SlideShare una empresa de Scribd logo
1 de 39
Descargar para leer sin conexión
Policies of the Use of Citizen Participative Services
                             in the Context of Public Administrations




      Risk Management
              in
      Participative Web
              Miriam Ruiz - Fundación CTIC
                miriam.ruiz@fundacionctic.org
Index

Introduction and Global View

Services

Methodology

Dangers

Risk Control

Examples
Introduction
The Future of the Web
●
    Web 1.0: People connecting to the Web for
    Information: Unidirectional from the editors to
    the readers.
●
    Web 2.0: People connecting to People: social
    networks, wikis, colaboration, possibility of
    sharing.
●
    Web 3.0: Web applications connecting to other
    web applications to enrich people's experience.
Advantages of Web 2.0
●
    Provides a meeting point for all agents involved in the
    smooth running of society
●
    Information sharing: knowledge, experiences, suggestions
    or complaints
●
    Active collaboration and greater protagonism and
    involvement of citizens
●
    Vehicle for providing new ideas to the Public
    Administration
●
    Collective generation and gathering of knowledge
●
    More transparency in the Public Administration
●
    Continuous improvement of public services
Global View
Goals
●
    Develop a methodology to extract the maximum
    benefit of the web 2.0 paradigm, minimizing its
    risks
●
    Have a knowledge as accurate as possible of the web
    2.0 phenomenon and its consequences
●
    Obtain the highest signal/noise ratio possible from
    the information generated in a decentralized way
●
    Systematize the design of new web 2.0 services
Participants
●
    Internal Staff: Contractual Relationship, indefinite
    stay
●
    Hired Staff: Contractual Relationship, temporary stay
●
    External People: No contractual relationship, they use
    the services provided
●
    Outsiders: No kind of relationship established
●
    Anonymous People: Unidentified
Identification Level

●
    Absolute identification by direct means: ID
    Card, Passport or similar.
●
    Absolute identification by indirect means:
    Telephone number or similar.
●
    Weak identification (pseudonym): Alias, e-mail,
    OpenID or similar.
●
    Anonymous participation: There is nothing that
    can identify the person
Authentication Level

●
    Biometric means: Biological Data
●
    Safe Network: Connection from a controlled
    Network (Intranet)
●
    Strong Authentication: e-ID, digital signature, etc.
●
    Intermediate Authentication: Private secret data
●
    Weak Authentication: Password
●
    No Authentication: No authentication
Services
Services

    Collective generation of information:
     − Blogs or Weblogs
       
         Other options: Microblogs or nanoblogs,
         photoblogs, videoblogs or vblogs
     − Discussion boards
     − Mailing lists
     − Wikis
     − Survey
     − Comments
     − Contests
Services

    Multimedia Contents (photos, audio, video,
    flash, etc.):
     − Photo Album or gallery
     − Podcast
     − Video Podcast, Vidcast or Vodcast

    Collective Classification of Contents:
     − Evaluation
     − Tags, folksonomies and tag clouds
     − Classification systems based on reputation
Services

    Information Export:
     − Content syndication (RSS, Atom)
     − Publishing of information in semantic formats
       (RDF, RDFa)
     − Open APIs

    Content Integration:
     − Blog aggregators, planets or metablogs
     − Mashups or hybrid web applications
Services

    Relationships between people:
     − Chat or cybertalk
        
          Instant Messaging
        
          Web Conferences
        
          Audio and Video Conferences
        
          Virtual Worlds
     − Social Networks

    Commercial or Economical Exchanges
Methodology
Risk Management Process

    Definition of the Global Strategy

    Risk Identification

    Initial Risk Evaluation

    Planification of measures to reduce the risks

    New Risk Evaluation

    Risk Control (application of planned measures)

    Data Collection

    Periodic Review
Risk Management Process

                          Global
                         Strategy
   Data
 Collection                      Risk
                             Identification
  Risk
 Control                      Initial Risk
                              Evaluation
 Final Risk
 Evaluation     Definition of
                Measures to
              Control the Risks
Risk Calculation




Risk = Probability x Impact
Quantification of the Probability


    High: The hazardous event will happen
    regularly

    Medium: The hazardous event will happen from
    time to time

    Low: The hazardous event will occur rarely

    Null: It's extremelly unlikely for the dangerous
    event to occur
Quantification of the Impact


    Severe or extremely harmful event: The
    damage would be very important if the
    dangerous event happened

    Serious or harmful event: The damage would
    be considerable

    Mild or slightly harmful event: The damage
    would not be too important

    Harmless: There would be almost no damage
    even when the incident occurred
Risk Quantification


                                    Co nseq uences (impact)
                         M ild         Ha rm ful              Severe

Probability
                Low      Trivial       Tolerable          Moderate
 (danger)      M edum   Tolerable      Moderate           Important
               Hig h    Moderate      Important          Intolerable
Risk Evaluation

               Risk = Probability x Impact


    T: Trivial (No specific actions are required)

    TO: Tolerable (Improvements that do not imply a big
    cost. Regular checks)

    MO: Moderate (Efforts to reduce risk)

    I: Important (A new service shall not be started.
    Prioritize the solution of the problem if the service is
    already running)

    IN: Intolerable (Stop the service inmediately)
Dangers
Dangers

    R01: Violation of personal privacy, honor or self-image of people

    R02: Revelation and disclosure of secrets or confidential information

    R03: Illegal contents or illegal advocacy of crime

    R04: Undesired contents or advocacy of undesired activities

    R05: Exchanges of attacks or insults

    R06: Threats

    R07: Continuous psychological harassment

    R08: Sexual harassment

    R11: Use of the platform for personal or business promotion

    R12: Negative advertisement or destructive or negative participation

    R13: Irrelevant matters or unrelated to the topic being treated (off-
    topic)
Dangers

    R14: Low quality of the contributions

    R15: Spreading rumors and false information

    R16: Loss of confidence in the service

    R17: Loss of credibility of the institution

    R18: Forced participation of third parties

    R21: Violation of protection rights of personal data

    R22: Infringement of intellectual property rights of third persons

    R23: Impersonation

    R24: Violation of the protection rights of minors

    R25: Fraud

    R26: Deception or phishing
Dangers

    R31: SPAM or unsolicited massive messages

    R32: Sabotage: malware, virus, trojans, spyware,...

    R33: Massive subscription

    R34: Massive theft of personal data

    R35: Accesibility problems

    R41: Low participation

    R42: Massive use of the service (“die of success”)

    R43: Biased participation or restricted to a part of the population

    R44: Emergency of power groups

    R51: Inappropriate use in external information services
Consequences

    Legal: Legal action that could be taken against the
    organization due to contents published by third persons

    Mediatic or Image-related: Potential impact on the media
    of the contents published in the collaborative services

    Economical: Financial or monetary consequences that
    may affect the organization

    Technical: Potential problems of a technical nature that,
    involuntarily or on purpose, may be caused by other
    people with their participation

    Social: Related to the inherent quality of the service for
    users
Risk Control
Proactive or preventive measures

    Definition and information of the conditions of use of the services

    Information and appropriate management of personal data

    Terms of licensing of the information and published contents

    Adequate information to the users of the services

    Training the staff of the organization

    Collaboration with copyright management organizations

    Limiting the involvement of minors

    Moderation prior to publication of contents provided by third parties

    Automatic filtering based on the format or the content

    Use of captchas (semantic or accesible)

    Identification and authentication of participants

    Restrictions on access to the contents or to participation

    Dinamization and motivation from within the community

    Proper planning of the starting up of the services
Reactive or corrective measures

    Removal or modification of already published content

    Direct participation in the service by the organization

    Collective moderation by the community itself

    Canceling of user accounts

    Denial of access to a service

    Definition of contingency plans

    Notification or formal complaints to competent authorities
Supervision or monitoring

    Active surveillance of published contents by the organization

    Warning system to allow the community itself to alert of problems

    Availability of an email account for personalized alerts

    Active surveillance of impact and contents reuse in external services

    Automated mechanisms for review of the published contents
Examples (mailing lists)
Example: Illegal Contents
   Initial Probability (danger)   Initial Consequences (damage)           Initial Risk

             High                         Harmful                        Important

                                                                  Proba-           Conse-
                      Measures Taken
                                                                   bility         quences
Identification and authentication of participants                    ↓                   =
Moderation based on user's reputation                                ↓                   =
Automatic filtering of contents                                      ↓                   =
Removal of the message                                               =                   ↓
Warnings from other users                                            =                   ↓



    Final Probability (danger)    Final Consequences (damage)             Final Risk

          Medium                            Mild                         Moderate
Example: SPAM
   Initial Probability (danger)      Initial Impact (damage)          Initial Risk

             High                           Mild                      Moderate

                                                               Proba-          Conse-
                       Measures Taken
                                                                bility        quences
Identification and authentication of participants                 ↓                  =
Moderation based on user's reputation                             ↓                  =
Automatic anti-SPAM filtering                                    ↓↓                  =
Removal of the message                                            =                  ↓
Warnings from other users                                         =                  ↓



    Final Probability (danger)       Final Impact (damage)             Final Risk

             Low                            Mild                       Trivial
Example: Low Participation
    Initial Probability (danger)   Initial Consequences (damage)          Initial Risk

              High                           Mild                         Moderate

                                                                   Proba-          Conse-
                        Measures Taken
                                                                    bility        quences
Identification and authentication of participant                      ↑                  =
Moderation based on user's reputation                                 ↑                  =
Motivate users for participation                                      ↓                  =
Provide interesting contents from the organization                    ↓                  =
Publicize the list                                                    ↓                  =



    Final Probability (danger)     Final Consequences (damage)             Final Risk

           Medium                            Mild                         Tolerable
Policies of the Use of Citizen Participative Services
                             in the Context of Public Administrations




      Risk Management
              in
      Participative Web
              Miriam Ruiz - Fundación CTIC
                miriam.ruiz@fundacionctic.org
Authors

    Promoted and developed by:
     − Gobierno del Principado de Asturias - http://www.asturias.es
     − CTIC Centro Tecnológico - http://www.fundacionctic.org



    Members of the Working Group, in Alphabetical Order:
     − Eloy Braña Gundin (Principado de Asturias)
     − Chus García (Fundación CTIC)
     − Marc Garriga (Ayuntamiento de Barcelona)
     − Raquel Gisbert (Ayuntamiento de Barcelona)
     − Mª Carmen Herrera (Principado de Asturias)
     − Dolors Pou (Xperience Consulting)
     − Andrés Ramos Gil de la Haza (Bardají & Honrado Abogados)
     − José Luis Rodríguez (Principado de Asturias)
     − Miriam Ruiz González (Fundación CTIC)
License

All the contents included in this work belong to Fundación CTIC and are
protected by the intellectual and industrial property rights granted by law.
 Their use, reproduction, distribution, public communication, availability,
processing or any other similar or analogous activity is totally prohibited,
except in the cases that are explicitly allowed by the license under which
it is published. Fundación CTIC reserves the right to pursue legal action
    as appropriate against those who violate or infringe their intellectual
                     property and / or industrial rights.

     This work is published under a Creative Commons license
                     Attribution-ShareAlike 3.0
                           (CC-by-sa 3.0).

                   To read the text of this license, visit
           http://creativecommons.org/licenses/by-sa/3.0/

Más contenido relacionado

Similar a Risk Management in Citizen Participative Services

Why Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of SafetyWhy Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of Safetytim_owen
 
Cybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to knowCybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to knowCordium
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umarylandSara-Jayne Terp
 
ITHI: Identifier Technologies Health Indicators
ITHI: Identifier Technologies Health IndicatorsITHI: Identifier Technologies Health Indicators
ITHI: Identifier Technologies Health IndicatorsAPNIC
 
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17Algorithmically Mediated Online Inforamtion Access workshop at WebSci17
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17Ansgar Koene
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Trilateral Research
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicyAllot Communications
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is allPECB
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowqmatheson
 
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docxForm Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docxalisondakintxt
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsObserveIT
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingJoe Nathans
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityDan Michaluk
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...Netpluz Asia Pte Ltd
 
Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46Jisc
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectTrilateral Research
 

Similar a Risk Management in Citizen Participative Services (20)

Why Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of SafetyWhy Risk Assessment Isn\’t Assurance of Safety
Why Risk Assessment Isn\’t Assurance of Safety
 
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
ISOC Efforts in Collaborative Responsibility Toward Internet Security and Res...
 
ISACA ISSA Presentation
ISACA ISSA PresentationISACA ISSA Presentation
ISACA ISSA Presentation
 
Cybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to knowCybersecurity and the regulator, what you need to know
Cybersecurity and the regulator, what you need to know
 
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland2021-05-SJTerp-AMITT_disinfoSoc-umaryland
2021-05-SJTerp-AMITT_disinfoSoc-umaryland
 
Ransomware attack
Ransomware attackRansomware attack
Ransomware attack
 
ITHI: Identifier Technologies Health Indicators
ITHI: Identifier Technologies Health IndicatorsITHI: Identifier Technologies Health Indicators
ITHI: Identifier Technologies Health Indicators
 
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17Algorithmically Mediated Online Inforamtion Access workshop at WebSci17
Algorithmically Mediated Online Inforamtion Access workshop at WebSci17
 
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
Workshop on Ethical, Legal, social Issues in Networked Information Exchange f...
 
Securing the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use PolicySecuring the Enterprise with Application Aware Acceptable Use Policy
Securing the Enterprise with Application Aware Acceptable Use Policy
 
SLVA - Privacy Framework and Approach
SLVA - Privacy Framework and ApproachSLVA - Privacy Framework and Approach
SLVA - Privacy Framework and Approach
 
Information security – risk identification is all
Information security – risk identification is allInformation security – risk identification is all
Information security – risk identification is all
 
Security Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you knowSecurity Breach: It's not if, it's not when, it's will you know
Security Breach: It's not if, it's not when, it's will you know
 
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docxForm Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
Form Responses 1TimestampUntitled QuestionRisk TableRisk IDID Da.docx
 
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other RegulationsPhish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
Phish, Spoof, Scam: Insider Threats, the GDPR & Other Regulations
 
NextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive BriefingNextLevel Cyber Security Executive Briefing
NextLevel Cyber Security Executive Briefing
 
Critical Issues in School Board Cyber Security
Critical Issues in School Board Cyber SecurityCritical Issues in School Board Cyber Security
Critical Issues in School Board Cyber Security
 
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
eSentinel webinar with Netpluz & Straits Interactive on Cyber Security & PDPA...
 
Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46Smoothwall and Ampliphae - Networkshop46
Smoothwall and Ampliphae - Networkshop46
 
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES ProjectPrivacy & Ethical Impact Assessment Workshop_RAMSES Project
Privacy & Ethical Impact Assessment Workshop_RAMSES Project
 

Más de Miriam Ruiz

MBTI (Myers-Briggs Type Indicator) (doc. v3)
MBTI (Myers-Briggs Type Indicator) (doc. v3)MBTI (Myers-Briggs Type Indicator) (doc. v3)
MBTI (Myers-Briggs Type Indicator) (doc. v3)Miriam Ruiz
 
Patrones de Escalas Musicales (Draft)
Patrones de Escalas Musicales (Draft)Patrones de Escalas Musicales (Draft)
Patrones de Escalas Musicales (Draft)Miriam Ruiz
 
Diagramas de Escalas Musicales (draft)
Diagramas de Escalas Musicales (draft)Diagramas de Escalas Musicales (draft)
Diagramas de Escalas Musicales (draft)Miriam Ruiz
 
Diagramas tonales de acordes musicales (draft)
Diagramas tonales de acordes musicales (draft)Diagramas tonales de acordes musicales (draft)
Diagramas tonales de acordes musicales (draft)Miriam Ruiz
 
Mapas Tonales Musicales [Draft]
Mapas Tonales Musicales [Draft]Mapas Tonales Musicales [Draft]
Mapas Tonales Musicales [Draft]Miriam Ruiz
 
Ukelele Chords Cheat Sheet v2
Ukelele Chords Cheat Sheet v2Ukelele Chords Cheat Sheet v2
Ukelele Chords Cheat Sheet v2Miriam Ruiz
 
Ukelele Chords Cheat Sheet
Ukelele Chords Cheat SheetUkelele Chords Cheat Sheet
Ukelele Chords Cheat SheetMiriam Ruiz
 
Mujeres en el Software Libre (Campus Party Colombia, 2020)
Mujeres en el Software Libre (Campus Party Colombia, 2020)Mujeres en el Software Libre (Campus Party Colombia, 2020)
Mujeres en el Software Libre (Campus Party Colombia, 2020)Miriam Ruiz
 
MBTI (Myers-Briggs Type Indicator)
MBTI (Myers-Briggs Type Indicator)MBTI (Myers-Briggs Type Indicator)
MBTI (Myers-Briggs Type Indicator)Miriam Ruiz
 
DiSC (Dominance, Influence, Steadiness, Conscientiousness)
DiSC (Dominance, Influence, Steadiness, Conscientiousness)DiSC (Dominance, Influence, Steadiness, Conscientiousness)
DiSC (Dominance, Influence, Steadiness, Conscientiousness)Miriam Ruiz
 
MBTI (Myers-Briggs Type Indicator) [old]
MBTI (Myers-Briggs Type Indicator) [old]MBTI (Myers-Briggs Type Indicator) [old]
MBTI (Myers-Briggs Type Indicator) [old]Miriam Ruiz
 
Mujeres en el Software Libre: El proyecto Debian Women (2015)
Mujeres en el Software Libre: El proyecto Debian Women (2015)Mujeres en el Software Libre: El proyecto Debian Women (2015)
Mujeres en el Software Libre: El proyecto Debian Women (2015)Miriam Ruiz
 
Planets in our Solar System (2015)
Planets in our Solar System (2015)Planets in our Solar System (2015)
Planets in our Solar System (2015)Miriam Ruiz
 
Understanding Debian Packages (2014)
Understanding Debian Packages (2014)Understanding Debian Packages (2014)
Understanding Debian Packages (2014)Miriam Ruiz
 
El Paradigma de la Cultura Libre (2014)
El Paradigma de la Cultura Libre (2014)El Paradigma de la Cultura Libre (2014)
El Paradigma de la Cultura Libre (2014)Miriam Ruiz
 
Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)
Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)
Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)Miriam Ruiz
 
UML Design Class Diagrams (2014)
UML Design Class Diagrams (2014)UML Design Class Diagrams (2014)
UML Design Class Diagrams (2014)Miriam Ruiz
 
Curso de C++ (2014)
Curso de C++ (2014)Curso de C++ (2014)
Curso de C++ (2014)Miriam Ruiz
 
Feminismo en la Red (2013)
Feminismo en la Red (2013)Feminismo en la Red (2013)
Feminismo en la Red (2013)Miriam Ruiz
 
El Software Libre: Una visión global (2012)
El Software Libre: Una visión global (2012)El Software Libre: Una visión global (2012)
El Software Libre: Una visión global (2012)Miriam Ruiz
 

Más de Miriam Ruiz (20)

MBTI (Myers-Briggs Type Indicator) (doc. v3)
MBTI (Myers-Briggs Type Indicator) (doc. v3)MBTI (Myers-Briggs Type Indicator) (doc. v3)
MBTI (Myers-Briggs Type Indicator) (doc. v3)
 
Patrones de Escalas Musicales (Draft)
Patrones de Escalas Musicales (Draft)Patrones de Escalas Musicales (Draft)
Patrones de Escalas Musicales (Draft)
 
Diagramas de Escalas Musicales (draft)
Diagramas de Escalas Musicales (draft)Diagramas de Escalas Musicales (draft)
Diagramas de Escalas Musicales (draft)
 
Diagramas tonales de acordes musicales (draft)
Diagramas tonales de acordes musicales (draft)Diagramas tonales de acordes musicales (draft)
Diagramas tonales de acordes musicales (draft)
 
Mapas Tonales Musicales [Draft]
Mapas Tonales Musicales [Draft]Mapas Tonales Musicales [Draft]
Mapas Tonales Musicales [Draft]
 
Ukelele Chords Cheat Sheet v2
Ukelele Chords Cheat Sheet v2Ukelele Chords Cheat Sheet v2
Ukelele Chords Cheat Sheet v2
 
Ukelele Chords Cheat Sheet
Ukelele Chords Cheat SheetUkelele Chords Cheat Sheet
Ukelele Chords Cheat Sheet
 
Mujeres en el Software Libre (Campus Party Colombia, 2020)
Mujeres en el Software Libre (Campus Party Colombia, 2020)Mujeres en el Software Libre (Campus Party Colombia, 2020)
Mujeres en el Software Libre (Campus Party Colombia, 2020)
 
MBTI (Myers-Briggs Type Indicator)
MBTI (Myers-Briggs Type Indicator)MBTI (Myers-Briggs Type Indicator)
MBTI (Myers-Briggs Type Indicator)
 
DiSC (Dominance, Influence, Steadiness, Conscientiousness)
DiSC (Dominance, Influence, Steadiness, Conscientiousness)DiSC (Dominance, Influence, Steadiness, Conscientiousness)
DiSC (Dominance, Influence, Steadiness, Conscientiousness)
 
MBTI (Myers-Briggs Type Indicator) [old]
MBTI (Myers-Briggs Type Indicator) [old]MBTI (Myers-Briggs Type Indicator) [old]
MBTI (Myers-Briggs Type Indicator) [old]
 
Mujeres en el Software Libre: El proyecto Debian Women (2015)
Mujeres en el Software Libre: El proyecto Debian Women (2015)Mujeres en el Software Libre: El proyecto Debian Women (2015)
Mujeres en el Software Libre: El proyecto Debian Women (2015)
 
Planets in our Solar System (2015)
Planets in our Solar System (2015)Planets in our Solar System (2015)
Planets in our Solar System (2015)
 
Understanding Debian Packages (2014)
Understanding Debian Packages (2014)Understanding Debian Packages (2014)
Understanding Debian Packages (2014)
 
El Paradigma de la Cultura Libre (2014)
El Paradigma de la Cultura Libre (2014)El Paradigma de la Cultura Libre (2014)
El Paradigma de la Cultura Libre (2014)
 
Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)
Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)
Mnemonic Acronym and Mnemonic Images for Object Oriented Principles (2014)
 
UML Design Class Diagrams (2014)
UML Design Class Diagrams (2014)UML Design Class Diagrams (2014)
UML Design Class Diagrams (2014)
 
Curso de C++ (2014)
Curso de C++ (2014)Curso de C++ (2014)
Curso de C++ (2014)
 
Feminismo en la Red (2013)
Feminismo en la Red (2013)Feminismo en la Red (2013)
Feminismo en la Red (2013)
 
El Software Libre: Una visión global (2012)
El Software Libre: Una visión global (2012)El Software Libre: Una visión global (2012)
El Software Libre: Una visión global (2012)
 

Último

8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCRashishs7044
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMVoces Mineras
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfRbc Rbcua
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCRashishs7044
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Peter Ward
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxsaniyaimamuddin
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCRashishs7044
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Seta Wicaksana
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Pereraictsugar
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchirictsugar
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaoncallgirls2057
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024Adnet Communications
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxmbikashkanyari
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy Verified Accounts
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Servicecallgirls2057
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfJos Voskuil
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Riya Pathan
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03DallasHaselhorst
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFChandresh Chudasama
 

Último (20)

8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR8447779800, Low rate Call girls in Rohini Delhi NCR
8447779800, Low rate Call girls in Rohini Delhi NCR
 
Memorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQMMemorándum de Entendimiento (MoU) entre Codelco y SQM
Memorándum de Entendimiento (MoU) entre Codelco y SQM
 
APRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdfAPRIL2024_UKRAINE_xml_0000000000000 .pdf
APRIL2024_UKRAINE_xml_0000000000000 .pdf
 
8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR8447779800, Low rate Call girls in Saket Delhi NCR
8447779800, Low rate Call girls in Saket Delhi NCR
 
Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...Fordham -How effective decision-making is within the IT department - Analysis...
Fordham -How effective decision-making is within the IT department - Analysis...
 
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptxFinancial-Statement-Analysis-of-Coca-cola-Company.pptx
Financial-Statement-Analysis-of-Coca-cola-Company.pptx
 
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
8447779800, Low rate Call girls in New Ashok Nagar Delhi NCR
 
Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...Ten Organizational Design Models to align structure and operations to busines...
Ten Organizational Design Models to align structure and operations to busines...
 
Kenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith PereraKenya Coconut Production Presentation by Dr. Lalith Perera
Kenya Coconut Production Presentation by Dr. Lalith Perera
 
Marketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent ChirchirMarketplace and Quality Assurance Presentation - Vincent Chirchir
Marketplace and Quality Assurance Presentation - Vincent Chirchir
 
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCREnjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
Enjoy ➥8448380779▻ Call Girls In Sector 18 Noida Escorts Delhi NCR
 
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City GurgaonCall Us 📲8800102216📞 Call Girls In DLF City Gurgaon
Call Us 📲8800102216📞 Call Girls In DLF City Gurgaon
 
TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024TriStar Gold Corporate Presentation - April 2024
TriStar Gold Corporate Presentation - April 2024
 
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptxThe-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
The-Ethical-issues-ghhhhhhhhjof-Byjus.pptx
 
Buy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail AccountsBuy gmail accounts.pdf Buy Old Gmail Accounts
Buy gmail accounts.pdf Buy Old Gmail Accounts
 
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort ServiceCall US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
Call US-88OO1O2216 Call Girls In Mahipalpur Female Escort Service
 
Digital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdfDigital Transformation in the PLM domain - distrib.pdf
Digital Transformation in the PLM domain - distrib.pdf
 
Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737Independent Call Girls Andheri Nightlaila 9967584737
Independent Call Girls Andheri Nightlaila 9967584737
 
Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03Cybersecurity Awareness Training Presentation v2024.03
Cybersecurity Awareness Training Presentation v2024.03
 
Guide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDFGuide Complete Set of Residential Architectural Drawings PDF
Guide Complete Set of Residential Architectural Drawings PDF
 

Risk Management in Citizen Participative Services

  • 1. Policies of the Use of Citizen Participative Services in the Context of Public Administrations Risk Management in Participative Web Miriam Ruiz - Fundación CTIC miriam.ruiz@fundacionctic.org
  • 2. Index Introduction and Global View Services Methodology Dangers Risk Control Examples
  • 4. The Future of the Web ● Web 1.0: People connecting to the Web for Information: Unidirectional from the editors to the readers. ● Web 2.0: People connecting to People: social networks, wikis, colaboration, possibility of sharing. ● Web 3.0: Web applications connecting to other web applications to enrich people's experience.
  • 5. Advantages of Web 2.0 ● Provides a meeting point for all agents involved in the smooth running of society ● Information sharing: knowledge, experiences, suggestions or complaints ● Active collaboration and greater protagonism and involvement of citizens ● Vehicle for providing new ideas to the Public Administration ● Collective generation and gathering of knowledge ● More transparency in the Public Administration ● Continuous improvement of public services
  • 7. Goals ● Develop a methodology to extract the maximum benefit of the web 2.0 paradigm, minimizing its risks ● Have a knowledge as accurate as possible of the web 2.0 phenomenon and its consequences ● Obtain the highest signal/noise ratio possible from the information generated in a decentralized way ● Systematize the design of new web 2.0 services
  • 8. Participants ● Internal Staff: Contractual Relationship, indefinite stay ● Hired Staff: Contractual Relationship, temporary stay ● External People: No contractual relationship, they use the services provided ● Outsiders: No kind of relationship established ● Anonymous People: Unidentified
  • 9. Identification Level ● Absolute identification by direct means: ID Card, Passport or similar. ● Absolute identification by indirect means: Telephone number or similar. ● Weak identification (pseudonym): Alias, e-mail, OpenID or similar. ● Anonymous participation: There is nothing that can identify the person
  • 10. Authentication Level ● Biometric means: Biological Data ● Safe Network: Connection from a controlled Network (Intranet) ● Strong Authentication: e-ID, digital signature, etc. ● Intermediate Authentication: Private secret data ● Weak Authentication: Password ● No Authentication: No authentication
  • 12. Services  Collective generation of information: − Blogs or Weblogs  Other options: Microblogs or nanoblogs, photoblogs, videoblogs or vblogs − Discussion boards − Mailing lists − Wikis − Survey − Comments − Contests
  • 13. Services  Multimedia Contents (photos, audio, video, flash, etc.): − Photo Album or gallery − Podcast − Video Podcast, Vidcast or Vodcast  Collective Classification of Contents: − Evaluation − Tags, folksonomies and tag clouds − Classification systems based on reputation
  • 14. Services  Information Export: − Content syndication (RSS, Atom) − Publishing of information in semantic formats (RDF, RDFa) − Open APIs  Content Integration: − Blog aggregators, planets or metablogs − Mashups or hybrid web applications
  • 15. Services  Relationships between people: − Chat or cybertalk  Instant Messaging  Web Conferences  Audio and Video Conferences  Virtual Worlds − Social Networks  Commercial or Economical Exchanges
  • 17. Risk Management Process  Definition of the Global Strategy  Risk Identification  Initial Risk Evaluation  Planification of measures to reduce the risks  New Risk Evaluation  Risk Control (application of planned measures)  Data Collection  Periodic Review
  • 18. Risk Management Process Global Strategy Data Collection Risk Identification Risk Control Initial Risk Evaluation Final Risk Evaluation Definition of Measures to Control the Risks
  • 19. Risk Calculation Risk = Probability x Impact
  • 20. Quantification of the Probability  High: The hazardous event will happen regularly  Medium: The hazardous event will happen from time to time  Low: The hazardous event will occur rarely  Null: It's extremelly unlikely for the dangerous event to occur
  • 21. Quantification of the Impact  Severe or extremely harmful event: The damage would be very important if the dangerous event happened  Serious or harmful event: The damage would be considerable  Mild or slightly harmful event: The damage would not be too important  Harmless: There would be almost no damage even when the incident occurred
  • 22. Risk Quantification Co nseq uences (impact) M ild Ha rm ful Severe Probability Low Trivial Tolerable Moderate (danger) M edum Tolerable Moderate Important Hig h Moderate Important Intolerable
  • 23. Risk Evaluation Risk = Probability x Impact  T: Trivial (No specific actions are required)  TO: Tolerable (Improvements that do not imply a big cost. Regular checks)  MO: Moderate (Efforts to reduce risk)  I: Important (A new service shall not be started. Prioritize the solution of the problem if the service is already running)  IN: Intolerable (Stop the service inmediately)
  • 25. Dangers  R01: Violation of personal privacy, honor or self-image of people  R02: Revelation and disclosure of secrets or confidential information  R03: Illegal contents or illegal advocacy of crime  R04: Undesired contents or advocacy of undesired activities  R05: Exchanges of attacks or insults  R06: Threats  R07: Continuous psychological harassment  R08: Sexual harassment  R11: Use of the platform for personal or business promotion  R12: Negative advertisement or destructive or negative participation  R13: Irrelevant matters or unrelated to the topic being treated (off- topic)
  • 26. Dangers  R14: Low quality of the contributions  R15: Spreading rumors and false information  R16: Loss of confidence in the service  R17: Loss of credibility of the institution  R18: Forced participation of third parties  R21: Violation of protection rights of personal data  R22: Infringement of intellectual property rights of third persons  R23: Impersonation  R24: Violation of the protection rights of minors  R25: Fraud  R26: Deception or phishing
  • 27. Dangers  R31: SPAM or unsolicited massive messages  R32: Sabotage: malware, virus, trojans, spyware,...  R33: Massive subscription  R34: Massive theft of personal data  R35: Accesibility problems  R41: Low participation  R42: Massive use of the service (“die of success”)  R43: Biased participation or restricted to a part of the population  R44: Emergency of power groups  R51: Inappropriate use in external information services
  • 28. Consequences  Legal: Legal action that could be taken against the organization due to contents published by third persons  Mediatic or Image-related: Potential impact on the media of the contents published in the collaborative services  Economical: Financial or monetary consequences that may affect the organization  Technical: Potential problems of a technical nature that, involuntarily or on purpose, may be caused by other people with their participation  Social: Related to the inherent quality of the service for users
  • 30. Proactive or preventive measures  Definition and information of the conditions of use of the services  Information and appropriate management of personal data  Terms of licensing of the information and published contents  Adequate information to the users of the services  Training the staff of the organization  Collaboration with copyright management organizations  Limiting the involvement of minors  Moderation prior to publication of contents provided by third parties  Automatic filtering based on the format or the content  Use of captchas (semantic or accesible)  Identification and authentication of participants  Restrictions on access to the contents or to participation  Dinamization and motivation from within the community  Proper planning of the starting up of the services
  • 31. Reactive or corrective measures  Removal or modification of already published content  Direct participation in the service by the organization  Collective moderation by the community itself  Canceling of user accounts  Denial of access to a service  Definition of contingency plans  Notification or formal complaints to competent authorities
  • 32. Supervision or monitoring  Active surveillance of published contents by the organization  Warning system to allow the community itself to alert of problems  Availability of an email account for personalized alerts  Active surveillance of impact and contents reuse in external services  Automated mechanisms for review of the published contents
  • 34. Example: Illegal Contents Initial Probability (danger) Initial Consequences (damage) Initial Risk High Harmful Important Proba- Conse- Measures Taken bility quences Identification and authentication of participants ↓ = Moderation based on user's reputation ↓ = Automatic filtering of contents ↓ = Removal of the message = ↓ Warnings from other users = ↓ Final Probability (danger) Final Consequences (damage) Final Risk Medium Mild Moderate
  • 35. Example: SPAM Initial Probability (danger) Initial Impact (damage) Initial Risk High Mild Moderate Proba- Conse- Measures Taken bility quences Identification and authentication of participants ↓ = Moderation based on user's reputation ↓ = Automatic anti-SPAM filtering ↓↓ = Removal of the message = ↓ Warnings from other users = ↓ Final Probability (danger) Final Impact (damage) Final Risk Low Mild Trivial
  • 36. Example: Low Participation Initial Probability (danger) Initial Consequences (damage) Initial Risk High Mild Moderate Proba- Conse- Measures Taken bility quences Identification and authentication of participant ↑ = Moderation based on user's reputation ↑ = Motivate users for participation ↓ = Provide interesting contents from the organization ↓ = Publicize the list ↓ = Final Probability (danger) Final Consequences (damage) Final Risk Medium Mild Tolerable
  • 37. Policies of the Use of Citizen Participative Services in the Context of Public Administrations Risk Management in Participative Web Miriam Ruiz - Fundación CTIC miriam.ruiz@fundacionctic.org
  • 38. Authors  Promoted and developed by: − Gobierno del Principado de Asturias - http://www.asturias.es − CTIC Centro Tecnológico - http://www.fundacionctic.org  Members of the Working Group, in Alphabetical Order: − Eloy Braña Gundin (Principado de Asturias) − Chus García (Fundación CTIC) − Marc Garriga (Ayuntamiento de Barcelona) − Raquel Gisbert (Ayuntamiento de Barcelona) − Mª Carmen Herrera (Principado de Asturias) − Dolors Pou (Xperience Consulting) − Andrés Ramos Gil de la Haza (Bardají & Honrado Abogados) − José Luis Rodríguez (Principado de Asturias) − Miriam Ruiz González (Fundación CTIC)
  • 39. License All the contents included in this work belong to Fundación CTIC and are protected by the intellectual and industrial property rights granted by law. Their use, reproduction, distribution, public communication, availability, processing or any other similar or analogous activity is totally prohibited, except in the cases that are explicitly allowed by the license under which it is published. Fundación CTIC reserves the right to pursue legal action as appropriate against those who violate or infringe their intellectual property and / or industrial rights. This work is published under a Creative Commons license Attribution-ShareAlike 3.0 (CC-by-sa 3.0). To read the text of this license, visit http://creativecommons.org/licenses/by-sa/3.0/