• Save
ICT and Disaster Management
Upcoming SlideShare
Loading in...5
×
 

ICT and Disaster Management

on

  • 998 views

Lounge lecture given on ICT usage and disaster management at De La Salle Univeristy, Manila on Saturday, 18 June 2011

Lounge lecture given on ICT usage and disaster management at De La Salle Univeristy, Manila on Saturday, 18 June 2011

Statistics

Views

Total Views
998
Views on SlideShare
998
Embed Views
0

Actions

Likes
2
Downloads
0
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment
  • Gathering the information                              Surveys                              Crowdsourcing (via SMS, Twitter, etc.)  --  Every person is a sensor.                              Bounded Crowdsourcing (Al-Jazeera coverage of Gaza in Ushahidi)                              Mechanical Turks                                   Gamification
  • Gathering the information                              Surveys                              Crowdsourcing (via SMS, Twitter, etc.)  --  Every person is a sensor.                              Bounded Crowdsourcing (Al-Jazeera coverage of Gaza in Ushahidi)                              Mechanical Turks                                   Gamification

ICT and Disaster Management ICT and Disaster Management Presentation Transcript

  • INFORMATION AND COMMUNICATION TECHNOLOGY (ICT) AND DISASTER MANAGEMENT
    • David Merrick, Center for Disaster Risk Policy
  • What is ICT?
    • Information and Communication Technology (ICT) reflects the convergence of internet , mobile , and traditional media technology.
    • These technologies have created new ways to transmit, gather, and analyze information, which is changing the world we live in.
    • As ICT networks grow, and terrorist organizations usage of these networks and channels grow, the utility of these networks will increase.
    • Metcalfe’s Law states…
      • … The utility of a network is proportional to the square of the number of nodes on the network.
  • Disintermediation
    • ICTs allow for communication disintermediation .
      • Information no longer flows as:
        • EVENT -> ORG -> MEDIA -> PUBLIC
      • Through disintermediation, info now flows directly from person to person. Organizations can participate in disseminating information directly to the population.
      • By enabling many-to-many communication, ICTs reduce the importance of the media for distributing messages.
  • EMIS….
    • Emergency Management Information System
      • “An information system designed to collect, analyze, and share information in support of emergency management activities.”
    • EMIS Systems can be either custom developed or COTS (commercial off the shelf software)
  • EMIS Architecture
    • Client / Server Relationship
      • Each user/client workstation connects to a centralized server (or cluster).
      • Data is stored primarily on the servers.
    • Mesh Networks
      • Data is stored on each client workstation, synchronized between all workstations when changes are made.
      • Redundant storage provides a more robust ‘offline’ mode.
  • COTS EMIS Examples
    • Client / Server
      • WebEOC
      • E-Team
    • Mesh Architecture
      • Microsoft Groove / SharePoint Workspace
  • EMIS Capabilities
    • EMIS should provide:
      • Common Operating Picture
      • Geospatial Data Visualization (GIS Integration)
      • Linkages or integration with Remote Sensor Data
        • Cameras
        • Aerial photography
      • Resource Tracking
      • Critical Infrastructure Tracking
      • Personnel / Team Management
        • Duty Rosters, Sign in logs
      • Mission Tracking or Action Planning
  • Common Operating Picture
    • "A common operating picture is established and maintained by the gathering, collating, synthesizing, and disseminating of incident information to all appropriate parties involved in an incident. Achieving a common operating picture allows on−scene and off−scene personnel to have the same information about the incident, including the availability and location of resources, personnel, and the status of requests for assistance. Additionally, a common operating picture offers an overview of an incident thereby providing incident information which enables the Incident Commander (IC), Unified Command (UC), and supporting agencies and organizations to make effective, consistent, and timely decisions. In order to maintain situational awareness, communications and incident information must be updated continually.”
    • - NIMS definition
  • Interoperability
    • Interoperability is critical in our info-centric environments.
    • Information systems must be able to easily exchange quality data.
      • Components of data quality:
        • Accuracy
        • Completeness
        • Timeliness
        • Consistency
    • Data versus Information
      • Information is comprised of sorted, analyzed and processed data.
  • Interoperability
    • FEMA IPAWS Open – Open Platform for Emergency Networks
    • OASIS – International community dedicated to expanding interoperability between information systems.
    • EDXL – Emergency Data Exchange Language
      • XML (Xtensible Markup Language) based format designed to streamline data exchange between systems.
      • EMIS that are capable of EDXL transfers are, in thoery, interoperable.
  • Geospatial Systems
    • GIS… does everyone know what this is (in the broadest terms)?
    • Google Maps
      • The first to bring quality mapping systems to the masses with a well documents Application Programming Interface (API).
      • Allows for extensible usage… beyond what Google originally envisioned.
    • Examples
      • http://map.floridadisaster.org/GATOR/index.html
      • http://www.oes.ca.gov/WebPage/oeswebsite.nsf/InteractiveMap?readform
  • Mapping Meets Social Media
    • Foursquare
    • Twitter
    • Facebook Places
    • Google Buzz / Google Latitude
  • Crowdsourcing
    • Crowdsourcing is defined as outsourcing work to an open community (a crowd) asking for contributions.
    • Can be effective in solving social problems.
    • Examples
      • iStockPhoto
      • Challenge.gov
        • http://challenge.gov/challenges/87/submissions/2077-before-the-storm
        • http://challenge.gov/challenges/87/submissions/1157-keep-it-under-wraps
        • http://challenge.gov/challenges/87/submissions/1394-femapp-mobile-applications-for-fema-employees-and-the-public-utilizing-gps
  • Loqi.me
    • Crowdsourcing meets mapping….
    • http://loqi.me
  • Crisis Mapping
    • Crisis mapping is a relatively new concept/application, designed to disintermediate geospatial information during a crisis or disaster.
    • Started by the Harvard Humanitarian Initiative (HHI) in roughly 2008.
    • Examples include Google Earth .KML files, Ushahidi, Loqi.me.
  • Ushahidi
    • Open source crisis mapping platform, mashup of SMS, Twitter and Google Maps.
    • Can be deployed locally on a completely open source stack, or is available for free on the internet at http://crowdmap.org
    • Developed by Kenyan bloggers in response to the January 2008 unrest following elections in Kenya.
      • Name means ‘witness’ in Swahili.
    • Has been deployed for humanitarian crises around the world, as well as post disaster.
      • Haiti earthquake, Japan earthquake, violence in Chad and Sudan, Egyptian uprising, Libyan unrest.
  • Three Key Concepts of Crisis Mapping
    • Information Collection or Sourcing
      • Sources of information may include…
        • Traditional surveys / field observations
        • Crowdsourcing
          • Mobile data collection - SMS, Twitter, etc.
          • “ Every Person is a Sensor”
        • Bounded Crowdsourcing
          • Limit the target population by parameters.
            • Example is the Al Jazeera crisis map of the Gaza conflicts.
  • Three Key Concepts of Crisis Mapping
    • Information Collection or Sourcing, continued
      • Data Verification can be troublesome. How do you know the crowd is passing quality data?
        • Location verification, Person/Profile verification, multi-source verification.
          • Swift River is a new product designed to automate this process somewhat.
        • Mechanical Turks may be useful to quickly verify information.
          • “ Gamification” may provide incentives for increased Turk output.
            • Scores, Leaderboards, etc. based on output.
  • Three Key Concepts of Crisis Mapping
    • Visualization
      • Display gathered information in a coherent way on a map.
      • This is not new to cartographers and GIS experts, but current technology makes it possible for anyone to display geospatial data.
        • Open source and freely available tools make this step straightforward.
  • Three Key Concepts of Crisis Mapping
    • Analysis
      • Analysis is extracting information and patterns from the map.  
      • Once again, this is not a new process, but is now able to happen faster, based on near real time data.
        • This has advantages – more useful information faster.
        • But also disadvantages – remember issues with data quality.
  • Too Many Maps?
    • While tools like Loqi.me and Ushahidi are wonderful ‘grassroots’ tools, but how do they interact with other EMIS?
      • Short answer… not very well.
    • If the public is using one set of crowdsourced data and information, and EM officials are using another, what does that do to the Common Operating Picture?
      • How can this be overcome?