|
Daniel Sanz, Patricia Gómez Bello, Paloma Díaz, Fausto J. Sainz, & Ignacio Aedo. (2007). Supporting physical and logical communication in emergency management Virtual Distributed Teams. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 439–448). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Virtual Distributed Teams (VDT) need to face physical and logical communication challenges during emergency response. Physical problems include heterogeneous technology infrastructures, ubiquitous accessibility, alternative media communication or real-time interaction. Logical problems are related to the accomplishment of a coordinated activity, such as the need for a common place accessible by all where digital artefacts are available, spontaneous communication, real-time interaction, and emergency awareness. We present an integration framework that addresses the physical and logical communication requirements in emergency management for VDTs. The framework provides a ubiquitous mobile infrastructure that supports physical communication, proposes a generic role-based organizational structure for VDT, and outlines an integration strategy that allows to define logical communication channels by means of information flow and access control policies based on the VDT structure.
|
|
|
Volkmar Schau, Christian Erfurth, Gerald Eichler, Steffen Späthe, & Wilhelm Rossak. (2011). Geolocated communication support in rescue management. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Efficient communication on base of consistent and up to date information is the key factor to cope with hard rescue missions. With the new generation of mobile devices local peer-to-peer communication in conjunction with geolocated information is promising to improve information's quality. Thereby, the routing of information in ad-hoc networks is very dynamic. This contribution, based on work of the SpeedUp project, analyses protocols and presents an approach which combines mobile software agents, routing in ad-hoc networks, and geolocated information to build up a reliable communication infrastructure. The 2MANS simulator allows efficient graphical model building. Geolocated information will be utilized as a map representation to improve the overall situation for unified rescue forces management.
|
|
|
Patrick C. Shih, Kyungsik Han, & John M. Carroll. (2014). Community incident chatter: Informing local incidents by aggregating local news and social media content. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 772–776). University Park, PA: The Pennsylvania State University.
Abstract: The emergence of social media provides an additional channel for broadcasting information to the public and support two-way communication between governmental stakeholders and the public during crisis. Research has focused on large-scale events, and few have investigated how social media can contribute to civic awareness and participation of small-scale incidents in a community-oriented context. Moreover, social media have been criticized because it is overabundant with noisy, inaccurate, and unprofessional information that are often misleading. This presents a serious challenge for community members to identify information that are relevant to a local incident. We introduce Community Incident Chatter (CIC), a smartphone application that is designed to aggregate information reported by formal news agencies and social media surrounding local incidents. Participants in a preliminary user study indicate that the community-oriented information presented in CIC is informative, relevant to the community, and has the potential of empowering community residents for responding to and managing local incidents.
|
|
|
Keri K. Stephens, & Jessica L. Ford. (2014). Banning mobile devices: Workplace policies that selectively exclude can shape crisis communication. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 279–283). University Park, PA: The Pennsylvania State University.
Abstract: There is a growing need to understand how mobile devices are used to reach people in a crisis. This study focuses on how work organizations play a gatekeeping role in how their employees receive crisis information. Relying on research in the digital divide and organizational justice, this study compares two different types of organizations and their policies banning or allowing mobile devices at work. Three major themes emerged: having omnipotent supervisors, being powerless workers, and experiencing information holes. These themes highlight the burden placed on organizations to create more inclusive digital policies to ensure that employees do not fall through the net of crisis management systems. Additionally, these findings necessitate new discussions among crisis and emergency management scholars that include the current understanding of the digital divide, specifically as it relates to digital inequality in the workplace.
|
|
|
Keri K. Stephens, Jessica L. Ford, Ashley Barrett, & Michael J. Mahometa. (2014). Alert networks of ICTs and sources in campus emergencies. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 652–661). University Park, PA: The Pennsylvania State University.
Abstract: This study contributes an understanding of how ICTs and varying information sources work together during emergency alerts. It builds on the prior work on campus active shooter events by examining an organization that used a range of ICTs including mobile devices, social media, organizational tools, and news media, to notify their stakeholders about an emergency. The study design used a survey to capture the responses from a random sample of over 1000 stakeholders-students, faculty, and staff-who were notified of an active shooter emergency. The findings from the first three notifications suggest that messages reaching the most stakeholders were (a) sent by official sources through ICTs like mobile phones; (b) official email communication, and (c) messages that included face-to-face communication. While 11 different ICTs were included in the study, mass media (i.e., television and radio), and social media (Twitter and Facebook) did not function substantially in the emergency alert process.
|
|
|
Jeannette N. Sutton, Leysia Palen, & Irina Shklovski. (2008). Backchannels on the front lines: Emergent uses of social media in the 2007 Southern California Wildfires. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 624–631). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Opportunities for participation by members of the public are expanding the information arena of disaster. Social media supports “backchannel” communications, allowing for wide-scale interaction that can be collectively resourceful, self-policing, and generative of information that is otherwise hard to obtain. Results from our study of information practices by members of the public during the October 2007 Southern California Wildfires suggest that community information resources and other backchannel communications activity enabled by social media are gaining prominence in the disaster arena, despite concern by officials about the legitimacy of information shared through such means. We argue that these emergent uses of social media are pre-cursors of broader future changes to the institutional and organizational arrangements of disaster response.
|
|
|
Jeannette N. Sutton. (2012). When online is off: Public communications following the February 2011 Christchurch, NZ, earthquake. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: This work in progress investigates the communication issues encountered and the strategies used by local government to communicate electronically with disaster affected individuals in the immediate aftermath of the February 2011 earthquake in Christchurch, NZ. It also provides a preliminary examination of the effects of information access on individual perceptions of community resiliency. We draw from a variety of data sources, including field research, interviews, and focus groups with local community members. Ongoing survey research will be integrated into future papers and presentations. This research provides insight into online crisis communications and the effectiveness of strategies to communicate with members of the public in a post-disaster environment when there is limited access to information via electronic channels. © 2012 ISCRAM.
|
|
|
Jeannette N. Sutton, Emma S. Spiro, Britta Johnson, Sean M. Fitzhugh, Mathew Greczek, & Carter T. Butts. (2012). Connected communications: Network structures of official communications in a technological disaster. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: Informal online communication channels are being utilized for official communications in disaster contexts. Channels such as networked microblogging enable public officials to broadcast messages as well as engage in direct communication exchange with individuals. Here we investigate online information exchange behaviors of a set of state and federal organizations during the Deepwater Horizon 2010 oil spill disaster. Using data from the popular microblogging service Twitter, we analyze the roles individual organizations play in the dissemination of information to the general public online, and the conversational microstructure of official posts. We discuss characteristics and features of following networks, centrality, and conversational dynamics that may affect information exchange in disaster. This research provides insight into the use of networked communications during an event of heightened public concern, describes implications of conversational features, and suggests directions for future research. © 2012 ISCRAM.
|
|
|
Bogdan Tatomir, & Leon J.M. Rothkrantz. (2005). Crisis management using mobile ad-hoc wireless networks. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 147–149). Brussels: Royal Flemish Academy of Belgium.
Abstract: In this paper we describe a disaster management system. It is assumed that each individual in the field is equipped with a PDA (Personal Digital Assistant) and that can communicate with other PDAs in the vicinity. Together the PDAs form an ad-hoc network. Users can enter their own observations to the PDA, like the position of victims, or a description of the current situation at particular location (e.g. smoke, emergency exits, traffic congestion). This information is entered in a special iconic language. Reversibly, the PDAs inform the users on the overall current situation of the crisis. In order to come to a shared view of the world, the knowledge that is present in the network has to be shared and fused. The proposed way to communicate is via a shared blackboard. This approach facilitates communication in a time and place independent way.
|
|
|
Teun Terpstra, Richard Stronkman, Arnout De Vries, & Geerte L. Paradies. (2012). Towards a realtime Twitter analysis during crises for operational crisis management. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: Today's crises attract great attention on social media, from local and distant citizens as well as from news media. This study investigates the possibilities of real-time and automated analysis of Twitter messages during crises. The analysis was performed through application of an information extraction tool to nearly 97,000 tweets that were published shortly before, during and after a storm hit the Pukkelpop 2011 festival in Belgium. As soon as the storm hit the festival tweet activity increased exponentially, peaking at 576 tweets per minute. The extraction tool enabled analyzing tweets through predefined (geo)graphical displays, message content filters (damage, casualties) and tweet type filters (e.g., retweets). Important topics that emerged were 'early warning tweets', 'rumors' and the 'self-organization of disaster relief' on Twitter. Results indicate that automated filtering of information provides valuable information for operational response and crisis communication. Steps for further research are discussed. © 2012 ISCRAM.
|
|
|
Robert Thomson, Naoya Ito, Hinako Suda, Fangyu Lin, Yafei Liu., Ryo Hayasaka, et al. (2012). Trusting tweets: The Fukushima disaster and information source credibility on Twitter. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: This paper focuses on the micro-blogging service Twitter, looking at source credibility for information shared in relation to the Fukushima Daiichi nuclear power plant disaster in Japan. We look at the sources, credibility, and between-language differences in information shared in the month following the disaster. Messages were categorized by user, location, language, type, and credibility of information source. Tweets with reference to third-party information made up the bulk of messages sent, and it was also found that a majority of those sources were highly credible, including established institutions, traditional media outlets, and highly credible individuals. In general, profile anonymity proved to be correlated with a higher propensity to share information from low credibility sources. However, Japanese-language tweeters, while more likely to have anonymous profiles, referenced low-credibility sources less often than non-Japanese tweeters, suggesting proximity to the disaster mediating the degree of credibility of shared content. © 2012 ISCRAM.
|
|
|
Elina Valtonen, Ronja Addams-Moring, Teemupekka Virtanen, Antti Järvinen, & Mikael Moring. (2004). Emergency announcements to mobile user devices in geographically defined areas. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2004 – 1st International Workshop on Information Systems for Crisis Response and Management (pp. 151–156). Brussels: Royal Flemish Academy of Belgium.
Abstract: When emergency announcements (EA) to a population in a crisis area are needed, avoiding single points of failure in the EA sending and forwarding systems is essential. We present a new concept, an extension to existing EA sending systems, which is based on real-time location information about mobile devices. Such a solution would increase the EA sending systems' robustness through redundancy and technology diversity. At the same time, these mobile emergency announcement (MEA) sending systems would increase the percentage of the threatened population that can be reached fast. The proposition is based on a set of requirements for EA sending systems, the most important of which turned out to be ensuring the authenticity and integrity of the EA information content. We found our preliminary results too optimistic: current GSM networks should not be used for sending EAs, as it is quite possible to forge SMS text messages, even to multiple GSM phones in a specific target area. The next generations of mobile phone networks (3G/UMTS and 4G) seem more promising, due to their packet-oriented architectures, as each data packet can be stamped with verifiable information about the source of the data. However, the development of communications networks with features compatible with MEA sending will demand that both authorities and independent experts take an active, early role in networks design right beside the commercial organisations. © Proceedings ISCRAM 2004.
|
|
|
Josine Van De Ven, Richelle Van Rijk, Peter Essens, & Erik Frinking. (2008). Network centric operations in crisis management. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 764–773). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: This paper describes the approach to implement network centric operations (NCO) in the Dutch crisis management domain. NCO resolves a number of important shortcomings related to the supply and flow of information experienced in current verbal communication-based crisis management. First, we provide a description of the crisis management organization in the Netherlands and the nature of information supply problems. Second, we explain how a network centric approach would be implemented in this domain. Next, we describe how between 2005 and 2008 several regions in the Netherlands have made efforts to implement a network-approach, and we evaluate their experiences. The NCO approach reduces the need for reliability checks of verbal communication. Consequently procedures can be optimized with NCO. This paper concludes with next steps, such as continuing to explore the effects of NCO on the current way of working and train people to work in a network centric environment.
|
|
|
Nuwan Waidyanatha, Tharaka Wilfred, Kasun Perera, Manoj Silva, & Brenda Burell. (2012). Complexity and usability of voice-enabled alerting and situational reporting decoupled systems. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: Telephone calls are the predominant telecommunication mode in Sri Lanka. Leveraging voice-based applications for disaster communication would be acceptable and sustainable. The findings in this paper are from an experiment concerning interactive voice for connecting community-based emergency field operatives with their central coordination hub. Challenge was in interchanging the Freedom Fone (FF) Interactive Voice Response (IVR) generated, Sinhala and Tamil language, speech data with the text-based 'Sahana' disaster management system for analysis and decision support. Emergency Data Exchange Language (EDXL) interoperable content standard was adopted for mediation. Low quality voice data resulting in incomplete information was a barrier to automating transformations between text and speech. Replacing those processes with human procedure significantly degrades the reliability. Moreover, human interaction with decoupled software systems, to accomplish the sequence of tasks, points to instabilities. This paper discusses the complexities and usability shortcomings discovered through controlled-exercises in Sri Lanka. © 2012 ISCRAM.
|
|
|
Yossi Nygate, William Johnson, Mark Indelicato, Miguel Bazdresch, & Clark Hochgraf. (2018). Intelligent Wireless Infrastructure Management for Emergency Communications. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 1156–1160). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: This poster describes the research of a collaborative faculty-led research that will enable first responders to identify and visualize geo-located quality of service and coverage gaps in wireless and deployable networks during an emergency event and support the deployment additional LTE base stations within FirstNet to augment network coverage and capacity. Our crowd sourced cellular metrics system uses big data analytics to detect changes in coverage and usage patterns and recommends where to deploy additional communication assets. The approach uses machine learning methods to measure and model coverage gaps and automatically implement bandwidth prioritization on whatever communication assets are available.
|
|
|
Hans Zimmermann. (2006). Availability of technologies versus capabilities of users. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 66–71). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: The regulatory environment is no longer the primary hindrance to the full application of telecommunications technology in the service of emergency response, disaster prevention and relief, and crisis management. Nowadays the restricting factor is the lack of knowledge about the capabilities, but also the limitations, of the multitude of specialized and of public communication systems. This paper will analyze the situation with the help of some practical examples and will recommend an interdisciplinary multi-stakeholder based approach to an educational concept for emergency and disaster telecommunications.
|
|