Citizen-to-Citizen Resource Sharing in Emergency Response

Author(s):  
Soon Ae Chun ◽  
Jaideep S. Vaidya ◽  
Vijayalakshmi Atluri ◽  
Basit Shafiq ◽  
Nabil R. Adam

During large-scale manmade or natural disasters, such as Superstorm Sandy and Hurricanes Harvey and Irma, collaborations among government agencies, NGOs, and businesses need to be coordinated to provide necessary resources to respond to emergency events. However, resources from citizens themselves are underutilized, such as their equipment or expertise. The citizen participation via social media enhanced the situational awareness, but the response management is still mainly handled by the government or government-sanctioned partners. By harnessing the power of citizen crowdsourcing, government agencies can create enhanced disaster situation awareness and facilitate effective utilization of resources provided by citizen volunteers, resulting in more effective disaster responses. This chapter presents a public engagement in emergency response (PEER) framework that provides an online and mobile crowdsourcing platform for incident reporting and citizens' resource volunteering as well as an intelligent recommender system to match-make citizen resources with emergency tasks.

Crowdsourcing ◽  
2019 ◽  
pp. 578-605
Author(s):  
Soon Ae Chun ◽  
Jaideep S. Vaidya ◽  
Vijayalakshmi Atluri ◽  
Basit Shafiq ◽  
Nabil R. Adam

During large-scale manmade or natural disasters, such as Superstorm Sandy and Hurricanes Harvey and Irma, collaborations among government agencies, NGOs, and businesses need to be coordinated to provide necessary resources to respond to emergency events. However, resources from citizens themselves are underutilized, such as their equipment or expertise. The citizen participation via social media enhanced the situational awareness, but the response management is still mainly handled by the government or government-sanctioned partners. By harnessing the power of citizen crowdsourcing, government agencies can create enhanced disaster situation awareness and facilitate effective utilization of resources provided by citizen volunteers, resulting in more effective disaster responses. This chapter presents a public engagement in emergency response (PEER) framework that provides an online and mobile crowdsourcing platform for incident reporting and citizens' resource volunteering as well as an intelligent recommender system to match-make citizen resources with emergency tasks.


2015 ◽  
Vol 4 (3) ◽  
pp. 29-46 ◽  
Author(s):  
David Lorenzi ◽  
Soon Ae Chun ◽  
Jaideep Vaidya ◽  
Basit Shafiq ◽  
Vijay Atluri ◽  
...  

While government agencies, NGOs, and even commercial entities immediately swing into action to help out, in the case of large disasters, one of the biggest resources – citizens themselves – are underutilized. The rise of social media creates an opportunity for the citizen participation for disaster response management. By harnessing the power of citizen crowdsourcing, the government can have enhanced disaster situation awareness and utilize resources provided by citizen volunteers, resulting in more effective disaster responses. In this paper, the prototype Public Engagement in Emergency Response (PEER) framework is presented. It provides a comprehensive online and mobile crowdsourcing platform for situation reporting and resource volunteering. Events are described that transpired in the aftermath of superstorm Sandy, which demonstrate the benefits of using the PEER framework in a major disaster situation. Also described is how it can alleviate some of the issues associated with the crowdsourcing responses such as fraud.


Crowdsourcing ◽  
2019 ◽  
pp. 541-559
Author(s):  
David Lorenzi ◽  
Soon Ae Chun ◽  
Jaideep S. Vaidya ◽  
Basit Shafiq ◽  
Vijayalakshmi Atluri ◽  
...  

While government agencies, NGOs, and even commercial entities immediately swing into action to help out, in the case of large disasters, one of the biggest resources – citizens themselves – are underutilized. The rise of social media creates an opportunity for the citizen participation for disaster response management. By harnessing the power of citizen crowdsourcing, the government can have enhanced disaster situation awareness and utilize resources provided by citizen volunteers, resulting in more effective disaster responses. In this paper, the prototype Public Engagement in Emergency Response (PEER) framework is presented. It provides a comprehensive online and mobile crowdsourcing platform for situation reporting and resource volunteering. Events are described that transpired in the aftermath of superstorm Sandy, which demonstrate the benefits of using the PEER framework in a major disaster situation. Also described is how it can alleviate some of the issues associated with the crowdsourcing responses such as fraud.


Author(s):  
Morten Egeberg ◽  
Jarle Trondal

Chapter 8 draws attention to meta-governance and how the governing of reforms is affected by how reform processes are organized. The chapter asks how reformers can ensure support for large-scale reforms that are likely to attract profound resistance. The focal point of the chapter is a study of geographical decentralization of central government agencies. The chapter argues that successful meta-governance can be provided for by careful organization of the reform process. The empirical case studied is a large-scale relocation of government agencies in Norway during the early 2000s. In carrying out this reform, the government succeeded against the odds. Most importantly, research has revealed huge constraints on the instrumental control of large-scale reforms in general and of geographical relocation of organizations in particular. Yet, this chapter shows that large-scale reforms can be successfully achieved through careful crafting of the reform organization.


2017 ◽  
Author(s):  
Wei Wang ◽  
Hong Chen ◽  
Aihui Xu ◽  
Minhao Qu

Abstract. This paper provides a detailed introduction to the disaster situation of the August 8, 2017, Ms 7.0 earthquake that occurred in Jiuzhaigou County, Sichuan Province, China, and specifically describes the emergency response activities of all levels of the government, various departments, rescue teams, enterprises and public institutions as well as social organizations. The characteristics of the earthquake disaster and the emergency responses are analysed and summarized. The emergency response activities during the Jiuzhaigou earthquake exhibited three distinct characteristics relative to those during similar earthquakes. The response level and resource mobilization were appropriately and sensibly adjusted according to the development of the disaster, and various departments worked closely together to conduct multi-sector joint rescue efforts. Moreover, professional rescue forces and participating social organizations were more rationally mobilized. A set of effective disaster relief command and coordination mechanisms were established for cooperation between multiple departments and the participation of many social organizations under the leadership of the local government. Finally, newer and more effective technologies played an important role in the emergency response and rescue efforts following this earthquake.


2017 ◽  
Author(s):  
Christopher Soghoian

Today, when consumers evaluate potential telecommunications, Internet service or application providers – they are likely to consider several differentiating factors: The cost of service, the features offered as well as the providers’ reputation for network quality and customer service. The firms’ divergent approaches to privacy, and in particular, their policies regarding law enforcement and intelligence agencies’ access to their customers’ private data are not considered by consumers during the purchasing process – perhaps because it is practically impossible for anyone to discover this information. A naïve reader might simply assume that the law gives companies very little wiggle room – when they are required to provide data, they must do so. This is true. However, companies have a huge amount of flexibility in the way they design their networks, in the amount of data they retain by default, the exigent circumstances in which they share data without a court order, and the degree to which they fight unreasonable requests. As such, there are substantial differences in the privacy practices of the major players in the telecommunications and Internet applications market: Some firms retain identifying data for years, while others retain no data at all; some voluntarily provide government agencies access to user data - one carrier even argued in court that its 1st amendment free speech rights guarantee it the right to do so, while other companies refuse to voluntarily disclose data without a court order; some companies charge government agencies when they request user data, while others disclose it for free. As such, a consumer’s decision to use a particular carrier or provider can significantly impact their privacy, and in some cases, their freedom. Many companies profess their commitment to protecting their customers’ privacy, with some even arguing that they compete on their respective privacy practices. However, none seem to be willing to disclose, let alone compete on the extent to which they assist or resist government agencies’ surveillance activities. Because information about each firm’s practices is not publicly known, consumers cannot vote with their dollars, and pick service providers that best protect their privacy. In this article, I focus on this lack of information and on the policy changes necessary to create market pressure for companies to put their customers’ privacy first. I outline the numerous ways in which companies currently assist the government, often going out of their way to provide easy access to their customers’ private communications and documents. I also highlight several ways in which some companies have opted to protect user privacy, and the specific product design decisions that firms can make that either protect their customers’ private data by default, or make it trivial for the government to engage in large scale surveillance. Finally, I make specific policy recommendations that, if implemented, will lead to the public disclosure of these privacy differences between companies, and hopefully, create further market incentives for firms to embrace privacy by design.


2019 ◽  
Vol 11 (3) ◽  
pp. 771
Author(s):  
Yuki Higuchi ◽  
Nobuhiko Fuwa ◽  
Kei Kajisa ◽  
Takahiro Sato ◽  
Yasuyuki Sawada

Aid from the government can play a critical role as a risk-coping device in a post-disaster situation if the recipients are properly targeted. We analyze the accuracy of disaster aid targeting and self-reporting bias in disaster damage and aid receipt by combining (i) satellite images (objective information on flood damage), (ii) administrative records (objective information on post-flood aid receipt), and (iii) unique survey data (self-reported information on damage assessment and aid receipt) on a large-scale flooding in 2012 in the Philippines. We find that damage is over-reported while aid receipt is under-reported, and as a result, the estimated targeting accuracy based on self-reported information is substantially downward-biased.


Author(s):  
Laura G. Militello ◽  
Emily S. Patterson ◽  
Robert Wears ◽  
Jill A. Ritter

Coordination is a key element in emergency response. This paper focuses on coordination as it occurred in a county-level Emergency Operations Center (EOC) during a simulated tornado. The EOC is responsible for locating, purchasing, and transporting resources to the disaster scene(s). The EOC is an ad hoc team made up of government agencies, private companies (i.e., hospitals, utilities, etc.), and non-governmental agencies. These decision makers come together to engage in creative problem solving in order to solve often complex logistics and coordination problems generally under intense time pressure during a rapidly evolving situation. Lessons learned from this exercise highlight coordination challenges including asymmetric information flow, natural fault lines, roles and functions, co-location benefits, emergent leadership, fragmented situation awareness, information displays, room design, and quick reference tools.


2017 ◽  
Vol 9 (3) ◽  
pp. 106
Author(s):  
Gulshan Rai

Cyber security expert Gulshan Rai will now take charge as special secretary for cyber security as the first cyber security chief under the Prime Ministers Office. Before the current appointment he was heading the Computer Emergency Response Team (CERT) at the Department of electronics and information technology (DeitY). Rai’s appointment comes at a time when cyber security assumes importance in the backdrop of growing network intrusions and hacking attempts on not just businesses but also on the government.


Sign in / Sign up

Export Citation Format

Share Document