SlideShare une entreprise Scribd logo
1  sur  39
Télécharger pour lire hors ligne
Policies of the Use of Citizen Participative Services
                             in the Context of Public Administrations




      Risk Management
              in
      Participative Web
              Miriam Ruiz - Fundación CTIC
                miriam.ruiz@fundacionctic.org
Index

Introduction and Global View

Services

Methodology

Dangers

Risk Control

Examples
Introduction
The Future of the Web
●
    Web 1.0: People connecting to the Web for
    Information: Unidirectional from the editors to
    the readers.
●
    Web 2.0: People connecting to People: social
    networks, wikis, colaboration, possibility of
    sharing.
●
    Web 3.0: Web applications connecting to other
    web applications to enrich people's experience.
Advantages of Web 2.0
●
    Provides a meeting point for all agents involved in the
    smooth running of society
●
    Information sharing: knowledge, experiences, suggestions
    or complaints
●
    Active collaboration and greater protagonism and
    involvement of citizens
●
    Vehicle for providing new ideas to the Public
    Administration
●
    Collective generation and gathering of knowledge
●
    More transparency in the Public Administration
●
    Continuous improvement of public services
Global View
Goals
●
    Develop a methodology to extract the maximum
    benefit of the web 2.0 paradigm, minimizing its
    risks
●
    Have a knowledge as accurate as possible of the web
    2.0 phenomenon and its consequences
●
    Obtain the highest signal/noise ratio possible from
    the information generated in a decentralized way
●
    Systematize the design of new web 2.0 services
Participants
●
    Internal Staff: Contractual Relationship, indefinite
    stay
●
    Hired Staff: Contractual Relationship, temporary stay
●
    External People: No contractual relationship, they use
    the services provided
●
    Outsiders: No kind of relationship established
●
    Anonymous People: Unidentified
Identification Level

●
    Absolute identification by direct means: ID
    Card, Passport or similar.
●
    Absolute identification by indirect means:
    Telephone number or similar.
●
    Weak identification (pseudonym): Alias, e-mail,
    OpenID or similar.
●
    Anonymous participation: There is nothing that
    can identify the person
Authentication Level

●
    Biometric means: Biological Data
●
    Safe Network: Connection from a controlled
    Network (Intranet)
●
    Strong Authentication: e-ID, digital signature, etc.
●
    Intermediate Authentication: Private secret data
●
    Weak Authentication: Password
●
    No Authentication: No authentication
Services
Services

    Collective generation of information:
     − Blogs or Weblogs
       
         Other options: Microblogs or nanoblogs,
         photoblogs, videoblogs or vblogs
     − Discussion boards
     − Mailing lists
     − Wikis
     − Survey
     − Comments
     − Contests
Services

    Multimedia Contents (photos, audio, video,
    flash, etc.):
     − Photo Album or gallery
     − Podcast
     − Video Podcast, Vidcast or Vodcast

    Collective Classification of Contents:
     − Evaluation
     − Tags, folksonomies and tag clouds
     − Classification systems based on reputation
Services

    Information Export:
     − Content syndication (RSS, Atom)
     − Publishing of information in semantic formats
       (RDF, RDFa)
     − Open APIs

    Content Integration:
     − Blog aggregators, planets or metablogs
     − Mashups or hybrid web applications
Services

    Relationships between people:
     − Chat or cybertalk
        
          Instant Messaging
        
          Web Conferences
        
          Audio and Video Conferences
        
          Virtual Worlds
     − Social Networks

    Commercial or Economical Exchanges
Methodology
Risk Management Process

    Definition of the Global Strategy

    Risk Identification

    Initial Risk Evaluation

    Planification of measures to reduce the risks

    New Risk Evaluation

    Risk Control (application of planned measures)

    Data Collection

    Periodic Review
Risk Management Process

                          Global
                         Strategy
   Data
 Collection                      Risk
                             Identification
  Risk
 Control                      Initial Risk
                              Evaluation
 Final Risk
 Evaluation     Definition of
                Measures to
              Control the Risks
Risk Calculation




Risk = Probability x Impact
Quantification of the Probability


    High: The hazardous event will happen
    regularly

    Medium: The hazardous event will happen from
    time to time

    Low: The hazardous event will occur rarely

    Null: It's extremelly unlikely for the dangerous
    event to occur
Quantification of the Impact


    Severe or extremely harmful event: The
    damage would be very important if the
    dangerous event happened

    Serious or harmful event: The damage would
    be considerable

    Mild or slightly harmful event: The damage
    would not be too important

    Harmless: There would be almost no damage
    even when the incident occurred
Risk Quantification


                                    Co nseq uences (impact)
                         M ild         Ha rm ful              Severe

Probability
                Low      Trivial       Tolerable          Moderate
 (danger)      M edum   Tolerable      Moderate           Important
               Hig h    Moderate      Important          Intolerable
Risk Evaluation

               Risk = Probability x Impact


    T: Trivial (No specific actions are required)

    TO: Tolerable (Improvements that do not imply a big
    cost. Regular checks)

    MO: Moderate (Efforts to reduce risk)

    I: Important (A new service shall not be started.
    Prioritize the solution of the problem if the service is
    already running)

    IN: Intolerable (Stop the service inmediately)
Dangers
Dangers

    R01: Violation of personal privacy, honor or self-image of people

    R02: Revelation and disclosure of secrets or confidential information

    R03: Illegal contents or illegal advocacy of crime

    R04: Undesired contents or advocacy of undesired activities

    R05: Exchanges of attacks or insults

    R06: Threats

    R07: Continuous psychological harassment

    R08: Sexual harassment

    R11: Use of the platform for personal or business promotion

    R12: Negative advertisement or destructive or negative participation

    R13: Irrelevant matters or unrelated to the topic being treated (off-
    topic)
Dangers

    R14: Low quality of the contributions

    R15: Spreading rumors and false information

    R16: Loss of confidence in the service

    R17: Loss of credibility of the institution

    R18: Forced participation of third parties

    R21: Violation of protection rights of personal data

    R22: Infringement of intellectual property rights of third persons

    R23: Impersonation

    R24: Violation of the protection rights of minors

    R25: Fraud

    R26: Deception or phishing
Dangers

    R31: SPAM or unsolicited massive messages

    R32: Sabotage: malware, virus, trojans, spyware,...

    R33: Massive subscription

    R34: Massive theft of personal data

    R35: Accesibility problems

    R41: Low participation

    R42: Massive use of the service (“die of success”)

    R43: Biased participation or restricted to a part of the population

    R44: Emergency of power groups

    R51: Inappropriate use in external information services
Consequences

    Legal: Legal action that could be taken against the
    organization due to contents published by third persons

    Mediatic or Image-related: Potential impact on the media
    of the contents published in the collaborative services

    Economical: Financial or monetary consequences that
    may affect the organization

    Technical: Potential problems of a technical nature that,
    involuntarily or on purpose, may be caused by other
    people with their participation

    Social: Related to the inherent quality of the service for
    users
Risk Control
Proactive or preventive measures

    Definition and information of the conditions of use of the services

    Information and appropriate management of personal data

    Terms of licensing of the information and published contents

    Adequate information to the users of the services

    Training the staff of the organization

    Collaboration with copyright management organizations

    Limiting the involvement of minors

    Moderation prior to publication of contents provided by third parties

    Automatic filtering based on the format or the content

    Use of captchas (semantic or accesible)

    Identification and authentication of participants

    Restrictions on access to the contents or to participation

    Dinamization and motivation from within the community

    Proper planning of the starting up of the services
Reactive or corrective measures

    Removal or modification of already published content

    Direct participation in the service by the organization

    Collective moderation by the community itself

    Canceling of user accounts

    Denial of access to a service

    Definition of contingency plans

    Notification or formal complaints to competent authorities
Supervision or monitoring

    Active surveillance of published contents by the organization

    Warning system to allow the community itself to alert of problems

    Availability of an email account for personalized alerts

    Active surveillance of impact and contents reuse in external services

    Automated mechanisms for review of the published contents
Examples (mailing lists)
Example: Illegal Contents
   Initial Probability (danger)   Initial Consequences (damage)           Initial Risk

             High                         Harmful                        Important

                                                                  Proba-           Conse-
                      Measures Taken
                                                                   bility         quences
Identification and authentication of participants                    ↓                   =
Moderation based on user's reputation                                ↓                   =
Automatic filtering of contents                                      ↓                   =
Removal of the message                                               =                   ↓
Warnings from other users                                            =                   ↓



    Final Probability (danger)    Final Consequences (damage)             Final Risk

          Medium                            Mild                         Moderate
Example: SPAM
   Initial Probability (danger)      Initial Impact (damage)          Initial Risk

             High                           Mild                      Moderate

                                                               Proba-          Conse-
                       Measures Taken
                                                                bility        quences
Identification and authentication of participants                 ↓                  =
Moderation based on user's reputation                             ↓                  =
Automatic anti-SPAM filtering                                    ↓↓                  =
Removal of the message                                            =                  ↓
Warnings from other users                                         =                  ↓



    Final Probability (danger)       Final Impact (damage)             Final Risk

             Low                            Mild                       Trivial
Example: Low Participation
    Initial Probability (danger)   Initial Consequences (damage)          Initial Risk

              High                           Mild                         Moderate

                                                                   Proba-          Conse-
                        Measures Taken
                                                                    bility        quences
Identification and authentication of participant                      ↑                  =
Moderation based on user's reputation                                 ↑                  =
Motivate users for participation                                      ↓                  =
Provide interesting contents from the organization                    ↓                  =
Publicize the list                                                    ↓                  =



    Final Probability (danger)     Final Consequences (damage)             Final Risk

           Medium                            Mild                         Tolerable
Policies of the Use of Citizen Participative Services
                             in the Context of Public Administrations




      Risk Management
              in
      Participative Web
              Miriam Ruiz - Fundación CTIC
                miriam.ruiz@fundacionctic.org
Authors

    Promoted and developed by:
     − Gobierno del Principado de Asturias - http://www.asturias.es
     − CTIC Centro Tecnológico - http://www.fundacionctic.org



    Members of the Working Group, in Alphabetical Order:
     − Eloy Braña Gundin (Principado de Asturias)
     − Chus García (Fundación CTIC)
     − Marc Garriga (Ayuntamiento de Barcelona)
     − Raquel Gisbert (Ayuntamiento de Barcelona)
     − Mª Carmen Herrera (Principado de Asturias)
     − Dolors Pou (Xperience Consulting)
     − Andrés Ramos Gil de la Haza (Bardají & Honrado Abogados)
     − José Luis Rodríguez (Principado de Asturias)
     − Miriam Ruiz González (Fundación CTIC)
License

All the contents included in this work belong to Fundación CTIC and are
protected by the intellectual and industrial property rights granted by law.
 Their use, reproduction, distribution, public communication, availability,
processing or any other similar or analogous activity is totally prohibited,
except in the cases that are explicitly allowed by the license under which
it is published. Fundación CTIC reserves the right to pursue legal action
    as appropriate against those who violate or infringe their intellectual
                     property and / or industrial rights.

     This work is published under a Creative Commons license
                     Attribution-ShareAlike 3.0
                           (CC-by-sa 3.0).

                   To read the text of this license, visit
           http://creativecommons.org/licenses/by-sa/3.0/

Contenu connexe

Similaire à Risk Management in Citizen Participative Services

Why Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of SafetyWhy Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of Safetytim_owen
 
Cybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to knowCybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to knowCordium
 
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital EmpowermentETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowermentnellykelly1663
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umarylandSara-Jayne Terp
 
ITHI: Identifier Technologies Health Indicators
ITHI: Identifier Technologies Health IndicatorsITHI: Identifier Technologies Health Indicators
ITHI: Identifier Technologies Health IndicatorsAPNIC
 
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17Algorithmically Mediated Online Inforamtion Access workshop at WebSci17
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17Ansgar Koene
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Trilateral Research
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicyAllot Communications
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is allPECB
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowqmatheson
 
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docxForm Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docxalisondakintxt
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsObserveIT
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityDan Michaluk
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...Netpluz Asia Pte Ltd
 
Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46Jisc
 

Similaire à Risk Management in Citizen Participative Services (20)

Why Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of SafetyWhy Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of Safety
 
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Cybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to knowCybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to know
 
ETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital EmpowermentETHICS IN CYBERSPACE.pptx Digital Empowerment
ETHICS IN CYBERSPACE.pptx Digital Empowerment
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
ITHI: Identifier Technologies Health Indicators
ITHI: Identifier Technologies Health IndicatorsITHI: Identifier Technologies Health Indicators
ITHI: Identifier Technologies Health Indicators
 
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17Algorithmically Mediated Online Inforamtion Access workshop at WebSci17
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
 
SLVA - Privacy Framework and Approach
SLVA - Privacy Framework and ApproachSLVA - Privacy Framework and Approach
SLVA - Privacy Framework and Approach
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is all
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you know
 
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docxForm Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46
 

Plus de Miriam Ruiz

MBTI (Myers-Briggs Type Indicator) (doc. v3)
MBTI (Myers-Briggs Type Indicator) (doc. v3)MBTI (Myers-Briggs Type Indicator) (doc. v3)
MBTI (Myers-Briggs Type Indicator) (doc. v3)Miriam Ruiz
 
Patrones de Escalas Musicales (Draft)
Patrones de Escalas Musicales (Draft)Patrones de Escalas Musicales (Draft)
Patrones de Escalas Musicales (Draft)Miriam Ruiz
 
Diagramas de Escalas Musicales (draft)
Diagramas de Escalas Musicales (draft)Diagramas de Escalas Musicales (draft)
Diagramas de Escalas Musicales (draft)Miriam Ruiz
 
Diagramas tonales de acordes musicales (draft)
Diagramas tonales de acordes musicales (draft)Diagramas tonales de acordes musicales (draft)
Diagramas tonales de acordes musicales (draft)Miriam Ruiz
 
Mapas Tonales Musicales [Draft]
Mapas Tonales Musicales [Draft]Mapas Tonales Musicales [Draft]
Mapas Tonales Musicales [Draft]Miriam Ruiz
 
Ukelele Chords Cheat Sheet v2
Ukelele Chords Cheat Sheet v2Ukelele Chords Cheat Sheet v2
Ukelele Chords Cheat Sheet v2Miriam Ruiz
 
Ukelele Chords Cheat Sheet
Ukelele Chords Cheat SheetUkelele Chords Cheat Sheet
Ukelele Chords Cheat SheetMiriam Ruiz
 
Mujeres en el Software Libre (Campus Party Colombia, 2020)
Mujeres en el Software Libre (Campus Party Colombia, 2020)Mujeres en el Software Libre (Campus Party Colombia, 2020)
Mujeres en el Software Libre (Campus Party Colombia, 2020)Miriam Ruiz
 
MBTI (Myers-Briggs Type Indicator)
MBTI (Myers-Briggs Type Indicator)MBTI (Myers-Briggs Type Indicator)
MBTI (Myers-Briggs Type Indicator)Miriam Ruiz
 
DiSC (Dominance, Influence, Steadiness, Conscientiousness)
DiSC (Dominance, Influence, Steadiness, Conscientiousness)DiSC (Dominance, Influence, Steadiness, Conscientiousness)
DiSC (Dominance, Influence, Steadiness, Conscientiousness)Miriam Ruiz
 
MBTI (Myers-Briggs Type Indicator) [old]
MBTI (Myers-Briggs Type Indicator) [old]MBTI (Myers-Briggs Type Indicator) [old]
MBTI (Myers-Briggs Type Indicator) [old]Miriam Ruiz
 
Mujeres en el Software Libre: El proyecto Debian Women (2015)
Mujeres en el Software Libre: El proyecto Debian Women (2015)Mujeres en el Software Libre: El proyecto Debian Women (2015)
Mujeres en el Software Libre: El proyecto Debian Women (2015)Miriam Ruiz
 
Planets in our Solar System (2015)
Planets in our Solar System (2015)Planets in our Solar System (2015)
Planets in our Solar System (2015)Miriam Ruiz
 
Understanding Debian Packages (2014)
Understanding Debian Packages (2014)Understanding Debian Packages (2014)
Understanding Debian Packages (2014)Miriam Ruiz
 
El Paradigma de la Cultura Libre (2014)
El Paradigma de la Cultura Libre (2014)El Paradigma de la Cultura Libre (2014)
El Paradigma de la Cultura Libre (2014)Miriam Ruiz
 
Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)
Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)
Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)Miriam Ruiz
 
UML Design Class Diagrams (2014)
UML Design Class Diagrams (2014)UML Design Class Diagrams (2014)
UML Design Class Diagrams (2014)Miriam Ruiz
 
Curso de C++ (2014)
Curso de C++ (2014)Curso de C++ (2014)
Curso de C++ (2014)Miriam Ruiz
 
Feminismo en la Red (2013)
Feminismo en la Red (2013)Feminismo en la Red (2013)
Feminismo en la Red (2013)Miriam Ruiz
 
El Software Libre: Una visión global (2012)
El Software Libre: Una visión global (2012)El Software Libre: Una visión global (2012)
El Software Libre: Una visión global (2012)Miriam Ruiz
 

Plus de Miriam Ruiz (20)

MBTI (Myers-Briggs Type Indicator) (doc. v3)
MBTI (Myers-Briggs Type Indicator) (doc. v3)MBTI (Myers-Briggs Type Indicator) (doc. v3)
MBTI (Myers-Briggs Type Indicator) (doc. v3)
 
Patrones de Escalas Musicales (Draft)
Patrones de Escalas Musicales (Draft)Patrones de Escalas Musicales (Draft)
Patrones de Escalas Musicales (Draft)
 
Diagramas de Escalas Musicales (draft)
Diagramas de Escalas Musicales (draft)Diagramas de Escalas Musicales (draft)
Diagramas de Escalas Musicales (draft)
 
Diagramas tonales de acordes musicales (draft)
Diagramas tonales de acordes musicales (draft)Diagramas tonales de acordes musicales (draft)
Diagramas tonales de acordes musicales (draft)
 
Mapas Tonales Musicales [Draft]
Mapas Tonales Musicales [Draft]Mapas Tonales Musicales [Draft]
Mapas Tonales Musicales [Draft]
 
Ukelele Chords Cheat Sheet v2
Ukelele Chords Cheat Sheet v2Ukelele Chords Cheat Sheet v2
Ukelele Chords Cheat Sheet v2
 
Ukelele Chords Cheat Sheet
Ukelele Chords Cheat SheetUkelele Chords Cheat Sheet
Ukelele Chords Cheat Sheet
 
Mujeres en el Software Libre (Campus Party Colombia, 2020)
Mujeres en el Software Libre (Campus Party Colombia, 2020)Mujeres en el Software Libre (Campus Party Colombia, 2020)
Mujeres en el Software Libre (Campus Party Colombia, 2020)
 
MBTI (Myers-Briggs Type Indicator)
MBTI (Myers-Briggs Type Indicator)MBTI (Myers-Briggs Type Indicator)
MBTI (Myers-Briggs Type Indicator)
 
DiSC (Dominance, Influence, Steadiness, Conscientiousness)
DiSC (Dominance, Influence, Steadiness, Conscientiousness)DiSC (Dominance, Influence, Steadiness, Conscientiousness)
DiSC (Dominance, Influence, Steadiness, Conscientiousness)
 
MBTI (Myers-Briggs Type Indicator) [old]
MBTI (Myers-Briggs Type Indicator) [old]MBTI (Myers-Briggs Type Indicator) [old]
MBTI (Myers-Briggs Type Indicator) [old]
 
Mujeres en el Software Libre: El proyecto Debian Women (2015)
Mujeres en el Software Libre: El proyecto Debian Women (2015)Mujeres en el Software Libre: El proyecto Debian Women (2015)
Mujeres en el Software Libre: El proyecto Debian Women (2015)
 
Planets in our Solar System (2015)
Planets in our Solar System (2015)Planets in our Solar System (2015)
Planets in our Solar System (2015)
 
Understanding Debian Packages (2014)
Understanding Debian Packages (2014)Understanding Debian Packages (2014)
Understanding Debian Packages (2014)
 
El Paradigma de la Cultura Libre (2014)
El Paradigma de la Cultura Libre (2014)El Paradigma de la Cultura Libre (2014)
El Paradigma de la Cultura Libre (2014)
 
Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)
Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)
Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)
 
UML Design Class Diagrams (2014)
UML Design Class Diagrams (2014)UML Design Class Diagrams (2014)
UML Design Class Diagrams (2014)
 
Curso de C++ (2014)
Curso de C++ (2014)Curso de C++ (2014)
Curso de C++ (2014)
 
Feminismo en la Red (2013)
Feminismo en la Red (2013)Feminismo en la Red (2013)
Feminismo en la Red (2013)
 
El Software Libre: Una visión global (2012)
El Software Libre: Una visión global (2012)El Software Libre: Una visión global (2012)
El Software Libre: Una visión global (2012)
 

Dernier

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxAndy Lambert
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth MarketingShawn Pang
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaShree Krishna Exports
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communicationskarancommunications
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation SlidesKeppelCorporation
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Tina Ji
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfOnline Income Engine
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayNZSG
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...anilsa9823
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst SummitHolger Mueller
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 DelhiCall Girls in Delhi
 

Dernier (20)

Monthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptxMonthly Social Media Update April 2024 pptx.pptx
Monthly Social Media Update April 2024 pptx.pptx
 
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
Tech Startup Growth Hacking 101  - Basics on Growth MarketingTech Startup Growth Hacking 101  - Basics on Growth Marketing
Tech Startup Growth Hacking 101 - Basics on Growth Marketing
 
Best Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in IndiaBest Basmati Rice Manufacturers in India
Best Basmati Rice Manufacturers in India
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 
Pharma Works Profile of Karan Communications
Pharma Works Profile of Karan CommunicationsPharma Works Profile of Karan Communications
Pharma Works Profile of Karan Communications
 
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
Nepali Escort Girl Kakori \ 9548273370 Indian Call Girls Service Lucknow ₹,9517
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
Keppel Ltd. 1Q 2024 Business Update  Presentation SlidesKeppel Ltd. 1Q 2024 Business Update  Presentation Slides
Keppel Ltd. 1Q 2024 Business Update Presentation Slides
 
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
Russian Faridabad Call Girls(Badarpur) : ☎ 8168257667, @4999
 
Unlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdfUnlocking the Secrets of Affiliate Marketing.pdf
Unlocking the Secrets of Affiliate Marketing.pdf
 
Forklift Operations: Safety through Cartoons
Forklift Operations: Safety through CartoonsForklift Operations: Safety through Cartoons
Forklift Operations: Safety through Cartoons
 
It will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 MayIt will be International Nurses' Day on 12 May
It will be International Nurses' Day on 12 May
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
Lucknow 💋 Escorts in Lucknow - 450+ Call Girl Cash Payment 8923113531 Neha Th...
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
Progress Report - Oracle Database Analyst Summit
Progress  Report - Oracle Database Analyst SummitProgress  Report - Oracle Database Analyst Summit
Progress Report - Oracle Database Analyst Summit
 
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
VVVIP Call Girls In Greater Kailash ➡️ Delhi ➡️ 9999965857 🚀 No Advance 24HRS...
 
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
9599632723 Top Call Girls in Delhi at your Door Step Available 24x7 Delhi
 

Risk Management in Citizen Participative Services

  • 1. Policies of the Use of Citizen Participative Services in the Context of Public Administrations Risk Management in Participative Web Miriam Ruiz - Fundación CTIC miriam.ruiz@fundacionctic.org
  • 2. Index Introduction and Global View Services Methodology Dangers Risk Control Examples
  • 4. The Future of the Web ● Web 1.0: People connecting to the Web for Information: Unidirectional from the editors to the readers. ● Web 2.0: People connecting to People: social networks, wikis, colaboration, possibility of sharing. ● Web 3.0: Web applications connecting to other web applications to enrich people's experience.
  • 5. Advantages of Web 2.0 ● Provides a meeting point for all agents involved in the smooth running of society ● Information sharing: knowledge, experiences, suggestions or complaints ● Active collaboration and greater protagonism and involvement of citizens ● Vehicle for providing new ideas to the Public Administration ● Collective generation and gathering of knowledge ● More transparency in the Public Administration ● Continuous improvement of public services
  • 7. Goals ● Develop a methodology to extract the maximum benefit of the web 2.0 paradigm, minimizing its risks ● Have a knowledge as accurate as possible of the web 2.0 phenomenon and its consequences ● Obtain the highest signal/noise ratio possible from the information generated in a decentralized way ● Systematize the design of new web 2.0 services
  • 8. Participants ● Internal Staff: Contractual Relationship, indefinite stay ● Hired Staff: Contractual Relationship, temporary stay ● External People: No contractual relationship, they use the services provided ● Outsiders: No kind of relationship established ● Anonymous People: Unidentified
  • 9. Identification Level ● Absolute identification by direct means: ID Card, Passport or similar. ● Absolute identification by indirect means: Telephone number or similar. ● Weak identification (pseudonym): Alias, e-mail, OpenID or similar. ● Anonymous participation: There is nothing that can identify the person
  • 10. Authentication Level ● Biometric means: Biological Data ● Safe Network: Connection from a controlled Network (Intranet) ● Strong Authentication: e-ID, digital signature, etc. ● Intermediate Authentication: Private secret data ● Weak Authentication: Password ● No Authentication: No authentication
  • 12. Services  Collective generation of information: − Blogs or Weblogs  Other options: Microblogs or nanoblogs, photoblogs, videoblogs or vblogs − Discussion boards − Mailing lists − Wikis − Survey − Comments − Contests
  • 13. Services  Multimedia Contents (photos, audio, video, flash, etc.): − Photo Album or gallery − Podcast − Video Podcast, Vidcast or Vodcast  Collective Classification of Contents: − Evaluation − Tags, folksonomies and tag clouds − Classification systems based on reputation
  • 14. Services  Information Export: − Content syndication (RSS, Atom) − Publishing of information in semantic formats (RDF, RDFa) − Open APIs  Content Integration: − Blog aggregators, planets or metablogs − Mashups or hybrid web applications
  • 15. Services  Relationships between people: − Chat or cybertalk  Instant Messaging  Web Conferences  Audio and Video Conferences  Virtual Worlds − Social Networks  Commercial or Economical Exchanges
  • 17. Risk Management Process  Definition of the Global Strategy  Risk Identification  Initial Risk Evaluation  Planification of measures to reduce the risks  New Risk Evaluation  Risk Control (application of planned measures)  Data Collection  Periodic Review
  • 18. Risk Management Process Global Strategy Data Collection Risk Identification Risk Control Initial Risk Evaluation Final Risk Evaluation Definition of Measures to Control the Risks
  • 19. Risk Calculation Risk = Probability x Impact
  • 20. Quantification of the Probability  High: The hazardous event will happen regularly  Medium: The hazardous event will happen from time to time  Low: The hazardous event will occur rarely  Null: It's extremelly unlikely for the dangerous event to occur
  • 21. Quantification of the Impact  Severe or extremely harmful event: The damage would be very important if the dangerous event happened  Serious or harmful event: The damage would be considerable  Mild or slightly harmful event: The damage would not be too important  Harmless: There would be almost no damage even when the incident occurred
  • 22. Risk Quantification Co nseq uences (impact) M ild Ha rm ful Severe Probability Low Trivial Tolerable Moderate (danger) M edum Tolerable Moderate Important Hig h Moderate Important Intolerable
  • 23. Risk Evaluation Risk = Probability x Impact  T: Trivial (No specific actions are required)  TO: Tolerable (Improvements that do not imply a big cost. Regular checks)  MO: Moderate (Efforts to reduce risk)  I: Important (A new service shall not be started. Prioritize the solution of the problem if the service is already running)  IN: Intolerable (Stop the service inmediately)
  • 25. Dangers  R01: Violation of personal privacy, honor or self-image of people  R02: Revelation and disclosure of secrets or confidential information  R03: Illegal contents or illegal advocacy of crime  R04: Undesired contents or advocacy of undesired activities  R05: Exchanges of attacks or insults  R06: Threats  R07: Continuous psychological harassment  R08: Sexual harassment  R11: Use of the platform for personal or business promotion  R12: Negative advertisement or destructive or negative participation  R13: Irrelevant matters or unrelated to the topic being treated (off- topic)
  • 26. Dangers  R14: Low quality of the contributions  R15: Spreading rumors and false information  R16: Loss of confidence in the service  R17: Loss of credibility of the institution  R18: Forced participation of third parties  R21: Violation of protection rights of personal data  R22: Infringement of intellectual property rights of third persons  R23: Impersonation  R24: Violation of the protection rights of minors  R25: Fraud  R26: Deception or phishing
  • 27. Dangers  R31: SPAM or unsolicited massive messages  R32: Sabotage: malware, virus, trojans, spyware,...  R33: Massive subscription  R34: Massive theft of personal data  R35: Accesibility problems  R41: Low participation  R42: Massive use of the service (“die of success”)  R43: Biased participation or restricted to a part of the population  R44: Emergency of power groups  R51: Inappropriate use in external information services
  • 28. Consequences  Legal: Legal action that could be taken against the organization due to contents published by third persons  Mediatic or Image-related: Potential impact on the media of the contents published in the collaborative services  Economical: Financial or monetary consequences that may affect the organization  Technical: Potential problems of a technical nature that, involuntarily or on purpose, may be caused by other people with their participation  Social: Related to the inherent quality of the service for users
  • 30. Proactive or preventive measures  Definition and information of the conditions of use of the services  Information and appropriate management of personal data  Terms of licensing of the information and published contents  Adequate information to the users of the services  Training the staff of the organization  Collaboration with copyright management organizations  Limiting the involvement of minors  Moderation prior to publication of contents provided by third parties  Automatic filtering based on the format or the content  Use of captchas (semantic or accesible)  Identification and authentication of participants  Restrictions on access to the contents or to participation  Dinamization and motivation from within the community  Proper planning of the starting up of the services
  • 31. Reactive or corrective measures  Removal or modification of already published content  Direct participation in the service by the organization  Collective moderation by the community itself  Canceling of user accounts  Denial of access to a service  Definition of contingency plans  Notification or formal complaints to competent authorities
  • 32. Supervision or monitoring  Active surveillance of published contents by the organization  Warning system to allow the community itself to alert of problems  Availability of an email account for personalized alerts  Active surveillance of impact and contents reuse in external services  Automated mechanisms for review of the published contents
  • 34. Example: Illegal Contents Initial Probability (danger) Initial Consequences (damage) Initial Risk High Harmful Important Proba- Conse- Measures Taken bility quences Identification and authentication of participants ↓ = Moderation based on user's reputation ↓ = Automatic filtering of contents ↓ = Removal of the message = ↓ Warnings from other users = ↓ Final Probability (danger) Final Consequences (damage) Final Risk Medium Mild Moderate
  • 35. Example: SPAM Initial Probability (danger) Initial Impact (damage) Initial Risk High Mild Moderate Proba- Conse- Measures Taken bility quences Identification and authentication of participants ↓ = Moderation based on user's reputation ↓ = Automatic anti-SPAM filtering ↓↓ = Removal of the message = ↓ Warnings from other users = ↓ Final Probability (danger) Final Impact (damage) Final Risk Low Mild Trivial
  • 36. Example: Low Participation Initial Probability (danger) Initial Consequences (damage) Initial Risk High Mild Moderate Proba- Conse- Measures Taken bility quences Identification and authentication of participant ↑ = Moderation based on user's reputation ↑ = Motivate users for participation ↓ = Provide interesting contents from the organization ↓ = Publicize the list ↓ = Final Probability (danger) Final Consequences (damage) Final Risk Medium Mild Tolerable
  • 37. Policies of the Use of Citizen Participative Services in the Context of Public Administrations Risk Management in Participative Web Miriam Ruiz - Fundación CTIC miriam.ruiz@fundacionctic.org
  • 38. Authors  Promoted and developed by: − Gobierno del Principado de Asturias - http://www.asturias.es − CTIC Centro Tecnológico - http://www.fundacionctic.org  Members of the Working Group, in Alphabetical Order: − Eloy Braña Gundin (Principado de Asturias) − Chus García (Fundación CTIC) − Marc Garriga (Ayuntamiento de Barcelona) − Raquel Gisbert (Ayuntamiento de Barcelona) − Mª Carmen Herrera (Principado de Asturias) − Dolors Pou (Xperience Consulting) − Andrés Ramos Gil de la Haza (Bardají & Honrado Abogados) − José Luis Rodríguez (Principado de Asturias) − Miriam Ruiz González (Fundación CTIC)
  • 39. License All the contents included in this work belong to Fundación CTIC and are protected by the intellectual and industrial property rights granted by law. Their use, reproduction, distribution, public communication, availability, processing or any other similar or analogous activity is totally prohibited, except in the cases that are explicitly allowed by the license under which it is published. Fundación CTIC reserves the right to pursue legal action as appropriate against those who violate or infringe their intellectual property and / or industrial rights. This work is published under a Creative Commons license Attribution-ShareAlike 3.0 (CC-by-sa 3.0). To read the text of this license, visit http://creativecommons.org/licenses/by-sa/3.0/