Lars Gerhold, & Nels Haake. (2015). Public Security in Germany 2030: Challenges for policy makers. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: This paper presents results from a two-round Expert-Delphi (N1=227, N2=126), realized in 2014, which focuses on the following research question: What are the most relevant developments affecting public security in Germany until 2030?
Theoretically the survey is based on a conceptual framework that includes assumptions on calculating the probable occurrence of risks, the relevance of megatrends and the implications of both on public security. Preliminary results show the relevance of the increasing dependency on Information and Communication Technologies (ICT), increasing exposure of critical infrastructures, the global mobility of men and goods and the widening gap between rich and poor as relevant for public security in Germany. Furthermore the potential impact of risks like ICT-crime, extreme weather events and pandemics are rated high, while their expected probability of occurrence differs from medium to high.
|
L. Palen, Monika Büscher, T. Comes, & A. Hughes. (2015). ISCRAM 2015 Conference Proceedings – 12th International Conference on Information Systems for Crisis Response and Management (L. Palen, M. Buscher, T. Comes, & A. Hughes, Eds.). Kristiansand, Norway: University of Agder (UiA).
|
Kristin Huebner, Carsten Dalaff, Wolfgang Vorraber, Gerald Lichtenegger, Uberto Delprato, Georg Neubauer, et al. (2015). Towards a Pan-European Information Space. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: When disasters occur, key factors for minimizing damages and loss of lives are access to necessary information and effective communication between emergency services. In cross-border disaster management, further challenges arise: language barriers, uneven know-how, organisational and technical differences in particular concerning communication and data or information exchange. To address those challenges, the FP7-Project EPISECC (Establish Pan-European Information Space to Enhance Security of Citizens) is working on the concept of a common information space to improve interoperability and efficiency while managing cross-border disasters. This involves researching on a common taxonomy and ontology as well as on interoperability functionalities and tools. A first step on this direction is the analysis of how disasters have been and are being managed. This paper reports on an inventory of disasters designed to consolidate such knowledge and aimed at being the basis for this information space. First gaps identified in communication/information management are also presented.
|
Kim Hagen, Meropi Tzanetakis, & Hayley Watson. (2015). Cascading effects in crises: categorisation and analysis of triggers. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: The analysis of cascading effects in crisis situations can enhance crisis managers? understanding of how crises unfold and what prominent triggers of cascading effects are. By identifying and categorising triggers of cascading effects, a greater understanding of critical points in crisis situations can be reached, which can contribute to strengthening practices of crisis management, including preparedness and response. Accordingly, this paper provides an insight into triggers of cascading effects, gained through the analysis of six case studies of crises that took place between 1999 and 2014. The analysis produced six categories of triggers, which are discussed here: the disruption of pre-existing relations of information, organisation, and supply, disturbance relations, pre-disaster conditions, and the malfunctioning of legal and regulatory relations. Authors argue that the categorisation of triggers aids anticipating cascading effects, along with predicting risks and planning for potential bottlenecks in crisis management.
|
Kevin D. Henry, & Tim G. Frazier. (2015). Scenario-Based Modeling of Community Evacuation Vulnerability. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Evacuation models can be used to determine evacuation capacity, by estimating the time required for evacuating populations to leave areas exposed to a hazard. Disaster management practices and evacuation modeling are generally carried out to prepare for ?worst-case? conditions. However, hazard severity is highly variable. Performing evacuation modeling for multiple hazard scenarios may provide flexibility and a comprehensive understanding of evacuation capacity. A case study was undertaken to analyze the merit of scenario-based evacuation modeling. Results demonstrate a difference in clearance time between maximum and historic tsunami scenario modeling. During a smaller-scale event, allowing the maximum scenario population to evacuate can add congestion and inhibit evacuation of at-risk populations. Managing evacuation can improve evacuation efficiency by preventing unneeded congestion. Results show that traditional worst-case-scenario modeling may lead to overestimation of time needed to evacuate. Planning under such a scenario may increase risk to smaller-scale hazards.
|
Katrina Petersen, Monika Büscher, Maike Kuhnert, Steffen Schneider, & Jens Pottebaum. (2015). Designing with Users: Co-Design for Innovation in Emergency Technologies. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: In this paper, we motivate the need for collaborative research and design for IT innovation in crisis response and management. We describe the value of such methodology and demonstrate how working alongside users enables creative anticipation of emergent future practices that can inform both more ?appropriate? and more ambitious innovation. We demonstrate how co-design methods are particularly valuable for eliciting ethical, legal, and social issues that would otherwise go unconsidered.
|
Katrina Petersen, & Monika Büscher. (2015). Technology in Disaster Response and Management: Narratives of Ethical, Legal, and Social Issues. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Ethical, legal and social issues (ELSI) are widely recognised as important in IT innovation for crisis response and management. However, attention often struggles to get beyond theorising basic concepts, when the realities of how difficulties and opportunities manifest are complex and practical. Unless these realities are understood, solutions to ELSI will remain at the surface, missing opportunities to responsibly and creatively leverage the potential of IT in disaster response. This workshop brings together narratives of lived experiences of ethical, legal, and social issues encountered in the context of IT innovation in disaster response, and analyses of normative, policy and regulatory backgrounds. In this editorial, we motivate this turn to narrative, summarise the contributions that will be presented on the day, and set out some key questions.
|
Katrina Petersen. (2015). Visualizing Risk: making sense of collaborative disaster mapping. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: This paper examines the relationship between collaborative disaster mapping and conceptions of risk. It looks at improvised mapmaking during the 2007 wildfires in Southern California to identify and analyze social and technological issues in creating a shared understanding through collaboration. By comparing and contrasting two different, yet intertwined, mapping practices this paper focuses on how the distribution of social and technological actors change how risk, threat, and uncertainty are approached. One, more centralized mapmaking collaboration produced risks related to managing authority and security. The other, more distributed collaboration, produced risks related to public trust and safety. This paper argues that map-making is characterized as a messy, distributed network of knowledge production in which the meaning of risk emerges through the unplanned collaborations that evolve as those involved work to make sense of the wildfires, not as an a-priori definition.
|
Katja Schulze, Daniel Lorenz, Bettina Wenzel, & Martin Voss. (2015). Disaster Myths and their Relevance for Warning Systems. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Warning systems are technically, socially, and organizationally shaped and rest on specific assumptions concerning human behavior during disasters. The common notions about people?s behavior in disaster situations are often not based on empirical data, but rather on so-called ?myths? which overemphasize rare and situation-dependent extreme behaviors such as panic, disaster shock, looting or helplessness. Due to the fact that these expectations are shaped within social environments, different stakeholders such as a heterogeneous population and professionals exhibit different assumptions. These assumptions may not only be misplaced, they additionally interfere with warning systems. The paper compares empirical results of three connected surveys: a comprehensive document analysis on disaster behavior, qualitative interviews with disaster relief workers and a quantitative representative poll. By contrasting the status of research with professional narrations as well as with the people?s expectations, different expectations and their variations are explored.
|
Katherine Lamb, Martijn Boosman, & Jim Davies. (2015). Introspect Model: Competency Assessment in the Virtual World. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Over the last decade the number of operational incidents responded to, has the UK Fire and Rescue Service has diminished by approximately 40% (Knight, 2013). This reduction in incident number and consequential experiential learning opportunities has resulted in a deterioration of incident evaluation skills by the incident commanders. This paper will detail the application of the ?Introspect model? in conjunction with the use of XVR simulation software, within Oxfordshire Fire & Rescue Service (OFRS). The model has been applied in development sessions and during competence assessment over the last 6 years. In 2009, only 45% of those candidates assessed, demonstrated the desired level of competence, compared to over 70% in 2014. The ?Introspect model?focuses on the understanding of decision rationale, striving towards a state of unconscious competence within the crisis decision maker at the incident, to effectively compensate for the skill fade or inexperience, due to diminished incident exposure.
|
Jonas Landgren. (2015). Insights from an ethnographic study of a foreign response team during the EBOLA Outbreak in Liberia. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Organizing response operations during large-scale and complex disasters requires an ability to meet and adapt to sudden changes of plans. This paper presents descriptive accounts from an ethnographic field study of the work of a foreign Ebola response team during the Ebola outbreak on location in Liberia. The findings illustrate how response work is subject to frequent and rapid changes that result in unforeseen consequences that could cause frictions and dilemmas. The findings imply tentative implications for design, suggesting a need for improved decision support for re-planning and re-designing of ongoing response operations.
|
John Sabou, Nadia Noori, & Jerri Husch. (2015). Recognizing Competitive Cultures: A case for describing the complexity of coordination between dynamic crisis response actors. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Crisis management frameworks are typically associated with concepts related to command and control or ?hierarchical? decision-making. However, advancements in communication technologies and new media platforms have brought new prospects to the design of crisis management frameworks. Social media platforms, for example, enable volunteering citizens to actively take part in crisis response efforts. In our paper we explore comparing and contrasting two forms of crisis management frameworks: a formal, the well-tested Incident Command System of the US, and an informal example, the Community Emergency Response Teams (CERT) program. The goal of the paper is to outline potential ways to examine the disparities in network structure and collaboration linkages in different forms of crisis management frameworks.
|
John J. Robinson, Jim Maddock, & Kate Starbird. (2015). Examining the Role of Human and Technical Infrastructure during Emergency Response. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Infrastructures?both technical and human?are critical components of emergency response, helping to facilitate and shape both formal work practices and the improvisational work that individuals and organizations take part in as they address emergent challenges during unpredictable events. This research explores the relationships between infrastructure and collaborative work in this context, at a time when the infrastructures themselves are rapidly changing and/or under pressure to change due to the introduction of new technology. We interviewed 17 emergency workers from region that had recently experienced a major emergency response. These interviews illuminate weaknesses in some of the systems designed to support the information and communication needs of emergency workers, and demonstrate emergency workers assembling their own ICT infrastructures using familiar off-the-shelf tools like social media platforms and shared Google documents. These findings also highlight the importance of human infrastructure in supporting improvisation and collaboration among emergency workers.
|
Joaquin Ramirez, Miguel Mendes, & Santiago Monedero. (2015). Enhanced forest fire risk assessment through the use of fire simulation models. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Forest fire risk assessment is an important task for forest fire management and planning. This paper presents current work on the definition and implementation of forest fire risk assessment models in the Wildfire AnalystTM software with the purpose of providing support and increased value in risk assessment. Three models are presented based on the concept of forest fire risk: forest fire structural hazard model that provides the assessment of the expected easiness that a fire has to spread in a certain area, a stochastic model that assesses the fire growth potential considering as potential ignition points critical elements of electric supply networks and a stochastic model that assesses the potential impact of forest fires on these infrastructures.
|
Joaquín López-Silva, Victor A. Bañuls, & Murray Turoff. (2015). Scenario Based Approach for Risks Analysis in Critical Infrastructures. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: This paper proposes a Cross Impact Analysis for supporting critical infrastructures risk analysis. This methodology contributes to decision-makers and planners with analytical tools for modeling complex situations. These features are generally useful in emergency management and particularly within the critical infrastructures scope, where complex scenarios for risk analysis and emergency plans design have to be analyzed. This paper will show by an example how CIA methodology can be applied for risks and identification analysis with an application to a Data Centre of a Critical Infrastructure.
|
Joanne I. White, & Leysia Palen. (2015). Participatory Mapping for Disaster Preparedness: The Development & Standardization of Animal Evacuation Maps. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: People who own animals are faced with complex decision making in evacuations. In the US, the Emergency Operations Center is often inundated with calls from animal owners who are aware they are under pre- or mandatory evacuation, but are unsure of what to do about evacuating their animals. Often animal evacuation is a highly improvised activity for owners and responders, though there is a now a general push toward streamlining procedures because of the high impact the matter of animals has on society?s welfare during times of emergency. This paper reports on the use of participatory design methods in a mapping project to support the range of people involved in animal evacuation during mass displacement events. The work provides insight into both procedures and standards for creating evacuation maps that communicate clearly with the public and across the range of emergency responders.
|
Jarrod R. Olson, Jonathan L. Barr, Russ Burtner, Curtis L. West, & Joseph Kielman. (2015). Policy and Technology Readiness: Engaging the User and Developer Community to Develop a Research Roadmap. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: A key challenge for research roadmapping in the crisis response and management domain is articulation of a shared vision that describes what the future can and should include. Visioning allows for far-reaching stakeholder engagement that can properly align research with stakeholders? needs. Engagement includes feedback from researchers, policy makers, general public, and end-users on technical and non-technical factors. This work articulates a process and framework for the construction and maintenance of a stakeholder-centric research vision and roadmap in the emergency management domain. This novel roadmapping process integrates three pieces: analysis of the research and technology landscape, visioning, and stakeholder engagement. Our structured engagement process elicits research foci for the roadmap based on relevance to stakeholder mission, identifies collaborators, and builds consensus around the roadmap priorities. We find that the vision process and vision storyboard helps SMEs conceptualize and discuss a technology?s strengths, weaknesses, and alignment with needs.
|
Janine S. Hiller, & Roberta S. Russell. (2015). Modalities for Cyber Security and Privacy Resilience: The NIST Approach. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Cybersecurity was a major topic of discussion at the 2015 World Economic Forum in Davos – the Sony attack; huge data breaches at Target and Adobe; a 91% increase in targeted cyber-attacks; annual losses of over $400 billion; the exposure of 904 million personal data records; cyber-attacks on a Finnish bank, a South Korean credit bureau, a German factory?s industrial controls, and the Ukrainian government; as well as increased general anxiety over critical infrastructure exposure (Tobias 2014; WEC 2015). These incidents highlight the risks inherent in a world increasingly complex, interconnected, and cyber-based. Much like thinking in other fields of disaster and crisis management, creating an impenetrable boundary or eliminating cyber risk entirely has given way to building cyber resilience. Cyber resilience is a social, economic and national security issue. This paper examines one approach, the NIST Cybersecurity Framework, in terms of building resilience in both cybersecurity and privacy.
|
Irina Temnikova, Carlos Castillo, & Sarah Vieweg. (2015). EMTerms 1.0: A Terminological Resource for Crisis Tweets. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: We present the first release of EMTerms (Emergency Management Terms), the largest crisis-related terminological resource to date, containing over 7,000 terms used in Twitter to describe various crises. This resource can be used by practitioners to search for relevant messages in Twitter during crises, and by computer scientists to develop new automatic methods for crises in Twitter.
The terms have been collected from a seed set of terms manually annotated by a linguist and an emergency manager from tweets broadcast during 4 crisis events. A Conditional Random Fields (CRF) method was then applied to tweets from 35 crisis events, in order to expand the set of terms while overcoming the difficulty of getting more emergency managers? annotations.
The terms are classified into 23 information-specific categories, by using a combination of expert annotations and crowdsourcing. This article presents the detailed terminology extraction methodology, as well as final results.
|
Imen Bizid, Patrice Boursier, Jacques Morcos, & Sami Faiz. (2015). A Classification Model for the Identification of Prominent Microblogs Users during a Disaster. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Content shared in microblogs during disasters is expressed in various formats and languages. This diversity makes the information retrieval process more complex and computationally infeasible in real time. To address this, we propose a classification model for the identification of prominent users who are sharing relevant and exclusive information during the disaster. Users who have shared at least one tweet about the disaster are modeled using three kinds of time-sensitive features, including topical, social and geographical features. Then, these users are classified into two classes using a linear Support Vector Machine (SVM) to evaluate them over the extracted features and identify the most prominent ones. The first results using the actual dataset, show that our model has a high accuracy by detecting most of the prominent users. Moreover, we demonstrate that all the proposed features used by our model are indispensable to achieve this high accuracy.
|
Ikki Niwa, Toshihiro Osaragi, Takuya Oki, & Noriaki Hirokawa. (2015). Development of Real Time Synchronous Web Application for Posting and Utilizing Disaster Information. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: In a large earthquake, rescue operations and fire-fighting are obstructed by fire-spreading and street-blockages. Therefore, it is important to quickly collect and utilize disaster information for disaster mitigation. In this paper, firstly, we develop a Web application for posting and viewing information collected by users in real time. Using this system, it is possible not only to easily share disaster information among users but also to apply to damage forecast such as fire-spreading. Next, we demonstrate the usefulness of the Web application by the following evaluation view points: (1) relationship between the access time of emergency vehicles from fire stations to the locations of fires and the ratio of collected information on street-blockage which is assumed to be collected with this system; (2) reciprocating time between a server and a client which is dependent on the number of users and band limitation after the occurrence of a disaster.
|
Ida Maria Haugstveit, Eivind Lars Rake, & Aslak Wegner Eide. (2015). Practitioner-Centered, Long-Term Testing of an ICT-based Triage System for Emergency Management. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Triage in emergency response refers to determining the priority of victims based on their need for treatment and medical intervention. Today, triage is performed by the use of paper-based triage tags. Communication about patients? status is mainly carried out over radio or through handwritten notes. This practice makes it challenging for emergency personnel to keep an overview of the number, location, and medical status of victims, and to distribute information between personnel. Although technological solutions to ease the triage process exist, the methods used to test these solutions are somewhat limited. This paper reports our plans and preparations for a practitioner-centered, long-term testing of an ICT-based triage system. The system uses electronic devices to tag patients and communicate their status to relevant incident operators, providing a common operational picture for both on- and off-site personnel. The technologies (eTriage and Master) that are to be used during the testing are presented.
|
Hossein Baharmand, & Tina Comes. (2015). A Framework for Shelter Location Decisions by Ant Colony Optimization. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Earthquakes frequently destroy the homes and livelihoods of thousands. One of the most important concerns after an earthquake is to find a safe shelter for the affected people. Because of large numbers of potential locations, the multitude of constraints (e.g. access to infrastructures; security); and the uncertainty prevailing (e.g., number of places required) the identification of optimal shelter locations is a complex problem. Nevertheless, rapidly locating shelters and transferring the affected people to the nearest shelters are high priority in crisis situations. In this paper, we develop a framework based on Ant Colony Optimization (ACO) to support decisions-makers in the response phase. Using the same framework, we also derive recommendations for urban planning in the preparedness phase. We demonstrate our method with a case focusing on the city of Kerman, in Iran.
|
Hongmin Li, Nicolais Guevara, Nic Herndon, Doina Caragea, Kishore Neppalli, Cornelia Caragea, et al. (2015). Twitter Mining for Disaster Response: A Domain Adaptation Approach. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Microblogging data such as Twitter data contains valuable information that has the potential to help improve the speed, quality, and efficiency of disaster response. Machine learning can help with this by prioritizing the tweets with respect to various classification criteria. However, supervised learning algorithms require labeled data to learn accurate classifiers. Unfortunately, for a new disaster, labeled tweets are not easily available, while they are usually available for previous disasters. Furthermore, unlabeled tweets from the current disaster are accumulating fast. We study the usefulness of labeled data from a prior source disaster, together with unlabeled data from the current target disaster to learn domain adaptation classifiers for the target. Experimental results suggest that, for some tasks, source data itself can be useful for classifying target data. However, for tasks specific to a particular disaster, domain adaptation approaches that use target unlabeled data in addition to source labeled data are superior.
|
Holger Fritze, & Christian Kray. (2015). Community and Governmental Responses to an Urban Flash Flood. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: In summer of 2014 the city of Münster experienced an urban flash flood not seen before with such intensity in Germany. This paper investigates the subsequent governmental and ad-hoc community response actions with a focus on the chronologies of Facebook and Twitter usage. Interviews identified drawbacks of coordinating volunteers in social media ecosystems. Possible solutions to overcome issues related to the interaction of community and official relief activities are identified.
|