-
Notifications
You must be signed in to change notification settings - Fork 0
Expand file tree
/
Copy pathfeed.xml
More file actions
442 lines (431 loc) · 66.7 KB
/
feed.xml
File metadata and controls
442 lines (431 loc) · 66.7 KB
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:media="http://search.yahoo.com/mrss/">
<title>verity•think</title>
<link href="https://veritythink.com/feed.xml" rel="self" />
<link href="https://veritythink.com" />
<updated>2026-03-15T18:47:43+01:00</updated>
<author>
<name>Andrej Verity</name>
</author>
<id>https://veritythink.com</id>
<entry>
<title>Optimizing Data for AI Chatbots</title>
<author>
<name>Andrej Verity</name>
</author>
<link href="https://veritythink.com/optimizing-data-for-ai-chatbots/"/>
<id>https://veritythink.com/optimizing-data-for-ai-chatbots/</id>
<updated>2026-01-30T10:00:00+01:00</updated>
<summary type="html">
<![CDATA[
Written with Ralfs Rudzitis January 2026 Read the full report Recent research indicates that advanced AI performance can plummet by up to 59% when processing datasets with common real-world imperfections. As AI chatbots become primary tools for data analysis, providers must transition from "human-readable" to…
]]>
</summary>
<content type="html">
<![CDATA[
<figure class="post__image post__image--left"><a href="https://veritythink.com/media/files/Optimizing Data for AI Chatbots - January 2026.pdf" target="_blank" rel="noopener noreferrer"><img loading="lazy" src="https://veritythink.com/media/posts/5/Cover-Optimizing-Data-for-AI-Chatbots-January-2026-2.jpg" alt="" width="612" height="792" sizes="(max-width: 48em) 100vw, 768px" srcset="https://veritythink.com/media/posts/5/responsive/Cover-Optimizing-Data-for-AI-Chatbots-January-2026-2-xs.jpg 300w ,https://veritythink.com/media/posts/5/responsive/Cover-Optimizing-Data-for-AI-Chatbots-January-2026-2-sm.jpg 480w ,https://veritythink.com/media/posts/5/responsive/Cover-Optimizing-Data-for-AI-Chatbots-January-2026-2-md.jpg 768w ,https://veritythink.com/media/posts/5/responsive/Cover-Optimizing-Data-for-AI-Chatbots-January-2026-2-lg.jpg 1024w ,https://veritythink.com/media/posts/5/responsive/Cover-Optimizing-Data-for-AI-Chatbots-January-2026-2-xl.jpg 1360w ,https://veritythink.com/media/posts/5/responsive/Cover-Optimizing-Data-for-AI-Chatbots-January-2026-2-2xl.jpg 1600w"></figure></a></p>
<p>Written with <a href="https://www.linkedin.com/in/ralfs-rudzitis-a2a582242" target="_blank" rel="noopener noreferrer">Ralfs Rudzitis</a><br>January 2026</p>
<p><strong><a href="https://veritythink.com/media/files/Optimizing Data for AI Chatbots - January 2026.pdf" target="_blank" rel="noopener noreferrer">Read the full report</a></strong></p>
<h2 data-path-to-node="0"> </h2>
<table style="border-collapse: collapse; width: 100%; background-color: #ecf0f1; border-style: none;" border="1">
<tbody>
<tr>
<td style="width: 99.8575%;">
<h2 data-path-to-node="0">AI generated summary</h2>
<p data-path-to-node="3"><span data-path-to-node="3,1"><span class="citation-253">Recent research indicates that advanced AI performance can plummet by up to </span><strong data-path-to-node="3,1" data-index-in-node="76"><span class="citation-253">59%</span></strong><span class="citation-253"> when processing datasets with common real-world imperfections</span></span><span data-path-to-node="3,3">. </span><span data-path-to-node="3,5"><span class="citation-252">As AI chatbots become primary tools for data analysis, providers must transition from "human-readable" to "machine-optimized" data structures to ensure accuracy</span></span><span data-path-to-node="3,7">. </span><span data-path-to-node="3,9"><span class="citation-251">This report, authored by Ralfs Rudzitis and Andrej Verity, provides a technical framework for preparing downloadable datasets that minimize automated errors in high-stakes environments</span></span><span data-path-to-node="3,11">.</span></p>
<p id="p-rc_29d3fd78a0a1a612-104" data-path-to-node="3"></p>
<h3 data-path-to-node="4">Technical Specifications for AI-Ready Datasets</h3>
<p data-path-to-node="5"><span data-path-to-node="5,1"><span class="citation-250">To prevent model hallucinations or system crashes, datasets should ideally remain under </span><strong data-path-to-node="5,1" data-index-in-node="88"><span class="citation-250">25MB</span></strong></span><span data-path-to-node="5,3">. </span><span data-path-to-node="5,5"><span class="citation-249">Structural integrity is paramount: each spreadsheet must contain a single table without merged cells, blank rows, or cryptic abbreviations</span></span><span data-path-to-node="5,7">. </span><span data-path-to-node="5,9"><span class="citation-248">Interestingly, AI models demonstrate higher accuracy with </span><strong data-path-to-node="5,9" data-index-in-node="58"><span class="citation-248">"wide formatting"</span></strong><span class="citation-248">—files containing more columns and fewer rows—rather than "long" datasets</span></span><span data-path-to-node="5,11">. </span><span data-path-to-node="5,13"><span class="citation-247">Providing a dedicated "Read Me" or metadata tab to define column headers further ensures the AI understands the specific context of the information</span></span><span data-path-to-node="5,15">.</span></p>
<p id="p-rc_29d3fd78a0a1a612-105" data-path-to-node="5"></p>
<h3 data-path-to-node="6">Comparative Performance: "Calculator" vs. "Reader" Modes</h3>
<p data-path-to-node="7"><span data-path-to-node="7,1"><span class="citation-246">AI models typically process data through two distinct lenses: </span><strong data-path-to-node="7,1" data-index-in-node="62"><span class="citation-246">Calculator Mode</span></strong><span class="citation-246">, which uses scripts for mathematical precision, and </span><strong data-path-to-node="7,1" data-index-in-node="130"><span class="citation-246">Reader Mode</span></strong><span class="citation-246">, which interprets data contextually like text</span></span><span data-path-to-node="7,3">. </span><span data-path-to-node="7,5"><span class="citation-245">In 2026 benchmarking, </span><strong data-path-to-node="7,5" data-index-in-node="22"><span class="citation-245">Google Gemini 3 Pro</span></strong><span class="citation-245"> was rated "High" for its robust handling of complex datasets, while </span><strong data-path-to-node="7,5" data-index-in-node="110"><span class="citation-245">ChatGPT 5</span></strong><span class="citation-245"> and </span><strong data-path-to-node="7,5" data-index-in-node="124"><span class="citation-245">DeepSeek V3.2</span></strong><span class="citation-245"> faced significant limitations with files exceeding 25-30MB</span></span><span data-path-to-node="7,7">. </span><span data-path-to-node="7,9"><span class="citation-244">Understanding these modal tendencies—where Gemini favors context and ChatGPT favors calculation—allows users to select the right tool for their specific analytical needs</span></span><span data-path-to-node="7,11">.</span></p>
<p id="p-rc_29d3fd78a0a1a612-106" data-path-to-node="7"></p>
<h3 data-path-to-node="8">Strategic Prompting for End-Users</h3>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"><span data-path-to-node="9,1"><span class="citation-243">The quality of AI output is heavily dependent on the "End-User Strategy" employed</span></span><span data-path-to-node="9,3">. </span><span data-path-to-node="9,5"><span class="citation-242">Users are encouraged to utilize </span><strong data-path-to-node="9,5" data-index-in-node="32"><span class="citation-242">"Chain-of-Thought" prompting</span></strong><span class="citation-242">, explicitly asking the AI to "show its work step-by-step" to avoid logical leaps</span></span><span data-path-to-node="9,7">. </span><span data-path-to-node="9,9"><span class="citation-241">Furthermore, defining specific roles (e.g., "Act as a senior financial analyst") and starting fresh chat sessions for new tasks helps manage the AI's "context window," preventing "memory fatigue" that leads to invented or ignored data.</span></span></p>
</td>
</tr>
</tbody>
</table>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
<p id="p-rc_0f5d1bb659606df9-100" data-path-to-node="3"></p>
]]>
</content>
</entry>
<entry>
<title>Future of Cybersecurity and Digital Governance - Quantum Meets AI</title>
<author>
<name>Andrej Verity</name>
</author>
<link href="https://veritythink.com/future-of-cybersecurity-and-digital-governance-quantum-meets-ai/"/>
<id>https://veritythink.com/future-of-cybersecurity-and-digital-governance-quantum-meets-ai/</id>
<updated>2024-07-31T20:45:00+02:00</updated>
<summary type="html">
<![CDATA[
Written with Kyrylo Khutornyi July 2024 Internal report - not released publically The report examines the rapidly evolving cybersecurity environment shaping humanitarian operations, highlighting how emerging technologies - particularly cloud computing, artificial intelligence, and quantum computing - are transforming both risks and defensive capabilities. It…
]]>
</summary>
<content type="html">
<![CDATA[
<p><span style="font-weight: 400;">Written with <a href="https://www.linkedin.com/in/kyrylo-khutornyi/" target="_blank" rel="noopener noreferrer">Kyrylo Khutornyi</a><br>July 2024</span></p>
<p><span style="text-decoration: underline; color: #e03e2d;"><strong>Internal report - not released publically</strong></span></p>
<table style="border-collapse: collapse; width: 100%; background-color: #ecf0f1; border-style: none;" border="1">
<tbody>
<tr>
<td style="width: 99.8575%;">
<div>
<div>
<div>
<h2 data-path-to-node="0">AI generated summary</h2>
<p>The report examines the rapidly evolving cybersecurity environment shaping humanitarian operations, highlighting how emerging technologies - particularly cloud computing, artificial intelligence, and quantum computing - are transforming both risks and defensive capabilities. It underscores that cyber‑threats are increasing in scale and sophistication, with humanitarian organizations facing disproportionate exposure due to resource constraints, legacy systems, and operational work in high‑risk environments. Historical incidents across the humanitarian sector reveal recurring patterns of misconfigurations, credential theft, and exploitation of vulnerable infrastructures, emphasizing the need for proactive and systemic digital resilience.</p>
<p>Cloud adoption continues to offer significant operational advantages, yet new forms of vulnerabilities are emerging through multi‑cloud complexity, misconfigured storage, and server‑side exploits. Meanwhile, the acceleration of AI adoption introduces new categories of risk ranging from unintended data leakage and deepfake‑driven social engineering to adversarial prompt attacks, data poisoning, and model jailbreaks. The growing prevalence of small and edge‑AI models also poses resilience challenges in low‑connectivity “brownfield” environments common in crisis contexts.</p>
<p>Quantum technology represents a longer‑term but increasingly relevant threat vector. While not yet widely accessible, quantum capabilities could eventually undermine modern cryptographic standards and enable new forms of ransomware and anonymized attacks. Although defensive research and post‑quantum cryptography are advancing, humanitarian organizations must prepare for asymmetrical adoption, where threat actors gain technological overmatch sooner than defenders.</p>
<p>To navigate this landscape, the report proposes a readiness framework centered on cross‑domain integration, operational enhancement, anticipatory action, strategic awareness, and long‑term innovation. These principles aim to strengthen governance, embed ethical AI use, support secure cloud adoption, and guide future investment in quantum‑resilient systems. By aligning technical strategy, human capacity, and organizational foresight, humanitarian organizations can better safeguard sensitive data, maintain operational continuity, and build cyber‑resilient digital governance for the decade ahead.</p>
</div>
</div>
</div>
<p id="p-rc_1c6176476976a8d2-319" data-path-to-node="4"></p>
<p id="p-rc_ba6b7649990ad8cc-316" data-path-to-node="5"></p>
<p id="p-rc_4e0aeee5d77124fb-269" data-path-to-node="4"></p>
</td>
</tr>
</tbody>
</table>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
<p id="p-rc_0f5d1bb659606df9-100" data-path-to-node="3"></p>
]]>
</content>
</entry>
<entry>
<title>Possibilities for AI in responding to and forecasting climate change hazards</title>
<author>
<name>Andrej Verity</name>
</author>
<link href="https://veritythink.com/possibilities-for-ai-in-responding-to-and-forecasting-climate-change-hazards/"/>
<id>https://veritythink.com/possibilities-for-ai-in-responding-to-and-forecasting-climate-change-hazards/</id>
<updated>2023-10-01T08:42:00+02:00</updated>
<summary type="html">
<![CDATA[
Written with Sarah Bosscha October 2023 Internal report - not released publically Humanitarian organizations are increasingly turning to data‑driven systems to keep pace with the rising frequency and severity of climate‑related hazards. This report examines how artificial intelligence is reshaping climate‑hazard forecasting and humanitarian action,…
]]>
</summary>
<content type="html">
<![CDATA[
<p><span style="font-weight: 400;">Written with <a href="https://www.linkedin.com/in/sarah-bosscha/" target="_blank" rel="noopener noreferrer">Sarah Bosscha</a><br>October 2023</span></p>
<p><span style="text-decoration: underline; color: #e03e2d;"><strong>Internal report - not released publically</strong></span></p>
<table style="border-collapse: collapse; width: 100%; background-color: #ecf0f1; border-style: none;" border="1">
<tbody>
<tr>
<td style="width: 99.8575%;">
<div>
<div>
<h2 data-path-to-node="0">AI generated summary</h2>
<p>Humanitarian organizations are increasingly turning to data‑driven systems to keep pace with the rising frequency and severity of climate‑related hazards. This report examines how artificial intelligence is reshaping climate‑hazard forecasting and humanitarian action, especially through predictive analytics, early warning systems, and anticipatory financing. It highlights how modern machine‑learning models can process massive datasets - from satellite imagery to environmental sensors - far faster than traditional methods, enabling earlier detection of risks such as floods, cyclones, droughts, and displacement pressures.</p>
<p>A central insight is the transformative role of anticipatory action frameworks. By combining scientific forecasting with pre‑agreed funding triggers, AI‑enabled systems allow humanitarian teams to act before disasters escalate. Several pilots show that automated hazard prediction and simplified operational workflows can accelerate response windows, reduce impact, and increase cost‑efficiency. However, scaling these systems requires improved data quality, stronger operational capacity, and sustained investment in both technology and field‑level readiness.</p>
<p>The report also explores practical applications already in use. Examples include AI models that estimate relief needs for climate‑driven cyclones, systems that predict conflict‑linked displacement linked to environmental anomalies, and simulations that help visualize how climate variables could reshape vulnerabilities over time. Tools such as natural‑language processing, computer vision, and neural‑network‑based climate models demonstrate how AI can streamline information management, assess risk, and automate labor‑intensive analytical tasks.</p>
<p>Despite strong potential, significant challenges remain. Uneven data availability, ethical concerns, trust in automated models, and the limitations of training systems on historical data all affect reliability. Human expertise remains essential, particularly in interpreting local context and grounding automated triggers in real‑world conditions. The report concludes that AI can substantially strengthen humanitarian climate response—especially anticipatory action—if introduced with careful safeguards, adequate funding, and a commitment to simplicity, transparency, and operational usability.</p>
</div>
</div>
<p id="p-rc_1c6176476976a8d2-319" data-path-to-node="4"></p>
<p id="p-rc_ba6b7649990ad8cc-316" data-path-to-node="5"></p>
<p id="p-rc_4e0aeee5d77124fb-269" data-path-to-node="4"></p>
</td>
</tr>
</tbody>
</table>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
<p id="p-rc_0f5d1bb659606df9-100" data-path-to-node="3"></p>
]]>
</content>
</entry>
<entry>
<title>Trust and Disinformation in the Age of AI: A Humanitarian’s Guide to LLMs</title>
<author>
<name>Andrej Verity</name>
</author>
<link href="https://veritythink.com/trust-and-disinformation-in-the-age-of-ai-a-humanitarians-guide-to-llms/"/>
<id>https://veritythink.com/trust-and-disinformation-in-the-age-of-ai-a-humanitarians-guide-to-llms/</id>
<updated>2023-10-01T08:38:00+02:00</updated>
<summary type="html">
<![CDATA[
Written with Katherine Leonard October 2023 Internal report - not released publically Emerging AI systems are transforming how information is produced, shared, and trusted - especially in humanitarian contexts where accuracy and credibility are essential. The rapid rise of large language models has made it…
]]>
</summary>
<content type="html">
<![CDATA[
<p>Written with<span style="color: var(--text-primary-color); font-family: var(--editor-font-family); font-size: inherit; font-weight: var(--font-weight-normal);"> <span style="font-weight: 400;">Katherine Leonard<br></span></span>October 2023</p>
<p><span style="text-decoration: underline; color: #e03e2d;"><strong>Internal report - not released publically</strong></span></p>
<table style="border-collapse: collapse; width: 100%; background-color: #ecf0f1; border-style: none;" border="1">
<tbody>
<tr>
<td style="width: 99.8575%;">
<div>
<h2 data-path-to-node="0">AI generated summary</h2>
<p>Emerging AI systems are transforming how information is produced, shared, and trusted - especially in humanitarian contexts where accuracy and credibility are essential. The rapid rise of large language models has made it easier than ever to generate human‑like text, but these same strengths create new vulnerabilities. Humanitarian practitioners now face a landscape where misinformation can spread unintentionally through well‑meaning use of AI tools, and where disinformation campaigns can be more sophisticated, multilingual, and scalable than anything previously seen.</p>
<p>The report examines how these models work, why they so often produce persuasive but inaccurate content, and how dataset limitations, hallucinations, and built‑in biases can erode trust. It highlights the ease with which malicious actors can circumvent safety guardrails, automate harmful narratives, and exploit AI to fabricate evidence, mimic institutional voices, or amplify conspiracy theories. These capabilities fundamentally reshape the threat environment for humanitarian work, increasing risks for personnel and potentially undermining core principles such as neutrality and impartiality.</p>
<p>At the same time, the analysis stresses that these tools hold meaningful potential. When used responsibly, AI can help humanitarians communicate complex issues more clearly, expand access to trustworthy information, and support monitoring, analysis, and fact‑checking efforts. Because models excel at pattern recognition and generating accessible explanations, they can serve as powerful allies in understanding and countering harmful information flows.</p>
<p>The report concludes with practical recommendations for organizations and field teams: develop clear policies on data use and disclosure, ensure a human‑in‑the‑loop for all AI‑generated outputs, invest in digital literacy and MDH training for local offices, and strengthen interdisciplinary collaboration. Ultimately, the humanitarian sector must balance the risks and opportunities of AI, taking proactive steps to protect trust while leveraging these technologies to strengthen response, communication, and community engagement.</p>
</div>
<p id="p-rc_1c6176476976a8d2-319" data-path-to-node="4"></p>
<p id="p-rc_ba6b7649990ad8cc-316" data-path-to-node="5"></p>
<p id="p-rc_4e0aeee5d77124fb-269" data-path-to-node="4"></p>
</td>
</tr>
</tbody>
</table>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
<p id="p-rc_0f5d1bb659606df9-100" data-path-to-node="3"></p>
]]>
</content>
</entry>
<entry>
<title>Generative AI for Humanitarians</title>
<author>
<name>Andrej Verity</name>
</author>
<link href="https://veritythink.com/generative-ai-for-humanitarians/"/>
<id>https://veritythink.com/generative-ai-for-humanitarians/</id>
<updated>2023-09-30T15:29:00+02:00</updated>
<summary type="html">
<![CDATA[
Written with Nasim Motalebi September 2023 Read the full report The "Generative AI for Humanitarians" report, published in September 2023 by the Digital Humanitarian Network (DH Network) and authored by Nasim Motalebi and Andrej Verity, explores the transformative potential of artificial intelligence in crisis response.
]]>
</summary>
<content type="html">
<![CDATA[
<figure class="post__image post__image--left"><a href="https://veritythink.com/Generative AI for Humanitarians - September 2023.pdf" target="_blank" rel="noopener noreferrer"><img loading="lazy" src="https://veritythink.com/media/posts/7/Generative-AI-for-Humanitarians-cover-September-2023.png" alt="" width="350" height="487" sizes="(max-width: 48em) 100vw, 768px" srcset="https://veritythink.com/media/posts/7/responsive/Generative-AI-for-Humanitarians-cover-September-2023-xs.png 300w ,https://veritythink.com/media/posts/7/responsive/Generative-AI-for-Humanitarians-cover-September-2023-sm.png 480w ,https://veritythink.com/media/posts/7/responsive/Generative-AI-for-Humanitarians-cover-September-2023-md.png 768w ,https://veritythink.com/media/posts/7/responsive/Generative-AI-for-Humanitarians-cover-September-2023-lg.png 1024w ,https://veritythink.com/media/posts/7/responsive/Generative-AI-for-Humanitarians-cover-September-2023-xl.png 1360w ,https://veritythink.com/media/posts/7/responsive/Generative-AI-for-Humanitarians-cover-September-2023-2xl.png 1600w"></figure></a>Written with <a href="https://www.linkedin.com/in/nasim-motalebi/" target="_blank" rel="noopener noreferrer">Nasim Motalebi</a><br>September 2023</p>
<p><strong><a href="https://veritythink.com/Generative AI for Humanitarians - September 2023.pdf" target="_blank" rel="noopener noreferrer">Read the full report</a></strong></p>
<h2 data-path-to-node="0"> </h2>
<table style="border-collapse: collapse; width: 100%; background-color: #ecf0f1; border-style: none;" border="1">
<tbody>
<tr>
<td style="width: 99.8575%;">
<h2 data-path-to-node="0">AI generated summary</h2>
<p data-path-to-node="2"><span data-path-to-node="2,2"><span class="citation-349">The "Generative AI for Humanitarians" report, published in September 2023 by the Digital Humanitarian Network (DH Network) and authored by Nasim Motalebi and Andrej Verity, explores the transformative potential of artificial intelligence in crisis response</span></span><span data-path-to-node="2,4">. </span><span data-path-to-node="2,6"><span class="citation-348">This think-brief serves as a critical stepping stone for humanitarian practitioners and leaders aiming to mainstream Generative AI tools within their organizations</span></span><span data-path-to-node="2,8">. </span><span data-path-to-node="2,10"><span class="citation-347">By examining technical capabilities and trending strategies, the paper provides a roadmap for the safe, ethical, and responsible adoption of AI to augment human capabilities rather than replace them in the field</span></span><span data-path-to-node="2,12">.</span></p>
<p id="p-rc_504b57ead0a591e9-133" data-path-to-node="2"></p>
<h3 data-path-to-node="3"><span data-path-to-node="3,0"><strong data-path-to-node="3,0" data-index-in-node="0">Technical Capabilities and Practical Use Cases</strong></span></h3>
<p data-path-to-node="3"><span data-path-to-node="3,2"><span class="citation-346">Generative AI represents a paradigm shift from traditional models that classify data to foundation models that create brand-new, unique artifacts like text, images, and video</span></span><span data-path-to-node="3,4">. </span><span data-path-to-node="3,6"><span class="citation-345">For humanitarian organizations, these tools offer profound opportunities to enhance internal efficiencies—such as automating administrative work and donor reporting—as well as project-level applications like predicting climate events or analyzing forced migration patterns</span></span><span data-path-to-node="3,8">. </span><span data-path-to-node="3,10"><span class="citation-344">The report details how technologies like Large Language Models (LLMs) and synthetic data generation can drastically reduce workloads, allowing staff to focus on substantive humanitarian issues</span></span><span data-path-to-node="3,12">.</span></p>
<p id="p-rc_504b57ead0a591e9-134" data-path-to-node="3"></p>
<h3 data-path-to-node="4"><span data-path-to-node="4,0"><strong data-path-to-node="4,0" data-index-in-node="0">Addressing Risks: Bias, Ethics, and Transparency</strong></span></h3>
<p data-path-to-node="4"><span data-path-to-node="4,2"><span class="citation-343">Despite the potential, the report underscores significant technical shortcomings including algorithmic bias, misinformation (hallucinations), and data privacy risks</span></span><span data-path-to-node="4,4">. </span><span data-path-to-node="4,6"><span class="citation-342">Because AI models reflect the data they are trained on, they risk encoding and exacerbating historical social stereotypes or producing non-factual information</span></span><span data-path-to-node="4,8">. </span><span data-path-to-node="4,10"><span class="citation-341">The authors emphasize that AI adoption is an accountability and data governance issue, requiring a "human-in-the-loop" approach to ensure outputs align with humanitarian values and legal standards</span></span><span data-path-to-node="4,12">.</span></p>
<p id="p-rc_504b57ead0a591e9-135" data-path-to-node="4"></p>
<h3 id="p-rc_504b57ead0a591e9-136" data-path-to-node="5"><span data-path-to-node="5,0"><strong data-path-to-node="5,0" data-index-in-node="0">The Road to a Humanitarian AI Ecosystem</strong></span></h3>
<p data-path-to-node="5"><span data-path-to-node="5,2"><span class="citation-340">To navigate this landscape, the report introduces "10 Rules of Thumb" and recommends building a robust Humanitarian AI Ecosystem</span></span><span data-path-to-node="5,4">. </span><span data-path-to-node="5,6"><span class="citation-339">This strategic framework focuses on five key pillars: selecting appropriate data and technology, establishing governance and regulations, investing in AI upskilling, implementing continuous evaluation, and fostering multilateral coordination</span></span><span data-path-to-node="5,8">. </span><span data-path-to-node="5,10"><span class="citation-338">By utilizing sandbox environments for safe testing and prioritizing transparency, organizations can harness the power of AI to deliver more effective assistance while remaining unwavering in their commitment to humanitarian principles</span></span></p>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
</td>
</tr>
</tbody>
</table>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
<p id="p-rc_0f5d1bb659606df9-100" data-path-to-node="3"></p>
]]>
</content>
</entry>
<entry>
<title>Data and Security Responsibilities of the Individual Humanitarian</title>
<author>
<name>Andrej Verity</name>
</author>
<link href="https://veritythink.com/data-and-security-responsibilities-of-the-individual-humanitarian/"/>
<id>https://veritythink.com/data-and-security-responsibilities-of-the-individual-humanitarian/</id>
<updated>2023-06-30T15:41:00+02:00</updated>
<summary type="html">
<![CDATA[
Written with Lidewij Heerkens June 2023 Read the full report Published in June 2023 by the Digital Humanitarian Network (DH Network), this report addresses a critical "yawning gap" between high-level organizational data policies and the daily realities faced by humanitarian workers. Authored by Lidewij Heerkens…
]]>
</summary>
<content type="html">
<![CDATA[
<figure class="post__image post__image--left"><a href="https://veritythink.com/Data and Security Responsibilities of the Individual Humanitarian - June 2023.pdf" target="_blank" rel="noopener noreferrer"><img loading="lazy" src="https://veritythink.com/media/posts/8/Data-and-Security-Responsibilities-of-the-Individual-Humanitarian-June-2023.png" alt="" width="916" height="1338" sizes="(max-width: 48em) 100vw, 768px" srcset="https://veritythink.com/media/posts/8/responsive/Data-and-Security-Responsibilities-of-the-Individual-Humanitarian-June-2023-xs.png 300w ,https://veritythink.com/media/posts/8/responsive/Data-and-Security-Responsibilities-of-the-Individual-Humanitarian-June-2023-sm.png 480w ,https://veritythink.com/media/posts/8/responsive/Data-and-Security-Responsibilities-of-the-Individual-Humanitarian-June-2023-md.png 768w ,https://veritythink.com/media/posts/8/responsive/Data-and-Security-Responsibilities-of-the-Individual-Humanitarian-June-2023-lg.png 1024w ,https://veritythink.com/media/posts/8/responsive/Data-and-Security-Responsibilities-of-the-Individual-Humanitarian-June-2023-xl.png 1360w ,https://veritythink.com/media/posts/8/responsive/Data-and-Security-Responsibilities-of-the-Individual-Humanitarian-June-2023-2xl.png 1600w"></figure></a>Written with <a href="https://www.linkedin.com/in/lidewij-heerkens-02319a169/" target="_blank" rel="noopener noreferrer">Lidewij Heerkens</a><br>June 2023</p>
<p><strong><a href="https://veritythink.com/Data and Security Responsibilities of the Individual Humanitarian - June 2023.pdf" target="_blank" rel="noopener noreferrer">Read the full report</a></strong></p>
<table style="border-collapse: collapse; width: 100%; background-color: #ecf0f1; border-style: none;" border="1">
<tbody>
<tr>
<td style="width: 99.8575%;">
<h2 data-path-to-node="0">AI generated summary</h2>
<p data-path-to-node="2"><span data-path-to-node="2,2"><span class="citation-385">Published in June 2023 by the Digital Humanitarian Network (DH Network), this report addresses a critical "yawning gap" between high-level organizational data policies and the daily realities faced by humanitarian workers</span></span><span data-path-to-node="2,4">. </span><span data-path-to-node="2,6"><span class="citation-384">Authored by Lidewij Heerkens and Andrej Verity, the study highlights how inconsistent data security practices across the sector create undeniable risks for vulnerable populations</span></span><span data-path-to-node="2,8">. </span><span data-path-to-node="2,10"><span class="citation-383">By examining the disconnect between outdated mandatory policies and modern field requirements, the report serves as an urgent call to action for international organizations to modernize their approach to digital protection</span></span><span data-path-to-node="2,12">.</span></p>
<p id="p-rc_7d63adbade40858c-141" data-path-to-node="2"></p>
<h3 data-path-to-node="3"><span data-path-to-node="3,0"><strong data-path-to-node="3,0" data-index-in-node="0">The Burden of Individual Responsibility and "Shadow IT"</strong></span></h3>
<p data-path-to-node="3"><span data-path-to-node="3,2"><span class="citation-382">A central finding of the report is the unrealistic burden of responsibility currently placed on individual aid workers</span></span><span data-path-to-node="3,4">. </span><span data-path-to-node="3,6"><span class="citation-381">Many humanitarians rely on personal initiative and their own limited knowledge to secure sensitive data, often resulting in the use of non-approved services—known as "shadow IT"—to overcome inadequate organizational tools</span></span><span data-path-to-node="3,8">. </span><span data-path-to-node="3,10"><span class="citation-380">From using WhatsApp for field communication to managing sensitive files in personal password-protected ZIPs, these inconsistent practices stem from a lack of practical, actionable training and technical support that reflects the complexity of the humanitarian operating environment</span></span><span data-path-to-node="3,12">.</span></p>
<p id="p-rc_7d63adbade40858c-142" data-path-to-node="3"></p>
<h3 data-path-to-node="4"><span data-path-to-node="4,0"><strong data-path-to-node="4,0" data-index-in-node="0">Strategic Recommendations for Cultural and Technical Shifts</strong></span></h3>
<p data-path-to-node="4"><span data-path-to-node="4,2"><span class="citation-379">To mitigate these risks, the report provides a comprehensive roadmap for improvement focused on targeted education and minimizing individual liability</span></span><span data-path-to-node="4,4">. </span><span data-path-to-node="4,6"><span class="citation-378">Key recommendations include replacing "one and done" training with recurring microlearnings, institutionalizing the role of Data Responsibility Officers, and leveraging automation like multi-factor authentication (MFA) to bake security into standard workflows</span></span><span data-path-to-node="4,8">. </span><span data-path-to-node="4,10"><span class="citation-377">Furthermore, the authors advocate for a "humanitarian-centric" approach to data collection: if an organization cannot adequately protect sensitive data, it should not collect or store it in the first place</span></span><span data-path-to-node="4,12">.</span></p>
<p id="p-rc_7d63adbade40858c-143" data-path-to-node="4"></p>
<h3 id="p-rc_7d63adbade40858c-144" data-path-to-node="5"><span data-path-to-node="5,0"><strong data-path-to-node="5,0" data-index-in-node="0">Building a Data-Secure Humanitarian Future</strong></span></h3>
<p data-path-to-node="5"><span data-path-to-node="5,2"><span class="citation-376">Ultimately, the report argues that data security is not just a technical challenge but a "wicked problem" that requires a fundamental cultural shift within the sector</span></span><span data-path-to-node="5,4">. </span><span data-path-to-node="5,6"><span class="citation-375">Moving forward, organizations must prioritize data security in funding decisions and donor reporting to ensure that digital protection becomes as much a priority as physical aid</span></span><span data-path-to-node="5,8">. </span><span data-path-to-node="5,10"><span class="citation-374">By adopting scenario and impact analysis as a standard requirement, the humanitarian community can protect its reputation and, most importantly, prevent real-world harm to the people it serves</span></span><span data-path-to-node="5,12">.</span></p>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
</td>
</tr>
</tbody>
</table>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
<p id="p-rc_0f5d1bb659606df9-100" data-path-to-node="3"></p>
]]>
</content>
</entry>
<entry>
<title>Identifying places - Improving data connectivity through unique identifiers</title>
<author>
<name>Andrej Verity</name>
</author>
<link href="https://veritythink.com/identifying-places-improving-data-connectivity-through-unique-identifiers/"/>
<id>https://veritythink.com/identifying-places-improving-data-connectivity-through-unique-identifiers/</id>
<updated>2022-10-31T15:53:00+01:00</updated>
<summary type="html">
<![CDATA[
Written with Elaine Donderer and Tom Haythornthwaite October 2022 Read the full report The report examines the fundamental role of "P-codes" (place codes) in humanitarian response. Authored by Elaine Donderer, Tom Haythornthwaite, and Andrej Verity, the paper highlights how unique identifiers serve as the "unique key"…
]]>
</summary>
<content type="html">
<![CDATA[
<figure class="post__image post__image--left"><a href="https://veritythink.com/Identifying places - Improving data connectivity through unique identifiers - October 2022.pdf" target="_blank" rel="noopener noreferrer"><img loading="lazy" src="https://veritythink.com/media/posts/10/Identifying-places-Improving-data-connectivity-through-unique-identifiers-October-2022-2.jpg" alt="" width="595" height="842" sizes="(max-width: 48em) 100vw, 768px" srcset="https://veritythink.com/media/posts/10/responsive/Identifying-places-Improving-data-connectivity-through-unique-identifiers-October-2022-2-xs.jpg 300w ,https://veritythink.com/media/posts/10/responsive/Identifying-places-Improving-data-connectivity-through-unique-identifiers-October-2022-2-sm.jpg 480w ,https://veritythink.com/media/posts/10/responsive/Identifying-places-Improving-data-connectivity-through-unique-identifiers-October-2022-2-md.jpg 768w ,https://veritythink.com/media/posts/10/responsive/Identifying-places-Improving-data-connectivity-through-unique-identifiers-October-2022-2-lg.jpg 1024w ,https://veritythink.com/media/posts/10/responsive/Identifying-places-Improving-data-connectivity-through-unique-identifiers-October-2022-2-xl.jpg 1360w ,https://veritythink.com/media/posts/10/responsive/Identifying-places-Improving-data-connectivity-through-unique-identifiers-October-2022-2-2xl.jpg 1600w"></figure></a>Written with <a href="https://www.linkedin.com/in/elaine-donderer-88b6b6183/" target="_blank" rel="noopener noreferrer">Elaine Donderer</a> and <a href="https://www.linkedin.com/in/tom-haythornthwaite-9b3926120/" target="_blank" rel="noopener noreferrer">Tom Haythornthwaite</a><br>October 2022</p>
<p><strong><a href="https://veritythink.com/Identifying places - Improving data connectivity through unique identifiers - October 2022.pdf" target="_blank" rel="noopener noreferrer">Read the full report</a></strong></p>
<table style="border-collapse: collapse; width: 100%; background-color: #ecf0f1; border-style: none;" border="1">
<tbody>
<tr>
<td style="width: 99.8575%;">
<h2 data-path-to-node="0">AI generated summary</h2>
<p data-path-to-node="2"><span data-path-to-node="2,2"><span class="citation-457">The report</span><span class="citation-457"> examines the fundamental role of "P-codes" (place codes) in humanitarian response</span></span><span data-path-to-node="2,4">. </span><span data-path-to-node="2,6"><span class="citation-456">Authored by Elaine Donderer, Tom Haythornthwaite, and Andrej Verity, the paper highlights how unique identifiers serve as the "unique key" that ties complex Geographic Information Systems (GIS) together</span></span><span data-path-to-node="2,8">. </span><span data-path-to-node="2,10"><span class="citation-455">By providing a standardized way to code administrative units and populated places, P-codes enable diverse agencies to exchange and analyze data across different languages and spellings, preventing a waste of resources and duplicated efforts during life-saving missions</span></span><span data-path-to-node="2,12">.</span></p>
<h3 data-path-to-node="3"><span data-path-to-node="3,0"><strong data-path-to-node="3,0" data-index-in-node="0">Lessons Learned: From Kosovo to Ukraine</strong></span></h3>
<p data-path-to-node="3"><span data-path-to-node="3,2"><span class="citation-454">Tracing the history of P-codes back to the 1998–1999 Kosovo War, the report illustrates how these identifiers originated as an inter-agency effort to coordinate rapid needs assessments</span></span><span data-path-to-node="3,4">. </span><span data-path-to-node="3,6"><span class="citation-453">Modern success stories, such as the response to the 2022 military conflict in Ukraine, demonstrate that P-codes remain essential for navigating geographies with duplicate place names and ensuring international actors plan aid for the correct locations</span></span><span data-path-to-node="3,8">. </span><span data-path-to-node="3,10"><span class="citation-452">However, the report also identifies a "yawning gap" where P-codes are often siloed within organizations or developed only at the onset of a disaster, rather than being integrated into national governance and long-term development strategies</span></span><span data-path-to-node="3,12">.</span></p>
<h3 data-path-to-node="4"><span data-path-to-node="4,0"><strong data-path-to-node="4,0" data-index-in-node="0">Overcoming Technical and Political Barriers</strong></span></h3>
<p data-path-to-node="4"><span data-path-to-node="4,2"><span class="citation-451">Despite their benefits, the adoption of unique identifiers faces significant hurdles, including a lack of temporal lineage—where codes do not reflect how boundaries change over time—and the difficulty of aligning specialized data, such as health districts, with standard administrative boundaries</span></span><span data-path-to-node="4,4">. </span><span data-path-to-node="4,6"><span class="citation-450">Furthermore, the report emphasizes the political dimension of defining spaces; imposing top-down identifiers can inadvertently marginalize communities if not done inclusively</span></span><span data-path-to-node="4,8">. </span><span data-path-to-node="4,10"><span class="citation-449">To address this, the authors advocate for an anti-colonial approach to data ownership that accredits national governments and local sources, ensuring the data remains accurate and sustainable</span></span><span data-path-to-node="4,12">.</span></p>
<h3 id="p-rc_0f506ff7c2a0dcfa-160" data-path-to-node="5"><span data-path-to-node="5,0"><strong data-path-to-node="5,0" data-index-in-node="0">A Roadmap for the Future of Geospatial Data</strong></span></h3>
<p data-path-to-node="5"><span data-path-to-node="5,2"><span class="citation-448">Looking ahead, the report suggests that the future of identifying places lies in inter-agency collaboration and the exploration of automated processes like machine learning</span></span><span data-path-to-node="5,4">. </span><span data-path-to-node="5,6"><span class="citation-447">By creating an "inter-agency adapter" to link different coding schemes and prioritizing national ownership of data, the humanitarian community can build a more resilient information infrastructure</span></span><span data-path-to-node="5,8">. </span><span data-path-to-node="5,10"><span class="citation-446">The ultimate goal is to move beyond technical silos and foster a culture where geographic identifiers bring people and disciplines together to improve humanitarian outcomes worldwide</span></span><span data-path-to-node="5,12">.</span></p>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
</td>
</tr>
</tbody>
</table>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
<p id="p-rc_0f5d1bb659606df9-100" data-path-to-node="3"></p>
]]>
</content>
</entry>
<entry>
<title>How Earth Observation Can Enable Anticipatory Action in Humanitarian Crises</title>
<author>
<name>Andrej Verity</name>
</author>
<link href="https://veritythink.com/how-earth-observation-can-enable-anticipatory-action-in-humanitarian-crises/"/>
<id>https://veritythink.com/how-earth-observation-can-enable-anticipatory-action-in-humanitarian-crises/</id>
<updated>2022-10-31T15:47:00+01:00</updated>
<summary type="html">
<![CDATA[
Written with Sarah Whelan October 2022 Read the full report The "How Earth Observation Can Enable Anticipatory Action in Humanitarian Crises" report, published in October 2022 by the Digital Humanitarian Network (DH Network) and authored by Sarah Whelan and Andrej Verity, explores the pivotal role…
]]>
</summary>
<content type="html">
<![CDATA[
<figure class="post__image post__image--left"><a href="https://veritythink.com/How Earth Observation Can Enable Anticipatory Action in Humanitarian Crises - October 2022.pdf" target="_blank" rel="noopener noreferrer"><img loading="lazy" src="https://veritythink.com/media/posts/9/How-Earth-Observation-Can-Enable-Anticipatory-Action-in-Humanitarian-Crises-cover-October-2022-2.jpg" alt="" width="1025" height="1450" sizes="(max-width: 48em) 100vw, 768px" srcset="https://veritythink.com/media/posts/9/responsive/How-Earth-Observation-Can-Enable-Anticipatory-Action-in-Humanitarian-Crises-cover-October-2022-2-xs.jpg 300w ,https://veritythink.com/media/posts/9/responsive/How-Earth-Observation-Can-Enable-Anticipatory-Action-in-Humanitarian-Crises-cover-October-2022-2-sm.jpg 480w ,https://veritythink.com/media/posts/9/responsive/How-Earth-Observation-Can-Enable-Anticipatory-Action-in-Humanitarian-Crises-cover-October-2022-2-md.jpg 768w ,https://veritythink.com/media/posts/9/responsive/How-Earth-Observation-Can-Enable-Anticipatory-Action-in-Humanitarian-Crises-cover-October-2022-2-lg.jpg 1024w ,https://veritythink.com/media/posts/9/responsive/How-Earth-Observation-Can-Enable-Anticipatory-Action-in-Humanitarian-Crises-cover-October-2022-2-xl.jpg 1360w ,https://veritythink.com/media/posts/9/responsive/How-Earth-Observation-Can-Enable-Anticipatory-Action-in-Humanitarian-Crises-cover-October-2022-2-2xl.jpg 1600w"></figure></a>Written with <a href="https://www.linkedin.com/in/sarwhelan/" target="_blank" rel="noopener noreferrer">Sarah Whelan</a><br>October 2022</p>
<p><strong><a href="https://veritythink.com/How Earth Observation Can Enable Anticipatory Action in Humanitarian Crises - October 2022.pdf" target="_blank" rel="noopener noreferrer">Read the full report</a></strong></p>
<table style="border-collapse: collapse; width: 100%; background-color: #ecf0f1; border-style: none;" border="1">
<tbody>
<tr>
<td style="width: 99.8575%;">
<h2 data-path-to-node="0">AI generated summary</h2>
<p data-path-to-node="2"><span data-path-to-node="2,2"><span class="citation-421">The "<em>How Earth Observation Can Enable Anticipatory Action in Humanitarian Crises</em>" report, published in October 2022 by the Digital Humanitarian Network (DH Network) and authored by Sarah Whelan and Andrej Verity, explores the pivotal role of satellite technology in modern crisis management</span></span><span data-path-to-node="2,4">. </span><span data-path-to-node="2,6"><span class="citation-420">As climate change increases the severity and frequency of disasters, the report argues that being proactive—rather than reactive—saves lives, preserves dignity, and reduces operational costs</span></span><span data-path-to-node="2,8">. </span><span data-path-to-node="2,10"><span class="citation-419">By leveraging five decades of satellite data, humanitarian organizations can now establish clear "triggers" for action, allowing pre-arranged funding and aid to be released before a predicted crisis hits its peak</span></span><span data-path-to-node="2,12">.</span></p>
<p id="p-rc_214e4019beffae33-149" data-path-to-node="2"></p>
<h3 data-path-to-node="3"><span data-path-to-node="3,0"><strong data-path-to-node="3,0" data-index-in-node="0">Leveraging Diverse Data Streams for Targeted Aid</strong></span></h3>
<p data-path-to-node="3"><span data-path-to-node="3,2"><span class="citation-418">The report details how various Earth observation (EO) data streams, including land imagery and meteorological forecasts, fill critical gaps in remote areas where local data collection is limited</span></span><span data-path-to-node="3,4">. </span><span data-path-to-node="3,6"><span class="citation-417">High-resolution land imagery allows for precise infrastructure mapping and population density analysis, which helps practitioners plan evacuation corridors and pre-position resources</span></span><span data-path-to-node="3,8">. </span><span data-path-to-node="3,10"><span class="citation-416">Furthermore, multispectral observation tools like the Normalized Difference Vegetation Index (NDVI) and soil moisture estimates serve as "proxies" for food insecurity, enabling early intervention in gradual-onset crises like drought</span></span><span data-path-to-node="3,12">.</span></p>
<p id="p-rc_214e4019beffae33-150" data-path-to-node="3"></p>
<h3 data-path-to-node="4"><span data-path-to-node="4,0"><strong data-path-to-node="4,0" data-index-in-node="0">Navigating Challenges: Beyond Technical Solutionism</strong></span></h3>
<p data-path-to-node="4"><span data-path-to-node="4,2"><span class="citation-415">While the potential of EO data is vast, the authors caution against "technological solutionism" and emphasize that data is not a silver bullet</span></span><span data-path-to-node="4,4">. </span><span data-path-to-node="4,6"><span class="citation-414">Significant challenges remain, including the need to manage stakeholder expectations, move beyond small-scale pilot projects, and account for how climate change is altering the historical patterns used for prediction</span></span><span data-path-to-node="4,8">. </span><span data-path-to-node="4,10"><span class="citation-413">The report underscores that for these systems to be effective, they must be "humanitarian-centric," combining objective data with local, indigenous expertise and "human sensors" on the ground to ensure aid is culturally and contextually appropriate</span></span><span data-path-to-node="4,12">.</span></p>
<p id="p-rc_214e4019beffae33-151" data-path-to-node="4"></p>
<h3 id="p-rc_214e4019beffae33-152" data-path-to-node="5"><span data-path-to-node="5,0"><strong data-path-to-node="5,0" data-index-in-node="0">A Multi-Sectoral Value Chain for Future Resilience</strong></span></h3>
<p data-path-to-node="5"><span data-path-to-node="5,2"><span class="citation-412 interactive-span-hovered">The path forward requires a robust "EO Data Value Chain" where scientists, engineers, and humanitarian practitioners collaborate across sectors</span></span><span data-path-to-node="5,4">. </span><span data-path-to-node="5,6"><span class="citation-411">The report highlights that no single organization can manage every aspect of anticipatory action; instead, success depends on a symbiotic relationship between development and humanitarian work</span></span><span data-path-to-node="5,8">. </span><span data-path-to-node="5,10"><span class="citation-410">By institutionalizing peer review frameworks and continuous monitoring, the humanitarian community can build the trust and reliability necessary to mainstream Earth observation as a standard tool for global disaster resilience</span></span><span data-path-to-node="5,12">.</span></p>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
</td>
</tr>
</tbody>
</table>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
<p id="p-rc_0f5d1bb659606df9-100" data-path-to-node="3"></p>
]]>
</content>
</entry>
<entry>
<title>The Humanitarian Sector & Digital Identity: Are We Affecting Refugee’s Self-Identities?</title>
<author>
<name>Andrej Verity</name>
</author>
<link href="https://veritythink.com/the-humanitarian-sector-and-digital-identity-are-we-affecting-refugees-self-identities/"/>
<id>https://veritythink.com/the-humanitarian-sector-and-digital-identity-are-we-affecting-refugees-self-identities/</id>
<updated>2022-09-30T16:10:00+02:00</updated>
<summary type="html">
<![CDATA[
Written with Zoey Zhang September 2022 Read the full report The report explores the complex intersection of digital identification technologies and the sociological self-concept of displaced populations. Authored by Zoey Zhang and Andrej Verity, the study investigates whether mandatory digital IDs—often required for life-saving assistance—alter a refugee’s…
]]>
</summary>
<content type="html">
<![CDATA[
<figure class="post__image post__image--left"><a href="https://veritythink.com/The Humanitarian Sector & Digital Identity - Are We Affecting Refugee's Self-Identities - September 2022.pdf" target="_blank" rel="noopener noreferrer"><img loading="lazy" src="https://veritythink.com/media/posts/12/The-Humanitarian-Sector-and-Digital-Identity-Are-We-Affecting-Refugees-Self-Identities-September-2022-2.png" alt="" width="924" height="1342" sizes="(max-width: 48em) 100vw, 768px" srcset="https://veritythink.com/media/posts/12/responsive/The-Humanitarian-Sector-and-Digital-Identity-Are-We-Affecting-Refugees-Self-Identities-September-2022-2-xs.png 300w ,https://veritythink.com/media/posts/12/responsive/The-Humanitarian-Sector-and-Digital-Identity-Are-We-Affecting-Refugees-Self-Identities-September-2022-2-sm.png 480w ,https://veritythink.com/media/posts/12/responsive/The-Humanitarian-Sector-and-Digital-Identity-Are-We-Affecting-Refugees-Self-Identities-September-2022-2-md.png 768w ,https://veritythink.com/media/posts/12/responsive/The-Humanitarian-Sector-and-Digital-Identity-Are-We-Affecting-Refugees-Self-Identities-September-2022-2-lg.png 1024w ,https://veritythink.com/media/posts/12/responsive/The-Humanitarian-Sector-and-Digital-Identity-Are-We-Affecting-Refugees-Self-Identities-September-2022-2-xl.png 1360w ,https://veritythink.com/media/posts/12/responsive/The-Humanitarian-Sector-and-Digital-Identity-Are-We-Affecting-Refugees-Self-Identities-September-2022-2-2xl.png 1600w"></figure></a>Written with <a href="https://www.linkedin.com/in/zoey-zhang-251a7a176/" target="_blank" rel="noopener noreferrer">Zoey Zhang</a> September 2022</p>
<p><strong><a href="https://veritythink.com/The Humanitarian Sector & Digital Identity - Are We Affecting Refugee's Self-Identities - September 2022.pdf" target="_blank" rel="noopener noreferrer">Read the full report</a></strong></p>
<table style="border-collapse: collapse; width: 100%; background-color: #ecf0f1; border-style: none;" border="1">
<tbody>
<tr>
<td style="width: 99.8575%;">
<h2 data-path-to-node="0">AI generated summary</h2>
<p data-path-to-node="1"><span data-path-to-node="1,1"><span class="citation-529">The report</span><span class="citation-529"> explores the complex intersection of digital identification technologies and the sociological self-concept of displaced populations</span></span><span data-path-to-node="1,3">. </span><span data-path-to-node="1,5"><span class="citation-528">Authored by Zoey Zhang and Andrej Verity, the study investigates whether mandatory digital IDs—often required for life-saving assistance—alter a refugee’s sense of belonging, culture, or nationalism</span></span><span data-path-to-node="1,7">. </span><span data-path-to-node="1,9"><span class="citation-527">While digital identity provides essential access to services for the undocumented, the research highlights a critical tension: these systems can either empower individuals by recognizing their existence or further marginalize them through digital surveillance and "function creep"</span></span><span data-path-to-node="1,11">.</span></p>
<p id="p-rc_20765557b8f2efd5-173" data-path-to-node="1"></p>
<p data-path-to-node="2"><span data-path-to-node="2,1"><span class="citation-526">From a sociological perspective, identity is multifaceted, shaped by social roles, cultural history, and collective commonalities</span></span><span data-path-to-node="2,3">. </span><span data-path-to-node="2,5"><span class="citation-525">The report finds that while a person’s social situation changes drastically during displacement, there is no decisive evidence that a </span><strong data-path-to-node="2,5" data-index-in-node="134"><span class="citation-525">digital humanitarian ID</span></strong><span class="citation-525"> fundamentally replaces or diminishes their primary self-identity</span></span><span data-path-to-node="2,7">. Instead, the impact is highly contextual. </span><span data-path-to-node="2,9"><span class="citation-524">For example, Rohingya refugees have protested IDs that categorize them as "forcibly displaced" because it codifies their exclusion from both their home and host countries, effectively divesting their identity from their ethnicity and nation</span></span><span data-path-to-node="2,11">.</span></p>
<p id="p-rc_20765557b8f2efd5-174" data-path-to-node="2"></p>
<p id="p-rc_20765557b8f2efd5-175" data-path-to-node="3"><span data-path-to-node="3,1"><span class="citation-523">The report concludes with urgent recommendations for humanitarian organizations to move beyond technical efficiency and prioritize the </span><strong data-path-to-node="3,1" data-index-in-node="135"><span class="citation-523">psychological and societal well-being</span></strong><span class="citation-523"> of end-users</span></span><span data-path-to-node="3,3">. </span><span data-path-to-node="3,5"><span class="citation-522">It emphasizes that the success of digital identity is largely dependent on a host country’s political will and economic inclusiveness</span></span><span data-path-to-node="3,7">. </span><span data-path-to-node="3,9"><span class="citation-521">Key suggestions include advocating for policies that allow refugees to access national civil services, improving transparency regarding data usage, and forming strategic partnerships with fields like </span><strong data-path-to-node="3,9" data-index-in-node="200"><span class="citation-521">Digital Sociology</span></strong><span class="citation-521"> to better understand the long-term impacts of living in digital exile</span></span><span data-path-to-node="3,11">.</span></p>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
</td>
</tr>
</tbody>
</table>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
<p id="p-rc_0f5d1bb659606df9-100" data-path-to-node="3"></p>
]]>
</content>
</entry>
<entry>
<title>Where Technology Meets Ethics - The Humanitarian Principles and Their Problematic Relationship to Technology</title>
<author>
<name>Andrej Verity</name>
</author>
<link href="https://veritythink.com/where-technology-meets-ethics-the-humanitarian-principles-and-their-problematic-relationship-to-technology/"/>
<id>https://veritythink.com/where-technology-meets-ethics-the-humanitarian-principles-and-their-problematic-relationship-to-technology/</id>
<updated>2022-09-30T15:59:00+02:00</updated>
<summary type="html">
<![CDATA[
Written with Oscar Tequeda September 2022 Read the full report The "Information Age" is rapidly deconstructing long-held humanitarian truths and challenging the sector's traditional moral frameworks. As technology and data become central to aid delivery, the humanitarian sector faces a critical "evolutionary" moment similar to…
]]>
</summary>
<content type="html">
<![CDATA[
<figure class="post__image post__image--left"><a href="https://veritythink.com/Where Technology Meets Ethics - The Humanitarian Principles and Their Problematic Relationship to Technology - September 2022.pdf" target="_blank" rel="noopener noreferrer"><img loading="lazy" src="https://veritythink.com/media/posts/11/Where-Technology-Meets-Ethics-The-Humanitarian-Principles-and-Their-Problematic-Relationship-to-Technology-September-2022-2.jpeg" alt="" width="794" height="1123" sizes="(max-width: 48em) 100vw, 768px" srcset="https://veritythink.com/media/posts/11/responsive/Where-Technology-Meets-Ethics-The-Humanitarian-Principles-and-Their-Problematic-Relationship-to-Technology-September-2022-2-xs.jpeg 300w ,https://veritythink.com/media/posts/11/responsive/Where-Technology-Meets-Ethics-The-Humanitarian-Principles-and-Their-Problematic-Relationship-to-Technology-September-2022-2-sm.jpeg 480w ,https://veritythink.com/media/posts/11/responsive/Where-Technology-Meets-Ethics-The-Humanitarian-Principles-and-Their-Problematic-Relationship-to-Technology-September-2022-2-md.jpeg 768w ,https://veritythink.com/media/posts/11/responsive/Where-Technology-Meets-Ethics-The-Humanitarian-Principles-and-Their-Problematic-Relationship-to-Technology-September-2022-2-lg.jpeg 1024w ,https://veritythink.com/media/posts/11/responsive/Where-Technology-Meets-Ethics-The-Humanitarian-Principles-and-Their-Problematic-Relationship-to-Technology-September-2022-2-xl.jpeg 1360w ,https://veritythink.com/media/posts/11/responsive/Where-Technology-Meets-Ethics-The-Humanitarian-Principles-and-Their-Problematic-Relationship-to-Technology-September-2022-2-2xl.jpeg 1600w"></figure></a>Written with <a href="https://www.linkedin.com/in/oscar-tequida-598865221/" target="_blank" rel="noopener noreferrer">Oscar Tequeda</a><br>September 2022</p>
<p><strong><a href="https://veritythink.com/Where Technology Meets Ethics - The Humanitarian Principles and Their Problematic Relationship to Technology - September 2022.pdf" target="_blank" rel="noopener noreferrer">Read the full report</a></strong></p>
<table style="border-collapse: collapse; width: 100%; background-color: #ecf0f1; border-style: none;" border="1">
<tbody>
<tr>
<td style="width: 99.8575%;">
<h2 data-path-to-node="0">AI generated summary</h2>
<p data-path-to-node="2"><span data-path-to-node="2,2"><span class="citation-497">The "Information Age" is rapidly deconstructing long-held humanitarian truths and challenging the sector's traditional moral frameworks</span></span><span data-path-to-node="2,4">. </span><span data-path-to-node="2,6"><span class="citation-496">As technology and data become central to aid delivery, the humanitarian sector faces a critical "evolutionary" moment similar to the Age of Enlightenment, where rigid adherence to absolute moral claims could lead to institutional decline</span></span><span data-path-to-node="2,8">. </span><span data-path-to-node="2,10"><span class="citation-495">This report by Oscar Tequida and Andrej Verity warns that the time for theorizing has ended; the sector must now act to reconcile its core ethical principles with the practical realities of modern technology</span></span><span data-path-to-node="2,12">.</span></p>
<p id="p-rc_45a55618b3c33632-165" data-path-to-node="2"></p>
<h3 data-path-to-node="3"><span data-path-to-node="3,0"><strong data-path-to-node="3,0" data-index-in-node="0">The Conflict of Traditional Principles</strong></span></h3>
<p data-path-to-node="3"><span data-path-to-node="3,2"><span class="citation-494">The report argues that the four traditional humanitarian principles—Humanity, Neutrality, Impartiality, and Independence—were not designed with modern technology in mind and often provide conflicting guidance</span></span><span data-path-to-node="3,4">. </span><span data-path-to-node="3,6"><span class="citation-493">For example, the principle of </span><strong data-path-to-node="3,6" data-index-in-node="30"><span class="citation-493">Humanity</span></strong><span class="citation-493"> may demand the use of rapid data-tracking tools to save lives from starvation, even if doing so raises ethical concerns about data privacy</span></span><span data-path-to-node="3,8">. </span><span data-path-to-node="3,10"><span class="citation-492">Conversely, </span><strong data-path-to-node="3,10" data-index-in-node="12"><span class="citation-492">Neutrality</span></strong><span class="citation-492"> is increasingly impossible in a landscape where technology is intrinsically linked to state politics and private corporate interests</span></span><span data-path-to-node="3,12">.</span></p>
<p id="p-rc_45a55618b3c33632-166" data-path-to-node="3"></p>
<h3 data-path-to-node="4"><span data-path-to-node="4,0"><strong data-path-to-node="4,0" data-index-in-node="0">Proposed Ethical Framework for the Information Age</strong></span></h3>
<p data-path-to-node="4"><span data-path-to-node="4,2"><span class="citation-491">To navigate these complexities, the authors suggest a more flexible "Semper Gumby" (always flexible) approach to moral reasoning</span></span><span data-path-to-node="4,4">. This involves adopting four additional principles to guide technological partnerships:</span></p>
<p id="p-rc_45a55618b3c33632-167" data-path-to-node="4"></p>
<ul>
<li data-path-to-node="5,0,1"><span data-path-to-node="5,0,1,0"><strong data-path-to-node="5,0,1,0" data-index-in-node="0"><span class="citation-490">Consistency:</span></strong><span class="citation-490"> Maintaining steady efforts to adapt to technological change while maximizing aid</span></span><span data-path-to-node="5,0,1,2">.</span></li>
<li data-path-to-node="5,1,1"><span data-path-to-node="5,1,1,0"><strong data-path-to-node="5,1,1,0" data-index-in-node="0"><span class="citation-489">Maneuverability:</span></strong><span class="citation-489"> Staying flexible enough to pivot through the rapid shifts of the Information Age</span></span><span data-path-to-node="5,1,1,2">.</span></li>
<li data-path-to-node="5,2,1"><span data-path-to-node="5,2,1,0"><strong data-path-to-node="5,2,1,0" data-index-in-node="0"><span class="citation-488">Transparency:</span></strong><span class="citation-488"> Openness regarding moral reasoning and corporate agreements, especially when they are problematic</span></span><span data-path-to-node="5,2,1,2">.</span></li>
<li data-path-to-node="5,3,1"><span data-path-to-node="5,3,1,0"><strong data-path-to-node="5,3,1,0" data-index-in-node="0"><span class="citation-487">Failure:</span></strong><span class="citation-487"> Embracing failure as a natural, necessary consequence of progress and experimentation.</span></span></li>
</ul>
<h3 id="p-rc_45a55618b3c33632-172" data-path-to-node="6"><span data-path-to-node="6,0"><strong data-path-to-node="6,0" data-index-in-node="0">Data Rights and Practical Implementation</strong></span></h3>
<p data-path-to-node="6"><span data-path-to-node="6,2"><span class="citation-486">The report concludes that data is the "currency of the 21st century" and must be managed by experts who understand its technical nuances rather than generalists</span></span><span data-path-to-node="6,4">. </span><span data-path-to-node="6,6"><span class="citation-485">Using the controversial World Food Programme (WFP) and Palantir partnership as a case study, the authors highlight how a lack of technical fluency and transparency can lead to sector-wide friction</span></span><span data-path-to-node="6,8">. </span><span data-path-to-node="6,10"><span class="citation-484">By implementing a decentralized yet unified "confederate-type" structure for data governance, the sector can better safeguard "demographically identifiable information" (DII) while still leveraging powerful tools to alleviate suffering</span></span><span data-path-to-node="6,12">.</span></p>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
</td>
</tr>
</tbody>
</table>
<p id="p-rc_29d3fd78a0a1a612-107" data-path-to-node="9"></p>
<p id="p-rc_0f5d1bb659606df9-100" data-path-to-node="3"></p>
]]>
</content>
</entry>
</feed>