: First, it presents the projects by comparing reports and investigating
possibility of collecting more information from discrepancies. Information can also be internally
more participants. With crowdsourcing, only those corroborated by evaluating whether it is internally
who are both informed and have the resources to consistent. Internal and external corroboration
take part will participate. Crowdseeding addresses is especially useful for projects in which the
this deficiency by equipping particular reporters trustworthiness of the source cannot be established
with the resources to take part and ensuring that because it is anonymous. Corroboration can also
the entire community knows they can contribute help to expand your network of trusted sources by
information through these reporters. Second, verifying reports of previously unknown reporters
crowdseeding provides the opportunity to select and, over time, contributing to their credibility.166
information from a random sample (as opposed In projects involving significant quantities of
to whoever participates, which is the case with data, verification can also be accomplished by
crowdsourcing). Third, crowdseeding can improve aggregation. Aggregating reports from many
the quality of the data since it increases the individuals about can provide a way to identify
reporter’s incentive to be honest and minimizes the those incidents that are more credible than others
risk of random misinformation.156 because they are confirmed by other reports.167 As
a method of verification, aggregation has important
Voix des Kivus employed this approach by using limitations, however. Among other things, it may
random sampling techniques to select villages and be difficult to obtain the volume of reports needed
then asking three individuals in each village to for such an approach to work, particularly with
serve as reporters.157 Trust can be established either respect to human rights violations that are more
by individual relationships with the reporters, as systematic or invisible.168

22 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

Information can also be verified through Finally, at least one project is planning to employ
investigation. Uchaguzi, for example, used its human review to ensure that reports included the
trained observers in the field to verify incoming context necessary for interpretation. Sisi Ni Amani
reports. When a report came in of voter fraud plans to rely on chapter leadership to interpret
or misinformation, it was relayed to one of the reports: “As community leaders and through
observers for verification.169 The Voice of Kibera their conflict prevention efforts, they will have a
citizen news outlet established an editorial board strong qualitative understanding of local dynamics
of trusted individuals to verify incoming reports.170 that will position leadership to make informed
Video and still images can also be verified by interpretations of shifting conflict dynamics
weather reports, landmarks, and shadows.171 that reflect the unique nature and context of the
Uwiano verified information by calling back community.”179 Ensuring a diverse membership
the numbers associated with the messages and may be key to helping provide adequate context
conducting brief interviews.172 One disadvantage for community reports, particularly in times of
of investigation is that it may eliminate the crisis: “The intergroup nature of the chapters will
anonymity that enabled the report in the first also help balance analysis, ensuring that cognitive
place. Some of those who reported information bias or perceptions that may pique during high
to Uwiano, for example, were reluctant to reveal periods of tension are mitigated.”180
details when they were called back because they
did not know the person who was returning their B. Security
call. In those instances, the team would turn to an
NGO or official to verify reports.173 New technologies also pose substantial risks
both for those who collect information and those
Projects might also manage problems of about whom information is collected.181 Collecting |ndex
verification through disclosure. Voice of Kibera, and disseminating information about human rights
for example, realizing that its internal investigators violations can put both reporter and source at risk
would not be able to verify all reports, decided of retaliation, whether from the state or other
to publish almost all of the reports on their site community members. Depending on the context,
but to label them with tags of either “verified” the reporter and the source may want to preserve
or “unverified” and allow readers to judge their anonymity. New technologies make it difficult
for themselves.174 Uchaguzi also opted to post to ensure anonymity for several different reasons.
reports from both trusted an anonymous sources,
“visualizing messages received from the crowd First, digital information is easily captured,
with black dots and reports from officially trained copied, and shared.182 This means that identifying
election monitors through our partner CRECO information (whether contained in the data itself
[Constitution and Reform Education Consortium] or hidden in its code) can be disseminated quickly
with blue.”175 Providing additional information and widely before steps can be taken to prevent
about the data received allowed the public to “sort the loss of anonymity. The Iranian and Burmese
through and decide how much weight to give to governments, for example, have used photos and
each report.”176 video footage of protests to identify demonstrators
and onlookers.183 Indeed, the Iranian government
Methods of verification can also be combined or used crowdsourcing in the process, posting images
different methods applied at different stages. Voix captured from YouTube and asking the public to
des Kivus, for example, sent a field coordinator to help identify those involved.184 In addition, because
investigate reports at the outset of the project,177 information is so easily copied and shared, there is a
but ceased investigation once it established that greater risk of re-victimization. Each publication of
the messages were of high quality. After that, a victim’s story—particularly when that account is
the project relied on triangulating the reports of captured in the form of video—can be experienced
the three village reporters, while backing this up as another assault on the victim’s integrity and
with phone contact between the reporter and the dignity and can cause additional trauma. The
field coordinator and occasional visits by the field ability to quickly and easily share stories of abuse
coordinator to the village.178 thus poses risks for victim security.185

T H E W O R L D B A N K G R OU P 23
#ICT4HR NOV EMBER 2012

Second, digital information also contains messages to be segmented and provide different
considerably more identifying information than levels of viewing privileges.194 In the Voix des Kivus
other means of communication, and individuals are project, reporters themselves classified information
often not aware that this information is embedded according to security risk when they sent it to the
in the content they create. For example, digital central team, indicating with whom they thought
information may contain markers that could reveal the text should be shared.195 Edited data was
the identity or location of the person who collects returned to the village; coarsened data, without
or transmits the information.186 Mobile phones, in village identifiers, was made available online as
particular, can be used to track the phone holder’s PDF bulletins; finer data, with the village but no
location.187 Individuals collecting and submitting individual identifiers, was made available, after
information via mobile phone may not be aware that consultation with the villages, to organizations in a
the content they create can be used to find them.188 position to respond to village appeals.196

Third, it can be difficult and expensive to Projects also managed security risks by deciding
maintain the physical security of digital information not to collect some kinds of information at all. The
containing identities of sources or reporters. ICT4GOV project, for example, does not collect
Information could be vulnerable to interception identifying information concerning who voted
while being transmitted. Security solutions may for which public works project.197 This may be
require a level of technological expertise and particularly important if there are concerns about
capacity that human rights organizations may not the security of physical servers or involvement by
possess. Physical servers housing sensitive data the government.
might be at risk of being accessed. Information
|ndex might also be held by third parties, who could Projects also implemented precautions to protect
be compelled by court order or otherwise to the physical security of the data collected. Because
provide the information to the government. In low local human rights defenders are at risk of retaliation
resource environments, technology is more often in the DRC, SJS decided to house any data received
shared, which means that information stored on via Piga Simu on the servers at its headquarters in
the device may not be secure.189 Data may also Kinshasa instead of on-site with partners, 2000
be at risk of physical loss due to virus, theft, fire, miles away from the project implementation site.198
neglect, or other reasons.190 Others took steps to ensure the physical security of
printouts of the information collected. In the initial
Projects employed several techniques to protect stages of the Voix des Kivus project, for example,
the security of the information they gathered. One the field coordinator would take a printout of
of the most common techniques was to carefully information submitted from each village to the
control the collected data and remove identifying village to verify the content with each reporter. The
information before circulation. The Voix des Kivus list was printed in a way that only made sense to the
research team, for example, would heavily edit coordinator and not to anyone who might stop him
the translated texts it received, removing village on the street.199
names and the names of people, and removing
entirely any texts that could have repercussions Reporters may be uniquely vulnerable in
within the village.191 Uwiano released data to several ways. In projects that employ bounded
the public in aggregated form so that individuals crowdsourcing, their identities are known, which
could not be identified.192 It never released may lead them to be targeted. In some cases
any identifying information, even to the law possessing the technology can present a risk in and
enforcement authorities charged with responding of itself. In Kibera News Network, for example,
to the reported concerns.193 participants were provided with Flip Cameras, which
put them at greater risk of theft and pickpockets.200
Projects also managed the security risk of Given the risk to identified reporters, Voix des Kivus
information containing sensitive information by initially considered keeping their identities secret.
controlling access to the data. Sisi Ni Amani, for The villages rejected this, however, as both futile and
example, is developing a system that will allow potentially causing greater suspicion and distrust.201

24 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

Although never used, to protect reporters, Voix des as well as the costs of the handsets themselves. A
Kivus implemented a “security alert” function by lack of competition in markets for mobile phone
which reporters could send a text and receive a call services may allow a few providers to dominate
back immediately asking if there was a need to send and keep prices high.213 Mobile providers might
peacekeepers.202 not serve under-resourced areas.214 In low resource
environments, people may find it difficult to obtain
Projects were also concerned with the safety of power to charge mobile phones. Finally, even where
those generating information. Sisi Ni Amani, for mobile is available, coverage may be limited. For
example, voiced concern that in localized projects, example, due to time constraints, the Uwiano
those who access the information would be likely project was only able to arrange a partnership with
to be able to identify those who were reporting one mobile service provider, Safaricom, for the SMS
information.203 As a result, the project is considering messaging system. While Safaricom is the service
using network members as “proxy” reporters provider of a large majority of Kenyans there were
to protect the identity of those who volunteer. still some who were not able to participate.215 The
Individuals will be able to send reports to members ICT4GOV project emphasized the importance of
of the network they trust, who would then report sustainability with respect to technology, especially
the information further without identification.204 in terms of cost, noting their efforts to address this
issue by using low cost handsets and negotiating
C. Inequality special rates with operators to reduce the cost of
text messages.
Although new technologies can help protect
the rights of vulnerable populations, they can Thus, although mobile phones provide an
also reinforce existing inequalities by excluding important starting point for overcoming the |ndex
individuals who lack access.205 The digital divide— digital divide, it is still a resource that is unevenly
the fact that many parts of the developing world are distributed, and access to mobile devices may
not connected to phone lines and Internet cables— be particularly limited in poor or underserved
remains a real problem.206 Mobile telephones have communities. Relying on preexisting access to a
gone a long way toward overcoming the digital particular technology poses the risk of replicating
divide; indeed, mobile subscriptions appear to have any inequalities that may exist with respect to
overtaken Internet penetration in many countries in that technology. The projects surveyed attempted
Africa.207 Several of the projects employed mobile to respond to these problems in several different
phones because of greater access. Uchaguzi, for ways. Piga Simu, for example, sought to minimize
example, chose to use mobile phones rather than the the burden of a phone call by offering a call back
Internet to collect information because the number service.217 Voix des Kivus provided the technology,
of Kenyans with mobile phones far outweighed the both the mobile phones themselves as well as a solar
number with Internet access.208 Map Kibera chose panel to recharge the phones.218 The ICT4GOV
SMS because its research indicated that most of project in South Kivu emphasized the importance
the Kibera residents either owned or had access to of ensuring that SMS messaging provided a
a mobile phone through friends or family.209 The complementary channel, not a substitute channel,
ICT4GOV project in South Kivu, for example, for other means of communication, such as working
chose to use SMS because mobile phones were with civil society organizations on the local level as
both widespread and suited to a context in which well as local leaders.219
electricity was scarce.210
Inequalities in access to a particular technology
Yet mobile still presents significant problems of may also exist within particular communities. In
access.211 In the Momaths project, for example, “[t] other words, the digital divide is not only geographic
he biggest problem in the project – identified by but can occur along the lines of race, gender, age,
both teachers and learners – was lack of access for and disability.220 In some places, for example,
some learners to a suitable mobile telephone.”212 the use of mobile phones may reinforce gender
Mobile phones can be prohibitively expensive inequalities. For example, a women-run community
because of the cost of individuals calls and texts based radio project in Southeast Kenya chose radio

T H E W O R L D B A N K G R OU P 25
#ICT4HR NOV EMBER 2012

over cell phones after conversations revealed that Finally, cultural perceptions of technology may
women felt their husbands would take and sell a also create barriers to access. In Map Kibera, for
cell phone; they were provided with solar powered example, project organizers found that individuals
rechargers for their radio interfaces because they did not view technology as participatory but rather
did not have access to household finances necessary saw online content as something to be passively
to purchase batteries.221 Voix des Kivus sought to consumed.231 As a result, Map Kibera did outreach
avoid replicating existing inequalities by providing specifically about the value of the technology:
one phone to the village chief, a second to the head “Many Kiberans who asked what the mappers were
of the village women’s association, and a third to doing did not see how a map available only online
someone elected by the village community.222 The could benefit them or their community—besides
project chose these individuals because they were which, they already knew how to get around.”232
typical sources of information in a village and SJS similarly said that it can be difficult to convince
provided a balance of power.223 people of the value added of technology to do
things they are already doing.233
Lack of literacy can also create a barrier to the
use of particular technologies. For example, SMS The Uchaguzi project indicates that sequencing
messaging requires a basic level of literacy. Piga might be one way to help foster technical literacy
Simu decided to use a voice-based system because and comfort with a particular technology. In that
it is easier to access by vulnerable populations who case, the community mapping project provided a
may not be able to write.224 A mobile project in foundation for later projects, such as community
Afghanistan changed its plans to use SMS to deliver news and issue specific mapping. Sequencing is
information about markets and commodities to not a necessary prerequisite but may be a way to
|ndex farmers to a call back function because of low levels introduce a technology and get people engaged.234
of literacy.225 At the same time, lack of literacy
does not mean that text is always not useful. D. Response
For example, a later survey of the farmers in the
Afghanistan project indicated that they wanted the Projects using new technologies may find it
SMS in addition to voice messages because they particularly challenging to transform information
could show the SMS market quote to potential into action. Although it is impossible to evaluate
buyers and gain leverage during negotiations.226 systematically, some of the projects provided at least
Language can also create barriers. Piga Simu offers anecdotal evidence of actions that resulted from their
a call back function in part so that women can information. Uwiano relayed information to the
request information in a language of their choice.227 police about reports of a planned vigilante action,
and the police responded and were able to make
Individuals may also be unable to access arrests.235 Uchaguzi sent reports about a polling place
particular technology because of a lack of technical that was displaying misleading information to the
literacy. Many of the projects surveyed invested time local electoral commission, and the commission was
in educating participants on the use of the relevant able to remedy the problem.236 Other projects were
technologies. In Voix des Kivus, for example, not able to provide even examples, however. The Voix
phone holders were given extensive training on the des Kivus research team, for example, concluded that
system’s operations, provided with a ‘code sheet,’ “we know of no instances in which development
and trained how to send and use SMS messages.228 or humanitarian agencies responded to incidents or
In Map Kibera, one resident from each village in issues raised by phone holders, and of no serious
Kibera was recruited and given training in different attempts to integrate the data into operations.”237
ICTs.229 Participants in Kibera News Network
were given weekly classes on how to use Flip Video There are three reasons it may be difficult to
cameras and editing software and they were given generate a response in projects involving new
practice assignments to improve their skills.230 technologies. First, collecting information by mobile

26 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

phone and via new techniques like crowdsourcing Second, transforming information into action is
can generate a significant volume of information. challenging if the information is not tailored to local
Much of the information generated will simply be needs. The Voix des Kivus research team, for example,
irrelevant. Organizations need to have the ability concluded that the one thing they would change, had
to manage and process the information, identifying they to do it over again, would be to “make Voix des
and isolating the relevant data, and that requires Kivus a central part of an NGO.”245 Although the
both human and financial resources.238 The volume research team established relationships with local
of information generated may also inhibit the ability organizations, these partners were not involved in
to find a local partner, since each potential partner is the conception, planning and implementation of
interested in only part of the data set.239 the project. The lack of involvement in the planning
and implementation of the project meant that the
The cases studied employed several techniques information that was being generated was not
in managing incoming data. Uwiano, for example, integrated into or tailored to the goals and priorities
limited the information it collected in order to of local organizations.246 Jessica Heinzelman also
handle the volume it was receiving leading up to the noted that although Uchaguzi was able to get the
election.240 It also engaged in “triage” of the incoming information it received to partners with the capacity
reports, organizing reports into six categories— to act, she would have put even more time into
informative, threat, positive message, hate speech, forming these relationships.247
coded message, or incitement to violence—in
order to identify those that required a response.241 Third, transforming information into action
Uwiano did a full analysis of only 300 of the 14,000 requires that the local partner organization have
submitted reports.242 Crowdseeding also aids in the capacity to make use of the information. Erica
the management of incoming data by limiting the Hagen, for example, said that for issue mapping to |ndex
number of reporters. In the Voix des Kivus project, be successful, the mapping project has to work with
for example, the team only had to process reports grassroots organizations to invest in helping people
from three individuals in each village.243 Projects are make use of the information.248 Rachel Brown
also using technology to filter. Medic Mobile, for recommended planning the ICT project with local
example, is developing technology that can be used leadership and community organizations because
“to auto-categorise messages sent from healthcare they have the knowledge and capital to guide any
workers in the field. The idea is to catch symptoms intervention.249 Local partners are more likely to be
across a number of languages and spellings (or trusted and thereby able to convince community
misspellings) to detect outbreaks of diseases or members to act on information than when that
hotspots for HIV/Aids, for example.”244 information comes from a source they do not know.250

T H E W O R L D B A N K G R OU P 27
#ICT4HR NOV EMBER 2012

|ndex

Navigating the Opportunities


and Risks of New Technologies

28 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

V. Recommendations

N
ew technologies offer the potential As Alston notes, for example, “crowdsourcing
to reduce the opportunity costs of could certainly be used by organizations (e.g.,
reporting, advocacy, and data collection, national human rights institutions, ombudsmen,
enable the inclusion of a wider range of peoples non-governmental organizations) to receive
and groups in human rights work, support better notifications of alleged abuses which could then
and more participatory development practices, be tracked and investigated.”252 To the extent
and help governments understand the needs and new technologies are used for other purposes—
priorities of their citizens. Each of these possible whether as a mechanism for ascertaining trends or
benefits, however, gives rise to new risks and simply for expression—less rigorous verification
challenges. Larger volumes of information make protocols may be necessary.253 For example, while
it difficult to ensure accuracy and to identify a project designed to solicit information about
relevant information. The use of new technologies the performance of local service organizations
can also exacerbate inequality and security risks. may be overly politicized, a project designed to
Information must also be translated into action. collect information about their work may be more
Although the Voix des Kivus case study indicates feasible.254
that participants may have valued participation
|ndex
in and of itself, they also participated because A central tension in choosing a verification
they continued to maintain the hope that their mechanism is the risk that this mechanism will
information would lead to concrete benefits for undermine or eliminate the very advantages
the community. provided by new methods of generating
information about human rights issues. One of
This section of the report presents several the most important advantages of these new
recommendations for projects seeking to employ approaches is cost; crowdsourcing can generate
new technologies in promoting human rights. It a significant amount of information about broad
does not provide recommendations for using ICTs range of activities over a wide geographic area at
generally, nor does it go into specifics about issues a fraction of the cost of traditional methods of
such as security or data management. Rather, the investigation. At the same time, the costs of verifying
purpose of this section is to identify the types of and managing that volume of information can
questions that might be asked at the outset of such eliminate any cost savings achieved in generating
a project and some of the tensions behind each of the information in the first place. Voix des Kivus,
these questions. for example, decided not to employ more intensive
verification because doing so would defeat the
1. Build verification mechanisms into the activity advantages presented by crowdsourcing; a field
and ensure they are tailored to project goals. coordinator sent to verify individual reports on
a bi-weekly basis could just as easily gather the
There are a range of mechanisms available information himself.255
for verifying information submitted by ordinary
individuals though mechanisms like crowdsourcing. 2. Establish appropriate security protocols.
The particular choice of mechanism will depend
on the needs of the particular activity. Professional In an ideal world, projects should evaluate
researchers may be needed if the information will be security risks to participants and researchers at
used in a human rights report, where credibility is the outset, adopt and implement appropriate
key; even then, however, these researchers could use protocols for minimizing the risk, and consider
information provided by crowdsourcing projects abandoning the project where it would not be
to identify questions or provide corroboration.251 possible to achieve an appropriate level of risk. It

T H E W O R L D B A N K G R OU P 29
#ICT4HR NOV EMBER 2012

is, however, very difficult in the abstract to say how authority for assessing risk. In Voix des Kivus, the
projects such evaluate risk, what levels of risk are phone holders made their own decisions about
acceptable, and how that risk should be minimized. how to rate the security risk of the information
Based on the cases studied, however, a few general they were gathering and were given no guidance
observations are in order. about how to do so.259 The research team,
however, edited the texts for security; indeed, the
First, even information commonly understood team felt uncomfortable being put in the position
to be “public” can create unintended risks when of “censors,” deciding who would receive what
collected and disseminated online. In mapping the information, and tried to get the community
health resources in the community, for example, to take over in this regard, but the community
Map Kibera participants wanted to include chemists, continually deferred to the research team.260 In
individuals who dispense medication and provide Map Kibera, the mapping team decided whether
other health services. Some of the chemists were to include the chemists and youth hangouts;
unlicensed, however, and might be shut down by the individual conversations between the mappers
government if discovered. There was also a concern and the chemists may have taken place about the
that mapping youth hangouts could lead to a police risks.261 Sisi ni Amani plans to engage community
crackdown.256 Although all of this information was in process of making decisions about who will
publicly available and known to the community, have access to what information.262 The Uchaguzi
gathering it all in one place and publishing it in an project attended less to security concerns because
online map would make it easier for the government they viewed the participants as volunteers who
to take action against these groups. could assess the risks themselves.263

|ndex On the one hand, it is reasonable to assume that There is a good deal to be said for allowing
public information raises fewer security concerns. those affected by a project make decisions about
The person affected by the information has already risk. They are often in the best position to assess
made a decision to release it, or even if not released the risk to themselves.264 That said, informed
under their authority, whatever harm might occur consent models may be particularly challenging
from publication has likely already been done. in the context of crowdsourcing projects
Indeed, regulations for human subjects review involving new technologies. It can be difficult
often make this very distinction. Although projects to obtain informed consent even in the best of
involving research with humans must go through circumstances. It is that much more difficult in
a separate review process,257 there is generally an a low-resource setting, complicated by social,
exception for collecting public information.258 cultural, and language barriers as well as a lack
That said, it is not always the case that the of familiarity with the nature of the technical
collection and dissemination of information, even risk involved.265 The desire of individuals in
information that is already “public,” does not lead vulnerable circumstances “to have their ‘stories’
to harm. Information that is common knowledge in told to the international community can outweigh
the local community make take on a very different consideration of the potential danger to themselves
meaning and have very different consequences if and their communities.”266 Further, the digital
released more widely and in a context and form environment has radically changed expectations
other than that which was originally anticipated about how quickly and how far something might
or intended. Crowdsourcing projects are likely to be shared. Information, once shared, is easily
encounter this tension and may want to anticipate shared again and remixed, and it may not be
the position they will take on “public” information possible to guarantee to a participant that his
and how they will draw the line between public or her information will not be used for other
and non-public information. purposes. Crowdsourcing projects are unlikely to
be able to identify participants in advance, and
Second, it will be difficult to decide who should the volume of participants might make it difficult
make decisions about risks. There was considerable to ensure that the proper information has been
variation in the projects in terms of who assumed conveyed and understood.267

30 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

Third, mobile crowdsourcing projects may can use the information and check the AAAS’s
need to be particularly cautious about managing results.274 Depending on the project, however,
expectations. Providing a means for gathering there may be human rights risks associated with
information can create expectations that the allowing others to use this data. At the same time,
information will be provided to those who can the technology values of openness may be in some
respond and that response will be forthcoming. tension with concerns about the uses of sensitive
Participants should not view a SMS platform as a data. Uchaguzi, for example, decided to make its
“911” line.268 In Voix des Kivus, for example, the data open not only because the project itself was
project would often get reports that were requests, a response to the lack of open information about
“for support with a health clinic, for support the electoral process, but also because it reflected
with schooling.”269 Even the most rigorous of the belief that “the opportunity to have your
disclosures, however, may not be enough to voice heard is more important than unexpected
dispel expectations. Although the Voix des Kivus consequences.”275 A report on human rights and
research team explained in the clearest of terms video security put it this way: “Human rights
that the project had a research purpose and that needs, for example understanding how consent
participants should not expect that anything would is secured from video participants, can come into
come of the information, expectations persisted: conflict with the assumption of engineers and user
“There was inevitably a hope that if information experience specialists in social media companies,
about the situation of these villages gets out to the that content and identity must be spread with as
world that someone will answer.”270 When asked little ‘friction’ as possible.”276
why they continued to participate despite the lack
of any response, the villagers said they knew they At the same time, a conservative approach with
shouldn’t expect a response, but they continued to respect to risk might hinder project innovation. |ndex
take part because it at least kept the possibility of The Voix des Kivus research team, for example,
a response open.271 cited several instances in which their caution
as researchers and desire to avoid any risk to
Fourth, there is a tension between the participants prevented them from introducing
conservatism of risk minimization and the innovations that might have led the project to have
underlying orientation of many of the innovators more of an impact on the ground. For example,
operating to employ new ICTs in furtherance of their concern about security risks led them to
human rights, development, and humanitarian decide not to share information between villages,
goals. This observation is not to critique either even though sharing of information could have
approach. Rather, it is simply to observe that the fostered the development of advocacy networks.277
values of the technology field—a willingness to
experiment and “to fail, adopt, and iterate”272— 3. Consider developing ethical protocols for
can be in some tension with the need to develop crowdsourcing in the human rights context.
considered and reasoned security protocols ahead
of time. In other works, while hacking is an One of the most fundamental challenges facing
iterative process, security is not. mobile crowdsourced projects in the human
rights context is how to treat the sources who
This tension appears most acutely in questions are contributing information. Citizen reporters
about open data. On the one hand, making data fall somewhere in between the roles of journalist,
available (or “open”) may help further other human rights researcher, researcher, and ordinary
projects and could lead to new uses of the data that observer. In some ways, it is their role as non-
the original generators could not have foreseen. professionals that provides value to crowdsourced
The data collected from Map Kibera, for example, projects, generating information that could not be
is available to be used as long as any subsequent gathered if the activity were limited to those with
uses are also shared.273 AAAS often tries to make credentials. At the same time, it presents risks. They
its full satellite imagery and analysis available do not have the training they need to recognize
through a Google Earth layer so that other groups risks to others and to take measures to minimize those

T H E W O R L D B A N K G R OU P 31
#ICT4HR NOV EMBER 2012

risks, to protect their own and others’ security, and to projects that employ ordinary individuals in the
ensure the accuracy of the information they gather.278 collection of information.283 A set of guidelines
Without a professional role, they also lack access to developed specifically for this context is preferable
a set of professional standards that would help them to adopting an existing set for two reasons. First,
sort through questions about security and risk. it not clear which set of professional standards
would be most appropriate—whether canons of
An important first step would be to recognize journalistic ethics, human rights research training
that individuals who collect information—even if protocols, human subjects research standards, or
they are not professionals—are nonetheless acting others.284 Indeed, the choice could even vary from
in a kind of professional capacity and could likely project to project. A separate set of standards for
benefit from training and guidance about how to crowdsourcing (in all its variations) may provide
exercise judgment in that capacity. The cases studied more flexibility to tailor ethical considerations and
tended to treat trusted sources as participants, not security protocols to the particular context. Second,
researchers. Voix des Kivus, for example, developed some of these standards may be too conservative
protocols to protect the security of phone holders but in many cases, impossible to apply, and risk of
not for other participants. The research team edited eliminating the very advantages of having citizens,
the texts for security and protected the disclosure not professionals, gathering information. A set
of sensitive information, and some phone holders of ethical standards for crowdsourcing could be
themselves withheld sensitive information—for tailored and flexible while nonetheless providing
example, they would not report incidents of sexual at the very least a framework for decision making
violence if the source asked them not to.279 At the about risk that would ensure greater consistency
same time, most of the phone holders appear to have and transparency. Further, standards for ethical
|ndex been acting as researchers, going out and collecting documentation do not need to be limited to a
information rather than waiting for individuals to static list, but could instead be incorporated into
approach them.280 As such, they might have benefited “site governance and review policies” of online
from training on how to collect information, protect platforms that handle human rights content,
sources, or avoid secondary trauma. embodied in learning and training materials, as
well as built into the technological documentation
Despite the difficulties of applying concepts of tools themselves.285
informed consent in the crowdsourced context,
projects should also consider methods for 4. Establish partnerships with local organizations
communicating to sources—the victims and witnesses able to respond to information flows.
from whom information is gathered—the way their
information will be used and any associated risks.281 Projects should also consider involving local
To the extent that trusted sources are affirmatively organizations from the very beginning and
going out and collecting information, they are acting ensuring that these organizations are able to act
as researchers and are subject to ethical constraints on the information being generated by the project.
in that process. It is true that in some instances, Involving local partners from the beginning
researchers may need to exercise independent will help ensure that outputs are tailored to the
judgment about risks to the victims and witnesses information needs of the community. In other
with whom they work. Nonetheless, this should only words, “technology has to support what local
happen when efforts to obtain informed consent people are trying to do” rather than the other
have failed or are impracticable.282 In addition, way around.286 Thomas Maketa of the ICT4GOV
clearer discussions about the relationship between project in South Kivu emphasized, for example,
researcher and source will help ensure this judgment that SMS is not a strategy by itself. In order to
is exercised consistently. foster participation, it is important to build
technology into a comprehensive engagement
Finally, we recommend that human rights strategy with the local community.287 In some
professionals, medical researchers, and technology instances, fostering participation may even require
innovators collaborate in developing a set of low-tech solutions. For example, because a large
ethical principles that could be used to guide portion of Kibera residents did not have access

32 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

to the Internet, Map Kibera made paper print put on the map.”290 At the same time, participants
outs of the map and placed them strategically also noted that they continued to hold out hope
within Kibera.288 Collaboration should be ongoing that someone would respond to the information
to aid in responsiveness as needs change. One they were sharing, and they wanted to keep that
interviewee also recommended closing the possibility open.291 At some point, continued
feedback loop by asking authorities to relay back failure to generate a response would likely result
which actions were taken.289 in diminished participation and sustainability.

Fostering responsiveness may also help


mitigate concerns about sustainability. The Voix To some extent, these principles are not specific
des Kivus research team, for example, had been to technology projects. In some sense, that should
concerned that the lack of response from outside not be surprising. New technologies are not ends,
organizations to the information that was being but tools. They will not themselves foster democratic
generated would lead to less participation and participation or greater protection of human rights.
reporting. They were surprised to find that for these Their value depends on the use to which they are
particular communities, the expressive component put. As Hagen emphasized, “technology is easy; real
of the project—the fact that it gave voice to the social change is still the most difficult—and most
community’s needs and concerns—provided an important—part.”292
incentive despite the lack of response. In the words
of one participant, “for the first time, we’re being

|ndex

T H E W O R L D B A N K G R OU P 33
#ICT4HR NOV EMBER 2012

(Endnotes)
1 Report of the Special Rapporteur on the Promotion and Protection of the Right to Freedom
of Opinion and Expression, Frank La Rue, U.N. Doc A/HRC/17/27, ¶ 2 (May 16, 2011) [hereinafter
Report of the Special Rapporteur],  available at http://w w w 2.ohchr.org/engl i s h/bodi es /hrcouncil/
do c s / 17s e s s i o n /A .H RC .1 7 .2 7 _ e n .p d f.
2 Information and Communication Technologies for Development, Wikipedia,
http://en.wikipedia.org/wiki/Information_and_communication_technologies_for_development
(last visited June 25, 2012 15:31 GMT).
3 Tommaso Balbo Di Vinadio, World Bank Institute, Information and Communication Technology
for Governance (ICT4GOV) Program, World Bank Institute Capacity Development and Results
(2012), available at w ww.o p e n d ta .org/Know l edge/ICT4G O V% 20Cas e% 20Study.pdf ; s ee also
ICT4Gov.netWork, h ttp ://i c t4 g o v.n e t/ (last visited June 25, 2012).
4 Interim Report of the Special Rapporteur on Extrajudicial, Summary or Arbitrary Executions,
Philip Alston, G.A. Res. 65/321, U.N. Doc. A/65/321, at ¶ 5 (Aug. 23, 2010), available at http://dacc ess-
dds - ny. un.o rg /d o c /U N D OC /G E N /N 1 0 /4 92/39/PD F/N 1049239.pdf? .
5 Id. ¶ 5.
6 Erica Hagen, Mapping Change, Community Information Empowerment in Kibera, 6 Innovations
69, at 92 (2011).
7 OpenLearn LabSpace, ICTs in Everyday Life, http://l abs pace.open.ac.uk/mod/res ource/view.
php?id=37 1 9 8 2 (last visited June 25, 2012).
8 Jamie F. Metzl, Information Technology and Human Rights, 18 Hum. Rts. Q. 705, 709 (1996).
9 Social Media, Wikipedia, h ttp ://en.w i ki pedi a.org/w i ki /Soci al _medi a (June 25, 2012 16:30 GMT).
|ndex
10 See, e.g., Lee Baker, The Unintended Consequences of U.S. Export Restrictions on Software and
Online Services for American Foreign Policy and Human Rights, 23 Harv. J. Law & Tech. 537, 556-63 (2010)
(discussing the ways in which activists used social media and mobile phones in the Ukraine, Moldova, and
Iran, and to circumvent online censorship in China).
11 Albert-László Barabási, Linked: The New Science of Networks 43 (2002).
12 The result is the “small world” phenomenon. See Clay Shirky, Here Comes Everybody: The
Power of Organizing Without Organizations 214 (2009).
13 Manuel Castells, et al., Mobile Communication and Society: A Global Perspective
201 (2007). Because weak ties can form bridges between groups that do not otherwise overlap, “whatever
is to be diffused can reach a larger number of people, and traverse greater social distance (i.e., path length),
when passed through weak ties rather than strong.” Mark Granovetter, The Strength of Weak Ties, 78 Am.
J. Soc. 1360, 1362–64 (1973).
14 Philip N. Howard & Muzammil M. Hussain, The Role of Digital Media, 22 J. Democracy 35,
48 (2011) (noting that one of the advantages of social media is that it provides networks that are “already
embedded in trusted networks of family and friends”).
15 Larry Diamond, Liberation Technology, 21 J. Democracy 69, 71 (2010).
16 See, e.g., Dan Hunter & F. Gregory Lastowka, Amateur-to-Amateur, William & Mary L. Rev.
951, 989 (2004) (noting that “cheap digital technologies of authorship are increasingly allowing individual,
poorly capitalized players to produce works that are competing for attention with the works created by
corporate and highly capitalized players”).
17 Yochai Benkler, The Wealth of Networks 60 (2006).
18 Peer production and user-generated content can overlap but are not identical. Wikipedia, for
example, uses a model of peer production to collaboratively produce user-generated content. Linux, in
contrast, is peer production by professionals—an effort to create a computer operating system through
incremental improvements contributed by computer programmers collaborating together on a volunteer
basis. See id. at 65–66.
19 For example, “although in some countries the number of fixed lines has actually declined over the

34 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

last five years, as of 2009, mobiles were accessible to between 60% and 70% of [Africa’s] population.”
Association for Progressive Communications, ICTs for Democracy: Information and Communication
Technologies for the Enhancement of Democracy — with a Focus on Empowerment (2009), available
at ht t ps : / /w ww.a p c .o rg /e n /s y s te m /fi l e s /SID A_ICTs + for+ D emocracy.pdf ; see also Leapfrogging: A
different route to development, Article 13 (Sep. 2005), available at http://w w w.arti cl e13.com/A13_
P r int a ble P a g e s .a sp ? s trA c ti o n = Ge tP u b l i cati on& PN ID = 1192.
20 Jeff Howe,  Crowdsourcing: A Definition, Crowdsourcing, http://crow ds ourci ng.com
(last visited July 11, 2012); see also Jeff P. Howe, The Rise of Crowdsourcing, Wired, June 2006, at 176.
21 James Suroweiecki, The Wisdom of Crowds XIII (2004).
22 Uchaguzi: An Ushahidi deployment for Kenya’s 2010 Constitutional Referendum, Ushahidi
Blog, h t t p : / / b l o g . u s h a h i d i . c o m / i n d e x . p h p / 2 0 1 0 / 0 8 / 0 2 / u c h a g u z i - a n - u s h a h i d i - d e p l o y m e n t - f o r-
k e ny a s - 20 1 0 -c o n sti tu ti o n a l -re fe re n d um/ (last visited Aug. 2, 2010).
23 Ushahidi is a “free, open source platform that allows its users to gather distributed data via SMS,
email or web and visualize it on a map or timeline.” Marta Poblet, Mobile Governance: Empowering
Citizens to Promote the Rule of Law, at http://cros s road.epu.ntua.gr/fi l es /2010/04/34_MPoblet _
M o bile G o v e rn a n c e .p d f (last visited June 30, 2012). Developed in order to aggregate reports about
irregularities and incidents of violence during the 2008 Kenyan elections, the initial platform has been
expanded into a downloadable and web-based platform that has been used in a variety of contexts.
24 Constitution and Reform Education Consortium (CRECO), Wanjiku’s Decision Referendum
2010, at 9 (2010).
25 Interview by Technology for Transparency Network with Jessica Heinzelman, Uchaguzi Team
Member (Dec. 3, 2010), available at h ttp : //trans parency.gl obal v oi ces onl i ne.org/proj ect/uchaguz i ; see
also Telephone Interview with Jessica Heinzelman, Senior ICT Specialist at DAI and former Non-Technical |ndex

Project Manager for Uchaguzi (June 7, 2012).


26 See Jessica Heinzelman, Overcoming Challenges of Early Warning and Response Systems:
The Promise of Participatory Models 47 (Apr. 2011) (unpublished MALD thesis, The Fletcher School
of Law & Diplomacy, Tufts University).
27 United Nations Development Programme, Voting, Not Violence, in Kenya, http://w w w.undp. or g/
c o n t e n t / u n d p / e n / h o m e / o u r w o r k / c r i s i s p r e v e n t i o n a n d r e c o v e r y / s u c c e s s s t o r i e s / Vo t i n g - n o t - v i o l e n c e -
in- k e ny a . h tm l ; see also E-Mail Interview With Stephen Kirimi, Chief Executive Officer, PeaceNet Kenya (2011).
28 Kenya: SOS by SMS, allAfrica.com (Aug. 3, 2010), http://al l afri ca.c om /
s t o r ie s / 20 1 0 0 8 0 3 1 0 3 9 .h tml .
29 E-Mail Interview with Stephen Kirimi, supra note 27.
30 Heinzelman, supra note 26, at 48–49.
31 Alice Nderitu, Information Partnerships–Building Democracy with Citizens, NGOs and
Government: The Uwiano Experience, at 3, available at http://w w w.j umptel l .com/Information_
P a r t ne r s hi p s _ U WIA N O_ A l i c e _ N d e ri tu . pdf . ; UWIANO Platform for Peace, Soul Beat Africa (Sep. 14,
2010), ht t p ://w ww.c o m m i n i t.c o m /a fri c a/content/uw i ano-pl atform-peace . Uwiano was launched by
PeaceNet Kenya, an umbrella of community-based organizations, the National Cohesion and Integration
Commission (NCIC), and the National Steering Committee (NSC) on Peace Building and Conflict
Management, and had the support of the United Nations Development Programme (UNDP). Id.
32 “[W]e wanted them to be researchers themselves, not merely distributors of knowledge imparted
by others.” Hagen, supra note 6, at 75–76.
33 Home, OpenStreetmap.us, h ttp ://w w w.opens treetmap.us / (last visited June 25, 2012).
34 Hagen, supra note 6, at 72–73. The project also uploaded photos to Flickr and linked into OSM.
E-Mail from Erica Hagen, Co-Founder, Map Kibera (July 24, 2012).
35 Hagen, supra note 6, at 76, 98.
36 Id. at 86.
37 Id. at 77–78.

T H E W O R L D B A N K G R OU P 35
#ICT4HR NOV EMBER 2012

38 E-Mail from Erica Hagen, supra note 34.


39 About Us, SisiNiAmani.org, h ttp://s i s i ni amani .org/i ndex .php? opti on= com_content& v iew=
a r t ic le & id= 2 &Ite m i d = 1 0 (last visited June 25, 2012).
40 Heinzelman, supra note 26, at 59–60. Sisi Ni Amani uses Frontline SMS, a SMS platform that
“enables users to send, receive and manage SMS over a mobile network.” The Software, Frontline
SMS, ht t p://ww w.fro n tl i n e s ms .c o m/th e-s oftw are/ (last visited June 25, 2012). The platform allows
organizations to communicate with large groups of ordinary citizens via mobile phone—to receive SMS
messages from individual members of the group and send information either to the group or selected
individuals. Id.
41 Patrick Meier, Marketing Peace using SMS Mobile Advertising: A New Approach to Conflict
Prevention, h ttp ://i R e v o l u ti o n .n e t/2 0 1 2 /06/11/peacetx t-marketi ng-peace (last visited July 10, 2012).
42 Columbia Center for the Study of Development Strategies, Voix des Kivus Leaflet 1,
available at h ttp ://c u -c sd s .o rg /w p -c o n t ent/upl oads /2009/10/Voi x -des -Ki v us -Leafl et.pdf.
43 Patrick Meier, From Crowdsourcing Crisis Information to Crowdseeding Conflict Zones,
ht t p: / / iR e v o l u ti o n .n e t/2 0 1 2 /0 7 /1 0 /c ro w ds ourci ng-to-crow ds eedi ng (last visited, July 10, 2012).
44 Voix des Kivus Leaflet, supra note 42, at 1.
45 Telephone Interview with Peter van der Windt, Lead Researcher, Voix des Kivus (June 27, 2011).
46 Id.
47 Peter van der Windt & Macartan Humphreys, Voix des Kivus: Reflections on a Crowdseeding
Approach to Conflict Event Data Gathering 5–6 (2012).
48 E-Mail Interview with Peter van der Windt, Lead Researcher, Voix des Kivus (June 24, 2012).
49 E-Mail from Macartan Humphreys, Voix des Kivus (July 12, 2012).
|ndex
50 Freedom Fone enables users “to create and share audio content using Interactive Voice Response
(IVR), voicemail and SMS.” How It Works, Freedom Fone, http://w w w.freedomfone.org/page/how- it -
w o r k s (last visited June 25, 2012). Using Freedom Fone, an organization can create voice menus (e.g., “press
1 for more information about X”), record information, and set up mailboxes to receive messages. Freedom
Fone also provides a means for polling and collecting information via SMS. Id.
51 E-Mail Interview with Françoise Mukuku, National Coordinator/Deputy President, Si Jeunesse
Savait (2011).
52 Id.
53 Id.
54 See h ttp ://ww w.a m n e s ty u s a .o rg/res earch/s ci ence-for-human-ri ghts (last visited July 10, 2012)
55 Id.
56 Combining Crowdsourced Satellite Imagery Analysis with Crisis Reporting: An Update on Syria,
http://blog.standbytaskforce.com/combining-crowdsourced-satellite-imagery-analysis-with-
c r is is - r e po rti n g -a n -u p d a te -o n -sy ri a (last visited July 10, 2012).
57 AAAS Scientific Responsibility, Human Rights and Law Program, American Association for
the Advancement of Science [hereinafter AAAS] (Apr. 2, 2012), http://s rhrl .aaas .org/geotech/.
58 Evidence of Destruction in the Democratic Republic of Congo, AAAS (Mar. 19, 2012),
ht t p: / / s hr.a a a s.o rg //g e o te c h /d rc o n g o /d rcongo.s html .
59 World Bank Institute, Case Study: Information and Communication Technology for Governance
(ICT4GOV) Program, at 1.
60 Telephone Interview with Thomas Maketa, Governance Specialist, World Bank (July 20, 2012).
61 Id.
62 Id.
63 Telephone Interview with Jenny Torres, Encargada de Investigación, Proceso de Pobreza y
Políticas Sociales Centro de Estudios Sociales (2011).
64 About Us, Coalición Educación Digna, http://educaci ondi gna.com/about/ (last visited
June 25, 2012).

36 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

65 Id.
66 Republica Dominicana Contaminada, http://domi ni canacontami nada.bl ogs pot.c om /
(last visited June 13, 2012).
67 Domivista, Barrick Gold y las Agua Contaminada en RD1, YouTube (Jan. 10, 2010),
ht t p: / / w w w.yo u tu b e .c o m/w a tc h ? v= F u MEccv i 9kQ .
68 Jose Maria Cabral, Rep Dominicana - Espejitos por Oro (¡Fuera Barrick Gold de America Latina!),
YouTube (May 20, 2011), h ttp ://ww w.y outube.com/w atch? v = hLdkSa4FMmg .
69 Id.
70 Kate Bulkley, Fast, Mobile-Based Messaging Service Boosts Healthcare and Cuts Costs, The
Guardian, June 18, 2010.
71 Medic Mobile, h ttp ://me d i c m o bi l e.org / (last visited July 6, 2012).
72 Id.
73 Kevin Asuncion, Text Messages that Save Lives with Josh Nesbit of Medic Mobile, Care2, Aug.
2, 2011, h ttp ://ww w.c a re 2 .c o m /c a u ses /tex t-mes s ages -that-s av e-l i v es -w i th-j os h-nes bi t-of-medic-
m o bile . ht ml # i x z z 1 U GP IF a Z A (last visited July 6, 2012).
74 International Covenant on Civil and Political Rights, opened for signature Dec. 16, 1966,
999 U.N.T.S. 171 (entered into force Mar. 23, 1976) [hereinafter ICCPR]; International Covenant on
Economic, Social and Cultural Rights, opened for signature Dec. 16, 1966, 993 U.N.T.S. 3 (entered into
force Jan. 3, 1976) [hereinafter ICESCR].
75 International Law, Office of the High Commissioner for Human Rights, http://w w w 2.ohchr.or g/
e ng lis h/ la w /.
76 World Conference on Human Rights, Vienna, Austria, June 14–25, 1993, Vienna Declaration and
Programme of Action, A/Conf.157/23. |ndex
77 See Report of the Special Rapporteur, supra note 1, ¶ 22 (“by acting as a catalyst for individuals
to exercise their right to freedom of opinion and expression, the Internet also facilitates the realization of a
range of other rights”).
78 Social Accountability Sourcebook, at 5, World Bank (2006), available at http://w w w.w orl dba nk.
o r g / s o c ia la c c o u n ta b i l i ty_ so u rc e b o o k /Pri ntVers i ons /Conceptual % 2006.22.07.pdf.
79 ICCPR, art. 19.
80 Event Mapping in Congo, Columbia Center for the Study of Development Strategies
ht t p: / / c u- c sd s .o rg /p ro j e c ts /e ve n t-m a ppi ng-i n-congo/ (last viewed June 25, 2012).
81 Telephone Interview with Peter van der Windt, supra note 45.
82 Hagen, supra note 6, at 82.
83 Id. at 84.
84 ICCPR, art. 19.
85 Id. art. 22(1).
86 Secretary of State Hillary Clinton, Remarks at George Washington University: Internet Rights and
Wrongs: Choices & Challenges in a Networked World (Feb. 15, 2011).
87 ICCPR, art. 21.
88 Pillowlita, Ritmos Amarillos: Solidaridad para Educación, YouTube (May 19, 2011),
ht t p: / / w w w.y o u tu b e .c o m/w a tc h ? v= VbYaR J 71v es .
89 ICCPR, art. 25.
90 As Hagen explained, bringing a map of water resources to a meeting of water stakeholders makes
an impression because that is not information that people necessarily have at their fingertips. Telephone
Interview with Erica Hagen, Co-Founder, Map Kibera (May 31, 2012).
91 E-Mail Interview with Rachel Brown, Founder & CEO, Sisi Ni Amani (2011).
92 ICESCR, arts. 12(1), 12(2)(d).
93 ECOSOC Resolution 1985/17, Review of the composition, organization and administrative
arrangements of the Sessional Working Group of Governmental Experts on the Implementation of the

T H E W O R L D B A N K G R OU P 37
#ICT4HR NOV EMBER 2012

International Covenant on Economic, Social and Cultural Rights (May 28, 1985).
94 Committee on Economic, Social and Cultural Rights, General Comment No. 14, The Right to the
Highest Attainable Standard of Health (General Comment No. 14), UN Doc. No. E/C.12/2000/4 (2000),
¶ 11. The right to health is best understood as the right to enjoy “a variety of facilities, goods, services and
conditions necessary for the realization of the highest attainable standard of health.” Id. ¶ 9.
95 See N. Mahmud et al., A Text Message-Based Intervention to Bridge the Healthcare Communication
Gap in the Rural Developing World, 18(2) Tech & Health Care J. 137 (2010); Asuncion, supra note 73.
96 Bulkley, supra note 70.
97 OpenMRS, About OpenMRS, h t tp://openmrs .org/about/ (last visited July 3, 2012).
98 Wikipedia, mHealth, (as of Jul. 3, 20:12 GMT), http://en.w i ki pedi a.org/w i ki /MH eal th .
99 ICESCR, art. 13(1).
100 Nokia Momaths, Momaths DL Brochure (2011) https ://proj ects .dev el oper.noki a.c om /
M o m a t hs / f i l e s/Mo M a th s % 2 0 D L % 2 0 B r ochure% 20-% 20Webs i te.pdf .
101 Riitta Vänskä, United Nations ECOSOC Innovation Fair Survey Response, at 1 (2011)
ht t p: / / w w w.u n .o rg /e n /e c o so c /i n n o v fa i r2011/docs /noki a.pdf .
102 Neil Butcher & Associates, Evaluation of the Imfundo yami/yethu Project: Executive Summary (2009)
h t t p s : / / p r o j e c t s . d e v e l o p e r. n o k i a . c o m / M o m a t h s / f i l e s / 2 0 0 9 _ 0 9 _ 0 9 % 2 0 I m f u n d o % 2 0 y a m i % 2 0
y e t hu%20e v a l u a ti o n % 2 0 E xe c u ti ve % 2 0 Summary.pdf . The project used MXit as its social networking
service. MXit allows for less expensive communication through the use of internet protocols to send
data rather than the more costly SMS service. Christopher M. Napolitano, “MXing it up”: How African
adolescents may affect social change through mobile phone use, 128 New Directions in Youth
Development 105, 108-109 (2010).
|ndex
103 Nokia Momaths, supra note 100.
104 Id.
105 ICESCR, art. 13(2)(a)-(b).
106 Id. art. 13(2)(d).
107 Hagen, supra note 6, at 74, 77.
108 ICESCR, art. 11(1).
109 Voix des Kivus Leaflet, supra note 42, at 3.
110 Telephone Interview with Jessica Heinzelman, supra note 25.
111 E-Mail Interview with Françoise Mukuku, supra note 51.
112 ICCPR, art. 2(1); United Nations, Comm. on Econ., Soc. & Cultural Rights, General Comment
No. 21: Right of Everyone to Take Part in Cultural Life (Art. 15, Para. 1 (a), of the International Covenant
on Economic, Social and Cultural Rights), ¶ 34, U.N. Doc. E/C.12/GC/21 (Dec. 21, 2009).
113 See, e.g., General Comment No. 21, supra note 112, ¶ 48.
114 United Nations, Human Rights Comm., General Comment No. 31 (The Nature of the General
Legal Obligation Imposed on States Parties to the Covenant), ¶ 7, U.N. Doc. CCPR/C/21/Rev.1/Add.13
(May 26, 2004); see also United Nations, Comm. on Econ., Soc. & Cultural Rights, General Comment No. 3:
The Nature of States Parties Obligations (Art. 2, Para. 1 of the Covenant), ¶ 7, U.N. Doc. E/1991/23 (Dec. 14, 1990).
115 General Comment No. 21, supra note 112, ¶ 48.
116 Report of the Special Representation of the Secretary-General on the Issue of Human Rights and
Transnational Corporations and Other Business Enterprises, John Ruggie, U.N. Doc. A/HRC/14/27, ¶ 1
(Apr. 9, 2010).
117 Claude E. Welch, Jr., Amnesty International and Human Rights Watch: A Comparison, in
NGOs and Human Rights: Promise and Performance 85, 107 (Claude E. Welch, Jr. ed., 2001).
118 Alston, supra note 4, ¶ 4.
119 Telephone Interview with Jessica Heinzelman, Senior ICT Specialist at DAI and former Non-
Technical Project Manager for Uchaguzi (2011).
120 Heinzelman, supra note 26, at 35.

38 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

121 Crowdsourcing might also be used to reduce the costs of information analysis. The AAAS, for
example, suggested that projects that require the analysis of very large areas could employ “the crowd” to
compare time sequenced satellite images to identify changes on the ground. Although the project would
have to be supervised by a trained professional, the comparison would not require expertise and could be
performed using crowdsourcing. Telephone Interview with Susan Wolfinbarger, Senior Program Associate,
Scientific Responsibility, Human Rights, and Law Program, AAAS (June 13, 2012).
122 DR Congo: Civilian Cost of Military Operation is Unacceptable, Human Rights Watch (Oct. 13,
2009), ht t p ://ww w.h rw.o rg /e n /n o d e /8 6 048 (“The coalition urged diplomats and UN officials, who are
due to meet in Washington, DC, this week to discuss the situation in eastern Congo and the wider region,
to take immediate steps to increase protection for civilians.”).
123 Clay Shirky, The Political Power of Social Media: Technology, the Public Sphere, and Political
Change, 90 Foreign Affairs 28, 29-30 (2011); see generally Howard & Hussain, supra note 14.
124 See, e.g., Herman Wasserman, Connecting African Activism with Global Networks: ICTs and
South African Social Movements, 30 Africa Development 163, 164–65 (2005).
125 Interview with Jenny Torres, supra note 63.
126 Telephone Interview with Jose Delio Area Garcia, Post-Producer and Editor for “Mirrors
for Gold” (2011).
127 Wasserman, supra note 124, at 165.
128 Nadine Jurrat,Citizen Journalism and the Internet,Open Society Foundations Reference Series No.4 12
(2011) (discussing the role played by the images of Neda Agha Soltan in Iran’s opposition movement).
129 Sameer Padania et al., Cameras Everywhere: Current Challenges and Opportunities
at the Intersection of Human Rights, Video and Technology 18 (2011), available at
|ndex
ht t p: / / w w w.wi tn e s s .o rg /c a me ra s -e ve ryw here/report-2011/tabl e-of-contents .
130 Micah White, Clicktivism is Ruining Leftist Activism, The Guardian (Aug. 12, 2010), http: / /
w w w. g ua r d i a n .c o .u k /c o m m e n ti sfre e /2 010/aug/12/cl i ckti v i s m-rui ni ng-l efti s t-acti v i s m .
131 See Molly Land, Networked Activism, 22 Harv. Hum. Rts. J. 205, 214, 221 (2009).
132 See, e.g., Malcom Gladwell, Small Change: Why the Revolution Will Not Be Tweeted, The New
Yorker (2010) (“Social networks are effective at increasing participation—by lessening the level of
motivation that participation requires.”); Land, supra note 131, at 206 (“Online human rights activism
thus seems faced with two equally unsatisfactory choices—involving many individuals in ways that are
meaningful but potentially of limited efficacy, or professionalization and its associated disadvantages.”)..
133 Land, supra note 131, at 232.
134 Gladwell, supra note 132 (“Because networks don’t have a centralized leadership structure and
clear lines of authority, they have real difficulty reaching consensus and setting goals.”).
135 See generally Shirky, supra note 12.
136 Kenneth Roth, New Laws Needed to Protect Social Media, Globalpost (Apr. 14, 2011),
http://www.globalpost.com/dispatch/news/opinion/110413/facebook-twitter-social-media-revolution
(“Social media makes possible a seemingly leaderless revolution, which cannot be so easily decapitated.”).
137 Sarah Joseph, Social Media, Political Change, and Human Rights, 35 B.C. Int’l & Comp. L. Rev.
145, 165 (2012).
138 Telephone Interview with Peter van der Windt, Lead Researcher, Voix des Kivus (2011).
139 Hagen, supra note 6, at 100.
140 See generally Linda Mayoux, Evaluation and Impact Research for Rights-Based Development:
Issues and Challenges (2007) (surveying some of the challenges associated with both evidence-based and
participatory methods of evaluation).
141 Joseph, supra note 137. There are also several studies that focus on the effect of online participation
opportunities on political engagement. See, e.g., Georg Aichholzer & Doris Allhutter, Online Forms of Political
Participation and Their Impact on Democracy, Institute of Technology Assessment, Austrian Academy of
Sciences, Vienna, at 12–13 (2011), available at http://epub.oeaw.ac.at/i ta/i ta-manus cri pt/i ta_11_02 . pdf

T H E W O R L D B A N K G R OU P 39
#ICT4HR NOV EMBER 2012

(surveying studies examining correlations between the availability of political information online and
opportunities for online participation with voting, political donations, and voter turnout, among other
measures of political participation).
142 Social Accountability Sourcebook, supra note 78, at 6 (listing, as examples, “public demonstrations,
protests, advocacy campaigns, investigative journalism, and public interest lawsuits”).
143 Id.; see also John M. Ackerman, Social Accountability in the Public Sector, at 1, available at
http://siteresources.worldbank.org/INTPCENG/214574-1116506074750/20542263/
FI NA L A c k e rm a n .p d f (citing Carmen Malena et al., Social Accountability: An Introduction to the
Concept and Emerging Practice (2004) available at http://s i teres ources .w orl dbank.org/IN TPCE NG/
214578-1116499844371/20524122/310420PAPER0So1ity0SDP0Civic0no1076.pdf (defining social
accountability as “an approach towards building accountability that relies on civic engagement, i.e. in
which it is ordinary citizens and/or civil society organizations who participate directly or indirectly in
exacting accountability”)); see generally Dena Ringold et al., Citizens and Service Delivery (2011).
144 E-Mail Interview With Stephen Kirimi, supra note 27.
145 See, e.g., Diane F. Orentlicher, Bearing Witness: The Art and Science of Human Rights Fact-Finding,
3 Harv. Hum. Rts. J. 83, 91 (1990) (describing the attacks of the Regan administration on HRW’s reporting
of abuses in El Salvador); see also Ann Marie Clark, “A Calendar of Abuses”: Amnesty International’s
Campaign on Guatemala, in NGOs and Human Rights: Promise and Performance 55, 62 (Claude E.
Welch, Jr. ed., 2001) (describing the response of the Guatemalan government to AI’s 1979 report on human
rights abuses in Guatemala calling the information “fabulous tales”).
146 See, e.g., William Korey, NGOs and the Universal Declaration of Human Rights 346 (2001).
147 Howard & Hussain, supra note 14, at 43.
|ndex
148 Joshua Goldstein & Juliana Rotich, Digitally Networked Technology in Kenya’s 2007–2008 Post-
Election Crisis, at 4 (2008), available at http://cy ber.l aw.harv ard.edu/s i tes /cy ber.l aw.harv ard.edu/
f ile s / G o ldste i n & Ro ti c h _ D i g i ta l l y_ N e tworked_Technol ogy _Keny as _Cri s i s .pdf.pdf ; see also Caroline
Hargreaves & Sanjana Hattotuwa, ICTs For the Prevention of Mass Atrocity Crimes, at 1 (2010), available at
h t t p : / / i c t 4 p e a c e . o r g / w p - c o n t e n t / u p l o a d s / 2 0 1 0 / 1 1 / I C Ts - f o r- t h e - P r e v e n t i o n - o f - M a s s - A t r o c i t y -
C r im e s 1. p d f (noting that “new media, it can be argued, gives even more pervasive and persuasive tools for
misinformation, disinformation, partisan propaganda and hate speech”).
149 Goldstein & Rotich, supra note 148, at 1.
150 Telephone Interview with Erica Hagen, supra note 90.
151 Id.
152 Telephone Interview with Thomas Maketa, supra note 60.
153 Padania et al., supra note 129, at 26; see also Sam Gregory, Cameras Everywhere: Ubiquitous
Video Documentation of Human Rights, New Forms of Video Advocacy, and Considerations of Safety,
Security, Dignity and Consent, 2(2) J. Hum. Rts. Practice 191, 202 (2010) (noting that “the possibilities
for remixing, re-appropriation and recirculation” can “pull the material farther and farther from its source
testifier and/or witness and from its original context – even as that process of translation may increase the
chances that the footage will find an audience (even an unexpected one) that may be willing and able to
respond”).
154 Patrick Meier, Information Forensics: Five Case Studies on How to Verify Crowdsourced Information from
Social Media, available at h ttp ://i R e v o l u ti on.net/2011/11/29/i nformati on-forens i cs -fi v e-cas e-s tud ies ;
see also Jessica Heinzelman & Patrick Meier, Crowdsourcing for Human Rights Monitoring: Challenges and
Opportunities for Information Collection and Verification, in Human Rights and Information Communication
Technologies: Trends and Consequences of Use 123 (J. Lannon & E.F. Halpin eds. 2012). Curation is the
process of presenting, in one place, information judged reliable based on triangulation or investigation. Rohit Bhargava,
Manifesto For The Content Curator: The Next Big Social Media Job of The Future?, Influential Marketing Blog
(Sept. 30, 2009), h ttp ://ro h i tb h a rg a v a.ty pepad.com/w ebl og/2009/09/mani fes to-for-the-cont ent -
c ur a t o r- t he -n e xt-b i g -s o c i a l -m e d i a -j o b -of-the-future-.html.

40 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

155 Patrick Meier, Why Bounded Crowdsourcing is Important for Crisis Mapping and Beyond,
ht t p: / / iR e v o l u ti o n .n e t/2 0 1 1 /1 2 /0 7 /wh y -bounded-crow ds ourci ng (last visited July 10, 2012).
156 E-Mail from Peter van der Windt, Lead Researcher, Voix des Kivus (July 12, 2012); see also Patrick
Meier, From Crowdsourcing Crisis Information to Crowdseeding Conflict Zones (Updated), iRevolution
(July 10, 2012).
157 Voix des Kivus Leaflet, supra note 42, at 2.
158 Patrick Meier,Verifying Crowdsourced Social Media Reports for Live Crisis Mapping:An Introduction
to Information Forensics, at 9 (2011), available at http://i rev ol uti on.fi l es .w ordpres s .com/2011 / 11/
m e ie r- v e r i fy i n g -c ro w d so u rc e d -d a ta -c as e-s tudi es .pdf (noting that it is possible to investigate the identity,
associates and previous activity of the reporter).
159 Snowball sampling is a form of bounded crowdsourcing in which trusted reporters recommend
others. As such, this approach provides a means to expand the network of trusted sources. Id. at 8.
160 Voix des Kivus Leaflet, supra note 42, at 4.
161 Van der Windt & Humphreys, supra note 47, at 2.
162 Voix des Kivus Leaflet, supra note 42, at 4; see also van der Windt & Humphreys, supra note 47, at 2.
163 Van der Windt & Humphreys, supra note 47, at 4.
164 Telephone Interview with Jessica Heinzelman, supra note 25.
165 Telephone Interview with Thomas Maketa, supra note 60.
166 Meier, supra note 158, at 14.
167 Molly Beutz Land, Peer Producing Human Rights, 46:4 Alberta L. Rev. 1115, 1132 (2009).
168 Id.
169 CRECO, supra note 24, at 10. The project claimed a 90% verification rate. Id. at 13.
170 Hagen, supra note 6, at 81. |ndex

171 Meier, supra note 158, at 13.


172 E-Mail Interview with Stephen Kirimi, supra note 29.
173 Id.
174 Hagen, supra note 6, at 81.
175 Technology for Transparency Network Interview with Jessica Heinzelman, supra note 25.
176 Id. Although none of the projects employed this technique, verification can also be crowdsourced.
For example, a group of activists in Southern Kyrgyzstan responded to misinformation distributed via SMS
and YouTube by checking with a trusted network of contacts on Skype. Meier, supra note 158, at 12.
177 The coordinator would have a list of the information submitted by the three phoneholders and
would meet with each reporter to determine if the message corresponded to what he or she intended to say.
The coordinator would also meet with others to learn if the events actually took place. E-Mail Interview
with Peter van der Windt, supra note 48.
178 van der Windt & Humphreys, supra note 47, at 4.
179 Heinzelman, supra note 26, at 63.
180 Id.
181 Padania et al., supra note 129, at 22 (noting that “new technologies have made it simpler for human
rights defenders (HRDs) and others to record and report violations, but harder for them to do so securely”).
182 Id. at 25.
183 Gregory, supra note 153, at 203.
184 Eric Schmidt & Jared Cohen, The Digital Disruption: Connectivity and the Diffusion of Power, 89
Foreign Affairs 75, 77 (2010); see also Fred Pretrossian, Iranian Officials ‘Crowd-Source’ Protestor’s
Identities Online, GlobalVoiceOnline.org (June 27, 2009), http://gl obal v oi ces onl i ne.org/2009/06/ 27/
ir a nia n- o f f i c i a l s -c ro w d -so u rc e -p ro te ster-i denti ti es -onl i ne/.
185 Gregory, supra note 153, at 201–02.
186 “All content and communications, including visual media, leave personal digital traces that third
parties can harvest, link and exploit. Hostile governments, in particular, can use photo and video data

T H E W O R L D B A N K G R OU P 41
#ICT4HR NOV EMBER 2012

—particularly that linked with social networking data—to identify track and target activists within their
countries, facilitated by the growth of automatic face-detection and recognition software.” Padania et al.,
supra note 129, at 12.
187 “In general, it is easier to be located and identified, and simpler to have your communications
intercepted on mobile devices than it is on the internet.” Id. at 22; see also Telephone Interview with Erika
Smith, Women’s Rights Project Associate, Association for Progressive Communications Women’s Network
Supporting Program (June 21, 2012).
188 Telephone Interview with Susan Wolfinbarger, supra note 121.
189 Hagen, supra note 6, at 85.
190 See Christian Kelleher et al., The Human Rights Documentation Initiative at the University of
Texas Libraries, 15 New Review of Information Networking 94 (2010).
191 E-Mail Interview with Peter van der Windt, supra note 48.
192 Heinzelman, supra note 26, at 76.
193 Id.
194 Id. at 62. Access to information might be limited through segmentation and password protection of
the technical platforms as well as limited permissions for downloading, removing, or modifying data. Id. at 77.
195 Voix des Kivus Leaflet, supra note 42, at 3.
196 E-Mail Interview with Peter van der Windt, supra note 48.
197 Telephone Interview with Thomas Maketa, supra note 60.
198 E-mail Interview with Françoise Mukuku, supra note 51.
199 E-Mail Interview with Peter van der Windt, supra note 48.
200 Heinzelman, supra note 26, at 84.
|ndex
201 Telephone Interview with Peter van der Windt, supra note 45.
202 Id.
203 Heinzelman, supra note 26, at 77.
204 Id.
205 See Aichholzer & Allhutter, supra note 141, at 12–13.
206 Map Kibera, for example, was initially only available online but few people accessed it because
they lacked an Internet connection. A later deployment included a mobile phone browser version that
allowed individuals to submit and view reports by web-enabled phone. Telephone Interview with Erica
Hagen, Co-Founder, Map Kibera (2011).
207 Tom Sarrazin, Texting, Tweeting, Mobile Internet: New Platforms for Democratic Debate in
Africa, fesMedia Africa Series 1, 17 (2011), available at http://l i brary.fes .de/pdf-fi l es /bueros /afr ica-
m e dia / 083 4 3 .p d f .
208 Quarterly Sector Statistics Report: 1st Quarter July-Sept 2011/2012, Communications Commission
of Kenya (2011), available at h ttp ://ww w.cck.go.ke/res c/dow nl oads /SECTO R _STATISTICS_R EPORT_
Q 1_ 11- 12.p d f .
209 E-Mail Interview with Erica Hagen, supra note 32.
210 Telephone Interview with Thomas Maketa, supra note 60.
211 Sarrazin, supra note 207, at 16.
212 Vänskä, supra note 101, at 4.
213 Sarrazin, supra note 207, at 16.
214 Jamie M. Zimmerman & Sascha Meinrath, Mobile Phones Will Not Save the Poorest of the Poor,
Slate (Feb. 9, 2012), h ttp ://ww w.s l a te .c om/arti cl es /technol ogy /future_tens e/2012/02/m_pes a_and_
o t he r _ ic t 4 d _ p ro j e c ts _ a re _ l e a vi n g _ b e hi nd_the_dev el opi ng_w orl d_s _poores t_peopl e_.s i ngl e.htm l.
215 E-Mail Interview with Stephen Kirimi, supra note 29.
216 Telephone Interview with Thomas Maketa, supra note 60.
217 E-Mail Interview with Françoise Mukuku, supra note 51.
218 Voix des Kivus Leaflet, supra note 42, at 4.

42 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

219 Telephone Interview with Thomas Maketa, supra note 60.


220 Report of the Special Rapporteur, supra note 1, ¶ 61; see also Wasserman, supra note 124, at 174.
221 S. Revi Sterling, AIR: Advancement through Interactive Radio, at 4 (2007), available at
ht t p: / / w w w.c s .c o l o ra d o .e d u /d e p a rtm e nt/publ i cati ons /reports /docs /CU -CS-1006-06.pdf.
222 Voix des Kivus Leaflet, supra note 42, at 2.
223 Id. at 4.
224 E-Mail Interview with Françoise Mukuku, supra note 51.
225 Telephone Interview with Jessica Heinzelman, supra note 25.
226 Id.
227 E-Mail Interview with Françoise Mukuku, supra note 51.
228 Voix des Kivus Leaflet, supra note 42, at 2.
229 Hagen, supra note 6, at 72.
230 Id. at 83.
231 Telephone Interview with Erica Hagen, supra note 206 (users “saw web not as participatory tool
for change but as a way to seek information and chat with friends”).
232 Hagen, supra note 6, at 75.
233 E-Mail Interview with Françoise Mukuku, supra note 51.
234 Telephone Interview with Erica Hagen, supra note 90.
235 Preventing Violence — Lessons from the Kenyan Constitution Referendum — Peace Watch
8/2010, Kubatana.net (Aug. 13, 2010), h ttp://w w w.kubatana.net/html /archi v e/l egi s l /100813v erit as.
a s p?s e c t o r= L E GIS L .
236 Interview with Jessica Heinzelman, supra note 25.
237 van der Windt & Humphreys, supra note 47, at 6. |ndex
238 See Tom Mclean, Not with a Bang but a Whimper: The Politics of Accountability and Open Data
in the UK, at 11, available at h ttp ://p a p ers .s s rn.com/s ol 3/papers .cfm? abs tract_i d= 1899790 (2011)
(concluding that, in the context of the UK’s open data initiative, that although technology has reduced the
costs of accessing data, costs of interpreting and using that data remained prohibitively high).
239 Telephone Interview with Peter van der Windt, supra note 45.
240 Heinzelman, supra note 26, at 74.
241 Kenya SOS by SMS, IRIN Africa (Aug. 3, 2010), http://w w w.i ri nnew s .org/R eport/900 50/
K ENYA - SO S -b y -S MS .
242 Heinzelman, supra note 26, at 48–49; see also E-Mail Interview with Stephen Kirimi, supra note 29.
Uwiano received 14,000 messages in the three weeks leading up to the referendum, and another 6,000 on
the day itself. Heinzelman, supra note 26, at 47.
243 E-Mail Interview with Peter van der Windt, supra note 48.
244 Bulkley, supra note 70.
245 E-mail Interview with Peter van der Windt, supra note 48.
246 Van der Windt & Humphreys, supra note 47, at 8.
247 Telephone Interview with Jessica Heinzelman, supra note 25.
248 Telephone Interview with Erica Hagen, supra note 90. An analysis of the UN’s early warning
mechanism from 1997 succinctly noted: “The UN’s problem is not the absence of information. Rather, it is
the absence of an organization to manage the information flow, linking early warning to the other processes
crucial to rapid reaction. To be effective, this early warning mechanism must be linked to individuals
and organizations capable of acting on such information.” George Bowers, The United Nations—
Enhancing Its Early-Warning Mechanism iii (1997).
249 E-Mail Interview with Rachel Brown, supra note 91.
250 Telephone Interview with Jessica Heinzelman, supra note 25.
251 Land, supra note 167, at 1131–32.
252 Alston, supra note 4, ¶ 6; see also Beutz Land, supra note 167, at 1131-35 (describing how amateurs

T H E W O R L D B A N K G R OU P 43
#ICT4HR NOV EMBER 2012

and professionals could work together to produce human rights reports).


253 In describing uses of Frontline SMS, Alston notes it “can be used as an early warning system, or
to track patterns of violence or the effects of a natural disaster, or to facilitate rapid response or service
delivery. Crisis mapping can provide important visual representation of events, facilitating more effective
strategic planning or advocacy.” Id.
254 Grassrootsalquds.net, for example, provides an interface that allows organizations operating
in Jerusalem to provide information about themselves and what they do. Grassroots Al-Quds Network,
GrassRootsAlQuds.ne, h ttp ://g ra ss roots al quds .net/gras s roots -al -quds -netw ork (last visited June
26, 2012).
255 E-Mail Interview with Peter van der Windt, supra note 48.
256 Telephone Interview with Erica Hagen, supra note 90.
257 Chris Beyrer & Nancy E. Kass, Human Rights, Politics, and Reviews of Research Ethics, 360 The
Lancet 246, 247 (2002) (noting that U.S. regulations require ethical review of human subjects research and
that this review considers “whether studies have an adequate balance of benefits to risks, whether consent
procedures are adequate, and whether any groups of participants are improperly targeted or denied benefits
as a result of the study”).
258 Institutional Review Board, h ttp ://en.w i ki pedi a.org/w i ki /Ins ti tuti onal _rev i ew _board .
259 Voix des Kivus Leaflet, supra note 42, at 3.
260 Van der Windt & Humphreys, supra note 47, at 8.
261 Telephone Interview with Erica Hagen, supra note 90; E-Mail from Erica Hagen, supra note 34.
262 Heinzelman, supra note 26, at 62.
263 Telephone Interview with Erica Hagen, supra note 90.
|ndex
264 Research ethics codes all require informed consent, see Beyrer & Kass, supra note 257, at 248, as
do human rights protocols, see [need cite].
265 Comments of Susannah Sirkin, Symposium Proceedings—Human Rights Impact: General Issues
and Sectoral Perspectives 64 (Yasmine Ergas & Kristina Eberbach eds. 2010); see also Eileen Pittaway et al.,
“Stop Stealing Our Stories”: The Ethics of Research with Vulnerable Groups, 2(2) J. Hum. Rts. Practice
229, 233 (2010) (noting the difficulty of communicating the implications of releasing a DVD to the media
in a refugee community).
266 Pittaway et al., supra note 265, at 233.
267 Gregory, supra note 153, at 204 (noting that models of informed consent that emphasize communicating
the worst-case scenarios for impact—that the information will be seen by your oppressor or opponent—may
be “impossible to sustain in the online participatory culture context of user-generated media”).
268 Telephone Interview with Jessica Heinzelman, supra note 25.
269 Van der Windt & Humphreys, supra note 47, at 5.
270 Telephone Interview with Peter van der Windt, supra note 45.
271 Id.
272 Hagen, supra note 6, at 92. The “hacker’s ethos” is an approach that tries, among other things, to
“build the best services over the long term by quickly releasing and learning from smaller iterations rather
than trying to get everything right all at once.” Mark Zuckerberg’s Letter to Investors:‘The Hacker Way’,
Wired (Feb. 1, 2012), available at h ttp ://w w w.w i red.com/bus i nes s /2012/02/z uck-l etter/ .
273 Hagen, supra note 6, at 73.
274 Telephone Interview with Susan Wolfinbarger, supra note 121.
275 Telephone Interview with Jessica Heinzelman, supra note 119.
276 Padania et al., supra note 129, at 26.
277 Van der Windt & Humphreys, supra note 47, at 7.
278 Tom Sarrazin argues, for example, that “awareness-raising and promoting media literacy among
ordinary citizens are the best tools in the fight for balance and fairness in citizen journalism.” Sarrazin, supra
note 207, at 36.

44 WWW.OPENDTA. ORG
I NFORM ATI O N A N D C O M M U N I C AT I O N T E C H N O L O G I E S F O R H U M A N R I GH T S #ICT4HR

279 Telephone Interview with Peter van der Windt, supra note 45.
280 Approximately 70-80% of the phone holders would go out and gather information about what
was happening in the village; the remainder would wait until villagers came to them with something to
report. Id.
281 Although principles of ethics in the human rights context are not codified and vary by organization,
most approaches emphasize informed consent—disclosing the purpose for collecting information and how
the information will be used, ensuring the person understands (and is able to understand) the consequences
of sharing information, and obtaining that person’s voluntary consent to share the information. See Gregory,
supra note 153, at 202–03.
282 Witness, for example, supports the use of informed consent or, if that is not possible, “an assessment
based either on objective, established principles (termed ‘a professional practice’)—or carried out by a well-
informed individual who seeks to determine what a person who has not given explicit consent might be
expected to grant (‘a reasonable person’ guideline).” Id. at 202; see also Comments of Susannah Sirkin, supra
note 265, at 64 (noting that in some instances, researchers may conclude that the risk is too great despite
the witness’s consent; although motivated by security, “in making such decisions, it [the organization] runs
the risk of becoming paternalistic”).
283 The choice of professional standards can have profound consequences for decision making. For
example, there are tensions between “the medical ethics lens, which addresses each person individually, and
the public health ethics lens, which primarily focuses on delivering the greatest good to the greatest number
of people at the lowest cost.” Comments of Susannah Sirkin, supra note 265, at 64.
284 Human rights research ethics may actually be most flexible but least developed of these three. See
Paul Gready, Introduction—“Responsibility to the Story,” 2(2) J. Hum. Rts. Practice 177, 179 (2010)
(“Human rights practitioners lack a more general ethical code similar to those followed by other professions, |ndex
such as lawyers, physicians and journalists.”).
285 Gregory, supra note 153, at 205.
286 Telephone Interview with Erica Hagen, supra note 90.
287 Telephone Interview with Thomas Maketa, supra note 60.
288 Hagen, supra note 6, at 72–77.
289 Telephone Interview with Jessica Heinzelman, supra note 25.
290 Telephone Interview with Peter van der Windt, supra note 45.
291 Id.
292 Hagen, supra note 6, at 92.

T H E W O R L D B A N K G R OU P 45
|ndex

Das könnte Ihnen auch gefallen