This document outlines opportunities and challenges in crisis informatics, which is an integrated approach to the technical, social, and informational aspects of crises. It begins with definitions of key terms like crisis informatics and crowdsourcing. It then discusses types of social media and ways crowdsourcing is used during crises. Opportunities of crisis informatics include citizen-based hazard science, situational awareness, and damage estimates. Challenges include ensuring data quality, integrating crowdsourced and authoritative data, and addressing legal/policy issues. The document concludes by identifying priority research challenges such as developing validation methods and best practices for data integration.
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaSyed Peer
“Securing the Critical Infrastructure Networks Effectively” - Is OT the Weakest Link in Securing the Critical Infrastructure?
Cyber Attacks has consistently ranked among the top threats faced by businesses. Cyber Security as a subject that has now reached boardroom agendas. There have been proposals to link Cyber Security to CEO performance and pays. The point only underlines the critical nature and importance of Cyber Security to Businesses.
In an OT environment, the threat is amplified much more because it can have ramifications that impact human lives and their safety.
Technologies and Policies for a Defensible Cyberspacemark-smith
Whether curious or malicious hackers, organized criminals, or national spies or soldiers, for decades, those who want to use cyberspace to attack have held nearly all the cards. Cyber attack has been, for decades, far easier than cyber defense.
Summary of leadership roles, professional activities and memberships, speeches, and published writings in the areas of cybersecurity, homeland security, emerging technologies, and government affairs
Social media platforms have become the norm for companies to engage with customers and communicate information with the rest of the world. These networks also provide data that, when used with social monitoring tools, can be used to mitigate security issues before they become a major problem.
In this presentation you can learn how some of the world’s leading companies are using social intelligence to monitor security threats, identify liabilities, and get ahead of risk.
Covered:
Cyber security attacks
Fraud detection
Intellectual property protection
Executive and talent threats
What should organizations be concerned about when using Machine Learning for Predictive Modeling techniques? Divergence Academy and Divergence.AI are leading efforts to bring Algorithmic Accountability awareness to masses.
Socialsensor project overview and topic discovery in tweeter streams Yiannis Kompatsiaris
A description of SocialSensor project motivation, objectives and use cases in news and infotainment. First results in topic discovery in tweeter streams.
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsMike Kujawski
These are my slides from a custom tool-based demonstration workshop I was asked to do where I went over various free tools that can be used to obtain valuable public data.
Big Data for Development: Opportunities and Challenges, Summary SlidedeckUN Global Pulse
Summary points from UN Global Pulse White Paper "Big Data for Development: Opportunities & Challenges." See: http://www.unglobalpulse.org/BigDataforDevelopment
Collaborative mapping is the crucial need in any rescue and relief operation. Our recent experience lead us to focus the research on the development of a unique platform [web and mobile] that allows different levels of geolocated information sharing, on a “user permissions” base [anonymus user, registered user level 1, ….]. Our approach is to use the solutions that are free and open [such as Google Maps, Google Earth, Google 3d, Ushahidi, OpenStreetMap, or Android apps for route tracking] and to develop a stable tool through the integration of diverse solutions ensuring a high level of sharing and collaboration among different players.
GCC Operational Technology Security Forum & Exhibition, 21-23 March 2017, DohaSyed Peer
“Securing the Critical Infrastructure Networks Effectively” - Is OT the Weakest Link in Securing the Critical Infrastructure?
Cyber Attacks has consistently ranked among the top threats faced by businesses. Cyber Security as a subject that has now reached boardroom agendas. There have been proposals to link Cyber Security to CEO performance and pays. The point only underlines the critical nature and importance of Cyber Security to Businesses.
In an OT environment, the threat is amplified much more because it can have ramifications that impact human lives and their safety.
Technologies and Policies for a Defensible Cyberspacemark-smith
Whether curious or malicious hackers, organized criminals, or national spies or soldiers, for decades, those who want to use cyberspace to attack have held nearly all the cards. Cyber attack has been, for decades, far easier than cyber defense.
Summary of leadership roles, professional activities and memberships, speeches, and published writings in the areas of cybersecurity, homeland security, emerging technologies, and government affairs
Social media platforms have become the norm for companies to engage with customers and communicate information with the rest of the world. These networks also provide data that, when used with social monitoring tools, can be used to mitigate security issues before they become a major problem.
In this presentation you can learn how some of the world’s leading companies are using social intelligence to monitor security threats, identify liabilities, and get ahead of risk.
Covered:
Cyber security attacks
Fraud detection
Intellectual property protection
Executive and talent threats
What should organizations be concerned about when using Machine Learning for Predictive Modeling techniques? Divergence Academy and Divergence.AI are leading efforts to bring Algorithmic Accountability awareness to masses.
Socialsensor project overview and topic discovery in tweeter streams Yiannis Kompatsiaris
A description of SocialSensor project motivation, objectives and use cases in news and infotainment. First results in topic discovery in tweeter streams.
Introduction to the Responsible Use of Social Media Monitoring and SOCMINT ToolsMike Kujawski
These are my slides from a custom tool-based demonstration workshop I was asked to do where I went over various free tools that can be used to obtain valuable public data.
Big Data for Development: Opportunities and Challenges, Summary SlidedeckUN Global Pulse
Summary points from UN Global Pulse White Paper "Big Data for Development: Opportunities & Challenges." See: http://www.unglobalpulse.org/BigDataforDevelopment
Collaborative mapping is the crucial need in any rescue and relief operation. Our recent experience lead us to focus the research on the development of a unique platform [web and mobile] that allows different levels of geolocated information sharing, on a “user permissions” base [anonymus user, registered user level 1, ….]. Our approach is to use the solutions that are free and open [such as Google Maps, Google Earth, Google 3d, Ushahidi, OpenStreetMap, or Android apps for route tracking] and to develop a stable tool through the integration of diverse solutions ensuring a high level of sharing and collaboration among different players.
Web and mobile emergency networks to real-time information and geodata management.
Authors: DI LOLLI - LANFRANCO - LOMBARDO - RAPISARDI
VVF TAS Torino | Università di Torino | NatRisk | Open Resilience
Big data, democratized analytics and deep context, CIDPNSI
Paper analyzes how big data, democratized analytics, deep context are changing how we think and do development. Outlines key new technologies, analysis techniques and tools that will have a major impact on development research. Classifies into data, analytics and feedback layer.
From Research to Applications: What Can We Extract with Social Media Sensing?Yiannis Kompatsiaris
SIGMAP22 Keynote Presentation:
Social media have transformed the Web into an interactive sharing platform where users upload data and media, comment on, and share this content within their social circles. The large-scale availability of user-generated content in social media platforms has opened up new possibilities for studying and understanding real-world phenomena, trends and events. Social media and websites provide an access to public opinions on certain aspects and therefore play an important role in getting insights on targeted audiences. The objective of this talk is to provide an overview of social media mining, including key aspects such as data collection, multimodal analysis and visualization. Challenges, such as fighting misinformation, will be presented together with applications, results and demonstrations from multiple areas including: news, environment, security, interior and urban design.
Efficient Data Filtering Algorithm for Big Data Technology in Telecommunicati...Onyebuchi nosiri
Efficient data filtering algorithm for Big Data technology Telecommunication is a concept aimed at effectively filtering desired information for preventive purposes, the challenges posed by unprecedented rise in volume, variety and velocity of information has necessitated the need for exploring various methods Big Data which is simply a data sets that are so large and complex that traditional data processing tools and technologies cannot cope with is been considered. The process of examining such data to uncover hidden patterns in them was evolved, this was achieved by coming up with an Algorithm comprising of various stages like Artificial neural Network, Backtracking Algorithm, Depth First Search, Branch and Bound and dynamic programming and error check. The algorithm developed gave rise to the flowchart, with each line of block representing a sub-algorithm.
IQPC Enterprise IT Security Exchange, March 10, 2013
This presentation looks at the risks and rewards and security and privacy implications of Big Data Analytics.
Data Science Innovations : Democratisation of Data and Data Science suresh sood
Data Science Innovations : Democratisation of Data and Data Science covers the opportunity of citizen data science lying at the convergence of natural language generation and discoveries in data made by the professions, not data scientists.
Similar to Opportunities and Challenges in Crisis Informatics (20)
Data Science Innovations : Democratisation of Data and Data Science
Opportunities and Challenges in Crisis Informatics
1. Opportunities and Challenges
in Crisis Informatics
COMMONS LAB
WOODROW WILSON CENTER
WASHINGTON, DC
PRESENTED TO WHITE HOUSE SENIOR STEERING
COMMITTEE ON BIG DATA
13 DECEMBER 2012
4. Crisis Informatics
Definition: An integrated approach to the technical,
social, and informational aspects of crises.
—Coined by Hagar (2006, 2010), Palen (2007, 2011)
Scope: Full life-cycle of a crisis
Focus: Needs and contributions of the public
5. Crowdsourcing
The usage of distributed, voluntary collaboration from
a (networked) community of users/participants, often
through an open call. —Jeff Howe (2006)
Crowdsourcing crisis reports after 2011 typhoon in
Phillipines, Source: iRevolution.net
6. Crowdmapping
Crowdsourced mapping, or the aggregation of crowd-
generated inputs, such as SMS text messages and social
media feeds, with geographic information and imagery
to provide real-time, interactive information.
Related:
Crisismapping,
Community Remote
Sensing, VGI,
Participatory
Geoweb
Philippines Flood Map 2012, Source: Ushahidi
15. Opportunities
Citizen-based hazards science
Hazards detection
Public safety and crisis information
Tracking what the “crowd” is discussing
Public engagement and trust building
Fostering transparency
Emergency warnings and alerts
Situational awareness
Requests for assistance
Damage estimates
Locating missing persons
Spotting rumors and viral information
Finding hidden problems
Determining who is influential
Leveraging the “Capable Crowd”
16. USGS Did You Feel It?
Rapid and automatic intensity maps
based on felt reports submitted
online by the public.
• 2011 VA Earthquake : 142k reports
(45k/hour)
• United States: 2+ million reports in the
last decade.
• Globally: 190k responses in 9,500 cities
in 140 countries.
• Pilots – Twitter Earthquake Dispatch,
NetQuakes, Did You See It?
17. Open Street Map – Haiti 2010
http://www.maploser.com/2010/09/06/openstreetmap-in-the-first-month-after-the-haiti-quake/
18. Gulu, Uganda:
U.S. State Department
HIU worked with
Humanitarian Open
Street Map Team
(H.O.T.) to deliver
high-resolution
commercial satellite
imagery to “the crowd”
for a Red Cross disaster
reduction project.
19. Tracking Population Movement
Figure 2. Est. distribution of persons who Figure 5. Average daily numbers of SIMs
moved out of Port-au-Prince after the moving out of the cholera outbreak area.
earthquake.
Bengtsson L, Lu X, Thorson A, Garfield R, et al. (2011) Improved Response to Disasters and Outbreaks by Tracking Population
Movements with Mobile Phone Network Data: A Post-Earthquake Geospatial Study in Haiti. PLoS Med 8(8): e1001083.
doi:10.1371/journal.pmed.1001083
http://www.plosmedicine.org/article/info:doi/10.1371/journal.pmed.1001083
21. Agency Mission and Needs
What information do local and national
government decision-makers need for
disaster response and recovery? For
scientific research?
Where might governments effectively
leverage social networking and
crowdsourcing for disaster management?
What policy frameworks will need to be
adapted or established?
22. Crowdsourced Data Quality
What tools and methods have been
developed for validation and
verification of crowdsourced data?
How does the accuracy and efficiency
compare to other data sets?
Under what circumstances might
crowdsourced data fill gaps or be more
useful than traditional sources?
23. Data Collection and Management
How can government integrate
crowdsourced data with authoritative
data sets?
What issues emerge when using fused
data sets?
What methods and processes have
governments put into place to support
crowdsourcing?
24. Impact Evaluation
How do we measure the impact? How do
we define success?
What forms of monitoring and evaluation
are effective?
How can we develop an iterative design
process with a positive measureable
impact?
25. Public and Volunteer Engagement
What are potential models for
successful participatory engagement?
What effective techniques for
engaging and motivating volunteers?
What types of organizational
structures, protocols, and processes
have proven effective?
26. Research Challenges
Technology mediated- Information security
behavior and reputation systems
Data integration and Legal and policy issues
system interoperability
Ethics and codes of
Information extraction conduct
and natural language
processing
27. Priority Research Challenges
Create durable workflows to connect the info needs
of responders and government decision-makers with
info providers.
Develop methods to quickly verify and validate
crowdsourced data.
Establish best practices of integrating
crowdsourced and authoritative datasets.
Construct methods and processes that can streamline
this integration and synthesis.
28. Priority Research Challenges
Determine where governments can effectively
leverage social networking and crowdsourced data to
augment existing info or intelligence for improved
decision-making. Conversely, determine where it is not
appropriate.
Determine which policies need to be adapted or
established. Develop ways for agencies to look ahead in
their policymaking 5-10 years with rapid technological
change – “Strategic Foresight.”
29. Research-and-Operations
How does a government agency turn new capabilities
into official processes?
How does an agency look out 10-20 years and build
processes with uncertainty and adaptation as part of
the design?
30. Legal and Policy Issues
Liability/Risk Mitigation Strategies
http://www.scribd.com/collections/3840667/Commons
-Lab-Science-and-Technology-Innovation-Program-STIP
http://wilsoncommonslab.org/2012/11/07/calling-for-
backup-indemnification-for-digital-volunteers/
Privacy
Statutes and Regulations
Data Ownership/Terms of Service
Records Management and Retention
Procurement Rules
31. Security of Crowdsourcing
What are the emerging security standards for
crowdsourcing?
How should governments approach the use of
crowdsourcing data to make decisions under
conditions of uncertainty?
How does this differ from the usual “fog of war” that
surrounds disasters?
33. Wilson Center Commons Lab
Lea Shanley, Director, Commons Lab
Science and Technology Innovation Program
Woodrow Wilson International Center for Scholars
Washington, DC USA
Facebook http://www.facebook.com/CommonsLab
Blog http://CommonsLab.wilsoncenter.org
Email CommonsLab@wilsoncenter.org
Twitter @GeodataPolicy @STIPCommonsLab
34. G2G Workshop Materials
Background Materials and White Papers:
http://www.wilsoncenter.org/event/webcast-day-2-
connecting-grassroots-to-government-for-disaster-
management-policy-roundtable
Workshop Session Videos:
http://bit.ly/CommonsLabVideo
Workshop Summary and Policy Reports (In progress,
To be published in 2013):
http://bit.ly/CommonsLabReports
36. Wilson Center Commons Lab
Responding to Liability: Evaluating and
Reducing Tort Liability for Digital Volunteers
(2012)
Privacy and Missing Persons Registries in
Natural Disasters (2013)
Transforming Earthquake Detection and
Science Through Crowdsourcing (2013)
Security of Crowdsourcing (2013)
http://bit.ly/CommonsLabReports
37. Resources
The Evolving Role of the Public Information Officer: An Examination of Social Media and Emergency
Management
Amanda Hughes and Leysia Palen, EPIC Project, UC-Boulder, forthcoming in
Journal of Homeland Security and Emergency Management (2012)
http://epic.cs.colorado.edu
Trial by Fire: The Deployment of Trusted Digital Volunteers in the 2011 Shadow Lake Fire
Lise Ann St. Denis, Amanda Hughes, and Leysia Palen, EPIC Project, UC-Boulder (2012)
http://epic.cs.colorado.edu/wp-content/uploads/TrustedDigitalVolunteersStDenisHughesPalen.pdf
Disasters 2.0: The Application of Social Media Systems for Modern Emergency Management
Adam Crowe, CRC Press (2012)
2011 Social Media + Emergency Management Camp: Transforming the Response Enterprise
Clarence Wardell and Yee San Su, CNA (2011) http://www.wilsoncenter.org/event/social-media-
emergency-management-transforming-the-response-enterprise
Optimizing Citizen Engagement During Emergencies Through Use of Web 2.0 Technologies
Laurie Van Leuven, Naval Postgraduate School (2009)
http://edocs.nps.edu/npspubs/scholarly/theses/2009/Mar/09Mar_Van_Leuven.pdf