|
Aarland, M., Radianti, J., & Gjøsæter, T. (2023). Using System Dynamics to Simulate Trust in Digital Supply Chains. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 516–529). Omaha, USA: University of Nebraska at Omaha.
Abstract: The power industry is outsourcing and digitalising their services to provide better, faster, and more reliable supply of electric power to the society. As a result, critical infrastructure increases in complexity and tight couplings between multiple suppliers and systems in digital supply chains. It also introduces new risks and challenges that are difficult to manage for critical infrastructure owners. To address the vulnerability in digital supply chains, we have developed a system dynamics model that represent important challenges to manage cybersecurity in digital supply chains, based on input from an expert group in the power industry. The system dynamics model illustrates how trust in suppliers as well as the need for control play important roles in outsourcing. Scenarios were developed and simulated.
|
|
|
Shoshana Altschuller, & Raquel Benbunan-Fich. (2008). Potential antecedents to trust in ad hoc emergency response virtual teams. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 254–264). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: This research explores the potential determinants of trust in newly formed virtual teams to better inform the choice of communication media for virtual emergency response groups for which interpersonal trust is crucial. Results of a laboratory experiment indicate that the way that communicants view their teammates and themselves as part of that team is significantly correlated with the level of trust that they experience. Impression formation, public self-awareness, perceived social presence, and self-disclosure are all found to have significant correlations with trust among ad hoc teammates. It is therefore recommended that the design of emergency response communication systems include features to foster these feelings thereby promoting trust among teammates. Our results are applicable to ad hoc emergency teams who interact for a period of time to address relief and recovery efforts after a major disaster or emergency.
|
|
|
Monika Büscher, Preben Holst Mogensen, & Margit Kristensen. (2008). When and how (not) to trust IT? Supporting virtual emergency teamwork. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 167–176). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: In this paper we use the formative evaluation of a prototype 'assembly' of pervasive computing technologies to specify design implications for emergency virtual teamwork tools. The prototype assembly, called “Overview”, was implemented in collaboration with police, fire and medical emergency services as part of the real life event management during the Tall Ships' Races 2007 in Denmark. We describe how the emergency teams used the technologies for collaboration between distributed colleagues, to produce shared situation awareness, to manage efforts and resources and respond to minor emergencies. Trust in technology is a key need virtual teams identify in their endeavours to dovetail innovative technologies into emergency work. We show how practices of working up trust are supported by the PalCom open architecture (which was used to build Overview), and delineate design guidelines to enable the productive integration of pervasive computing.
|
|
|
Carole Adam, & Eric Andonoff. (2019). Vigi Flood: a serious game for understanding the challenges of crisis communication. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Emergency managers receive communication training about the importance of being ?first, right and credible?,
which is not easy. For instance, in October 2018, the Aude department in the South-West of France was hit by
intense rain. Flash floods were hard to forecast and only the ?orange? level of vigilance could be raised initially, but
the population dismissed this very usual warning in that season. The ?red? level was then raised too late, leading
to high criticism. The main problem here is the loss of trust induced by too many ?false alarms?. In this paper
we propose a serious game called VigiFlood for raising awareness in the population about the difficulty of crisis
communication and their own responsibility for reacting to the alerts. The implemented game still has limited
functionality but already shows interesting results in helping the user to visualise and understand the trust dynamics
|
|
|
Carolyn Huston, Jennifer Davis, Petra Kuhnert, & Andrew Bolt. (2023). Creating Trusted Extensions to Existing Software Tools in Bushfire Consequence Estimation. In V. L. Thomas J. Huggins (Ed.), Proceedings of the ISCRAM Asia Pacific Conference 2022 (pp. 25–34). Palmerston North, New Zealand: Massey Unversity.
Abstract: Bushfire modelling has advanced with wildfire simulators such as Spark and Phoenix Rapidfire that can generate plausible fire dynamics and simulations that decision-makers can easily explore. With extreme weather impacting the Australian landscapes through the onset of droughts and heatwaves, it is becoming more important to make decisions rapidly from fire simulations. An element of this decision-making process is trust, in which the decision-maker feels empowered to make decisions from models of complex systems like fire. We propose a framework for decision-making that makes use of a fire emulator, a surrogate version of Spark, to facilitate faster exploration of wildfire predictions and their uncertainties under a changing climate. We discuss the advantages and next steps of an emulator model using the mechanisms and conditions framework, a powerful vocabulary and design framework that builds in trust to allow users of a technology to understand and accept the features of a system.
|
|
|
Fiona Jennet McNeill, Diana Bental, Jeremy Bryans, Paolo Missier, & Jannetta Steyn. (2018). Informing decision makers: facilitating communication and trust for decision makers during crises. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 1133–1135). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: This paper describes our approach to facilitating automated data sharing during a crisis management scenario. There are a number of reasons why this is difficult, of which we are addressing two of the main ones. Firstly, data in different organisations (and organisations) is mismatched in that different terminology, structure, specificity and data formats are used, so automated comprehension of data is problematic. Secondly, is that it is hard to assess the trustworthiness of data from other organisations. We have developed data-matching and provenance-based solutions to these problems individually. In this paper, we discuss how best these approaches can be integrated so that decision makers can quickly and automatically be presented with data to match, or approximately match, their data needs, together with the right information for them to understand the quality and meaning of this data, and introduce the CEM-DIT (Communication for Emergency Management through Data Integration and Trust) system.
|
|
|
Thomas Foulquier, & Claude Caron. (2010). Towards a formalization of interorganizational trust networks for crisis management. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: As the concept of trust has found its way into the crisis management literature, many questions remain to be addressed, among which that of its integration with information technology, and its relevance for improving collaboration in a crisis management environment. We propose in this paper that a sub category of social networks, interpersonal trust networks between organisations, may have a significant influence on the management of a crisis by organizations, and that their formalization by technology can help manage such networks and prepare for potential crises. Following a review of trust in the crisis management context, we link trust's organizing properties to crisis management case studies and present our rationale for formalizing trust networks in an information system. We consider the technological artifact produced before the crisis by formalizing interpersonal, interorganizational trust relationships will constitute an element for collective sensemaking by parties involved in the management of a crisis.
|
|
|
Matti Haataja, Markku Häkkinen, & Helen T. Sullivan. (2011). Understanding user acceptance of mobile alerting systems. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Even though the adoption of emergency alerting systems may improve the safety and security of individuals, participation in existing systems that utilize mobile alerting in universities in USA varies and does not match the high adoption rate of mobile phone technology itself (Sullivan, Häkkinen & Piechocinski 2009; Wu, 2009). As the adoption of mobile alerting system (MAS) can be viewed as a critical life safety benefit, there is motivation to better understand factors that affect the acceptance of MAS. Among the possible, alternative methods of implementing mobile alerting, an opt-in type of system can enable the alerting process to be executed in a way that is more suitable and useful for a diverse community of individuals. As a result of this study, a refined version of technology acceptance model (TAM) is proposed, extended with factors of perceived trust and perceived financial cost to better interpret the acceptance of MAS. This model is being evaluated in ongoing research on MAS in a university and community context.
|
|
|
John Sabou, & Simeon Videlov. (2016). An Analysis on the Role of Trust in Digital Humanitarian Actor Networks. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: This paper explores the difficulties of collaboration between Volunteer and Technical Communities (V&TCs) and Humanitarian Response Organisations (HROs). The phenomenon of digital volunteers and their role in collecting and analyzing social media data provided by disaster affected populations has brought unprecedented opportunities and challenges to the humanitarian system. Central to these processes are the risks and vulnerabilities that these transformations might bring to existing humanitarian actors. Thus, this paper draws upon the work of Anthony Giddens regarding trust to account for the ongoing relational dynamics, and the unpacking of both it's institutional and inter-personal dimensions. The paper identifies two major approaches underlying their collaborative efforts. The first approach concerns a top-down and centralized process of developing a institutionalized forms of interfacing; while the second concerns the development of interpersonal relational infrastructure.
|
|
|
Lauren C. Landrigan, Allen Milewski, & Jason Baker. (2010). Determining credible sources during an emergency situation. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: An important aspect of working in an emergency operations center (EOC) is determining what information is credible and what actions to take based on that information. Information during an emergency may come from various sources and EOC workers may not know the information providers personally. Information may come from electronic sources where the exact source of the information may be unknown and credibility may be affected. For this study, we conducted ethnographic interviews with emergency management subject matter experts to gain insights on credibility. The interviews included a series of questions to learn about the current processes of an EOC, what sources generally provide information about the situation and what factors determine credibility. These interviews are ongoing and this paper provides a summary of the interviews completed at this point. The expected outcome of this study is a potential software system with features to enhance credibility despite weak source information.
|
|
|
Linda Plotnick, Starr Roxanne Hiltz, Sukeshini Grandhi, & Julie Dugdale. (2018). Real or Fake? User Behavior and Attitudes Related to Determining the Veracity of Social Media Posts. In Kristin Stock, & Deborah Bunker (Eds.), Proceedings of ISCRAM Asia Pacific 2018: Innovating for Resilience – 1st International Conference on Information Systems for Crisis Response and Management Asia Pacific. (pp. 439–449). Albany, Auckland, New Zealand: Massey Univeristy.
Abstract: Citizens and Emergency Managers need to be able to distinguish “fake” (untrue) news posts from real news posts on social media during disasters. This paper is based on an online survey conducted in 2018 that produced 341 responses from invitations distributed via email and through Facebook. It explores to what extent and how citizens generally assess whether postings are “true” or “fake,” and describes indicators of the trustworthiness of content that users would like. The mean response on a semantic differential scale measuring how frequently users attempt to verify the news trustworthiness (a scale from 1-never to 5-always) was 3.37. The most frequent message characteristics citizens' use are grammar and the trustworthiness of the sender. Most respondents would find an indicator of trustworthiness helpful, with the most popular choice being a colored graphic. Limitations and implications for assessments of trustworthiness during disasters are discussed.
|
|
|
Lixiong Chen, Monika Buscher, & Yang Hu. (2019). On Liquid Ground: Contesting the facts around Shouguang Flood on Weibo. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: As one of the most well-known social media platforms in China, Weibo provides an online public sphere. During the 2018 Shouguang flood, many people who were affected converged on the platform to discuss the disaster. The government ? the highest emergency management authority ? was accused of using censorship and other measures to suppress the coverage of the disaster. Based on an analysis of 34 qualitative interviews with Weibo users, of which nine directly address the Shouguang floods, this paper examines how three major actors contested facts and responsibilities during the disaster. Focusing on the state-censored, market-moderated social media context in China, our ongoing study provides new insights into a universal challenge of managing diverging interpretations and expectations in risk communication. We show that the establishing and framing of facts is inherently ethical and political. Time, time-space compression, liability and scales of risk responsibility emerge as critical points of friction. We draw on theories of risk governance, public discourse, computer supported collaborative work, and media studies for analysis and to articulate avenues for design.
|
|
|
Kathleen A. Moore, Andrea H. Tapia, & Christopher Griffin. (2013). Research in progress: Understanding how emergency managers evaluate crowdsourced data: A trust game-based approach. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 272–277). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: The use, or barriers to use, of crowdsourced data by emergency managers has been a significant topic of scholarly discussion during the past several years. The single strongest barrier to use has been identified as one of data quality (Tapia, et. al, 2011). We argue that within this environment the Emergency Manager (EM) acts as a decision-maker and evaluator of crowdsourced data. The final judgement on whether to incorporate crowdsourced data into a Crisis response lies with the EM. In this paper we make a brief argument for the role of EM as trustworthy data analyst and then propose a model for capturing the trust-analytical behavior through game theory (Griffin, et. al, 2012). Lastly, we propose a simple computer game, which uses our model through which we will capture EM trust-analytical behavior though a future empirical data collection effort.
|
|
|
Peter L. O'Dell. (2008). Communities of trust. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (265). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Effective response to emergency, security and operational continuity events generally requires cooperation across political, physical and technical boundaries. It's necessary, therefore, to use a communications system that enables people in heterogeneous organization to communicate effectively. Since 2002, Swan Island Networks has been developing an Internet-based information sharing system that links responsible people with the information necessary to make better decisions, and to each other. The system allows people to form “Communities of Trust”, in which all community members are known and authenticated. Each community is formed by a responsible Champion, who determines who can participate and what information will be shared within the community. In order for people to be willing to share, and to accept the information they receive as genuine, the community must operate in an environment of trust. This presentation outlines the fundamental concepts, methodologies and features for access and information control that create a trusted environment, particularly Authorization, Authentication and Audit (AAA). In the system discussed, AAA elements function together to create a comprehensive trust framework, and provide a contextually appropriate level of information assurance, data protection and dissemination control.
|
|
|
Online Media as a Means to Affect Public Trust in Emergency Responders. (2015). Amanda Lee Hughes; Apoorva Chauhan. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: This exploratory study examines how fire and police departments used online media during the 2012 Hurricane Sandy and how these media can be used to affect trust with members of the public during such an event. Using trust theory, we describe how online communications provide a means for emergency responders to appear trustworthy through online acts of ability, integrity, and benevolence. We conclude with implications and recommendations for emergency response practice and a trajectory of future work.
|
|
|
Ophélie Morand, Caroline Rizza, Stéphane Safin, & Robert Larribau. (2022). Improving Cardiopulmonary Resuscitation by Building Trust between Dispatchers and Citizens through Simulation Workshop. In Rob Grace, & Hossein Baharmand (Eds.), ISCRAM 2022 Conference Proceedings – 19th International Conference on Information Systems for Crisis Response and Management (pp. 791–802). Tarbes, France.
Abstract: Improving the survival rate of Out-of-Hospital Cardiac Arrest (OHCA) remains an important public health issue. Indeed, current survival rates are approximately 10% and can be significantly enhanced by early Cardiopulmonary reanimation (CPR) and early defibrillation. Bystanders are most likely to perform these acts, but few resources (such as digital apps) are dedicated to them due to a lack of confidence in their abilities from them and from the professionals. In order to build trust and collaboration between the dispatchers and the bystanders, an OHCA simulation workshop was conducted involving the whole survival chain. The main idea consisted in getting the participants to interact via an application dedicated to bystanders which provided a CPR demonstration video. The aim was to analyze the effects of this video on the CPR itself and especially on the lived-experience of the participants. A further objective was to assess how the shared workshop would affect the relationship between the stakeholders.
|
|
|
Pouyan Fotouhi Tehrani, Niklas von Kalckreuth, & Selma Lamprecht. (2020). Toward an Integrative Model of Trust for Digital Emergency Communication. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 1012–1021). Blacksburg, VA (USA): Virginia Tech.
Abstract: Digital technologies have become an integral enabler of communication during various phases of emergency management (EM). A crucial prerequisite of effective communication between authorities and the public during EM is the establishment of adequate mutual trust. Trust, however, is an elusive concept which is not easily translatable into technical settings. In this paper we propose an integrative model of trust in digital communication and show how such model can be advantageous in assessing and improving trust relations in context of EM. Our interdisciplinary model, which is based on findings from psychology, sociology and computer sciences provides an abstraction which not only seizes both subjective and objective as well as personal and non-personal, \eg institutional or cultural, aspects of trust but at the same time is concrete enough to be applicable to real-life scenarios.
|
|
|
Rustenberg, K., Radianti, J., & Gjøsæter, T. (2023). Exploring Demons for the Establishment of Team Situational Awareness. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 636–648). Omaha, USA: University of Nebraska at Omaha.
Abstract: Individual situational awareness (SA) is crucial for building team SA, which is necessary for achieving a shared understanding of a situation, making informed decisions, and taking appropriate actions. This article examines the communication barriers that emerge when transitioning from individual to team SA in emergency management scenarios. We observed two emergency exercises on “ongoing life-threatening violence” and dam failure causing hospital congestion. The study was complemented with interviews with participants of these exercises, aiming at identifying barriers called SA-demons in the team setting. We discovered barriers that hinder the establishment of team SA, including a vicious cycle of mistrust, a fragmented information trap, a false feeling of mastery trap, and a decaying memory trap. These barriers can stem from individual, organizational, or technological factors. To complement existing SA theories, we applied the Cynefin framework and found that standard operating procedures can be potential barriers when transitioning into chaotic or complex domains.
|
|
|
Bryan Semaan, Gloria Mark, & Ban Al-Ani. (2010). Developing information technologies for citizens experiencing disruption: The role of trust and context. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: This paper considers a subset of the technology-enabled communication that took place among citizen populations experiencing various disruptions, e.g. disaster and war. In the context of a disrupted environment, trust can erode where people no longer rely on institutions for support (i.e. the government), or where citizens do not trust other people. We argue that depending on what is taking place in the physical world, trust in people, information, and institutions can change – in this sense, trust is contextual. We then offer recommendations for designing new technologies for people who experience disruption, taking into account trust and context.
|
|
|
Shane Errol Halse, Andrea Tapia, Anna Squicciarini, & Cornelia Caragea. (2016). An Emotional Step Towards Automated Trust Detection in Crisis Social Media. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: To this date, research on crisis informatics has focused on the detection of trust in Twitter data through the use of message structure, sentiment, propagation and author. Little research has examined the effects of perceived emotion of these messages in the crisis response domain. Toward detecting useful messages in case of crisis, we examine perceived emotions of these messages and how the different emotions affect the perceived usefulness and trustworthiness. Our analysis is carried out on two datasets gathered from Twitter concerning hurricane Sandy in 2012 and the Boston Bombing 2013. The results indicate that there is a significant difference in the perceived emotions that contribute towards the perceived trustworthiness and usefulness. This could have impacts on how messages from social media data are analyzed for use in crisis response.
|
|
|
Shane Errol Halse, Andrea Tapia, Anna Squicciarini, & Cornelia Caragea. (2016). Tweet Factors Influencing Trust and Usefulness During Both Man-Made and Natural Disasters. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: To this date, research on crisis informatics has focused on the detection of trust in Twitter data through the use of message structure, sentiment, propagation and author. Little research has examined the usefulness of these messages in the crisis response domain. Toward detecting useful messages in case of crisis, in this paper, we characterize tweets, which are perceived useful or trustworthy, and determine their main features. Our analysis is carried out on two datasets (one natural and one man made) gathered from Twitter concerning hurricane Sandy in 2012 and the Boston Bombing 2013. The results indicate that there is a high correlation and similar factors (support for the victims, informational data, use of humor and type of emotion used) influencing trustworthiness and usefulness for both disaster types. This could have impacts on how messages from social media data are analyzed for use in crisis response.
|
|
|
Shane Halse, Jomara Binda, & Samantha Weirman. (2018). It's what's outside that counts: Finding credibility metrics through non-message related Twitter features. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 516–528). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: Social media data, such as Twitter, enables crisis response personnel and civilians to share information during a crisis situation. However, a lack of information gatekeeping processes also translates into concerns about both content and source credibility. This research aims to identify Twitter metrics which could assist with the latter. A 2 (average number of hashtags used) x 2 (ratio of tweets/retweets posted) x 2 (ratio of follower/followee) between-subjects experiment was conducted to evaluate the level of influence of Twitter broker metrics on behavioral intention and the perception of source credibility. The findings indicate that follower/followee ratio in conjunction with hashtag usage approached a significant effect on perceived source credibility. In addition, both Twitter awareness metrics and dispositional trust played an important role in determining behavioral intentions and perceived source credibility. Implications and limitations are also discussed.
|
|
|
Lise Ann St. Denis, Amanda L. Hughes, & Leysia Palen. (2012). Trial by fire: The deployment of trusted digital volunteers in the 2011 shadow lake fire. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: We report on the use of a team of trusted digital volunteers during the 2011 Shadow Lake Fire that occurred in the US Pacific Northwest to extend the social media capacity of a Type I incident management team. In this case study, we outline the tools and processes used by this virtual team to coordinate their activities, monitor social media communication and to establish communications with the public around the event. Finally, we discuss the potential merits and limitations of implementing a team of trusted volunteers and explore how this idea could be incorporated into emergency management organizations. © 2012 ISCRAM.
|
|
|
Lise Ann St. Denis, Leysia Palen, & Kenneth M. Anderson. (2014). Mastering social media: An analysis of Jefferson County's communications during the 2013 Colorado floods. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 737–746). University Park, PA: The Pennsylvania State University.
Abstract: We report on the social media communications and work practices of the Jefferson County Type III Incident Management Team during the September 2013 Colorado Floods. In this case study, we examine flood-related communications across three platforms: Facebook, Twitter, and the team's blog for insight into how this innovative team coordinated their communications to meet the information needs of a community outside of the media spotlight. Using a mixed method approach of interviews and social media content analysis, we describe their online behaviors in relation to the needs of the emergency response as a whole. We report on adaptations to their work practice that allowed them to extend traditional communications with social media to create an integrated communication plan. Finally, we look to the team's experiences for direction in how to use social media in emergencies generally.
|
|
|
Stephan Weijman, & Kenny Meesters. (2020). Shifting Control and Trust: Exploring Implications of Introducing Delegated Decision Support Systems. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 285–294). Blacksburg, VA (USA): Virginia Tech.
Abstract: Increased information access and more intelligent information systems enable more operators in an organization to autonomously make decisions. These delegated decision-making opportunities play an important role during critical events, as operators -such as emergency teams and responders- can work independently and rely less on a centralized decision-making structure. Moreover, the operators' perceived level of trust increases while also limiting the coordinators' perceived control. In this paper, we examine the influence of such systems on the shift in perceived control and empowerment for both operators and commanders. In our experiments, conducted at the Royal Netherlands Air Force, we found that the introduction of these systems indeed affects perceived control and empowerment, specifically as perceived by the coordinator. These factors will play an important role in the effective use of such systems and their transformative effect on an organization. Especially considering the ongoing technical and organizational developments in crisis information management.
|
|