Web Mapping of Improvised Explosive Device (Ied) Incidents in Kenya
Abstract
This project reviewed existing Improvised Explosive Device (IED) Incidents data from different sources, cleaned it up and used the data to develop a reliable IED incidents geodatabase for Kenya. This database was then used to develop an interactive web-map that renders the incident data objects to users through the web. The web deployment enhances access of the data by stakeholders, and also promotes corroborative building, and enhancing of the database by allowing users to contribute data and also point out observations upon exploring the data hosted and served through the web Mapping System.
During the project conception, user needs assessment was conducted, and the user requirements used to design the geodatabase, and inform the elements and functionalities of the envisaged IED Web Mapping System (MapIED). Database Entity Relation Diagrams (ERD) were generated using LucidChart software, and the webpage Graphic User Interface (GUI) prototype developed using Figma software. This was used to get user feedback and further enhance the design.
The MapIED System was then developed using Python Django Application to develop the backend of the system and the REST Application Programming Interface (API). On the other hand, Angular application (Open source software by Google Inc.) was used to develop the frontend of the system. The result was a robust Web Mapping System, that in addition to similar systems (e.g. Armed Conflict Location & Events Data - ACLED) is more specific (to IED mapping) and detailed, more corroborative (through user incident reporting functionality), and captures other valuable incident information such as media/incident images and technical reports (by Explosive Ordinance Teams) which are not available in other such mapping systems.
This is a valuable system that upon deployment, has the potential to provide stakeholders with valuable IED incident information, including trends, emplacement patterns, and device constructs. This information is critical is assessing the adversary’s Tactics, Techniques and Procedures (TTPs) and responding with appropriate Counter-IED measures to address the IED threat in Kenya.
It is recommended that at the onset, the system be deployed within a closed network, within the existing Multi-Agency Security framework and then progressively expanded to take in other stakeholders. This is to allow for development of appropriate access security protocols for its deployment outside the mainstream security sector, so as to safeguard the sensitive IED data.
Publisher
University of Nairobi
Rights
Attribution-NonCommercial-NoDerivs 3.0 United StatesUsage Rights
http://creativecommons.org/licenses/by-nc-nd/3.0/us/Collections
The following license files are associated with this item: