Monika Büscher, Lisa Wood, & Sung-Yueh Perng. (2013). Privacy, security, liberty: Informing the design of EMIS. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 401–410). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: This paper explores issues of security, privacy and liberty arising in relation to ICT supported emergency management. The aim is to inform the design of emergency management information systems (EMIS) and architectures that support emergent interoperability and assembly of emergency management systems of systems. We show how transformations of social and material practices of privacy boundary management create challenges, opportunities and dangers in this context. While opportunities include development of more efficient and agile emergency management models, building on smart city concepts, dangers include surveillance, social sorting and an erosion of civil liberties. Against this backdrop, we briefly explore human practice focused 'privacy by design' as a candidate design avenue.
|
Monika Büscher, Catherine Easton, Maike Kuhnert, Christian Wietfeld, Matts Ahlsén, Jens Pottebaum, et al. (2014). Cloud ethics for disaster response. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 284–288). University Park, PA: The Pennsylvania State University.
Abstract: In emergencies, exceptions to data protection raise concerns that data may become available to unexpected actors during and after a crisis, resulting in privacy intrusion and social sorting. Apart from ethical issues, there are legal issues, for example around data minimization and issues around social and cultural practices of sharing information. This paper explores key ethical, legal and social issues (ELSI) in utilizing cloud computing for disaster response and management and some examples of innovative design.
|
Kevin Fall, Gianluca Iannaccone, Jayanthkumar Kannan, Fernando Silveira, & Nina Taft. (2010). A disruption-tolerant architecture for secure and efficient disaster response communications. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: We consider the problem of providing situational awareness when citizens in a disaster are willing to contribute their own devices, such as laptops and smart phones, to gather data (text, images, audio or video) and to help forward data gathered by others. A situational awareness service processes all received data and creates annotated maps to visualize a disaster site (e.g., the status of the disaster, such as fires or floods, the location of people, food, or water). We discuss the challenges imposed on such an application when 1) the communications infrastructure in the disaster area can only provide intermittent connectivity, 2) anxious victims generate large amounts of redundant content congesting the network, and 3) the sharing of personal devices creates security and privacy threats. We present an architecture that addresses the requirements to support such a service.
|
Hayley Watson, & Rachel L. Finn. (2013). Privacy and ethical implications of the use of social media during a volcanic eruption: Some initial thoughts. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 416–420). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: In a relatively new area of research for crisis management, this working paper presents a preliminary discussion of some of the privacy and ethical implications surrounding the use of social media in the event of a crisis. The paper uses the chaos caused by the eruptions of the Eyjafjallajokull volcano in 2010 to contextualise the analysis. It begins by presenting two case studies of the use of social media by members of the public and the aviation industry during the crisis caused by the ash plume. The paper then proceeds to briefly highlight some select ethical and privacy implications stemming from the use of social media such as privacy infringements and inequality. The paper concludes by briefly summarising the findings of the paper and considering next steps for future research in this area.
|