After presenting at the 17th international conference on current issues of sustainable development, I wanted to continue sharing my thoughts and reflections on ICT4D and mobile technologies in development. I posted at the beginning of the year, “The Allure of Mobile Technologies in Development: Reflections on Sustainable Development and #mtech” where I shared a visualization (based on personal experience during my time in Zambia) on the application of mobile technologies in
At the end of that post, I mentioned that I was continuing my research on mobile technologies and their implementation in development. Specifically, I wanted to expand my understanding of the dangers posed by utilizing and implementing these technologies in support of vulnerable populations. Data, and particularly personally identifiable data, often collected alongside geographic (GPS) data can pose a very real physical threat to community members and advocates who might threaten existing power structures. Further, the rush to embrace the ease of data collection and transmission might endanger the privacy, self-determination, and security of individuals and communities with
Although it’s designed for humanitarian
Key Considerations:
Although I have a lot more to research and discover, it seems that there are four major considerations to keep in mind.
- Design and implement with caution!
- Take your time to do the background research, contextualize your project with localized information – who are your key informants, who disseminates information, and what are the relative positionalities of key stakeholders?
- At every step of your design, assume that the system and data will be compromised at some point – how can you protect your
constitents ?
- At every step of your design, assume that the system and data will be compromised at some point – how can you protect your
- Address challenges from a variety of perspectives:
- Make sure you consider gender structures, including physical access to technologies,
decision making trees, and independence of data entry.Literacy can be a major challenge – remember thattext based solutions may limit your reach, especially in consideration of the most vulnerable populations.
- Make sure you consider gender structures, including physical access to technologies,
- Ensure that your cost-benefit analysis includes risks:
- There are many situations where a technological solution compounds harm rather than offers benefits.Innovation is
exciting, but dangerous – do not test/experiment with your product on extremely vulnerable populations, especially when the validity and veracity of their informed consent is questionable
- There are many situations where a technological solution compounds harm rather than offers benefits.Innovation is
- It’s essential to remember:
- Data collected cannot be adequately protected, and
breach is inevitable, the design must include protocols to limit the damage and danger to participants whenbreach occurs.If you’re designing a product, address its longevity – can you guarantee implementation? For how long? What happens when your funding runs out? What are the assumptions regarding infrastructure andinter-operability ? What are the associated costs and who will bear them?
- Data collected cannot be adequately protected, and
I’m looking forward to continuing to delve deeper into this subject, to learn more about data security and
Leave a Reply