SlideShare uma empresa Scribd logo
1 de 16
The Florida State University
Tallahassee, Florida
Utilizing Community Volunteered
Information to Enhance Disaster
Situational Awareness
David Merrick
Tom Duffy
Center for Disaster Risk Policy, Florida State University
10th International ISCRAM Conference, May 2013
Traditional Inputs to Situational Awareness
There are a variety of traditional data inputs feeding
situational awareness, including:
 Reconnaissance and damage assessments
 Weather reports and forecasts
 Geographical and population information
 Partner organization reports
 Private sector reports
This data is combined to create a conceptual
model of the disaster as it currently exists, as well
as projections for how it is going to evolve.
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Community Volunteered Information
 Why are response agencies interested in CVI and other
crowdsourced information?
 Further, it provides a participatory channel for citizens
and survivors to help themselves and others.
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Barriers to Adoption
There are significant barriers to adoption of CVI into situational
awareness processes and workflows.
Lack of authenticity and trust
 Emergency and disaster managers swear by ‘ground truth’, and
they understand how difficult this can be to achieve. How can
an average Twitter user be trusted?
 And yet… they want fast information.
Time intensive
 Emergency and disaster managers already have limited
personnel resources to accomplish life safety and life
sustainment. Resources to process CVI is very limited.
Limited models or tools
 Existing tools and models for working with CVI (primarily the
social media aspect) are aimed at commercial use.
 The most powerful systems are too expensive for local EM use.
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Overcoming Barriers
 Lack of trust in CVI stems from a perception by
emergency managers of poor accuracy.
 Increasing trust in CVI requires overcoming these
perceptions through research and case studies.
 Further, the perception of poor accuracy stems from a
misconception of how CVI can be created and utilized.
 FSU EMHS has established an ongoing research program
examining the validity of CVI.
 Broad goals include:
 Development of confidence indicators model for utilizing
CVI for situational awareness.
 Development of best practices and workflows aimed at
practitioners.
 Using CVI as an additional layer of information –
despite its imperfection.
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Tropical Storm Debby (2012)
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
40 MPH Winds at Landfall
Maximum surge of 4.49 ft
at Cedar Key, Florida
Maximum rainfall of 28
inches in Sanborn,
Florida.
Minimal wind or surge
damage, but spawned
at least six tornados.
Major inland flooding
was the primary impact.
NWS Final Track - Debby
Tropical Storm Debby (2012)
 Before landfall, EMHS began to capture Twitter data
based on keyword and hashtag searches.
 “Debby”, “TSDebby”, “flwx”, “hurricane”, “TS Debby” and
others.
 No geographical boundaries were utilized.
 In a 7 day period, captured 36,317 tweets.
 After analysis, it was determined that over 77% of the data
did not pertain to the tropical system.
 Of the remaining 23% of the data, the concepts with the
largest frequency were “rain” and “flood/flooding”
 Only 1.2% of the tweets were geocoded with latitude and
longitude coordinates.
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Tropical Storm Debby (2012)
 Additional real-time monitoring of Twitter traffic was
conducted during landfall and inland progression of the
storm.
 EMHS used Hootsuite and keywords such as “TSDebby” and
“flooding” to identify data points.
 Citizen reports were used in the State Emergency
Operations Center to get a very basic picture of which
counties were receiving flooding.
 Significant analysis was not done on this data.
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Hurricane Isaac (2012)
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
NWS Final Track
Isaac made landfall on
29 August 2012 with
maximum winds of 70
mph. It was classified
as a Category 1 storm.
Produced a surge of
over 14 feet in
Braithwaite, La.
Levees in Plaqumines
Parrish failed, causing
significant flooding.
Produced over 20 in, of
rain in parts of New
Orleans.
Hurricane Isaac Field Research
 FSU EMHS deployed a team to New Orleans immediately
following Isaac’s landfall.
 Their mission was to physically verify on CVI reports, assessing
accuracy of both community and government information.
 This project served as a pilot for ongoing research.
 Preliminary results include:
 CVI that includes media (photos) was found to be more
accurate than CVI without media.
 Citizens use terminology that is different than those who work
as a responder or in emergency management.
 Information submitted may be accurate… but that doesn’t
make it relevant.
 CVI is not comprehensive – and we cannot assume it will be.
It must be used as an additional information layer.
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Isaac - Accuracy and Relevance
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Isaac - Accuracy and Relevance
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Isaac - Consistent Terminology
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Isaac - Consistent Terminology
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Ongoing Research
 FSU EMHS will continue field research in the United States,
particularly as the 2013 Hurricane Season kicks off in
June.
 We have refined our data collection system to allow us to
verify CVI more efficiently in the field.
 Expand field research into observations of the State
Emergency Operations Center as well as County
Emergency Operations Centers.
 Utilize the FSU VOST as a test platform for developing
models and best practices.
 Integrate our developing models into the State of
Florida’s Division of Emergency Management through
ESF-14 (Public Information), ESF-5 (Planning), and ESF-18
(Business and Industry).
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Thank you!
Questions or Suggestions?
For more information:
David F. Merrick II
dmerrick@fsu.edu
Center for Disaster Risk Policy
Florida State University
644 Bellamy
Tallahassee, Florida 32306-2250
http://em.fsu.edu
850.644.9961
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany

Mais conteúdo relacionado

Destaque

S1.2 newsletter term 4 2015 16
S1.2 newsletter term 4 2015 16S1.2 newsletter term 4 2015 16
S1.2 newsletter term 4 2015 16AP Pietri
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Destaque (7)

S1.2 newsletter term 4 2015 16
S1.2 newsletter term 4 2015 16S1.2 newsletter term 4 2015 16
S1.2 newsletter term 4 2015 16
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Semelhante a Utilizing Community Volunteered Information to Enhance Disaster Situational Awareness

This case was prepared by Ruth Gilleran, Senior Lectu.docx
This case was prepared by Ruth Gilleran, Senior Lectu.docxThis case was prepared by Ruth Gilleran, Senior Lectu.docx
This case was prepared by Ruth Gilleran, Senior Lectu.docxgertrudebellgrove
 
This case was prepared by Ruth Gilleran, Senior Lectu.docx
 This case was prepared by Ruth Gilleran, Senior Lectu.docx This case was prepared by Ruth Gilleran, Senior Lectu.docx
This case was prepared by Ruth Gilleran, Senior Lectu.docxgertrudebellgrove
 
Using Remote Sensing Data to Develop Catastrophe Models
Using Remote Sensing Data to Develop Catastrophe ModelsUsing Remote Sensing Data to Develop Catastrophe Models
Using Remote Sensing Data to Develop Catastrophe ModelsChris Ewing
 
BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)- Mark - Fullbright
 
2013 08 26 OFFSHC Newsletter
2013 08 26 OFFSHC Newsletter2013 08 26 OFFSHC Newsletter
2013 08 26 OFFSHC NewsletterOFFSHC
 
Insurance climate volatility infographic
Insurance climate volatility infographicInsurance climate volatility infographic
Insurance climate volatility infographicConsultant
 
Rfs & social media
Rfs & social mediaRfs & social media
Rfs & social mediaBGTT_SYD
 
Kpacket 2014 Top_Ten_Guide
Kpacket 2014 Top_Ten_GuideKpacket 2014 Top_Ten_Guide
Kpacket 2014 Top_Ten_GuideAPEX Global
 
HOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTS
HOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTSHOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTS
HOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTSSunil Kakade
 
Social media use in times of crisis
Social media use in times of crisisSocial media use in times of crisis
Social media use in times of crisisInes Mergel
 
Risk management and the release of microdata:
Risk management and the release of microdata:  Risk management and the release of microdata:
Risk management and the release of microdata: Sonia Whiteley
 
Ferry-Accidents-The-Challenge-of-Rescue-Report
Ferry-Accidents-The-Challenge-of-Rescue-ReportFerry-Accidents-The-Challenge-of-Rescue-Report
Ferry-Accidents-The-Challenge-of-Rescue-ReportKiersten Reid Sander
 
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docxScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docxjeffsrosalyn
 
Past and Future Speaking Engagements
Past and Future Speaking EngagementsPast and Future Speaking Engagements
Past and Future Speaking EngagementsMatthew J McMahon
 
6 Steps to Unlocking the Power of Location
6 Steps to Unlocking the Power of Location6 Steps to Unlocking the Power of Location
6 Steps to Unlocking the Power of LocationJonathan Lazzarotto
 
Global Centre for Disaster Statistics Yuichi ONO
Global Centre for Disaster Statistics  Yuichi ONOGlobal Centre for Disaster Statistics  Yuichi ONO
Global Centre for Disaster Statistics Yuichi ONOGlobal Risk Forum GRFDavos
 
FINAL: San Francisco Cyber TTX exercise -- ESF 18 drill
FINAL: San Francisco Cyber TTX exercise -- ESF 18 drillFINAL: San Francisco Cyber TTX exercise -- ESF 18 drill
FINAL: San Francisco Cyber TTX exercise -- ESF 18 drillDavid Sweigert
 
NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...
NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...
NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...DRIscience
 

Semelhante a Utilizing Community Volunteered Information to Enhance Disaster Situational Awareness (20)

This case was prepared by Ruth Gilleran, Senior Lectu.docx
This case was prepared by Ruth Gilleran, Senior Lectu.docxThis case was prepared by Ruth Gilleran, Senior Lectu.docx
This case was prepared by Ruth Gilleran, Senior Lectu.docx
 
This case was prepared by Ruth Gilleran, Senior Lectu.docx
 This case was prepared by Ruth Gilleran, Senior Lectu.docx This case was prepared by Ruth Gilleran, Senior Lectu.docx
This case was prepared by Ruth Gilleran, Senior Lectu.docx
 
Using Remote Sensing Data to Develop Catastrophe Models
Using Remote Sensing Data to Develop Catastrophe ModelsUsing Remote Sensing Data to Develop Catastrophe Models
Using Remote Sensing Data to Develop Catastrophe Models
 
BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)
 
Em mag jan10
Em mag jan10Em mag jan10
Em mag jan10
 
2013 08 26 OFFSHC Newsletter
2013 08 26 OFFSHC Newsletter2013 08 26 OFFSHC Newsletter
2013 08 26 OFFSHC Newsletter
 
Insurance climate volatility infographic
Insurance climate volatility infographicInsurance climate volatility infographic
Insurance climate volatility infographic
 
Rfs & social media
Rfs & social mediaRfs & social media
Rfs & social media
 
Kpacket 2014 Top_Ten_Guide
Kpacket 2014 Top_Ten_GuideKpacket 2014 Top_Ten_Guide
Kpacket 2014 Top_Ten_Guide
 
HOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTS
HOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTSHOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTS
HOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTS
 
Social media use in times of crisis
Social media use in times of crisisSocial media use in times of crisis
Social media use in times of crisis
 
Risk management and the release of microdata:
Risk management and the release of microdata:  Risk management and the release of microdata:
Risk management and the release of microdata:
 
Strong Angel - an Evolution in Preparedness
Strong Angel - an Evolution in PreparednessStrong Angel - an Evolution in Preparedness
Strong Angel - an Evolution in Preparedness
 
Ferry-Accidents-The-Challenge-of-Rescue-Report
Ferry-Accidents-The-Challenge-of-Rescue-ReportFerry-Accidents-The-Challenge-of-Rescue-Report
Ferry-Accidents-The-Challenge-of-Rescue-Report
 
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docxScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
 
Past and Future Speaking Engagements
Past and Future Speaking EngagementsPast and Future Speaking Engagements
Past and Future Speaking Engagements
 
6 Steps to Unlocking the Power of Location
6 Steps to Unlocking the Power of Location6 Steps to Unlocking the Power of Location
6 Steps to Unlocking the Power of Location
 
Global Centre for Disaster Statistics Yuichi ONO
Global Centre for Disaster Statistics  Yuichi ONOGlobal Centre for Disaster Statistics  Yuichi ONO
Global Centre for Disaster Statistics Yuichi ONO
 
FINAL: San Francisco Cyber TTX exercise -- ESF 18 drill
FINAL: San Francisco Cyber TTX exercise -- ESF 18 drillFINAL: San Francisco Cyber TTX exercise -- ESF 18 drill
FINAL: San Francisco Cyber TTX exercise -- ESF 18 drill
 
NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...
NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...
NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...
 

Último

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch TuesdayIvanti
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesBernd Ruecker
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesManik S Magar
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...itnewsafrica
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationKnoldus Inc.
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxfnnc6jmgwh
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesKari Kakkonen
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfNeo4j
 

Último (20)

How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
2024 April Patch Tuesday
2024 April Patch Tuesday2024 April Patch Tuesday
2024 April Patch Tuesday
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
QCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architecturesQCon London: Mastering long-running processes in modern architectures
QCon London: Mastering long-running processes in modern architectures
 
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotesMuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
MuleSoft Online Meetup Group - B2B Crash Course: Release SparkNotes
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...Abdul Kader Baba- Managing Cybersecurity Risks  and Compliance Requirements i...
Abdul Kader Baba- Managing Cybersecurity Risks and Compliance Requirements i...
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Data governance with Unity Catalog Presentation
Data governance with Unity Catalog PresentationData governance with Unity Catalog Presentation
Data governance with Unity Catalog Presentation
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptxGenerative AI - Gitex v1Generative AI - Gitex v1.pptx
Generative AI - Gitex v1Generative AI - Gitex v1.pptx
 
Testing tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examplesTesting tools and AI - ideas what to try with some tool examples
Testing tools and AI - ideas what to try with some tool examples
 
Connecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdfConnecting the Dots for Information Discovery.pdf
Connecting the Dots for Information Discovery.pdf
 

Utilizing Community Volunteered Information to Enhance Disaster Situational Awareness

  • 1. The Florida State University Tallahassee, Florida Utilizing Community Volunteered Information to Enhance Disaster Situational Awareness David Merrick Tom Duffy Center for Disaster Risk Policy, Florida State University 10th International ISCRAM Conference, May 2013
  • 2. Traditional Inputs to Situational Awareness There are a variety of traditional data inputs feeding situational awareness, including:  Reconnaissance and damage assessments  Weather reports and forecasts  Geographical and population information  Partner organization reports  Private sector reports This data is combined to create a conceptual model of the disaster as it currently exists, as well as projections for how it is going to evolve. Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 3. Community Volunteered Information  Why are response agencies interested in CVI and other crowdsourced information?  Further, it provides a participatory channel for citizens and survivors to help themselves and others. Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 4. Barriers to Adoption There are significant barriers to adoption of CVI into situational awareness processes and workflows. Lack of authenticity and trust  Emergency and disaster managers swear by ‘ground truth’, and they understand how difficult this can be to achieve. How can an average Twitter user be trusted?  And yet… they want fast information. Time intensive  Emergency and disaster managers already have limited personnel resources to accomplish life safety and life sustainment. Resources to process CVI is very limited. Limited models or tools  Existing tools and models for working with CVI (primarily the social media aspect) are aimed at commercial use.  The most powerful systems are too expensive for local EM use. Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 5. Overcoming Barriers  Lack of trust in CVI stems from a perception by emergency managers of poor accuracy.  Increasing trust in CVI requires overcoming these perceptions through research and case studies.  Further, the perception of poor accuracy stems from a misconception of how CVI can be created and utilized.  FSU EMHS has established an ongoing research program examining the validity of CVI.  Broad goals include:  Development of confidence indicators model for utilizing CVI for situational awareness.  Development of best practices and workflows aimed at practitioners.  Using CVI as an additional layer of information – despite its imperfection. Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 6. Tropical Storm Debby (2012) Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany 40 MPH Winds at Landfall Maximum surge of 4.49 ft at Cedar Key, Florida Maximum rainfall of 28 inches in Sanborn, Florida. Minimal wind or surge damage, but spawned at least six tornados. Major inland flooding was the primary impact. NWS Final Track - Debby
  • 7. Tropical Storm Debby (2012)  Before landfall, EMHS began to capture Twitter data based on keyword and hashtag searches.  “Debby”, “TSDebby”, “flwx”, “hurricane”, “TS Debby” and others.  No geographical boundaries were utilized.  In a 7 day period, captured 36,317 tweets.  After analysis, it was determined that over 77% of the data did not pertain to the tropical system.  Of the remaining 23% of the data, the concepts with the largest frequency were “rain” and “flood/flooding”  Only 1.2% of the tweets were geocoded with latitude and longitude coordinates. Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 8. Tropical Storm Debby (2012)  Additional real-time monitoring of Twitter traffic was conducted during landfall and inland progression of the storm.  EMHS used Hootsuite and keywords such as “TSDebby” and “flooding” to identify data points.  Citizen reports were used in the State Emergency Operations Center to get a very basic picture of which counties were receiving flooding.  Significant analysis was not done on this data. Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 9. Hurricane Isaac (2012) Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany NWS Final Track Isaac made landfall on 29 August 2012 with maximum winds of 70 mph. It was classified as a Category 1 storm. Produced a surge of over 14 feet in Braithwaite, La. Levees in Plaqumines Parrish failed, causing significant flooding. Produced over 20 in, of rain in parts of New Orleans.
  • 10. Hurricane Isaac Field Research  FSU EMHS deployed a team to New Orleans immediately following Isaac’s landfall.  Their mission was to physically verify on CVI reports, assessing accuracy of both community and government information.  This project served as a pilot for ongoing research.  Preliminary results include:  CVI that includes media (photos) was found to be more accurate than CVI without media.  Citizens use terminology that is different than those who work as a responder or in emergency management.  Information submitted may be accurate… but that doesn’t make it relevant.  CVI is not comprehensive – and we cannot assume it will be. It must be used as an additional information layer. Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 11. Isaac - Accuracy and Relevance Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 12. Isaac - Accuracy and Relevance Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 13. Isaac - Consistent Terminology Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 14. Isaac - Consistent Terminology Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 15. Ongoing Research  FSU EMHS will continue field research in the United States, particularly as the 2013 Hurricane Season kicks off in June.  We have refined our data collection system to allow us to verify CVI more efficiently in the field.  Expand field research into observations of the State Emergency Operations Center as well as County Emergency Operations Centers.  Utilize the FSU VOST as a test platform for developing models and best practices.  Integrate our developing models into the State of Florida’s Division of Emergency Management through ESF-14 (Public Information), ESF-5 (Planning), and ESF-18 (Business and Industry). Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 16. Thank you! Questions or Suggestions? For more information: David F. Merrick II dmerrick@fsu.edu Center for Disaster Risk Policy Florida State University 644 Bellamy Tallahassee, Florida 32306-2250 http://em.fsu.edu 850.644.9961 Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany