Mobile Internet's "Creative Destruction": Implications for Global Mobile PolicyMoving Media
Mobile Internet imbricated in current economic crisis & reshaping of geo-political & communication orders
not just mobiles + Internet, mobile Internet spans a complex assembly of emergent, hybrid media forms. From smartphones, tablets, and the apps phenomena, through new televisual ecologies and locative media, to pervasive computers, connected cars & smart cities.
Opening the Gates: Will Open Data Initiatives Make Local Governments in the P...Open Data Research Network
A research poster presented as part of the Exploring the Emerging Impacts of Open Data in Developing Countries project at the Research Sharing Event in Berlin, 15th July 2014. For more see http://www.opendataresearch.org/emergingimpacts/
Mobile Internet's "Creative Destruction": Implications for Global Mobile PolicyMoving Media
Mobile Internet imbricated in current economic crisis & reshaping of geo-political & communication orders
not just mobiles + Internet, mobile Internet spans a complex assembly of emergent, hybrid media forms. From smartphones, tablets, and the apps phenomena, through new televisual ecologies and locative media, to pervasive computers, connected cars & smart cities.
Opening the Gates: Will Open Data Initiatives Make Local Governments in the P...Open Data Research Network
A research poster presented as part of the Exploring the Emerging Impacts of Open Data in Developing Countries project at the Research Sharing Event in Berlin, 15th July 2014. For more see http://www.opendataresearch.org/emergingimpacts/
Observation of Katrina/Rita Groove Deployment: Addressing Social and Communi...Shelly D. Farnham, Ph.D.
In disaster environments, relief workers have a have strong need for ad ho communication and coordination, but are in an extremely challenged communication environment. This presentation summarizes findings of a study of a peer-to-peer communication technology (Groove) used by relief workers following Katrina, and based on results makes design recommendations.
Humanitarian emergencies: searching for Open Data - OKCon2013Anahi Iacucci
While a growing conversation is happening around Open Data as a driver for development and accountability, little, if any, is being said about the role of open data in humanitarian emergencies. While we ask governments to open all their data as a duty towards their citizens, humanitarian organizations seems to be pretty much left outside. Is there a need for open data in the humanitarian community space? What would it look like? Are transparency and accountability strictly linked to the healthy recovery of communities in emergencies? This talk will look at some of those questions and try to propose some solutions, drawing from the long-standing experience that Internews has in media and communication with communities during emergencies.
“Social Networking Sites: A Surveillance Studies Primer”
In recognizing social networking sites as sites of sociological concern, this presentation will offer a surveillance studies perspective to this topic. Using Facebook as a case study, a review of key surveillance material as well as preliminary findings will underscore directions for future research. In particular, the popularized and controversial practice of 'Facebook stalking' will serve to illustrate how lateral (or peer-to-peer) surveillance not only supplements, but may also amplify conventional forms of monitoring.
Questions:
1) Can practices such as deception or dissimulation on social networking sites be regarded as ways of resisting surveillance?
2) What kind of connections does Facebook enable between peer-based forms of surveillance, and practices such as employee screening?
Common Good Digital Framework Action Plan
PURPOSE
The Common Good Digital Framework (CGDF) will serve as a platform to bring
authoritative knowledge and raise awareness about violations of ethical values
and standards by governments and large organizations.
The platform will monitor and alert against the misuse of Artificial Intelligence
(AI), personal data, and neglect of cyber security. The objectives of the
campaign are to stimulate and galvanize civil society towards the need to create
new norms and regulations, and therein influence public and private AI and
cyber policy.
Remixing Public Health: Tools for Public Health InnovationJody Ranck
This is an extensive outline of some tools, trends, concepts, platforms and ideas that we can harness to drive innovation in public health and the Healthy Cities movement.
Observation of Katrina/Rita Groove Deployment: Addressing Social and Communi...Shelly D. Farnham, Ph.D.
In disaster environments, relief workers have a have strong need for ad ho communication and coordination, but are in an extremely challenged communication environment. This presentation summarizes findings of a study of a peer-to-peer communication technology (Groove) used by relief workers following Katrina, and based on results makes design recommendations.
Humanitarian emergencies: searching for Open Data - OKCon2013Anahi Iacucci
While a growing conversation is happening around Open Data as a driver for development and accountability, little, if any, is being said about the role of open data in humanitarian emergencies. While we ask governments to open all their data as a duty towards their citizens, humanitarian organizations seems to be pretty much left outside. Is there a need for open data in the humanitarian community space? What would it look like? Are transparency and accountability strictly linked to the healthy recovery of communities in emergencies? This talk will look at some of those questions and try to propose some solutions, drawing from the long-standing experience that Internews has in media and communication with communities during emergencies.
“Social Networking Sites: A Surveillance Studies Primer”
In recognizing social networking sites as sites of sociological concern, this presentation will offer a surveillance studies perspective to this topic. Using Facebook as a case study, a review of key surveillance material as well as preliminary findings will underscore directions for future research. In particular, the popularized and controversial practice of 'Facebook stalking' will serve to illustrate how lateral (or peer-to-peer) surveillance not only supplements, but may also amplify conventional forms of monitoring.
Questions:
1) Can practices such as deception or dissimulation on social networking sites be regarded as ways of resisting surveillance?
2) What kind of connections does Facebook enable between peer-based forms of surveillance, and practices such as employee screening?
Common Good Digital Framework Action Plan
PURPOSE
The Common Good Digital Framework (CGDF) will serve as a platform to bring
authoritative knowledge and raise awareness about violations of ethical values
and standards by governments and large organizations.
The platform will monitor and alert against the misuse of Artificial Intelligence
(AI), personal data, and neglect of cyber security. The objectives of the
campaign are to stimulate and galvanize civil society towards the need to create
new norms and regulations, and therein influence public and private AI and
cyber policy.
Remixing Public Health: Tools for Public Health InnovationJody Ranck
This is an extensive outline of some tools, trends, concepts, platforms and ideas that we can harness to drive innovation in public health and the Healthy Cities movement.
SPEAK Social media and crisis communication during cascading disasters, Elisa...Global Risk Forum GRFDavos
6th International Disaster and Risk Conference IDRC 2016 Integrative Risk Management - Towards Resilient Cities. 28 August - 01 September 2016 in Davos, Switzerland
The UNDP is providing travel scholarships for up to 25 people for our upcoming Climate Action Hackathon. This is a huge opportunity! Apply today. https://lnkd.in/eFCaq4q
Big Ideas, Visionaries, Amateur Forecasters and Computer Developers Welcome at UNDP Climate Information for a Resilient Africa Event
What’s It All About
Innovation, out-of-the-box-thinking, big ideas, and smart applications of technology have the potential to significantly impact the way weather information is shared across Africa. And in a world where information is power – and climate change is producing more severe storms and temperature fluctuations that affect vulnerable African communities – access to accurate and timely weather forecasts can work toward reducing poverty, empowering rural communities and saving lives.
With the goal of creating an innovation-driven crowd-sourced space for big thinkers and techno-visionaries to come together, the UNDP’s Programme on Climate Information for Resilient Development in Africa (CIRDA) is inviting developers, mobile application gurus, students and developers to this three-day hackathon and innovations incubator.
The Climate Action Hackathon will run in parallel with a multinational UNDP workshop addressing “The Last Mile: Saving lives, improving livelihoods and increasing resiliency with tailored weather information services for a changing climate.”
Participants will have access to leaders in meteorology, technology, sustainable development and communications. They will work individually or in teams to create mobile applications, technology solutions or data-crunching systems that address Africa’s persistent challenges in adapting to climate change, and sharing early warnings and accurate climate information across the continent.
The Climate Action Hackathon Challenge
• Create prototype mobile and information-system-based applications and technological solutions to share actionable weather and climate information with a variety of stakeholders, sectors and end-users.
• Connect technology with people to bridge the last mile.
• Build scalable systems that react to more frequent storms, increase in lightning, erratic weather patterns and long-term climate change.
• Create technological solutions that are built for Africa and solve local challenges.
• Design and develop next-generation applications to improve on existing systems and methodologies to use climate information and reach end users.
• Leverage existing information, networks and human capacity to seed innovation.
• Communicate existing climate information in an innovative and easy-to-understand manner to catalyze action, improve productivity, save lives and empower end-users.
#COVIDaction, a partnership between DFID’s Frontier Technology Hub, Global Disability (GDI) Hub, UCL Institute of Healthcare Engineering along with other collaborators will be working to build a technology and innovation pipeline to support action related to the COVID pandemic.
Law Enforcement & Social Media: Enhancing Response, Communication, and Public...Corey Olszewski
Class presentation for Technology in Emergency Management at UNT's Emergency Management degree program. This presentation details a strategy for law enforcement agencies to use social media to enhance response, and community relations.
This presentation is for education use only.
Effective Whole Community Digital Communications PlanningCarol Spencer
This presentation describes the elements of an effective communications plan. Topics include determining demographics, channel creation, interfacing with government agencies and public sector stakeholders, policy development, embracing the whole community approach (including second responders, local actors), marketing strategies and more. Practical information supplements speaker experiences as government and citizen volunteer communicators during Hurricane Irene, Superstorm Sandy, the Joplin (MO) Tornado and other emergencies. This was presented at the 2016 World Conference on Disaster Management in Toronto CA, June 7 - 8, 2016.
Utilize Digital and Social Media Data to Inform Your Research in Novel WaysKatja Reuter, PhD
In collaboration with Audun Utengen and Thomas Lee from Symplur LLC, we explore the usage of digital and social media data to inform research in novel ways and discover emerging health trends, disease communities and outreach mechanisms.
This presentation is part of the Digital Scholar Training Series at USC and CHLA.
Learn more about the initiative: http://sc-ctsi.org/digital-scholar/
News story: http://sc-ctsi.org/index.php/news/new-digital-scholar-training-initiative-helps-researchers-better-utilize-we#.VDhIWWK9mKU
Effective Whole Community Digital Communications PlanningCarol Spencer
Presented at Emergency Managers Association of Texas (EMAT) Symposium in March 2017, this presentation provides recommendations and information about putting together and implementing a digital communications plan for emergencies.
Signal - social media, considerations for public safety and emergency managementIntergen
Social media’s significant usage and ongoing growth creates
opportunity for public safety and emergency management.
Information in and around social media can greatly enhance
intelligence and the common operating picture.
The now commonplace use of social media should encourage
public safety and emergency management agencies to get
involved. The level of involvement can be staged with
monitoring usually being the best place to start.
Many social media monitoring tools have been created to help
organisations manage the deluge of information and gain
intelligence. However, not all tools are alike especially when
it comes to features specific to public safety and emergency
management. Organisations should consider their requirements
carefully when investing in social media monitoring.
OCHA Think Brief - Hashtag Standards for emergenciesJan Husar
POLICY AND STUDIES SERIES
These short think pieces are non-papers that present
relatively new ideas that require testing and validation.
The objective of the Think Brief is to generate feedback,
views and advice. The Think Briefs do not necessarily
represent the official views of OCHA
ScenarioYou are an employee at D&B Investigations, a firm that c.docxjeffsrosalyn
Scenario
You are an employee at D&B Investigations, a firm that contracts with individuals, companies, and government agencies to conduct computer forensics investigations. D&B employees are expected to observe the following tenets, which the company views as the foundation for its success:
· Give concerted attention to clients’ needs and concerns.
· Follow proper procedures and stay informed about legal issues.
· Maintain the necessary skill set to apply effective investigative techniques using the latest technologies.
Your manager has just scheduled a meeting with an important prospective client, and she has asked you to be part of the team that is preparing for the meeting. The prospective client is Brendan Oliver, a well-known celebrity. Last night, Mr. Oliver’s public relations team discovered that someone obtained three photos that were shot on his smartphone, and tried to sell the photos to the media. Due to the sensitive nature of the photos, Mr. Oliver and his team have not yet contacted law enforcement. They would like to know if D&B can provide any guidance or support related to the investigation—or, at the very least, if D&B can help them prevent similar incidents from occurring in the future. At this time, they do not know how the photos were acquired. The public relations team is wondering if a friend, family member, or employee could have gained direct access to Mr. Oliver’s phone and obtained the photos that way, although the phone is usually locked with a passcode when Mr. Oliver is not using it. In addition, Mr. Oliver emailed the photos to one other person several months ago. He has not spoken with that person in the last few weeks, but he does not believe that person would have shared the photos with anyone else.
Your manager plans to use this initial meeting with Mr. Oliver and his public relations team to establish rapport, learn more about the case, and demonstrate the firm’s expertise. The company sees this as an opportunity to build future business, regardless of whether they are retained to help with the investigation of this case.
Tasks
To help the team prepare for the meeting, your manager asks you (and your colleagues) to consider and record your responses the following questions:
· What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation?
· Based on the limited information provided in the scenario, what is the rationale for launching an investigation that uses computer forensic activities? Would D&B and/or law enforcement need
· additional information in order to determine if they should proceed with an investigation? Why or why not?
· What would you share with the client about how investigators prepare for and conduct a computer forensics investigation? Identify three to five key points that are most relevant to this case.
· What sources of evidence would investigators likely examine in this case? Provide concrete examples and explain your rationale.
.
Similar to Social Media as a Record for Public Services and Utilities in a Disaster (20)
GridMate - End to end testing is a critical piece to ensure quality and avoid...ThomasParaiso2
End to end testing is a critical piece to ensure quality and avoid regressions. In this session, we share our journey building an E2E testing pipeline for GridMate components (LWC and Aura) using Cypress, JSForce, FakerJS…
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
Pushing the limits of ePRTC: 100ns holdover for 100 daysAdtran
At WSTS 2024, Alon Stern explored the topic of parametric holdover and explained how recent research findings can be implemented in real-world PNT networks to achieve 100 nanoseconds of accuracy for up to 100 days.
In his public lecture, Christian Timmerer provides insights into the fascinating history of video streaming, starting from its humble beginnings before YouTube to the groundbreaking technologies that now dominate platforms like Netflix and ORF ON. Timmerer also presents provocative contributions of his own that have significantly influenced the industry. He concludes by looking at future challenges and invites the audience to join in a discussion.
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...SOFTTECHHUB
The choice of an operating system plays a pivotal role in shaping our computing experience. For decades, Microsoft's Windows has dominated the market, offering a familiar and widely adopted platform for personal and professional use. However, as technological advancements continue to push the boundaries of innovation, alternative operating systems have emerged, challenging the status quo and offering users a fresh perspective on computing.
One such alternative that has garnered significant attention and acclaim is Nitrux Linux 3.5.0, a sleek, powerful, and user-friendly Linux distribution that promises to redefine the way we interact with our devices. With its focus on performance, security, and customization, Nitrux Linux presents a compelling case for those seeking to break free from the constraints of proprietary software and embrace the freedom and flexibility of open-source computing.
Communications Mining Series - Zero to Hero - Session 1DianaGray10
This session provides introduction to UiPath Communication Mining, importance and platform overview. You will acquire a good understand of the phases in Communication Mining as we go over the platform with you. Topics covered:
• Communication Mining Overview
• Why is it important?
• How can it help today’s business and the benefits
• Phases in Communication Mining
• Demo on Platform overview
• Q/A
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Unlocking Productivity: Leveraging the Potential of Copilot in Microsoft 365, a presentation by Christoforos Vlachos, Senior Solutions Manager – Modern Workplace, Uni Systems
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024Neo4j
Neha Bajwa, Vice President of Product Marketing, Neo4j
Join us as we explore breakthrough innovations enabled by interconnected data and AI. Discover firsthand how organizations use relationships in data to uncover contextual insights and solve our most pressing challenges – from optimizing supply chains, detecting fraud, and improving customer experiences to accelerating drug discoveries.
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Epistemic Interaction - tuning interfaces to provide information for AI supportAlan Dix
Paper presented at SYNERGY workshop at AVI 2024, Genoa, Italy. 3rd June 2024
https://alandix.com/academic/papers/synergy2024-epistemic/
As machine learning integrates deeper into human-computer interactions, the concept of epistemic interaction emerges, aiming to refine these interactions to enhance system adaptability. This approach encourages minor, intentional adjustments in user behaviour to enrich the data available for system learning. This paper introduces epistemic interaction within the context of human-system communication, illustrating how deliberate interaction design can improve system understanding and adaptation. Through concrete examples, we demonstrate the potential of epistemic interaction to significantly advance human-computer interaction by leveraging intuitive human communication strategies to inform system design and functionality, offering a novel pathway for enriching user-system engagements.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
Dr. Sean Tan, Head of Data Science, Changi Airport Group
Discover how Changi Airport Group (CAG) leverages graph technologies and generative AI to revolutionize their search capabilities. This session delves into the unique search needs of CAG’s diverse passengers and customers, showcasing how graph data structures enhance the accuracy and relevance of AI-generated search results, mitigating the risk of “hallucinations” and improving the overall customer journey.
Social Media as a Record for Public Services and Utilities in a Disaster
1. Social Media as a Record for Public
Services and Utilities in a Disaster
How Government and Public Utilities used Social
Media during “Post-Tropical Cyclone” Sandy
2. People Like Social Media
Pew Research Center’s Internet & American Life Project
• 65% of adult internet users now say they use a social networking site
like MySpace, Facebook or LinkedIn. (2011)
• 74% of smartphone owners use their phone to get real-time locationbased information. (2012)
• Some 15% of online adults use Twitter. (2012)
Dartmouth Survey: Social Media Use by Fortune 500 Companies
• 73% of Gas and Electric Utilities (16 of 22) used Twitter,
50% used Facebook, and 27% hosted a blog. (2012)
Red Cross Survey (July 2010)
• Social media sites ranked fourth as a resource for emergency
information behind television news, radio and online news sites
• One in five would try to contact responders through a digital means
such as e-mail, websites or social media
• Nearly half believe a response agency is probably already responding
to any urgent request they might see
3. Social Media can be a Record
“Made or received by an organization in pursuance of legal
obligations or in the transaction of business” — ARMA
However
“The scope of discovery of electronically stored information does
not depend on the internal designation or records classification
that may or may not have been assigned to it. Any electronically
stored information, whether or not it is internally viewed as of
business, legal, regulatory, or personal value, is potentially
discoverable.” — The Sedona Conference
4. Social Media Policy
AIIM International
• Integrate social media into an organization’s existing
governance policy.
• Policy should be “channel-neutral”.
Patricia Franks, San Jose State University SLIS
• Guided by the Generally Accepted Recordkeeping
Principles.
• Create a crosswalk between the existing records
retention schedule and records generated through
social media.
5. Sample from Patricia Franks RACO 2011 Presentation:
“How Federal Agencies Can Effectively Manage Records Created Using New Social Media Tools”
6. Social Media and Sandy
Disasters = Unique Communication Environment
Time-Sensitive: Little time for reflection, open debate, rebuttals
Suppression: No longer an option
Counter
• Outdated, inaccurate, or
false information
• Malicious use
Provide
• “Expand the use of newer technologies to communicate with
customers during outages (i.e. email, text messaging, and
social media).” — Utility Performance Report Following Hurricane Irene
and Tropical Storm Lee NYS Public Service Commission, June 2012
7. Social Media and Sandy
Six Categories of Social Media Use in a Disaster
• Public safety and crisis information disseminated
before, during, and after various incidents;
• Notifications for training or mobilizing first responders;
• Sending emergency warnings and alerts;
• Gaining situational awareness and utilizing multi-directional
communications;
• Responding to requests for assistance;
• Aiding in recovery efforts.
Social Media and Disasters: Current Uses, Future Options, and Policy
Considerations, Congressional Research Service, Sept. 2011
8. Social Media and Sandy
Public safety and crisis information disseminated
before, during, and after
9. Social Media and Sandy
Public safety and crisis information disseminated
before, during, and after
17. Social Media and Sandy
Not Aiding in recovery efforts with incomplete information
3 Days Apart
18. Social Media and Sandy
Notifications for training or mobilizing first responders
(not really this time)
19. Social Media and Sandy
GARP
Accountability and Transparency
• Documented and approved social media policy or that social
media is included in a “channel-neutral” communications
policy or internet policy.
• Tool-specific and sector-specific procedures.
• Have print copies of policy and procedures at backup site.
• Specify who will manage social media accounts during a
disaster and train them
on special case usage.
20. Social Media and Sandy
GARP
Integrity and Protection
• Clearly link identity to the organization and comply with
the social media/communications policy
• Ensure protection of data by updating data maps of the
physical locations of all electronically stored records
• Vet the reliability of any third party vendor
• Alternative channels if platform goes down
• Keep account in the hands of appropriate users and
avoid malicious hijacking
21. Social Media and Sandy
GARP
Compliance
• Maintain records in keeping with company policy, applicable
local, state, or federal laws as well as any industry regulations.
• Evaluate the risks and
benefits of channel silence
on an issue.
22. Social Media and Sandy
GARP
Availability, Retention, and Disposition
• Evaluate services for capture, indexing, and retrieval
(ArchiveSocial, Next Point CloudPreservation, Hanzo Archives)
• Evaluate appropriate posting tools
(Hootsuite, Radian 6)
• Limits of control over third-party software:
What if needed for longer than the terms of service allows?
What if records should not exist as long as services maintain?
23. Resources
• Franks, Patricia “How Federal Agencies Can Effectively
Manage Records Created Using New Social Media Tools” IBM
Center for The Business of Government, 2012
• Lindsay, Bruce “Social Media and Disasters: Current
Uses, Future Options, and Policy Considerations” Library of
Congress, Congressional Research Service, Sept. 6, 2011
• Redgrave, Jonathan “The Sedona Principles (Second Edition)”
The Sedona Conference, June 2007
• “Best Practices Study of Social Media Records Policies” ACTIAC Collaboration & Transformation (C&T) Shared Interest
Group (SIG), March 2011