SlideShare a Scribd company logo
1 of 12
Public Safety Leader Decision Making in the Web 2.0+ Environment Glen Woodbury March 10, 2010
Some Background Thoughts Issues Quality of data Rate of adoption Lack of clarity Solutions Conceptualization Awareness/Education Exercises and Best Practices Requirements Technical Support Research Actions Web 2.0 Primer Study current use by public safety Study networks in disasters Incorporate SM tng and strategy support into federal tech assistance Develop WG and facilitate workshops Encourage private sector tech firms to engage with public safety community OGMA Workshop Report www.chds.us/?conferences/ogma_jun09
TRUST
Web 2.0+ Decision Spectrum INFLUENCE SUPPRESS ADAPT DEFER ADOPT DESIGN Decision-makers have options along the spectrum above in regards to how they might handle web 2.0 (or 3.0, 4.0, etc.) technologies and tools.
Web 2.0+ Decision Spectrum SUPPRESS ADAPT INFLUENCE DEFER ADOPT DESIGN Suppress – An organization issues policies or directorates that forbid the use of a particular technology. For example, an agency issues a prohibition on their employees’ ability to access Facebook. Or an intelligence fusion center forbids its analysts from accessing social networks due to civil liberty and privacy concerns.
Web 2.0+ Decision Spectrum SUPPRESS ADAPT INFLUENCE ADOPT DESIGN DEFER Defer – (ignore, abstain, dismiss) An organization decides to not use or not engage in technologies or tools even though their use is evident in their operating environment. For example, a public safety agency decides not to observe or utilize Twitter, Facebook, blogs, or other information sources even though they know that these forums are providing information to the public they are serving. Or the agency determines that engagement in a particular social networking information source would strip resources away from other requirements.
Web 2.0+ Decision Spectrum ADAPT SUPPRESS INFLUENCE DEFER ADOPT DESIGN Adapt (Reactive) – An organization observes the use of technologies and tools in their environment and decides to adjust its policies and procedures in order to participate in the same technological environment. For example, a fire agency discovers that the public is relying or acting on information from Twitter sources, so it decides to enter Twitter forums and generate its own content.
Web 2.0+ Decision Spectrum SUPPRESS ADAPT INFLUENCE DEFER DESIGN ADOPT Adopt (Proactive) – An organization decides, in advance of an event, to use technologies and tools that already exist and are being utilized in the public domain. For example, a police department decides, and plans for, the use of Facebook to provide information to the general public during a planned mass gathering event.
Web 2.0+ Decision Spectrum INFLUENCE SUPPRESS ADAPT DEFER ADOPT DESIGN Influence – An organization deliberately influences how a particular technology or tool is being used, maintained or operated. For example, a public health agency asks a technology provider to delay scheduled maintenance on its system so that important information can be delivered to the public at a certain time. Or the same agency asks the technology company to change a characteristic of its technology to better serve the requirements of the agency.
Web 2.0+ Decision Spectrum SUPPRESS ADAPT INFLUENCE DEFER ADOPT DESIGN Design – An organization determines requirements that might be served by new technologies and tools and seeks a design and production of a system to serve those needs.  For example, an emergency management agency desires a new way to hold collaborative planning discussions in a virtual environment and engages with a technology provider to build the product.
Is this essentially just about “information”? In a crisis, “you must treat information as a commodity as important as the more traditional and tangible commodities such as food, water, and shelter.” DHS Deputy Secretary Jane Hull Lute – March 8, 2010
Glen Woodbury Director Center for Homeland Defense and Security Naval Postgraduate School glwoodbu@nps.edu (831)656-3038 www.chds.us

More Related Content

Similar to Woodbury Pnnl Conference 3 10 2010 A

SMU CEHD Professional Development Webinar
SMU CEHD Professional Development WebinarSMU CEHD Professional Development Webinar
SMU CEHD Professional Development WebinarRick Reo
 
253 By Dr. Patricia Franks and Robert Smallwood .docx
253   By Dr. Patricia Franks and Robert Smallwood   .docx253   By Dr. Patricia Franks and Robert Smallwood   .docx
253 By Dr. Patricia Franks and Robert Smallwood .docxlorainedeserre
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEMShehanperamuna
 
Aging Services Expo Presentation
Aging Services Expo PresentationAging Services Expo Presentation
Aging Services Expo PresentationMary Derrick Cook
 
Immersion Program Presentation Web2
Immersion Program Presentation   Web2Immersion Program Presentation   Web2
Immersion Program Presentation Web2Rick Reo
 
Defense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 ArticleDefense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 ArticlePete Modigliani
 
After reading chapter 10Watch.. httpswww.youtube.comwatc.docx
After reading chapter 10Watch.. httpswww.youtube.comwatc.docxAfter reading chapter 10Watch.. httpswww.youtube.comwatc.docx
After reading chapter 10Watch.. httpswww.youtube.comwatc.docxnettletondevon
 
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...Jon Polenberg
 
July CLE Webinar material: Best Practices for Victim Response and Reporting o...
July CLE Webinar material: Best Practices for Victim Response and Reporting o...July CLE Webinar material: Best Practices for Victim Response and Reporting o...
July CLE Webinar material: Best Practices for Victim Response and Reporting o...LexisNexis
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Great Wide Open
 
Dig prof oer_mqb_sh_v4_june2011
Dig prof oer_mqb_sh_v4_june2011Dig prof oer_mqb_sh_v4_june2011
Dig prof oer_mqb_sh_v4_june2011SuzanneHardy
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxucisa
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,Jill Lyons
 
Jisc RSC Eastern Technical Managersforum Feb 2013 'Intrinsic Technology, Dunc...
Jisc RSC Eastern Technical Managersforum Feb 2013 'Intrinsic Technology, Dunc...Jisc RSC Eastern Technical Managersforum Feb 2013 'Intrinsic Technology, Dunc...
Jisc RSC Eastern Technical Managersforum Feb 2013 'Intrinsic Technology, Dunc...JISC RSC Eastern
 
Infodemic management - present and future
Infodemic management - present and futureInfodemic management - present and future
Infodemic management - present and futureTina Purnat
 
Donnia turner assistive technology
Donnia turner assistive technologyDonnia turner assistive technology
Donnia turner assistive technologydmturner30
 

Similar to Woodbury Pnnl Conference 3 10 2010 A (20)

SMU CEHD Professional Development Webinar
SMU CEHD Professional Development WebinarSMU CEHD Professional Development Webinar
SMU CEHD Professional Development Webinar
 
253 By Dr. Patricia Franks and Robert Smallwood .docx
253   By Dr. Patricia Franks and Robert Smallwood   .docx253   By Dr. Patricia Franks and Robert Smallwood   .docx
253 By Dr. Patricia Franks and Robert Smallwood .docx
 
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEMMIS  Notes For University Students.MANAGEMENT INFORMATION SYSTEM
MIS Notes For University Students.MANAGEMENT INFORMATION SYSTEM
 
Aging Services Expo Presentation
Aging Services Expo PresentationAging Services Expo Presentation
Aging Services Expo Presentation
 
Immersion Program Presentation Web2
Immersion Program Presentation   Web2Immersion Program Presentation   Web2
Immersion Program Presentation Web2
 
Defense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 ArticleDefense Acquisition Enterprise 2.0 Article
Defense Acquisition Enterprise 2.0 Article
 
After reading chapter 10Watch.. httpswww.youtube.comwatc.docx
After reading chapter 10Watch.. httpswww.youtube.comwatc.docxAfter reading chapter 10Watch.. httpswww.youtube.comwatc.docx
After reading chapter 10Watch.. httpswww.youtube.comwatc.docx
 
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
criminal_division_guidance_on_best_practices_for_victim_response_and_reportin...
 
July CLE Webinar material: Best Practices for Victim Response and Reporting o...
July CLE Webinar material: Best Practices for Victim Response and Reporting o...July CLE Webinar material: Best Practices for Victim Response and Reporting o...
July CLE Webinar material: Best Practices for Victim Response and Reporting o...
 
Em2 0 Empa
Em2 0 EmpaEm2 0 Empa
Em2 0 Empa
 
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
Open Source and Cyber Security: Open Source Software's Role in Government Cyb...
 
Dig prof oer_mqb_sh_v4_june2011
Dig prof oer_mqb_sh_v4_june2011Dig prof oer_mqb_sh_v4_june2011
Dig prof oer_mqb_sh_v4_june2011
 
UCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptxUCISA cyber incident response toolkit.pptx
UCISA cyber incident response toolkit.pptx
 
Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...Socially augmented software empowering software operation through social cont...
Socially augmented software empowering software operation through social cont...
 
Socialmedia guidelines
Socialmedia guidelinesSocialmedia guidelines
Socialmedia guidelines
 
Enterprise 20 Summary
Enterprise 20 SummaryEnterprise 20 Summary
Enterprise 20 Summary
 
According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,According To The Author Of “Build A Streamlined Refinery”,
According To The Author Of “Build A Streamlined Refinery”,
 
Jisc RSC Eastern Technical Managersforum Feb 2013 'Intrinsic Technology, Dunc...
Jisc RSC Eastern Technical Managersforum Feb 2013 'Intrinsic Technology, Dunc...Jisc RSC Eastern Technical Managersforum Feb 2013 'Intrinsic Technology, Dunc...
Jisc RSC Eastern Technical Managersforum Feb 2013 'Intrinsic Technology, Dunc...
 
Infodemic management - present and future
Infodemic management - present and futureInfodemic management - present and future
Infodemic management - present and future
 
Donnia turner assistive technology
Donnia turner assistive technologyDonnia turner assistive technology
Donnia turner assistive technology
 

More from Jarrod Olson

Graybeal Social Networking Emergency Management Brief
Graybeal   Social Networking Emergency Management BriefGraybeal   Social Networking Emergency Management Brief
Graybeal Social Networking Emergency Management BriefJarrod Olson
 
Graybeal Social Networking Emergency Management Brief
Graybeal   Social Networking Emergency Management BriefGraybeal   Social Networking Emergency Management Brief
Graybeal Social Networking Emergency Management BriefJarrod Olson
 
Graybeal Social Networking Emergency Management Brief
Graybeal   Social Networking Emergency Management BriefGraybeal   Social Networking Emergency Management Brief
Graybeal Social Networking Emergency Management BriefJarrod Olson
 
Facebook And Twitter As Emergency Management Communications Tool
Facebook And Twitter As Emergency Management Communications ToolFacebook And Twitter As Emergency Management Communications Tool
Facebook And Twitter As Emergency Management Communications ToolJarrod Olson
 
C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations Mornin...
C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations   Mornin...C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations   Mornin...
C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations Mornin...Jarrod Olson
 
Ann Housekeeping Presentation
Ann   Housekeeping PresentationAnn   Housekeeping Presentation
Ann Housekeeping PresentationJarrod Olson
 

More from Jarrod Olson (6)

Graybeal Social Networking Emergency Management Brief
Graybeal   Social Networking Emergency Management BriefGraybeal   Social Networking Emergency Management Brief
Graybeal Social Networking Emergency Management Brief
 
Graybeal Social Networking Emergency Management Brief
Graybeal   Social Networking Emergency Management BriefGraybeal   Social Networking Emergency Management Brief
Graybeal Social Networking Emergency Management Brief
 
Graybeal Social Networking Emergency Management Brief
Graybeal   Social Networking Emergency Management BriefGraybeal   Social Networking Emergency Management Brief
Graybeal Social Networking Emergency Management Brief
 
Facebook And Twitter As Emergency Management Communications Tool
Facebook And Twitter As Emergency Management Communications ToolFacebook And Twitter As Emergency Management Communications Tool
Facebook And Twitter As Emergency Management Communications Tool
 
C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations Mornin...
C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations   Mornin...C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations   Mornin...
C:\Documents And Settings\D3x495\Desktop\Presentations\Presentations Mornin...
 
Ann Housekeeping Presentation
Ann   Housekeeping PresentationAnn   Housekeeping Presentation
Ann Housekeeping Presentation
 

Recently uploaded

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 3652toLead Limited
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxOnBoard
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...HostedbyConfluent
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 

Recently uploaded (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
Tech-Forward - Achieving Business Readiness For Copilot in Microsoft 365
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Maximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptxMaximizing Board Effectiveness 2024 Webinar.pptx
Maximizing Board Effectiveness 2024 Webinar.pptx
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
Transforming Data Streams with Kafka Connect: An Introduction to Single Messa...
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 

Woodbury Pnnl Conference 3 10 2010 A

  • 1. Public Safety Leader Decision Making in the Web 2.0+ Environment Glen Woodbury March 10, 2010
  • 2. Some Background Thoughts Issues Quality of data Rate of adoption Lack of clarity Solutions Conceptualization Awareness/Education Exercises and Best Practices Requirements Technical Support Research Actions Web 2.0 Primer Study current use by public safety Study networks in disasters Incorporate SM tng and strategy support into federal tech assistance Develop WG and facilitate workshops Encourage private sector tech firms to engage with public safety community OGMA Workshop Report www.chds.us/?conferences/ogma_jun09
  • 4. Web 2.0+ Decision Spectrum INFLUENCE SUPPRESS ADAPT DEFER ADOPT DESIGN Decision-makers have options along the spectrum above in regards to how they might handle web 2.0 (or 3.0, 4.0, etc.) technologies and tools.
  • 5. Web 2.0+ Decision Spectrum SUPPRESS ADAPT INFLUENCE DEFER ADOPT DESIGN Suppress – An organization issues policies or directorates that forbid the use of a particular technology. For example, an agency issues a prohibition on their employees’ ability to access Facebook. Or an intelligence fusion center forbids its analysts from accessing social networks due to civil liberty and privacy concerns.
  • 6. Web 2.0+ Decision Spectrum SUPPRESS ADAPT INFLUENCE ADOPT DESIGN DEFER Defer – (ignore, abstain, dismiss) An organization decides to not use or not engage in technologies or tools even though their use is evident in their operating environment. For example, a public safety agency decides not to observe or utilize Twitter, Facebook, blogs, or other information sources even though they know that these forums are providing information to the public they are serving. Or the agency determines that engagement in a particular social networking information source would strip resources away from other requirements.
  • 7. Web 2.0+ Decision Spectrum ADAPT SUPPRESS INFLUENCE DEFER ADOPT DESIGN Adapt (Reactive) – An organization observes the use of technologies and tools in their environment and decides to adjust its policies and procedures in order to participate in the same technological environment. For example, a fire agency discovers that the public is relying or acting on information from Twitter sources, so it decides to enter Twitter forums and generate its own content.
  • 8. Web 2.0+ Decision Spectrum SUPPRESS ADAPT INFLUENCE DEFER DESIGN ADOPT Adopt (Proactive) – An organization decides, in advance of an event, to use technologies and tools that already exist and are being utilized in the public domain. For example, a police department decides, and plans for, the use of Facebook to provide information to the general public during a planned mass gathering event.
  • 9. Web 2.0+ Decision Spectrum INFLUENCE SUPPRESS ADAPT DEFER ADOPT DESIGN Influence – An organization deliberately influences how a particular technology or tool is being used, maintained or operated. For example, a public health agency asks a technology provider to delay scheduled maintenance on its system so that important information can be delivered to the public at a certain time. Or the same agency asks the technology company to change a characteristic of its technology to better serve the requirements of the agency.
  • 10. Web 2.0+ Decision Spectrum SUPPRESS ADAPT INFLUENCE DEFER ADOPT DESIGN Design – An organization determines requirements that might be served by new technologies and tools and seeks a design and production of a system to serve those needs. For example, an emergency management agency desires a new way to hold collaborative planning discussions in a virtual environment and engages with a technology provider to build the product.
  • 11. Is this essentially just about “information”? In a crisis, “you must treat information as a commodity as important as the more traditional and tangible commodities such as food, water, and shelter.” DHS Deputy Secretary Jane Hull Lute – March 8, 2010
  • 12. Glen Woodbury Director Center for Homeland Defense and Security Naval Postgraduate School glwoodbu@nps.edu (831)656-3038 www.chds.us