An Online Social Network for Emergency ManagementConnie White
This document proposes investigating whether an online social network could help facilitate collaboration across different emergency management organizations. It discusses how social networking sites are becoming more popular tools for mass collaboration. The researchers conducted a survey of emergency management students to get preliminary feedback on using social networks for emergency coordination. The results showed strong agreement that social networks could effectively support information sharing and communication during emergencies. The researchers plan to further engage emergency professionals to understand their needs and how a social network could best serve the emergency domain.
Im Course Assignment 2 A Lubkovskaya Humloglubkovsk
The document discusses several key challenges in humanitarian information management based on a global symposium, including strategic use of information, communications with affected communities, standards, and preparedness. It provides examples of specific issues such as lack of agreed assessment tools, failure to involve local communities, and need for preparedness measures. Solutions proposed include developing common standards and assessment processes, strengthening two-way communication, and increasing information accessibility.
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Connie White
Detailing guidelines and safe practices for using social media across a range of emergency management applications‚ Social Media, Crisis Communication, and Emergency Management: Leveraging Web 2.0 Technologies supplies cutting-edge methods to help you inform the public‚ reduce information overload‚ and ultimately‚ save more lives.
Introduces collaborative mapping tools that can be customized to your needs
Explores free and open-source disaster management systems‚ such as Sahana and Ushahidi
Covers freely available social media technologies—including Facebook‚ Twitter‚ and YouTube
This document summarizes a study that used social network analysis to understand how climate information spreads in the Shoalhaven region of New South Wales, Australia. Interviews with formal network members (government agencies) and informal network members (community groups) identified key sources of climate information and how information is shared. The analysis found that a few central organizations, like the Bureau of Meteorology and local radio, are important for disseminating information, but that knowledge is not widely shared beyond local professional and geographic groups. The findings could help the NSW government identify effective ways to engage communities in climate adaptation.
Social Media play a critical role during crisis events, revealing a natural coordination dynamic. We propose a computational framework guided by social science principles to measure, analyze, and understand coordination among the different types of organizations and actors in crisis response. The analysis informs both the scientific account of cooperative behavior and the design of applications and protocols to support crisis management.
H. Purohit, A. Hampton, V. Shalin, A. Sheth, J. Flach. Framework to Analyze Coordination in Crisis Response. Workshop on Collaboration and Crisis Informatics, CSCW-2012.
http://knoesis.wright.edu/library/resource.php?id=1640
This presentation summarizes Jennifer Tucker's dissertation study, entitled “Motivating Subjects: Data Sharing in Cancer Research.” The research focused on the motivational factors that influence a researcher’s decision to share data.
This document discusses information behaviors in the U.S. intelligence community. It notes that intelligence analysts experience information overload due to the vast amounts of data they must process each day from numerous sources. This overload can compromise their efficiency and ability to identify threats in a timely manner. The document also examines issues between different levels of government in the intelligence community, such as a lack of consistent training and information sharing between federal, state, and local agencies. It proposes applying theories of information behavior from library and information science, such as minimizing effort, to help analysts better manage information overload.
An Online Social Network for Emergency ManagementConnie White
This document proposes investigating whether an online social network could help facilitate collaboration across different emergency management organizations. It discusses how social networking sites are becoming more popular tools for mass collaboration. The researchers conducted a survey of emergency management students to get preliminary feedback on using social networks for emergency coordination. The results showed strong agreement that social networks could effectively support information sharing and communication during emergencies. The researchers plan to further engage emergency professionals to understand their needs and how a social network could best serve the emergency domain.
Im Course Assignment 2 A Lubkovskaya Humloglubkovsk
The document discusses several key challenges in humanitarian information management based on a global symposium, including strategic use of information, communications with affected communities, standards, and preparedness. It provides examples of specific issues such as lack of agreed assessment tools, failure to involve local communities, and need for preparedness measures. Solutions proposed include developing common standards and assessment processes, strengthening two-way communication, and increasing information accessibility.
Social Media, Crisis Communication and Emergency Management: Leveraging Web 2...Connie White
Detailing guidelines and safe practices for using social media across a range of emergency management applications‚ Social Media, Crisis Communication, and Emergency Management: Leveraging Web 2.0 Technologies supplies cutting-edge methods to help you inform the public‚ reduce information overload‚ and ultimately‚ save more lives.
Introduces collaborative mapping tools that can be customized to your needs
Explores free and open-source disaster management systems‚ such as Sahana and Ushahidi
Covers freely available social media technologies—including Facebook‚ Twitter‚ and YouTube
This document summarizes a study that used social network analysis to understand how climate information spreads in the Shoalhaven region of New South Wales, Australia. Interviews with formal network members (government agencies) and informal network members (community groups) identified key sources of climate information and how information is shared. The analysis found that a few central organizations, like the Bureau of Meteorology and local radio, are important for disseminating information, but that knowledge is not widely shared beyond local professional and geographic groups. The findings could help the NSW government identify effective ways to engage communities in climate adaptation.
Social Media play a critical role during crisis events, revealing a natural coordination dynamic. We propose a computational framework guided by social science principles to measure, analyze, and understand coordination among the different types of organizations and actors in crisis response. The analysis informs both the scientific account of cooperative behavior and the design of applications and protocols to support crisis management.
H. Purohit, A. Hampton, V. Shalin, A. Sheth, J. Flach. Framework to Analyze Coordination in Crisis Response. Workshop on Collaboration and Crisis Informatics, CSCW-2012.
http://knoesis.wright.edu/library/resource.php?id=1640
This presentation summarizes Jennifer Tucker's dissertation study, entitled “Motivating Subjects: Data Sharing in Cancer Research.” The research focused on the motivational factors that influence a researcher’s decision to share data.
This document discusses information behaviors in the U.S. intelligence community. It notes that intelligence analysts experience information overload due to the vast amounts of data they must process each day from numerous sources. This overload can compromise their efficiency and ability to identify threats in a timely manner. The document also examines issues between different levels of government in the intelligence community, such as a lack of consistent training and information sharing between federal, state, and local agencies. It proposes applying theories of information behavior from library and information science, such as minimizing effort, to help analysts better manage information overload.
Given the growth of social media and rapid evolution of Web of Data, we have unprecedented opportunities to improve crisis response by extracting social signals, creating spatio-temporal mappings, performing analytics on social and Web of Data, and supporting a variety of applications. Such applications can help provide situational awareness during an emergency, improve preparedness, and assist during the rebuilding/recovery phase of a disaster. Data mining can provide valuable insights to support emergency responders and other stakeholders during crisis. However, there are a number of challenges and existing computing technology may not work in all cases. Therefore, our objective here is to present the characterization of such data mining tasks, and challenges that need further research attention for leveraging social media and Web of Data to assist crisis response coordination.
Invited talk presented by Hemant Purohit (http://knoesis.org/researchers/hemant) at the NCSU workshop on IT for sustainable tourism development. The talk presents application of technology developed for crisis coordination into more general marketplace coordination via social media for helping suppliers (micro-entrepreneurs) and demanders (tourists).
Expelling Information of Events from Critical Public Space using Social Senso...ijtsrd
Open foundation frameworks give a significant number of the administrations that are basic to the wellbeing, working, and security of society. A considerable lot of these frameworks, in any case, need persistent physical sensor checking to have the option to recognize disappointment occasions or harm that has struck these frameworks. We propose the utilization of social sensor enormous information to recognize these occasions. We center around two primary framework frameworks, transportation and vitality, and use information from Twitter streams to identify harm to spans, expressways, gas lines, and power foundation. Through a three step filtering approach and assignment to geographical cells, we are able to filter out noise in this data to produce relevant geo located tweets identifying failure events. Applying the strategy to real world data, we demonstrate the ability of our approach to utilize social sensor big data to detect damage and failure events in these critical public infrastructures. Samatha P. K | Dr. Mohamed Rafi "Expelling Information of Events from Critical Public Space using Social Sensor Big Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25350.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/25350/expelling-information-of-events-from-critical-public-space-using-social-sensor-big-data/samatha-p-k
A Dynamic Delphi Process Utilizing a Modified Thurstone Scaling Method: Colla...Connie White
In an extreme event or major disaster, very often there are both alternative actions that might be considered and far more requests for actions than can be executed immediately. The relative desirability of each option for action could be a collaborative expression of a significant number of emergency managers and experts trying to manage the most desirable alternatives at any given time, in real time. Delphi characteristics can satisfy these needs given that anyone can vote or change their vote on any two options, and voting and scaling are used to promote a group understanding. Further utilized with Thurstone’s Law of Comparative Judgment, a group decision or the range of acceptability a group is willing to consent to, can be calculated and utilized as a means of producing the best decision. A ubiquitous system for expeditious real-time decision making by large virtual teams in emergency
response environments is described.
A survey of confidential data storage and deletion methodsunyil96
This document surveys methods for confidential data storage and deletion. It begins with an introduction explaining the importance of protecting sensitive data throughout its lifetime, from storage to disposal. It then provides background on security concepts and compares existing approaches based on their strength of confidentiality, ease of use, performance, and flexibility in implementing security policies. The focus is on single-user computing environments and threats from dead forensic analysis of storage media.
Social Media & Web Mining for Public Services of Smart Cities - SSA TalkHemant Purohit
This talk at Data Science Seminar of SSA presents challenges and methods to model behavior on social media & Web for application opportunities for public services. The talk also demonstrates an in-depth case study of mining intentional behavior from the noisy natural language text of social media messages during disasters and how it could assist emergency services of future smart cities.
Automatically Rank Social Media Requests for Emergency Services using Service...Hemant Purohit
Public expects a prompt response from online services, including emergency response organizations to requests for help posted on social media. However, the information overload experienced by these organizations, coupled with their limited human resources, challenges them to timely identifying and prioritizing such requests. We present a novel model to formally characterize social media requests and then, develop a Learning-to-Rank system using this model.
Paper: Purohit, H., Castillo, C., Imran, M., and Pandey, R. (2018). Social-EOC: Serviceability Model To Rank Social Media Requests for Emergency Operation Centers. ASONAM 2018.
- Ahmed Barakat is seeking a challenging position in a reputable company where he can sharpen his skills and develop his qualifications.
- He has over 10 years of experience in automotive sales, currently working as a team leader for Chevrolet in Qatar.
- His experience includes welcoming customers, providing vehicle information, maintaining relationships, conducting sales activities, and ensuring showroom standards are met.
Professional and Student Works SUNYP WELDZIUSDavid Weldzius
This document provides descriptions of 10 professional works and 10 student works by various artists. The professional works sections describe pieces from series titled "Estrada Courts, USA" and "Pedestrian Views of the Case Study House No. 22" by artists David Botello and Steve Delgado, as well as other untitled works. The student works sections list pieces from series such as "The 95: An Investigation of Blackness at Occidental College" and "High Desert", created by students including Cruz Riley, Javier Sevilla, and Ruby Paiva. Each work is identified by title, date, medium, and dimensions.
This document discusses single phase inverters. It describes:
1. Single pulse width modulation, which controls output voltage by varying the width of pulses in each half cycle compared to a triangular carrier signal.
2. A single phase half bridge inverter, which uses two switches and capacitors to divide the DC source voltage. Feedback diodes provide current continuity for inductive loads.
3. A full bridge single phase inverter, which uses four thyristors controlled such that only one pair conducts at a time to produce an AC output voltage from the DC source. Feedback diodes allow current to flow when thyristors turn off.
IBM Digital Experience Theme CustomizationVan Staub, MBA
This document provides an overview of theme customization capabilities in IBM Digital Experience including:
- Tools for customizing themes like the Theme Manager, Web Developer Dashboard, and Theme Editor.
- Capabilities for customizing themes like creating new themes from templates, updating styles, templates, and adding modules and profiles.
- Information on the resources and lab environment available for theme development.
Watson DevCon 2016: Why Audience Intelligence Requires a Modular AI ApproachIBM Watson
Presentation given by Francesco D'Orazio at Watson DevCon 2016.
Not all data is created equal. Different datasets, industries, audiences, and use cases require different techniques to make sense of the data and help craft insights beyond simple analytics. At Pulsar, we deal with complex and varied social and behavioral datasets that require a very diverse range of data mining techniques—and there’s only so much a single company can do to keep up with the level of specialism needed to make sense of it all.Pulsar has built a modular system for AI solutions. Integrating Watson has been essential in helping to support a wide range of research use cases – from image analysis to topic extraction and emotion analysis. Come explore different Watson-enabled use cases and hear plans for future integrations.
Innovate Finance’s booklet ‘Celebrating Diversity in FinTech’ shines a spotlight on leading FinTech firms and institutions closing the diversity gap in FinTech and promoting inclusion within the workplace.
The booklet features 10 member companies including some of the world’s most successful and exciting FinTech businesses such as Bankable, Neyber, remittance companies Azimo and World Remit, leading banks Lloyds Banking Group and RBS.
An introduction to IBM Watson Work Services and Workspace development. Focuses on API usage and building cognitive, conversational applications with Watson Work.
El documento presenta una herramienta metodológica para la observación de clases por parte de supervisores escolares. Describe los tres momentos clave de la observación: 1) la preparación, 2) el desarrollo de la observación tomando 10 "instantáneas" codificadas cada pocos minutos, y 3) la elaboración de un informe. El objetivo es que los supervisores puedan registrar sistemáticamente el uso del tiempo, las actividades y los materiales docentes, así como detectar estudiantes en riesgo, para sustentar un diálogo prof
Social Networks in Health Care - Talk at ICSE 2010James Williams
A talk given at the Software Engineering for Health Care workshop at ICSE 2010 (Cape Town). Reviews privacy and security issues for social networking in the health care domain, covers some existing work, and points out future directions.
14 mejri new configurationict-indisasters-ws2014Luca Marescotti
This document discusses new communication configurations that can arise during crisis management situations. It begins by looking at how information sharing is key during emergencies but can be challenging. It then examines how new technologies and social media have created new information providers and made sharing more bottom-up. Finally, it discusses some specific technologies like Ushahidi and Google Person Finder that have been used to help coordinate responses.
Social Media Survival Guide for Public SafetyBrett Hicks
This document discusses the practical applications of social media for public safety organizations. It covers why social media should be used, how to develop a strategic communications plan, who uses different social media platforms, and how to effectively search and monitor social media to address misinformation. The key benefits are reaching large audiences quickly and enabling two-way communication, but public safety organizations must have clear objectives and evaluate the outcomes of their social media efforts.
More Research Needed on Concurrent Usage of Information Systems during Emerge...Steve Peterson, CEM
This presentation highlighted research challenges to improving effectiveness of integrating information and communication technologies during emergencies. Proposed as a research focus is the integration of proven virtual activation processes with an unobtrusive research presence. This positions the research presence during a real-time emergency to glean previously unknown information/rationales on how decision-makers decide and take action. Establishing a collaborative partnership by combining a “research presence” with the “virtual operation capability,” would be essential. Mutual understanding must embrace the precept of no disruption to response and recovery efforts. Consensus would be reached in identifying measurable outcomes for the research. The collaborative effort opens a groundbreaking area for consideration of study in crisis response and management. It could shed new light on an underexplored, critical area of emergency management and has the potential to further enhance the value of information and communication systems in preparing, responding, and recovering from emergencies.
SPEAK Social media and crisis communication during cascading disasters, Elisa...Global Risk Forum GRFDavos
6th International Disaster and Risk Conference IDRC 2016 Integrative Risk Management - Towards Resilient Cities. 28 August - 01 September 2016 in Davos, Switzerland
This document discusses various methods and tools for collecting, processing, and analyzing nursing data and information. It describes different sources of information like libraries, databases, and search engines. It also discusses ethical issues around copyright and fair use. Common data collection methods in nursing include questionnaires, interviews, and electronic documentation. Quantitative data is analyzed statistically while qualitative data requires identifying themes. Cohort and case-control studies are described as common research designs.
Given the growth of social media and rapid evolution of Web of Data, we have unprecedented opportunities to improve crisis response by extracting social signals, creating spatio-temporal mappings, performing analytics on social and Web of Data, and supporting a variety of applications. Such applications can help provide situational awareness during an emergency, improve preparedness, and assist during the rebuilding/recovery phase of a disaster. Data mining can provide valuable insights to support emergency responders and other stakeholders during crisis. However, there are a number of challenges and existing computing technology may not work in all cases. Therefore, our objective here is to present the characterization of such data mining tasks, and challenges that need further research attention for leveraging social media and Web of Data to assist crisis response coordination.
Invited talk presented by Hemant Purohit (http://knoesis.org/researchers/hemant) at the NCSU workshop on IT for sustainable tourism development. The talk presents application of technology developed for crisis coordination into more general marketplace coordination via social media for helping suppliers (micro-entrepreneurs) and demanders (tourists).
Expelling Information of Events from Critical Public Space using Social Senso...ijtsrd
Open foundation frameworks give a significant number of the administrations that are basic to the wellbeing, working, and security of society. A considerable lot of these frameworks, in any case, need persistent physical sensor checking to have the option to recognize disappointment occasions or harm that has struck these frameworks. We propose the utilization of social sensor enormous information to recognize these occasions. We center around two primary framework frameworks, transportation and vitality, and use information from Twitter streams to identify harm to spans, expressways, gas lines, and power foundation. Through a three step filtering approach and assignment to geographical cells, we are able to filter out noise in this data to produce relevant geo located tweets identifying failure events. Applying the strategy to real world data, we demonstrate the ability of our approach to utilize social sensor big data to detect damage and failure events in these critical public infrastructures. Samatha P. K | Dr. Mohamed Rafi "Expelling Information of Events from Critical Public Space using Social Sensor Big Data" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-3 | Issue-5 , August 2019, URL: https://www.ijtsrd.com/papers/ijtsrd25350.pdfPaper URL: https://www.ijtsrd.com/engineering/computer-engineering/25350/expelling-information-of-events-from-critical-public-space-using-social-sensor-big-data/samatha-p-k
A Dynamic Delphi Process Utilizing a Modified Thurstone Scaling Method: Colla...Connie White
In an extreme event or major disaster, very often there are both alternative actions that might be considered and far more requests for actions than can be executed immediately. The relative desirability of each option for action could be a collaborative expression of a significant number of emergency managers and experts trying to manage the most desirable alternatives at any given time, in real time. Delphi characteristics can satisfy these needs given that anyone can vote or change their vote on any two options, and voting and scaling are used to promote a group understanding. Further utilized with Thurstone’s Law of Comparative Judgment, a group decision or the range of acceptability a group is willing to consent to, can be calculated and utilized as a means of producing the best decision. A ubiquitous system for expeditious real-time decision making by large virtual teams in emergency
response environments is described.
A survey of confidential data storage and deletion methodsunyil96
This document surveys methods for confidential data storage and deletion. It begins with an introduction explaining the importance of protecting sensitive data throughout its lifetime, from storage to disposal. It then provides background on security concepts and compares existing approaches based on their strength of confidentiality, ease of use, performance, and flexibility in implementing security policies. The focus is on single-user computing environments and threats from dead forensic analysis of storage media.
Social Media & Web Mining for Public Services of Smart Cities - SSA TalkHemant Purohit
This talk at Data Science Seminar of SSA presents challenges and methods to model behavior on social media & Web for application opportunities for public services. The talk also demonstrates an in-depth case study of mining intentional behavior from the noisy natural language text of social media messages during disasters and how it could assist emergency services of future smart cities.
Automatically Rank Social Media Requests for Emergency Services using Service...Hemant Purohit
Public expects a prompt response from online services, including emergency response organizations to requests for help posted on social media. However, the information overload experienced by these organizations, coupled with their limited human resources, challenges them to timely identifying and prioritizing such requests. We present a novel model to formally characterize social media requests and then, develop a Learning-to-Rank system using this model.
Paper: Purohit, H., Castillo, C., Imran, M., and Pandey, R. (2018). Social-EOC: Serviceability Model To Rank Social Media Requests for Emergency Operation Centers. ASONAM 2018.
- Ahmed Barakat is seeking a challenging position in a reputable company where he can sharpen his skills and develop his qualifications.
- He has over 10 years of experience in automotive sales, currently working as a team leader for Chevrolet in Qatar.
- His experience includes welcoming customers, providing vehicle information, maintaining relationships, conducting sales activities, and ensuring showroom standards are met.
Professional and Student Works SUNYP WELDZIUSDavid Weldzius
This document provides descriptions of 10 professional works and 10 student works by various artists. The professional works sections describe pieces from series titled "Estrada Courts, USA" and "Pedestrian Views of the Case Study House No. 22" by artists David Botello and Steve Delgado, as well as other untitled works. The student works sections list pieces from series such as "The 95: An Investigation of Blackness at Occidental College" and "High Desert", created by students including Cruz Riley, Javier Sevilla, and Ruby Paiva. Each work is identified by title, date, medium, and dimensions.
This document discusses single phase inverters. It describes:
1. Single pulse width modulation, which controls output voltage by varying the width of pulses in each half cycle compared to a triangular carrier signal.
2. A single phase half bridge inverter, which uses two switches and capacitors to divide the DC source voltage. Feedback diodes provide current continuity for inductive loads.
3. A full bridge single phase inverter, which uses four thyristors controlled such that only one pair conducts at a time to produce an AC output voltage from the DC source. Feedback diodes allow current to flow when thyristors turn off.
IBM Digital Experience Theme CustomizationVan Staub, MBA
This document provides an overview of theme customization capabilities in IBM Digital Experience including:
- Tools for customizing themes like the Theme Manager, Web Developer Dashboard, and Theme Editor.
- Capabilities for customizing themes like creating new themes from templates, updating styles, templates, and adding modules and profiles.
- Information on the resources and lab environment available for theme development.
Watson DevCon 2016: Why Audience Intelligence Requires a Modular AI ApproachIBM Watson
Presentation given by Francesco D'Orazio at Watson DevCon 2016.
Not all data is created equal. Different datasets, industries, audiences, and use cases require different techniques to make sense of the data and help craft insights beyond simple analytics. At Pulsar, we deal with complex and varied social and behavioral datasets that require a very diverse range of data mining techniques—and there’s only so much a single company can do to keep up with the level of specialism needed to make sense of it all.Pulsar has built a modular system for AI solutions. Integrating Watson has been essential in helping to support a wide range of research use cases – from image analysis to topic extraction and emotion analysis. Come explore different Watson-enabled use cases and hear plans for future integrations.
Innovate Finance’s booklet ‘Celebrating Diversity in FinTech’ shines a spotlight on leading FinTech firms and institutions closing the diversity gap in FinTech and promoting inclusion within the workplace.
The booklet features 10 member companies including some of the world’s most successful and exciting FinTech businesses such as Bankable, Neyber, remittance companies Azimo and World Remit, leading banks Lloyds Banking Group and RBS.
An introduction to IBM Watson Work Services and Workspace development. Focuses on API usage and building cognitive, conversational applications with Watson Work.
El documento presenta una herramienta metodológica para la observación de clases por parte de supervisores escolares. Describe los tres momentos clave de la observación: 1) la preparación, 2) el desarrollo de la observación tomando 10 "instantáneas" codificadas cada pocos minutos, y 3) la elaboración de un informe. El objetivo es que los supervisores puedan registrar sistemáticamente el uso del tiempo, las actividades y los materiales docentes, así como detectar estudiantes en riesgo, para sustentar un diálogo prof
Similar to ISCRAM 2013: Beyond the Trustworthy Tweet: A Deeper Understanding of Microblogged Data Use by Disaster Response and Humanitarian Relief Organizations
Social Networks in Health Care - Talk at ICSE 2010James Williams
A talk given at the Software Engineering for Health Care workshop at ICSE 2010 (Cape Town). Reviews privacy and security issues for social networking in the health care domain, covers some existing work, and points out future directions.
14 mejri new configurationict-indisasters-ws2014Luca Marescotti
This document discusses new communication configurations that can arise during crisis management situations. It begins by looking at how information sharing is key during emergencies but can be challenging. It then examines how new technologies and social media have created new information providers and made sharing more bottom-up. Finally, it discusses some specific technologies like Ushahidi and Google Person Finder that have been used to help coordinate responses.
Social Media Survival Guide for Public SafetyBrett Hicks
This document discusses the practical applications of social media for public safety organizations. It covers why social media should be used, how to develop a strategic communications plan, who uses different social media platforms, and how to effectively search and monitor social media to address misinformation. The key benefits are reaching large audiences quickly and enabling two-way communication, but public safety organizations must have clear objectives and evaluate the outcomes of their social media efforts.
More Research Needed on Concurrent Usage of Information Systems during Emerge...Steve Peterson, CEM
This presentation highlighted research challenges to improving effectiveness of integrating information and communication technologies during emergencies. Proposed as a research focus is the integration of proven virtual activation processes with an unobtrusive research presence. This positions the research presence during a real-time emergency to glean previously unknown information/rationales on how decision-makers decide and take action. Establishing a collaborative partnership by combining a “research presence” with the “virtual operation capability,” would be essential. Mutual understanding must embrace the precept of no disruption to response and recovery efforts. Consensus would be reached in identifying measurable outcomes for the research. The collaborative effort opens a groundbreaking area for consideration of study in crisis response and management. It could shed new light on an underexplored, critical area of emergency management and has the potential to further enhance the value of information and communication systems in preparing, responding, and recovering from emergencies.
SPEAK Social media and crisis communication during cascading disasters, Elisa...Global Risk Forum GRFDavos
6th International Disaster and Risk Conference IDRC 2016 Integrative Risk Management - Towards Resilient Cities. 28 August - 01 September 2016 in Davos, Switzerland
This document discusses various methods and tools for collecting, processing, and analyzing nursing data and information. It describes different sources of information like libraries, databases, and search engines. It also discusses ethical issues around copyright and fair use. Common data collection methods in nursing include questionnaires, interviews, and electronic documentation. Quantitative data is analyzed statistically while qualitative data requires identifying themes. Cohort and case-control studies are described as common research designs.
In order to explore public attitudes towards the use of data from online services (e.g. social media) or digital devices (e.g. mobile phone GPS), we are running a Twitter based campaign (#AnalyzeMyData) in which we reminded people of instances of data usage that have been reported in news stories and asked them to rate if they considered these data uses to be OK. In order to produce momentum of public participation we designed the experiment as a sustained campaign in which a different news item is presented each day over a period of multiple weeks. Each Tweet includes a link to a mini-survey which asks participants to respond, 'yes', 'no' or 'depends'. To further motivate continued participation as the campaign progresses, we provide a running update on our website of the response statistics to the items that were previously Tweeted. The types of data usage included in the campaign range from academic studies of social media use, to data collection for product development, marketing and government studies. Our hope is that this campaign/experiment will 1) help to raise awareness of the various ways in which personal data, acquired through online services of digital devices, is currently being used, and 2) provide a large dataset of case-studies with an associated baseline of public acceptance/rejection that can be used for future research ethics guidelines and review training.
Statement for the Record of Heather Blanchard, Co Founder of CrisisCommons before the Ad Hoc Subcommittee on Disaster Recovery and Intergovernmental Affairs, Homeland Security and Governmental Affairs Committee, United States Senate on May 19, 2011
The document discusses how information and analysis can support humanitarian financing by bringing together stakeholders and generating timely information to inform donors. It analyzes the use of information management principles and the Work Centered Analysis framework in the humanitarian financing context. The UN Information Management principles focus on gathering, analyzing, storing, and sharing relevant information in a timely, reliable, and impartial manner while maintaining confidentiality and accountability. Some principles like interoperability and confidentiality conflict, making information management complex. The Work Centered Analysis framework takes a performance perspective, focusing on customer satisfaction and aligning stakeholders through reliable, real-time information sharing and flexible standards. Information technology should facilitate this while maintaining relationships of trust between organizations.
#COVIDaction, a partnership between DFID’s Frontier Technology Hub, Global Disability (GDI) Hub, UCL Institute of Healthcare Engineering along with other collaborators will be working to build a technology and innovation pipeline to support action related to the COVID pandemic.
Assessment of Data Use for Malaria Program Decision Making in the Democratic ...MEASURE Evaluation
The document summarizes an assessment of how data is used for malaria program decision making in the Democratic Republic of Congo. It found that most participants do not use data for decision making due to concerns about data quality. The assessment identified barriers to data use and led participants to prioritize questions to answer with data and create action plans. This was meant to launch a data use cycle to improve data quality and use, leading to better malaria program decisions.
This study assessed formal and informal networks involved in public health response during Florida's devastating 2004 hurricane season. Researchers conducted interviews with response participants to identify relationships between formal and informal healthcare networks at the local level and how these networks functioned and communicated. Preliminary results found that strong leadership, relationship building, and addressing logistical challenges were important. Volunteers were also instrumental in response, either as spontaneous, unaffiliated aid or through becoming affiliated with formal groups. Future research directions included further exploration of how informal networks emerge and fill response gaps as well as assessing current understanding and "lessons learned" regarding informal network surge capacity.
Why aren't Evaluators using Digital Media Analytics?CesToronto
This document discusses how evaluators are not taking full advantage of digital media analytics to inform program evaluations. It outlines how social media and online data can provide insights into public perceptions, behaviors, and opinions. Specifically, digital analytics can help measure outcomes, gather hard to reach stakeholder views, establish baselines, and provide context. However, there are also challenges like misinformation and privacy concerns. The document argues digital analytics could strengthen evaluations by supplementing traditional methods and calls for further exploring opportunities for its use.
1) The document discusses how participatory culture, open data, and technology can help expand crisis management capacity.
2) It provides examples of how volunteers and public participation helped map needs and resources for crisis response through initiatives like CrisisCamp Haiti.
3) Key recommendations are to include participatory communities in crisis response planning, create missions to coordinate volunteer efforts, invest in open data preparedness, and engage communities outside of traditional organizational boundaries.
This document summarizes a lunch and learn workshop on using big data to improve disaster management. It discusses how big data from sources like interRAI assessments can be used to develop algorithms like the Vulnerable Persons Registry (VPR) to identify vulnerable individuals. The VPR was tested during an ice storm and found higher-risk individuals were more likely to require care. The workshop involved brainstorming how different groups could benefit from this technology by mapping VPR scores and flood plains in Waterloo-Wellington. Stakeholder collaboration is needed to address barriers and further the project.
Josh Liss presented on building effective frameworks for social media analysis. He discussed how social media can be used from an intelligence perspective and common pitfalls to avoid, such as analyzing what instead of why. He provided a case study on analyzing social media data during Superstorm Sandy to help disaster response efforts. Key aspects included problem definition, data capture from Twitter, reporting trends and entities, and analyzing hashtags, sentiment, and networks to identify new questions and ways social media could supplement emergency systems.
This is a brief a brief review of current multi-disciplinary and collaborative projects at Kno.e.sis led by Prof. Amit Sheth. They cover research in big social data, IoT, semantic web, semantic sensor web, health informatics, personalized digital health, social data for social good, smart city, crisis informatics, digital data for material genome initiative, etc. Dec 2015 edition.
Similar to ISCRAM 2013: Beyond the Trustworthy Tweet: A Deeper Understanding of Microblogged Data Use by Disaster Response and Humanitarian Relief Organizations (20)
ISCRAM 2013: Supporting multi-level situation awareness in crisis managementISCRAM Events
Authors: Michael E. Stiso, SINTEF ICT,
Aslak Wegner Eide, SINTEF ICT
Ragnhild Halvorsrud, SINTEF ICT
Erik G. Nilsson, SINTEF ICT
Jan Håvard Skjetne, SINTEF ICT
ISCRAM 2013: Smartphones as an Alerting, Command and Control System for the P...ISCRAM Events
Smartphones as an Alerting, Command and Control System for the Preparedeness Groups and Civilians: Results of Preliminary Tests with the Finnish Police
Author: Kuula Jaana, Kauppinen Olli, Auvinen Vili, Kettunen Pauli, Viitanen Santtu /
University of Jyväskylä, Dept. Of Mathematical Information Technology
Korhonen Tuomo / Central Finland Police Department
ISCRAM 2013: Social media in C2 Proof-of-principle experimentISCRAM Events
The document describes a proof-of-principle experiment to test the use of social media in command and control (C2). The experiment was designed to raise the technology readiness level from a theoretical concept to an analytical proof of concept. It compared using traditional email (Condition A) to using Twitter and CrowdMap (Condition B) in a scenario of transporting aid from Sudan to Darfur. Results found that Condition B facilitated self-synchronization across the hierarchy and completed the task 30 minutes faster, supporting the theoretical framework. However, the study had limitations as a proof of concept and further research is needed.
ISCRAM 2013: Leading Cats: How to Effectively Command CollectivesISCRAM Events
This document discusses effective command of collectives. It explores defining commands at both a higher conceptual level, considering interactions between commands, and a lower level looking at individual command elements. Command by intent aims to express the purpose and desired outcome without dictating how to achieve it, allowing for flexibility and novel behavior. Successful command of collectives requires understanding the interplay between different commands, flexibility to adapt to situations, and awareness of organizational cultures. Hurricane Katrina response failures demonstrate the need for these elements.
This document summarizes a research project called COBACORE that aims to close collaboration gaps in urban disaster recovery through two innovation pathways: 1) improving community-wide collaboration building through methods and technologies to facilitate information sharing and joint work; and 2) stimulating a comprehensive needs assessment approach through systematic exploration and joint sensemaking to understand recovery environments from different perspectives. The COBACORE project will develop a collaborative workspace to support common needs assessment in humanitarian recovery operations, complementing existing approaches while enhancing accountability and participation. It will be tested in a large-scale experiment on the Dutch-German border in mid-2015.
ISCRAM 2013: Designing towards an impact evaluation framework for a collabora...ISCRAM Events
This document proposes an impact evaluation framework for assessing collaborative information supply chains between volunteer and technical communities (V&TC) and humanitarian organizations. It outlines the framework components, including evaluation types, perspectives, scope, measurements, and indicators. A case study example compares how the framework could be applied differently to assess the impact of an information supply system used by an NGO versus one used by a V&TC deployment. The framework is intended to help improve coordination between formal humanitarian systems and loosely organized volunteer groups.
ISCRAM 2013: Context Ontology for Humanitarian Assistance in Crisis ResponseISCRAM Events
The document presents a context ontology for humanitarian assistance in crisis response. It aims to build a knowledge representation system to provide necessary information and recommendation actions for decision makers. The system extracts concepts from online crisis data and maps them to an ontology. It then uses logic rules to infer recommendations based on humanitarian standards and provide explanations of how the recommendations are made. The experiments applied the system to crisis data from Hurricane Wilma and showed it performed better than keyword matching alone.
ISCRAM 2013: Meeting the Sphere Standards a case analysis of earthquake respo...ISCRAM Events
1) The document discusses China's response to the 2008 Wenchuan earthquake and 2010 Yushu earthquake, analyzing them according to the Sphere Project's humanitarian standards.
2) It finds both responses faced difficulties like information isolation, damage to transportation and communication infrastructure, and challenges working with NGOs and volunteers.
3) The response to Yushu earthquake showed some improvements like better use of remote sensing technology, coordinating psychological support earlier, and more focus on recovery operations with NGOs. Comparing the responses helps identify aspects of emergency response that could be strengthened.
ISCRAM 2013: Building robust supply networks for effective and efficient disa...ISCRAM Events
The document discusses building robust supply networks for effective disaster response. It proposes an iterative dynamic approach for decision support involving problem structuring, optimization to generate alternatives, dynamic scenario construction to consider uncertainties, and evaluation. As a use case, it applies the approach to optimize locations for health care centers in Haiti after the 2010 earthquake. The approach aims to identify alternatives that perform relatively well across scenarios to create flexible, effective and efficient supply networks.
This document provides an overview of UNHCR (United Nations High Commissioner for Refugees) including:
- UNHCR was established after WWII to respond to refugees in Europe. It currently assists refugees, asylum seekers, internally displaced persons, and stateless people.
- UNHCR's mandate is to provide protection and seek durable solutions such as repatriation, resettlement, and local integration.
- UNHCR faces challenges in accurately knowing refugee populations, assessing refugee needs, and sharing information with partners. Technology can help address these challenges.
ISCRAM 2013: A CBR Detection Framework Using Fuzzy Logic- WIPISCRAM Events
This document presents a framework for detecting chemical, biological, radiological, nuclear, or explosive incidents using fuzzy logic. The framework aims to aggregate information from various sources to calculate cumulative belief degrees about potential incidents. It accounts for attributes of incidents and the credibility of different information sources. An example shows how belief degrees from multiple experts can be aggregated to assess the existence of a radiological dispersion device. The goal is to help decision making by fusing heterogeneous data with different reliability levels. Future work includes implementing the framework as a web service and modeling other incident types while accounting for variable attribute importance.
ISCRAM 2013: A decision support system for effective use of probability forec...ISCRAM Events
1) The document discusses the development of a decision support system (DSS) to help users effectively utilize probabilistic water level forecasts for risk-based decision making regarding flood management.
2) Current issues include difficulty extracting relevant information from probabilistic forecasts and the need to separate responsibilities of forecasters and decision makers.
3) The proposed DSS would ask targeted questions to help users determine appropriate actions based on forecasted flood probabilities and consequences rather than just water levels.
ISCRAM 2013: A Fine-Grained Sentiment Analysis Approach for Detecting Crisis ...ISCRAM Events
The document presents an approach for fine-grained sentiment analysis to detect crisis-related social media posts. It analyzes tweets using seven sentiment classes (anger, disgust, fear, sadness, surprise, happiness, neutral) and evaluates performance on two tweet datasets labeled for the classes. The approach achieves up to 65% accuracy and outperforms analyses using only positive, negative, neutral classes. It detects crisis-informative tweets expressing fear better than generic negative tweets. The authors conclude fine-grained sentiment analysis shows promise for situational awareness but requires larger training data.
ISCRAM 2013: Social Media-based Event Detection for Crisis Management in the ...ISCRAM Events
The document discusses using social media to analyze events and monitor conditions in the Za'atari refugee camp in Jordan. It finds that around 20 relevant tweets per day can be identified from 50,000 daily tweets in the region by filtering for location and keywords. Key topics identified from tweets include refugee numbers, diseases, security issues, riots, infrastructure problems and daily life. Videos and first-hand accounts are also sometimes posted, providing live documentation of camp visits and events like a large fire in March 2013.
ISCRAM 2013: Lessons Learnt from the 2011 Great East Japan Earthquake and Tsu...ISCRAM Events
1) The 2011 Great East Japan Earthquake and Tsunami was one of the largest earthquakes ever recorded at magnitude 9.0. It caused widespread damage including over 15,000 deaths from tsunami waves as high as 40 meters.
2) The earthquake damaged nuclear power plants in Fukushima and caused meltdowns. This revealed flaws in assuming that risks beyond design standards were improbable. It showed the importance of considering lower probability higher impact events and increasing infrastructure flexibility.
3) Early warning systems helped reduce losses from the earthquake and tsunami. The earthquake early warning was issued only 8 seconds after shaking was detected, allowing some trains to stop safely. Updated tsunami warnings were issued as data came in.
ISCRAM 2013: Analysis of a German First Responder Exercise: Requirements for ...ISCRAM Events
This document analyzes a German first responder exercise to identify requirements for exercise support and simulation tools. It summarizes the key findings from observing the exercise and subsequent interviews. Real-life exercises have limitations like lack of control over scenarios and inability to repeat them. The analysis identified three relevant phases - spatial planning, triage and transportation, and transportation to hospitals. For each phase, it outlines the type of output data collected, potential uses of simulation tools, and how those tools could support exercises. The conclusion is that an exercise support software solution and region-specific simulation tools could improve training, future exercises, and resource planning.
ISCRAM 2013: Impact of the distribution and enrichment of information on the ...ISCRAM Events
1) This document describes a study on the impact of information distribution and enrichment on crisis management coordination.
2) An experiment was conducted with 100 crisis management professionals across 4 groups responding to simulated crises under different information conditions.
3) The results showed that enriching information for coordinators had a strong impact on their situation awareness and decision making, but also increased risks of coordination neglect and role neglect, especially with more centralized information management.
“An Outlook of the Ongoing and Future Relationship between Blockchain Technologies and Process-aware Information Systems.” Invited talk at the joint workshop on Blockchain for Information Systems (BC4IS) and Blockchain for Trusted Data Sharing (B4TDS), co-located with with the 36th International Conference on Advanced Information Systems Engineering (CAiSE), 3 June 2024, Limassol, Cyprus.
In the rapidly evolving landscape of technologies, XML continues to play a vital role in structuring, storing, and transporting data across diverse systems. The recent advancements in artificial intelligence (AI) present new methodologies for enhancing XML development workflows, introducing efficiency, automation, and intelligent capabilities. This presentation will outline the scope and perspective of utilizing AI in XML development. The potential benefits and the possible pitfalls will be highlighted, providing a balanced view of the subject.
We will explore the capabilities of AI in understanding XML markup languages and autonomously creating structured XML content. Additionally, we will examine the capacity of AI to enrich plain text with appropriate XML markup. Practical examples and methodological guidelines will be provided to elucidate how AI can be effectively prompted to interpret and generate accurate XML markup.
Further emphasis will be placed on the role of AI in developing XSLT, or schemas such as XSD and Schematron. We will address the techniques and strategies adopted to create prompts for generating code, explaining code, or refactoring the code, and the results achieved.
The discussion will extend to how AI can be used to transform XML content. In particular, the focus will be on the use of AI XPath extension functions in XSLT, Schematron, Schematron Quick Fixes, or for XML content refactoring.
The presentation aims to deliver a comprehensive overview of AI usage in XML development, providing attendees with the necessary knowledge to make informed decisions. Whether you’re at the early stages of adopting AI or considering integrating it in advanced XML development, this presentation will cover all levels of expertise.
By highlighting the potential advantages and challenges of integrating AI with XML development tools and languages, the presentation seeks to inspire thoughtful conversation around the future of XML development. We’ll not only delve into the technical aspects of AI-powered XML development but also discuss practical implications and possible future directions.
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfMalak Abu Hammad
Discover how MongoDB Atlas and vector search technology can revolutionize your application's search capabilities. This comprehensive presentation covers:
* What is Vector Search?
* Importance and benefits of vector search
* Practical use cases across various industries
* Step-by-step implementation guide
* Live demos with code snippets
* Enhancing LLM capabilities with vector search
* Best practices and optimization strategies
Perfect for developers, AI enthusiasts, and tech leaders. Learn how to leverage MongoDB Atlas to deliver highly relevant, context-aware search results, transforming your data retrieval process. Stay ahead in tech innovation and maximize the potential of your applications.
#MongoDB #VectorSearch #AI #SemanticSearch #TechInnovation #DataScience #LLM #MachineLearning #SearchTechnology
How to Get CNIC Information System with Paksim Ga.pptxdanishmna97
Pakdata Cf is a groundbreaking system designed to streamline and facilitate access to CNIC information. This innovative platform leverages advanced technology to provide users with efficient and secure access to their CNIC details.
Removing Uninteresting Bytes in Software FuzzingAftab Hussain
Imagine a world where software fuzzing, the process of mutating bytes in test seeds to uncover hidden and erroneous program behaviors, becomes faster and more effective. A lot depends on the initial seeds, which can significantly dictate the trajectory of a fuzzing campaign, particularly in terms of how long it takes to uncover interesting behaviour in your code. We introduce DIAR, a technique designed to speedup fuzzing campaigns by pinpointing and eliminating those uninteresting bytes in the seeds. Picture this: instead of wasting valuable resources on meaningless mutations in large, bloated seeds, DIAR removes the unnecessary bytes, streamlining the entire process.
In this work, we equipped AFL, a popular fuzzer, with DIAR and examined two critical Linux libraries -- Libxml's xmllint, a tool for parsing xml documents, and Binutil's readelf, an essential debugging and security analysis command-line tool used to display detailed information about ELF (Executable and Linkable Format). Our preliminary results show that AFL+DIAR does not only discover new paths more quickly but also achieves higher coverage overall. This work thus showcases how starting with lean and optimized seeds can lead to faster, more comprehensive fuzzing campaigns -- and DIAR helps you find such seeds.
- These are slides of the talk given at IEEE International Conference on Software Testing Verification and Validation Workshop, ICSTW 2022.
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...Neo4j
Leonard Jayamohan, Partner & Generative AI Lead, Deloitte
This keynote will reveal how Deloitte leverages Neo4j’s graph power for groundbreaking digital twin solutions, achieving a staggering 100x performance boost. Discover the essential role knowledge graphs play in successful generative AI implementations. Plus, get an exclusive look at an innovative Neo4j + Generative AI solution Deloitte is developing in-house.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Observability Concepts EVERY Developer Should Know -- DeveloperWeek Europe.pdfPaige Cruz
Monitoring and observability aren’t traditionally found in software curriculums and many of us cobble this knowledge together from whatever vendor or ecosystem we were first introduced to and whatever is a part of your current company’s observability stack.
While the dev and ops silo continues to crumble….many organizations still relegate monitoring & observability as the purview of ops, infra and SRE teams. This is a mistake - achieving a highly observable system requires collaboration up and down the stack.
I, a former op, would like to extend an invitation to all application developers to join the observability party will share these foundational concepts to build on:
Generative AI Deep Dive: Advancing from Proof of Concept to ProductionAggregage
Join Maher Hanafi, VP of Engineering at Betterworks, in this new session where he'll share a practical framework to transform Gen AI prototypes into impactful products! He'll delve into the complexities of data collection and management, model selection and optimization, and ensuring security, scalability, and responsible use.
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
ISCRAM 2013: Beyond the Trustworthy Tweet: A Deeper Understanding of Microblogged Data Use by Disaster Response and Humanitarian Relief Organizations
1. Beyond the Trustworthy Tweet:
A Deeper Understanding of Microblogged Data Use
by Disaster Response and Humanitarian Relief
Organizations
Andrea H. Tapia
Kathleen A. Moore
Nicholas J. Johnson
Penn State University
College of Information Sciences and Technology
2. Opportunity:
Microblogging
New technological affordances allow for…
• data from crowds of non-professional participants
• average citizens reporting on activities on-the-ground during
a disaster
• a way of mitigating the impacts of and speeding up the
recovery from extreme events
• is ubiquitous, rapid and accessible
• empowers average citizens to become more situationally
aware during disasters
• coordinate to help themselves
3. Problem Statement: Despite the evidence of strong value to
those experiencing the disaster and those seeking information
concerning the disaster, there has been very little uptake of
message data by large-scale, disaster response organizations
Research Questions:
(1) What are the criteria for measurement, standards and threshold for
relevant, trustworthy and actionable data to disaster response
organizations?
(2) How can automatic measures of trust be incorporated into
organizational decision-making practices so that the serving of these
data occurs at the appropriate time, in the appropriate form, to the
appropriate person, and the appropriate level of confidence?
4. Research Goal
• Map the information needs and
flow through response
organizations
• Map patterns of decisions
made during a disaster
response, types and forms of
data inputs to those decisions,
and varying standards for
relevance and veracity for each
• Understand the data
requirements at decision points
during a response
5. Old History
ISCRAM 2011—
• We reported that microblogged data produced by citizens were akin to
food that responding organizations could not eat
• Responding organizations saw the data as untrustworthy, they could not
be inserted into the critical decision tree of the organization
Data quality was the
single most important
determining factor in use
6. We considered these to be three discreet options, with larger community
favoring the third, most technical choice
However, after our second round of data collection, we see these three
potential paths all playing out in some fashion and often overlapping
Our second round of data collection has shown us that informational
needs of humanitarian organizations responding to a crisis are
varied, and standards for quality of that data also varies
ISCRAM 2011
We offered three potential paths
toward increased microblogged
data use by humanitarian
organizations:
1. bounded microblogging environment
2. ambient or contextual use
3. computational solutions to
automating trustworthiness
7. New Story
• Beyond Data Quality
• Beyond Trustworthiness
• Fast, Good Enough Data
• From a community
The landscape of the use of microblogged data in crisis
response is varied, with pockets of use and acceptance
among organizations
Microblogged data is useful to responders in situations where
information is limited, such as at beginning of an emergency
response effort, and when risks of ignoring an accurate
response outweigh risks of acting on an incorrect one
8. THE GOOD ENOUGH PRINCIPLE IN
HUMANITARIAN ACTION
• There have always been imperfect data and knowledge
during disasters
• Act on good intelligence, not perfect
• Satisficing and good enough principles
• Strive for helpfulness, not accuracy
9. RESEARCH DESIGN
Our Team: EMERSE: Enhanced Messaging for Emergency
Response
Facilitated by our partner NetHope.org. Second Round of Data
Collection.
• Interviewed representatives from 21 of the 38
NetHope members
• Information managers associated with Emergency
Response
• Applied analytical induction coding process
10.
11. Findings: A Varied Landscape of Data Quality
Summary: Responders already make decisions based on imperfect data, often
from second-hand sources. The inherently chaotic nature of any disaster limits
responders’ ability to both gather and assess the quality of information from
traditional sources.
Subjects said:
• We use best data available, but in most cases high quality data is never
available
• We regret that better data was not typically available, acceptance that this
condition was part of the nature of their work, and understanding that despite
lack of perfect data hundreds of emergencies had been responded to
successfully, millions of lives had been saved and regions had been
reconstructed
12. Findings: A Varied Landscape of
Decisions
Summary: Information needs changed as
the disaster environment changed
Onset of a disaster needed to
understand context and scope of an
emergency, including size and location of affected
population and extent of damage to basic support
infrastructure
Later, they need information about specific gaps in availability of goods, services and
other forms of aid
Still later, they need information about operational coordination, i.e. who is
responding with what and where
Lastly, they need regular updates on the security situation, impact of intervention,
status of affected population, and constant inter-organizational coordination of
information
Microblogged data’s value as an information source is not a constant, and
would vary as a disaster response develops.
13. Findings: Data Type Influences the
Required Level of Data Quality
Summary: Requirements for data quality and trustworthiness
were variable depending on the type of question asked by the
responding organization
• initial awareness of a disaster they would accept a low or unknown
threshold for data quality in exchange for real time knowledge
• looked to social media data during first few days after a disaster for
contextual data
• Around half of subjects stated that they would listen to microblogged
data if it spoke of a security threat to NGO field workers, supplies or
camps
• some types of questions that required a very high level of confidence
in which microblogged data could not yet be used as a key input
14. Findings: Networks of Responders Cross Organizational
Boundaries
Summary: All subjects followed members of the humanitarian community
via social media.
• Each had a patchwork of different sources of microblogged data including
official accounts, unofficial and informal blogs of employees of these
organizations, employees of various organizations, blogs of humanitarian
focused or interested individuals and family and friends
• Personal social network was already producing trustworthy and
actionable data
• It served as a powerful informal source of information about the response
and the conditions during a disaster
15. Findings: Reliance on Volunteer and Technical
Communities
Summary: Subjects mentioned that they had already used
or were planning to use secondary microblogged data--
Twitter data that had been collected on a large scale and
processed by outside groups
• Expressed more trust of volunteer and technical communities
than original data-- Ushahidi, Crisis Mappers, The Standby
Task Force and the Digital Humanitarian Network
• They transferred expertise and trust to outside their
organization, to trusting volunteers processing data rather than
data itself
16. Discussion: Organic Bounded Trust Community
• A form of bounded environment has in part grown organically
• Employees and volunteers already working in relief sector have
become active social media users, perhaps overcoming a
technology adoption problem as previously suggested
• Participants in these networks are friends and friends of friends and
largely trusted, sharing same cultural understandings of
humanitarian response and practice
• This is largely informal, organic and crosses organizational borders
and hierarchies
• The data produced in these groups serves as supplemental input to
decisions made by organizational responders
17. Conclusions:
• Twitter is a food that has always
been consumed by response
community, but in varied forms and
times, which may or may not be
official or formal channels
• Encourage response organizations
to recognize their own current use of
microblogged or crowdsourced data
and validate that use with additional
organizational suppor
• Adjust organizational standards for
data quality and accuracy based on
type of decision
18. Encourage humanitarian
workers to use social media
regularly and build networks
organic network of humanitarian
microblogging users could serve as
a middle ground between traditional
data sources and unfiltered
microblogging data
• Non-competitive nature of goals of humanitarian response organizations
is ideal for fostering an environment for inter-organizational information
sharing
• Having an informal, everyday knowledge of what other humanitarian
workers are doing could lead to better organizational efficiency and co-
ordination of response and recovery efforts
• With use comes normalcy and trust
19. • Encourage response organizations to continue to pursue
computational and automatic solutions assessing accuracy
and trust in crowdsourced data
• Shift some of burden to outside volunteer organizations
• Ensuring that organizations that specialize in processing
microblogged data are producing reliable data could also
help encourage humanitarian response organizations to
use these sources