The technologist’s dilemma: ethical challenges of using crowdsourcing technology in conflict and disaster-affected regions

Martin-Shields, Charles
External Publications (2013)

in: Georgetown Journal of International Affairs 14 (2), 157-163


The growth of mobile phone technology and Internet access globally has affected peoples’ lives in various ways. For the field of governance and conflict management, this has meant unprecedented levels of information sharing from within conflict and crisis zones. As Internet access has expanded across Africa, entities like Kenya’s Ushahidi—which build digital maps to publicly display real-time SMS text messages and social media feeds geographically—have been changing the way that citizens share their experiences of violence as they are happening. Probably the most important of these technologies—mobile phones— have expanded exponentially across the developing world; many countries in Africa, Asia and the Pacific have mobile phone market saturation rates of over 100 percent. The international development community has been actively developing tools and methods for using mobile phones for outreach and project monitoring for years; the governance and conflict management fields are beginning to find effective ways to use mobile phones and SMS text messaging.

While there has been excitement about the way these technologies can improve the work of conflict resolution and governance professionals, less popular attention has been paid to the unique risks and ethical challenges associated with using these tools in highly unstable political and social environments such as conflict zones. In these types of situations, crowdsourcing raises ethical issues of privacy, transparency of purpose and data protection. However, having secure technical data collection and storage procedures are not sufficient because most security failures are due to human error. To ethically run a crowdsourcing program in a conflict or disaster-affected environment, organizations need to ensure that their staffs and the “crowd” participating in the project have been trained to use the technologies and assess the unique risks of the digital information environment.

About the author

Martin-Shields, Charles

Political Science


Further experts