Bribecaster: documenting bribes through community participation

Corruption is endemic in many emerging economies - many transactions of private citizens with government institutions require payment of bribes. While well known as a general phenomenon, specific data about the "bribe economy" are hard to come by. But such data are needed for rational responses to corruption at the societal and individual level - to expose it; to know which offices to avoid; or to know how much to pay if other recourse is not available. In response to a corruption survey of 102 Indian participants we are developing Bribecaster, a mobile application that enables citizen collection and curation of corruption data. A key research question is how to create a system that has accurate data while simultaneously protecting users from repercussions of having their identities revealed.

[1]  B. Hussien,et al.  Computer-Access Security Systems Using Keystroke Dynamics , 1990, IEEE Trans. Pattern Anal. Mach. Intell..

[2]  Fabian Monrose,et al.  Keystroke dynamics as a biometric for authentication , 2000, Future Gener. Comput. Syst..

[3]  F. Reichheld The one number you need to grow. , 2003, Harvard business review.

[4]  Edward D. Lazowska,et al.  Designing an Architecture for Delivering Mobile Information Services to the Rural Developing World , 2006, Seventh IEEE Workshop on Mobile Computing Systems & Applications (WMCSA'06 Supplement).

[5]  Daniel Treisman,et al.  What have we learned about the causes of corruption from ten years of crossnational empirical research? , 2007 .

[6]  Ron Kohavi,et al.  Practical guide to controlled experiments on the web: listen to your customers not to the hippo , 2007, KDD '07.

[7]  Daniel Treisman,et al.  What Have We Learned About the Causes of Corruption from Ten Years of Cross-National Empirical Research? , 2007 .

[8]  Aniket Kittur,et al.  Crowdsourcing user studies with Mechanical Turk , 2008, CHI.

[9]  Bing Liu,et al.  Opinion spam and analysis , 2008, WSDM '08.

[10]  Vladimiro Sassone,et al.  Trust in Anonymity Networks , 2010, CONCUR.

[11]  K. Basu Why, for a Class of Bribes, the Act of Giving a Bribe should be Treated as Legal , 2011 .

[12]  Jeffrey Heer,et al.  SpanningAspectRatioBank Easing FunctionS ArrayIn ColorIn Date Interpolator MatrixInterpola NumObjecPointI Rectang ISchedu Parallel Pause Scheduler Sequen Transition Transitioner Transiti Tween Co DelimGraphMLCon IData JSONCon DataField DataSc Dat DataSource Data DataUtil DirtySprite LineS RectSprite , 2011 .

[13]  Edward Cutrell,et al.  Designing a phone broadcasting system for urban sex workers in India , 2011, CHI.

[14]  Claire Cardie,et al.  Finding Deceptive Opinion Spam by Any Stretch of the Imagination , 2011, ACL.