· Easy to use
· Security principles
· Highly available solution
· Speed is critical
· External connections
· Validation workflow
With the application itself we have the culmination of the overall design considerations as well as the continuation of the critical user requirements.
The big design elements that the user won’t touch are the administration validation workflow process that will occur in the background and the connection system that also occurs in the background.
The validation process must be fast. Allowing for the following considerations:
· Repeat submissions in a specific area
· Collaborative evidence (video or newsfeeds etc)
· Unfinished submission (cut off or interrupted)
· False submission – attempt to “mislead system”
· False submission – prank/uninformed
The last two are critical to quickly move from submission to action. Given that some people have a desire to hurt others, they will use an open and anonymous system to flood that system with false and misleading reports to delay response to what they are doing. The first three are also critical the first for trending the second for quick validation. The third is a failsafe designed to capture partial information for collaboration. In cases of abuse, be it genocide or a spouse abusing another spouse, the reality is the abused person seldom has a lot of time to act. Catching and acting on partial submission will be critical.
· Critical data (name or other identifier) must be captured first
· Location can be captured from the IP addressing or physical bounce back of the actual machine the person is using to enter the information
· Type of abuse (free form entry) when I first envisioned this component I thought about a drop down list, but then I realized that list would be so long the person trying to enter would have to scroll far too long to enter any information and that would be a risk.
The last bullet makes me sad. There are so many ways human beings can abuse each other. Why is it that we spend so much time figuring out ways to kill each other?
· Reporter security
· Validator security
· System security
· Quick reporting from the system to social systems (twitter, yammer etc) regarding systematic or wide spread abuses
· Managed reporting to social networks (updates are approved manually to confirm hey are actual problems)
The power of the social media solutions is that they get information out, quickly to a large number of people spread across a large geography.
· Agile report structuring that allows for ad hoc, structured and standard reporting
· Ability to collate a number of “abuse” reports and deliver them quickly to the proper organization, agency or government
· Mapping report (this is already done) that maps instances of issues into areas on a map for visual reporting
Reporting is critical both from a knowledge of problems but also from a tracking abuse to the system.