|
Monika Büscher, Sarah Becklake, Catherine Easton, Xaroula Kerasidou, Rachel Oliphant, Katrina Petersen, et al. (2016). ELSI Guidelines for Networked Collaboration and Information Exchange in PPDR and Risk Governance. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: Networked collaboration and information exchange technologies have transformative potential for PPDR and risk governance. However, it is difficult to shape these transformations in a way that supports real world practices of collaboration and sense-making, and it is even more difficult to do so in ways that are ethically, legally and socially sensitive and proactive. This paper presents efforts to construct Ethical, Legal and Social Issues or ?ELSI? Guidelines for Networked Collaboration and Information Exchange in PPDR. The Guidelines would facilitate Risk Governance and serve as a living community resource to support the design and use of IT for PPDR and Risk Governance.
|
|
|
Catherine Easton. (2016). Information Systems for Crisis Response and Management: The EU Data Protection Regulation, Privacy by Design and Certification. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: With technological development in crisis management reaching a point at which there is wide-scale aggregation of data, including social media, there is a need to focus strongly upon the position of end users in order to uphold data protection principles. Recent wide-ranging European Union legal reforms, finalized in 2016, have enshrined the concept of data protection by design and paved the way for certification schemes to validate compliance. There is a need for those involved with the practical development of information systems for crisis management to understand these new developments and determine their practical implications. This paper presents a critical analysis of the reforms, focusing on the interplay between the law and technological design and predicting their impact on crisis management system development.
|
|
|
Catherine Easton, & Monika Büscher. (2015). The role of the privacy impact assessment in IT Innovation in Crises: An Example. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Privacy Impact Assessments (PIA) are increasingly used and, in certain jurisdictions, legally mandated in projects to foresee risks to privacy and to plan strategies to avoid these. Once adopted and implemented, the EU?s Data Protection Regulation will, in certain circumstances require the need for a PIA. This short paper focuses upon the PIA process in an EU-funded project to develop cloud-based disaster response technology. It introduces the project and then gives a background to the PIA process. Insights and observations are then made on how the PIA operates, with the aim of drawing conclusions that can both improve the current project and be transferable to others.
|
|
|
Monika Büscher, Catherine Easton, Maike Kuhnert, Christian Wietfeld, Matts Ahlsén, Jens Pottebaum, et al. (2014). Cloud ethics for disaster response. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 284–288). University Park, PA: The Pennsylvania State University.
Abstract: In emergencies, exceptions to data protection raise concerns that data may become available to unexpected actors during and after a crisis, resulting in privacy intrusion and social sorting. Apart from ethical issues, there are legal issues, for example around data minimization and issues around social and cultural practices of sharing information. This paper explores key ethical, legal and social issues (ELSI) in utilizing cloud computing for disaster response and management and some examples of innovative design.
|
|
|
Catherine Easton. (2014). The digital divide, inclusion and access for disabled people in IT supported emergency response systems: A UK and EU-based analysis. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 275–278). University Park, PA: The Pennsylvania State University.
Abstract: This short insights paper examines IT Supported Emergency Response systems from the perspective of the digital divide and access for disabled people. It is argued that inclusive design is often overlooked in the development of emergency systems and this can lead to increased marginalisation of certain societal groups, such as disabled people and older people. Given the importance of equality of provision in relation to emergency responses there is a need to examine accessibility policy in this area to determine whether it enables the equal participation of all. This is important both in relation to the ability to access key information in an emergency situation and to participate in crowdsourced data generation to help in the targeting of resources, both at the time of an emergency and in subsequent planning. This insights paper takes both a practical and theoretical approach and focuses upon key policies emanating from the EU and UK.
|
|