alajous@mit.edu's blog

Getting information from the influenza epidemic in Mexico through cellphones

Submitted by alajous@mit.edu on Tue, 05/19/2009 - 18:11.

This is an ongoing research project, please do not cite since all the information is preliminary

The main problem for the Mexican authorities and the scientific community regarding the recent influenza pandemic is that Mexico has limited capabilites to accumulate information from citizens regarding the spread of the H1NI virus. This is due to two factors 1) the limited physical resources of the Mexican health services, and 2) the limited knowldege about viral diseases in Mexico among the population. This means that the government does not have the necessary staff to detect infected people, and that infected people don't recognize flu symptoms.

More information on the people infected by the virus would give public health officials the possibility of calculating the epidemic curve of the virus, the rate of contagion, and maybe the mortality rate.

Considering these limitations and possibilities, SMS seemed to offer a good method for getting massive information from the population.

One Mexican cellphone company agreed to carry out the project, sending 1 million SMS around the country for the academic purposes of a group of researchers at the Harvard School of Public Health and Mexico's Secretary of Healthy. The technology used was a combination of SMS and USSD.

On May 12, 1 million subscribers received and SMS asking them to participate in a survey conducted by the Secretary of Health by entering a code which opened the USSD session in the company's network. (USSD sessions have no costs for the user)

The questions were the following:

1) Did you have a fever accompanied by cough, and throat ache?
1. Yes, 2. No
2) Please remember the approximate date when the fever started and type a number
(i.e. 16)
3) Did these symptoms incapacitate you to go to work, study or take care of your family?
1. Yes, 2. No
4) Apart from yourself how many people got flu symptoms during the month of April in your family?
(i.e.2)
5) Did you get vaccinated against flu last year?
6) What is your age?

If the first question was answered "No" then the session jumped directly to question 4.

The response rate was around 5.6% (56000 people) which is relatively low, although a large number regarding this type of information. Preliminary analysis of the information shows that it may be prove useful, except for that fact that in many cases the answers regarding dates were the date used by the example (16).

SMS (+ contact name) -> Twitter!

Submitted by alajous@mit.edu on Wed, 04/15/2009 - 16:25.

This script automatically sends every SMS recieved on the phone to a Twitter account where the number of the phone from where it was originally sent and the content of the SMS appear on Twitter. (For it to work you need to setup the Twitter SMS service in you Twitter account)

From what I presented in class I made a small modification after Chris' "I am wearing a tutu" SMS (Twitter: andreslajous, I am wearing a tutu) so that it now would say "andreslajous, Chris dice (spanish for says) : I am wearing a tutu".

import inbox, e32, appuifw, messaging
global i
global id

#exit function


app_lock=e32.Ao_lock()
def quit():
app_lock.signal()
appuifw.app.exit_key_handler=quit

#this retrieves the content of the received sms


id=0
def cb(id_cb):
global id
id=id_cb
i=inbox.Inbox()
data1 = i.address(id)
data2 = i.content(id)
#this sends the retreived content to Twitter's SMS service


messaging.sms_send("40404", u" %s dice: %s " % (data1, data2))
i=inbox.Inbox()
i.bind(cb)
app_lock.wait()

Protecting sex-workers from violence in Tanzania

Submitted by alajous@mit.edu on Tue, 03/17/2009 - 18:37.

Description of the project

The present project has the objective of establishing a pilot experiment where two kinds of applications involving the use of cell phone technology would be used in a cohort of sex-workers in the city of Mwanza Tanzania.

The two applications are designed to provide sex workers with a private co-sex worker’s list that would benefit each member by exchanging information about their physical location when they are confronted with violent clients.

1. The system has a phone side component that is based on a count-down application which prompts the user to enter the location and number of hours she will be with the client. The information would only be distributed to a network of friends in the event that the application is not stopped. The phone would send an emergency SMS directly to a list of friends alerting them in real time about a possible danger situation.
2. The second phone side component is based on an application that allows users to send data on potential dangerous individuals to be stored in a server and the information can be retrieved by subscribers to the server list. Both types of applications require secure distribution of the information and are not designed to be used by the government services, but are available to NGOs that may provide support.

Rationale

It is well established that government based support to prevent violence is scarce and sub-optimal in Tanzania, and that community based organization is required to solve many of the problems faced in this society including violence prevention. Information regarding violence against women is hard to standardize because of underreporting. In the case of Tanzania 19% of the women in Dar es Salaam reported being subject of physical violence by someone other than their partner.(WHO, 2004). Although the information is not particular to women related to the sex industry, it does tell us something about the general context of women in the country.

According to the WHO there are several factors that increase the risk of being subjects of violence. Among them are:

− financial autonomy,
− level of empowerment and social support,
− employment status,
− the degree of economic inequality between men and women,
− and attitudes toward gender roles.

Considering these risk factors, sex-workers appear to be in a continuously precarious situation. Because of the structure of their occupation all this risks seem to be augmented by being present at the same time. Although a full-scale solution for violence would have to go deeper into the causes and solutions for these risk factors, empowerment and social support can be increased by the creation of networks and the enhancement of information sharing in the short term. We believe that the use of wireless technology can achieve this and help sex-workers reduce the risk of being subjected to gender-based violence.

Materials and Methods

We built three applications, two phone-based, and one server-based.

The server-based application is a cell-phone based social network that takes in “bad date reports” from sex workers. The bad date reports are then sent out immediately (in real time) to members of the reporter's friends (as defined by the social network—coming soon), and also logged in a database. Newcomers, and those already in the system, can make use of the database by searching it for keywords. The idea is that sex workers will enter client violence information in free-form, for example by sending a text message saying “Australian blonde named Steve tried to hit me at Joe's Bar. He was refusing to wear condoms, and got unhappy when I insisted. Joe's wife helped me sneak out the back.” A new sex worker can then come along, and search the database for this message by any of the key words, for example, “getinfo Steve” or “getinfo Australian” will get him/her the previous message that was entered.

SMS interface: Since SMS's are packaged up, and delivered via email, the server-based application is currently email based. In our tests, we were able to email to the programmer's cell-phone, by using the email gateway address of his cellphone “XXX@tmomobile.com” for a cell-phone XXX and t-mobile service carrier. The current reporting system uses cfa.baddate@gmail.com as it's sms recipient. In a field deployment, the system would want to use an actual number. This can be fed in through a GSM modem into python, and python can call a simple “process” function in our server in order to process these text messages.

Database: As the application is built as a proof of concept, the database used is a simple python dictionary that is saved in a file using the cPickle library. The cPickle library simply generates text encodings of objects. In a real implementation, one would want to use a real database like SQL to do operations.

“Social Network”: In order to determine who your friends are, there needs to be some sort of “social network” that needs to be built up on the server. The social network can be of differing varieties, and we explored three possibilities, which we can call the list-serve variety, the twitter variety, and the facebook variety. In the list-serve variety, there are entities which we can call list-serves that people can sign up to. Whenever somebody signs up to a list-serve, they become “friends” with everybody else on the list-serve. The facebook idea is that people can sign up friends directly, rather than using a list-serve as an intermediary. However, since this idea assumes that friendships are reciprocal, we would need a confirmation process. The third idea is that I can decide who's friend I am, but not who is my friend. This is the twitter idea—in that I can decide who to listen to, but not (directly) who listens to me. No confirmation is ostensibly required, but more user control needs to be built into the system.
The current system is based on the list-serve idea, again as proof of concept. The code is easy to modify into a twitter style friend network, or even a facebook-style friend network, even though that is more complicated. Two types of messages “add X” and “lists” are devoted to the implementation of the social network. “add X” adds you the sender to listserve X, and “lists” returns the list-serves that you currently belong to.

Feedback: The motivation for the server app is that it can store information that sex workers put in, and deliver it back to them in the future. The way to relay back information is again complicated, and calls for some ingenuity and experimentation. The current system simply searches all text messages for the user's query, and returns back the latest-by-date text message that has that query string in it. Other ideas could be: return the last N text messages sent regarding this query, use technologies such as SMS find to find appropriate answers, or have NGO curators looking at the database, and for each keyword (example: Australian, Steve, skinny, etc), make a summary text message that sex workers would get back when that keyword was queried. Again, the program is built to be easily modifiable to do any of the above things.

Phone-based Applications

The two phone-based applications are meant to further strengthen the sex worker community and encourage them to work together for their safety.

Emergency Callback

The first phone-based application is an Emergency Callback system modeled on a mobile phone system in use on some university campuses in the US. For example when the user is about to walk home to their dorm from a night out they enter into the mobile application the amount of time it should reasonably take them to get there. If the timer reaches the preset time limit and the user has not canceled the countdown then the system notifies campus security with their number and location and they try to call the user to see if they are alright. If no response then they go looking for the user. Our system operates in a similar manner based on a simple timer countdown. It can be used when a sex worker is walking home for the night or can be used to estimate how long they should reasonably be with a client before someone should check in on them. Because the local police are at best ignoring sex workers and at worse contributing to their abuse and exploitation our system notifies the users “social network” sending an SMS to all their friends either added locally on the phone from their list of contacts or via an SMS to the bad date reporting server which would then send out the message to the “social network”. In addition, since we cannot rely on sex workers’ cell-phones to be GPS enabled or network provided cell ID information we decided to use a simple prompt when entering the countdown time to also ask for their probable location.

Bad Date Reporting

The second phone-based application is to work in conjunction with the bad date reporting server. The open manner in which the bad date server receives reports is very useful in keeping the system flexible. However, victims of physical and sexual assault can be emotionally traumatized and have difficulty providing useful information in a strictly voluntary unprompted manner. For this reason we developed a simple cell-phone-based application that prompts the user for pertinent information about the incident.

1. Name of the client
2. Nationality of the client
3. Physical description (long hair, tattoos, etc.)
4. Location of assault
5. Date and time of assault
6. Was a weapon used? If so what kind

The above information is consolidated into an SMS with each answer separated by a delineator that is then sent to the bad date reporting server. Five or six questions seemed the appropriate number to ask, asking too many or too detailed questions can actually cause the victim to re-live the incident which can be difficult and potentially turn victims off from completing a report or using the system again in the future. Having a formatted series of questions with the answers delineated in the SMS makes the information easier to parse on the server side.

Cell phone penetration and providers in Tanzania

In Tanzania, the teledensity has been increasing from one per cent in 2000 to 25 per cent in 2008. Currently, there are six licensed mobile phone operators — Tanzania Telecommunications Company Ltd (TTCL), Zantel, Zain, Tigo, Vodacom and Benson.

Cell phones are ideal tools for a mobile team and the equipment is less likely to be stolen compared with laptops or personal digital assistants. Cell phones don’t stick out in the field because from an outside observer, it looks like a sex-workers is just making a phone call. Therefore protecting this group from possible police investigation of retaliation from violent clients.

However, there is a limitation to the use of cell phones because of the cost of the service in relation to the per capita income of the country. In fact Tanzania is one of the countries with the most expensive services according to the ITU, which calculated the cost of 25 monthly calls and 30 SMS at around 33% of the per capita income. In consequence cellphone penetration is not very high at 24 lines per 100 inhabitants.
Review of the literature on using cell phones for health interventions

Applications involving the phone and the Internet have been described previously in literature. For example, Voxiva developed Alerta, a system that involves the phone and the Internet for communication and disease surveillance. Alerta was piloted initially in health clinics of the Ministry of Health in Peru, and later in October, 2002 http://www.prevenperu.org Voxiva platform for health solutions have been deployed in Latin America, Africa, Iraq, and India. For example, in Africa, Voxiva created a national HIV/AIDS information system for eight countries that monitors current data for national and global reporting requirements, and manages the use of antiretrovirals to reduce the spread of viral resistance. In India, Voxiva created, within a month, a surveillance system for Japanese encephalitis http://www.voxiva.net/. In South Africa, the project Cell Life http://www.cell-life.org/ is using cell phones to monitor adherence for the management of HIV/AIDS in patients on antiretroviral therapy. Some of the platforms Cell Life is using include a global system for mobile communications (GSM), wireless Internet gateway (WIG), and a geographical information system (GIS) database. Karras et al. reported in the procedures of the AMIA Symposium that a Java-enabled wireless phone could be potentially used in disaster response and public health informatics. They emphasized that the technology was inherently deployable, portable and that minimal orientation to new hardware was needed since everyone was comfortable with entering numbers on a phone keypad and pushing the send button. But not often these applications in data collection emphasize that communities should have access to the data generated nor there are sufficient planning in implementing the use of the data by the communities.

Alternativa: Overcoming obstacles for non-party politics in Mexico

Submitted by alajous@mit.edu on Tue, 03/17/2009 - 17:04.

Alternativa is a political organization in Mexico that is trying to do politics outside of the party system

1. A closed political system

Although Mexico has regular elections where there is some degree of competition since the mid-nineties, access to the political system for non-professional politicians is very limited. For example to compete in any election you have to be supported by a political party, and the prerequisites to form a political party are very high. (you need around 200,000 signatures plus territorial organization in 2/3 of the country).
A the national level only political parties can legally buy access to electronic media, organizations or individuals that are not parties cannot buy time for political ads. In print media, it costs around 25, 000 dollars to buy ad space. At the local level participation in politics is inhibited by decentralized political violence and clientelism.
Three big parties control most elections throughout the country, and the few small parties that have some regional presence become appendixes of the three big parties.
Internet is not used in particularly creative ways for politics. Around 20 million people in Mexico have access to the internet, out of a 105 million. Although there are 75 million cellphone lines.

2. Alternativa

Alternativa was a political party that participated in the 2006 presidential elections with the only woman running for president, Patricia Mercado. Unexpectedly her campaign had some degree of success because it managed to link local mobilization with national politics. The campaign had very limited resources in comparison to the three big parties, but still it was able to get almost 3% of the national vote and some representation in congress.
a) In this link you can see the type of campaigning that was done. Mostly in plazas and universities with little equipment and without resources for mobilizing supporters.
http://video.google.com/videoplay?docid=952559187931430179&hl=es
b) In this other link you can se the tv ad that was made after the presidential debate. It was a famous ad because it was really cheap to make, and it used the participation of the other candidates to make a point.
http://www.youtube.com/watch?v=h8HGzV9H2_4
(If you don't speak Spanish: Patricia Mercado says, "Mexico is ready for having a woman as president" and then all the other candidates say "I agree with Patricia" all phrases which were taken from the debate where they said it regarding different topics).

3. Kicked-out!

Exactly a year ago (march 16) during a party convention to elect the new chair-person of the party, a minority in the party allied with the big parties, hired a group a thugs and beat up the group that opposed these alliances. The expelled group was not only the majority of activists, but also most of the founders including Patricia Mercado.
(If you understand Spanish you can look at the following videos made by a newspaper using images from cellphones. These videos were very important because they link the party officials with mercenaries.
http://www.youtube.com/watch?v=9IgybGM78g0
http://www.youtube.com/watch?v=GGI0Mvu6F1Q ). After they took control of the party they kicked out everyone linked to the founders of the party, and changed its name. Now these guys get the public funding.

4. What’s next?

After leaving the party, some of the founders decided to reorganize to participate in politics, but outside of the party system. In Mexico there are few examples of this, but the ones that have been done have been fairly effective (i.e. the Zapatistas). This image alternativa is of an event made by Alternativa where the “monument for the revolution” was covered on “revolution day” to represent the urge to leave traditional politics in the past. The main message was: “less partyocracy, more citizenship” (To appreciate the size of the thing, compare the size of a person, to the monument).

5. Three projects to link local mobilization with national politics.

At the moment Alternativa is trying to develop three projects centered in accountability before july 5, when mid-term elections will take place:

a) Open-space debates between candidates in some districits.
b) A public evaluation and “negative campaigning” of the worst candidates (regarding either, their past careers linked to corruption chareges, or on some particular proposals like death penalty).
c) 500 citizens, following 500 congressmen for a year. Each citizen would commit to generate and share information about a single congressman during a year.