Disclosed herein are systems and methods for facilitating the usage of an
online workforce to remotely monitor security-sensitive sites and report
potential security breaches.In some embodiments, cameras are configured
to monitor critical civilian infrastructure, such as water supplies and
nuclear reactors. The cameras are operatively connected to a central
computer or series of computers, and images captured by the cameras are
transmitted to the central computer. After initially registering with the
central computer, Guardians "log on" to a central website hosted by the
central computer and monitor the images, thereby earning compensation. In
one embodiment, images of "no-man" zones--areas where no humans or
vehicles should be present or monitored--are sent to Guardians for a
simple determination of whether or not a human exists in the picture.
Site owners compensate the operator of the computer system for this
monitoring service, and the operator in turn compensates Guardians based
on, for example, (i) the amount of time spent monitoring, and/or (ii) the
degree of a given Guardian's responsiveness to real or fabricated
security breaches.Among other things, systems and methods are disclosed
herein for facilitating (a) the registration of monitored sites, (b) the
registration of Guardians, and (c) the management of monitoring sessions,
including the routing of real and fabricated images to Guardians, the
rating of Guardians, and the compensation of Guardians. Many additional
and alternative embodiments are contemplated, including the following
example of one embodiment.