User Journey: Bounty Provider

Bounty Provider

1. Dashboard Overview

  • Initial Setup: Upon logging in, Bounty Providers are greeted with a dashboard overview that displays their current balance, active bounties, pending validations, and a summary of past activities.

  • Support Access: A prominent "Help & Support" section is available, offering quick access to tutorials, FAQs, and the option to contact Technical Support.

2. Creating a Bounty

  • Start a New Bounty: Providers click a “Create New Bounty” button to initiate the process.

  • Define Bounty Details:

  • Paper Selection: If targeting a specific paper, they can search for it using the paper's title, DOI, DID, or author name(s). For broader bounties, they may create a set of papers, select fields of research, or keywords.

  • Bounty Criteria: Providers select a specific bounty-level or higher category from the Common Academic Weakness Enumeration (CAWE). They may also specify the evidence required for a claim and any specific criteria to guide Bounty Validators.

  • Validation Criteria: Providers can set a threshold of validator acceptance for a claim to be considered approved. If they are the sole validator, then the criterion would be 1 out of 1. However, other thresholds could be set, such as 3 out of 5, 5 out of 7 or other ratios of yes/no validator votes.

  • Reward Amount: They specify the bounty amount, which is then escrowed from their wallet to ensure trust and commitment.

  • Deadline: A submission deadline is set, after which no new claims will be accepted.

  • Educational Prompt: At each step, tooltips and pop-up guides offer explanations and best practices, helping providers to create effective and clear bounties.

3. Bounty Review and Publication

  • Preview and Submit: Before submission, providers review a summary of their bounty, making any necessary adjustments.

  • Approval Process: Upon submission, the bounty may go through a quick review by Bounty Validator bots to ensure it meets platform standards and ethical guidelines. This step is communicated as a quality control measure rather than a gatekeeping process.

  • Publication: Once approved, the bounty is published on the platform and becomes visible to Bounty Hunters, General Audience and other key user groups. Providers receive a notification of the publication along with a direct link to their bounty.

4. Monitoring and Management

  • Dashboard Updates: The provider's dashboard updates in real-time with the status of active bounties, including the number of claims submitted and pending review.

  • Interactions with Bounty Hunters: Providers can opt to receive notifications when claims are made and can view summaries or detailed reports of each submission.

  • Adjustments and Extensions: Providers have the option to adjust bounty details (e.g., increasing the reward or extending the deadline) if initial engagement is low, subject to platform policies and possibly a review process.

5. Bounty Completion and Payout

  • Validation and Payout: Once a claim is validated by Bounty Validators or through an automated process involving validation bots, the platform automatically processes the payout from the escrowed funds to the successful Bounty Hunter.

  • Feedback and Review: Providers are encouraged to provide feedback on the bounty process and outcomes, contributing to the continuous improvement of the platform.

6. Support and Education

  • Throughout the process, Technical Support and User Education specialists are available for consultation via live chat, email, or scheduled calls to assist with any questions or challenges. Interactive webinars and workshops are also periodically offered to educate providers about best practices in creating and managing bounties.

Last updated