Public Response to Alerts and Warnings Using Social Media: Report of a Workshop on Current Knowledge and Research Gaps

Free sample

Following an earlier NRC workshop on public response to alerts and warnings delivered to mobile devices, a related workshop was held on February 28 and 29, 2012 to look at the role of social media in disaster response. This was one of the first workshops convened to look systematically at the use of social media for alerts and warnings—an event that brought together social science researchers, technologists, emergency management professionals, and other experts on how the public and emergency managers use social media in disasters.In addition to exploring how officials monitor social media, as well as the resulting privacy considerations, the workshop focused on such topics as: what is known about how the public responds to alerts and warnings; the implications of what is known about such public responses for the use of social media to provide alerts and warnings to the public; and approaches to enhancing the situational awareness of emergency managers.

Public Response to Alerts and Warnings Using Social Media: Report of a Workshop on Current Knowledge and Research Gaps summarizes presentations made by invited speakers, other remarks by workshop participants, and discussions during parallel breakout sessions. It also points to potential topics for future research, as well as possible areas for future research investment, and it describes some of the challenges facing disaster managers who are seeking to incorporate social media into regular practice.
Read more
Loading...

Additional Information

Publisher
National Academies Press
Read more
Published on
Jan 18, 2013
Read more
Pages
68
Read more
ISBN
9780309290340
Read more
Language
English
Read more
Genres
History / Military / Strategy
Political Science / Political Freedom
Read more
Content Protection
This content is DRM free.
Read more
Read Aloud
Available on Android devices
Read more

Reading information

Smartphones and Tablets

Install the Google Play Books app for Android and iPad/iPhone. It syncs automatically with your account and allows you to read online or offline wherever you are.

Laptops and Computers

You can read books purchased on Google Play using your computer's web browser.

eReaders and other devices

To read on e-ink devices like the Sony eReader or Barnes & Noble Nook, you'll need to download a file and transfer it to your device. Please follow the detailed Help center instructions to transfer the files to supported eReaders.
For every opportunity presented by the information age, there is an opening to invade the privacy and threaten the security of the nation, U.S. businesses, and citizens in their private lives. The more information that is transmitted in computer-readable form, the more vulnerable we become to automated spying. It's been estimated that some 10 billion words of computer-readable data can be searched for as little as $1. Rival companies can glean proprietary secrets . . . anti-U.S. terrorists can research targets . . . network hackers can do anything from charging purchases on someone else's credit card to accessing military installations. With patience and persistence, numerous pieces of data can be assembled into a revealing mosaic. Cryptography's Role in Securing the Information Society addresses the urgent need for a strong national policy on cryptography that promotes and encourages the widespread use of this powerful tool for protecting of the information interests of individuals, businesses, and the nation as a whole, while respecting legitimate national needs of law enforcement and intelligence for national security and foreign policy purposes. This book presents a comprehensive examination of cryptography--the representation of messages in code--and its transformation from a national security tool to a key component of the global information superhighway. The committee enlarges the scope of policy options and offers specific conclusions and recommendations for decision makers. Cryptography's Role in Securing the Information Society explores how all of us are affected by information security issues: private companies and businesses; law enforcement and other agencies; people in their private lives. This volume takes a realistic look at what cryptography can and cannot do and how its development has been shaped by the forces of supply and demand. How can a business ensure that employees use encryption to protect proprietary data but not to conceal illegal actions? Is encryption of voice traffic a serious threat to legitimate law enforcement wiretaps? What is the systemic threat to the nation's information infrastructure? These and other thought-provoking questions are explored. Cryptography's Role in Securing the Information Society provides a detailed review of the Escrowed Encryption Standard (known informally as the Clipper chip proposal), a federal cryptography standard for telephony promulgated in 1994 that raised nationwide controversy over its "Big Brother" implications. The committee examines the strategy of export control over cryptography: although this tool has been used for years in support of national security, it is increasingly criticized by the vendors who are subject to federal export regulation. The book also examines other less well known but nevertheless critical issues in national cryptography policy such as digital telephony and the interplay between international and national issues. The themes of Cryptography's Role in Securing the Information Society are illustrated throughout with many examples -- some alarming and all instructive -- from the worlds of government and business as well as the international network of hackers. This book will be of critical importance to everyone concerned about electronic security: policymakers, regulators, attorneys, security officials, law enforcement agents, business leaders, information managers, program developers, privacy advocates, and Internet users.
We depend on information and information technology (IT) to make many of our day-to-day tasks easier and more convenient. Computers play key roles in transportation, health care, banking, and energy. Businesses use IT for payroll and accounting, inventory and sales, and research and development. Modern military forces use weapons that are increasingly coordinated through computer-based networks. Cybersecurity is vital to protecting all of these functions. Cyberspace is vulnerable to a broad spectrum of hackers, criminals, terrorists, and state actors. Working in cyberspace, these malevolent actors can steal money, intellectual property, or classified information; impersonate law-abiding parties for their own purposes; damage important data; or deny the availability of normally accessible services. Cybersecurity issues arise because of three factors taken together - the presence of malevolent actors in cyberspace, societal reliance on IT for many important functions, and the presence of vulnerabilities in IT systems. What steps can policy makers take to protect our government, businesses, and the public from those would take advantage of system vulnerabilities?

At the Nexus of Cybersecurity and Public Policy offers a wealth of information on practical measures, technical and nontechnical challenges, and potential policy responses. According to this report, cybersecurity is a never-ending battle; threats will evolve as adversaries adopt new tools and techniques to compromise security. Cybersecurity is therefore an ongoing process that needs to evolve as new threats are identified. At the Nexus of Cybersecurity and Public Policy is a call for action to make cybersecurity a public safety priority. For a number of years, the cybersecurity issue has received increasing public attention; however, most policy focus has been on the short-term costs of improving systems. In its explanation of the fundamentals of cybersecurity and the discussion of potential policy responses, this book will be a resource for policy makers, cybersecurity and IT professionals, and anyone who wants to understand threats to cyberspace.

The new edition of the acclaimed guide to strategic decision-making in community planning, development, and collaboration

Based on the results of more than a decade of research by the Pew Partnership for Civic Change, Smart Communities provides directions for strategic decision-making and outlines the key strategies used by thousands of leaders who have worked to create successful communities. Outlining seven "leverage points" for decision-making used by thousands of leaders who have worked to create successful communities, this new Second Edition offers leaders from both the public and private sectors the tools they need to build a civic infrastructure and create a better future for all the community's citizens.

Second Edition has been thoroughly updated with current knowledge and researchCovers new developments from current design thinking and strategy literature to innovation and invention in communitiesAdvises on how to create community readiness that will help avert problems before they beginAll case vignettes have been revised to include more detailed information about the process and application of the seven leverage pointsExamples from communities around the country illustrate how these change agents' well-structured decision-making processes can be traced to their effective use of the seven key leverage points

Smart Communities offers hope to those who are striving to improve their communities and addresses vital issues such as poverty, race relations, and children's health and welfare.

©2018 GoogleSite Terms of ServicePrivacyDevelopersArtistsAbout Google|Location: United StatesLanguage: English (United States)
By purchasing this item, you are transacting with Google Payments and agreeing to the Google Payments Terms of Service and Privacy Notice.