SlideShare ist ein Scribd-Unternehmen logo
1 von 16
The Florida State University
Tallahassee, Florida
Utilizing Community Volunteered
Information to Enhance Disaster
Situational Awareness
David Merrick
Tom Duffy
Center for Disaster Risk Policy, Florida State University
10th International ISCRAM Conference, May 2013
Traditional Inputs to Situational Awareness
There are a variety of traditional data inputs feeding
situational awareness, including:
 Reconnaissance and damage assessments
 Weather reports and forecasts
 Geographical and population information
 Partner organization reports
 Private sector reports
This data is combined to create a conceptual
model of the disaster as it currently exists, as well
as projections for how it is going to evolve.
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Community Volunteered Information
 Why are response agencies interested in CVI and other
crowdsourced information?
 Further, it provides a participatory channel for citizens
and survivors to help themselves and others.
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Barriers to Adoption
There are significant barriers to adoption of CVI into situational
awareness processes and workflows.
Lack of authenticity and trust
 Emergency and disaster managers swear by ‘ground truth’, and
they understand how difficult this can be to achieve. How can
an average Twitter user be trusted?
 And yet… they want fast information.
Time intensive
 Emergency and disaster managers already have limited
personnel resources to accomplish life safety and life
sustainment. Resources to process CVI is very limited.
Limited models or tools
 Existing tools and models for working with CVI (primarily the
social media aspect) are aimed at commercial use.
 The most powerful systems are too expensive for local EM use.
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Overcoming Barriers
 Lack of trust in CVI stems from a perception by
emergency managers of poor accuracy.
 Increasing trust in CVI requires overcoming these
perceptions through research and case studies.
 Further, the perception of poor accuracy stems from a
misconception of how CVI can be created and utilized.
 FSU EMHS has established an ongoing research program
examining the validity of CVI.
 Broad goals include:
 Development of confidence indicators model for utilizing
CVI for situational awareness.
 Development of best practices and workflows aimed at
practitioners.
 Using CVI as an additional layer of information –
despite its imperfection.
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Tropical Storm Debby (2012)
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
40 MPH Winds at Landfall
Maximum surge of 4.49 ft
at Cedar Key, Florida
Maximum rainfall of 28
inches in Sanborn,
Florida.
Minimal wind or surge
damage, but spawned
at least six tornados.
Major inland flooding
was the primary impact.
NWS Final Track - Debby
Tropical Storm Debby (2012)
 Before landfall, EMHS began to capture Twitter data
based on keyword and hashtag searches.
 “Debby”, “TSDebby”, “flwx”, “hurricane”, “TS Debby” and
others.
 No geographical boundaries were utilized.
 In a 7 day period, captured 36,317 tweets.
 After analysis, it was determined that over 77% of the data
did not pertain to the tropical system.
 Of the remaining 23% of the data, the concepts with the
largest frequency were “rain” and “flood/flooding”
 Only 1.2% of the tweets were geocoded with latitude and
longitude coordinates.
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Tropical Storm Debby (2012)
 Additional real-time monitoring of Twitter traffic was
conducted during landfall and inland progression of the
storm.
 EMHS used Hootsuite and keywords such as “TSDebby” and
“flooding” to identify data points.
 Citizen reports were used in the State Emergency
Operations Center to get a very basic picture of which
counties were receiving flooding.
 Significant analysis was not done on this data.
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Hurricane Isaac (2012)
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
NWS Final Track
Isaac made landfall on
29 August 2012 with
maximum winds of 70
mph. It was classified
as a Category 1 storm.
Produced a surge of
over 14 feet in
Braithwaite, La.
Levees in Plaqumines
Parrish failed, causing
significant flooding.
Produced over 20 in, of
rain in parts of New
Orleans.
Hurricane Isaac Field Research
 FSU EMHS deployed a team to New Orleans immediately
following Isaac’s landfall.
 Their mission was to physically verify on CVI reports, assessing
accuracy of both community and government information.
 This project served as a pilot for ongoing research.
 Preliminary results include:
 CVI that includes media (photos) was found to be more
accurate than CVI without media.
 Citizens use terminology that is different than those who work
as a responder or in emergency management.
 Information submitted may be accurate… but that doesn’t
make it relevant.
 CVI is not comprehensive – and we cannot assume it will be.
It must be used as an additional information layer.
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Isaac - Accuracy and Relevance
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Isaac - Accuracy and Relevance
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Isaac - Consistent Terminology
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Isaac - Consistent Terminology
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Ongoing Research
 FSU EMHS will continue field research in the United States,
particularly as the 2013 Hurricane Season kicks off in
June.
 We have refined our data collection system to allow us to
verify CVI more efficiently in the field.
 Expand field research into observations of the State
Emergency Operations Center as well as County
Emergency Operations Centers.
 Utilize the FSU VOST as a test platform for developing
models and best practices.
 Integrate our developing models into the State of
Florida’s Division of Emergency Management through
ESF-14 (Public Information), ESF-5 (Planning), and ESF-18
(Business and Industry).
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany
Thank you!
Questions or Suggestions?
For more information:
David F. Merrick II
dmerrick@fsu.edu
Center for Disaster Risk Policy
Florida State University
644 Bellamy
Tallahassee, Florida 32306-2250
http://em.fsu.edu
850.644.9961
Merrick and Duffy, May 2013
10th International ISCRAM Conference,
Baden-Baden, Germany

Weitere ähnliche Inhalte

Andere mochten auch

S1.2 newsletter term 4 2015 16
S1.2 newsletter term 4 2015 16S1.2 newsletter term 4 2015 16
S1.2 newsletter term 4 2015 16AP Pietri
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer ExperienceYuan Wang
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionIn a Rocket
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanPost Planner
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting PersonalKirsty Hulse
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldabaux singapore
 

Andere mochten auch (7)

S1.2 newsletter term 4 2015 16
S1.2 newsletter term 4 2015 16S1.2 newsletter term 4 2015 16
S1.2 newsletter term 4 2015 16
 
10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience10 Insightful Quotes On Designing A Better Customer Experience
10 Insightful Quotes On Designing A Better Customer Experience
 
Learn BEM: CSS Naming Convention
Learn BEM: CSS Naming ConventionLearn BEM: CSS Naming Convention
Learn BEM: CSS Naming Convention
 
How to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media PlanHow to Build a Dynamic Social Media Plan
How to Build a Dynamic Social Media Plan
 
SEO: Getting Personal
SEO: Getting PersonalSEO: Getting Personal
SEO: Getting Personal
 
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika AldabaLightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
Lightning Talk #9: How UX and Data Storytelling Can Shape Policy by Mika Aldaba
 
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job? Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
Succession “Losers”: What Happens to Executives Passed Over for the CEO Job?
 

Ähnlich wie Utilizing Community Volunteered Information to Enhance Disaster Situational Awareness

This case was prepared by Ruth Gilleran, Senior Lectu.docx
This case was prepared by Ruth Gilleran, Senior Lectu.docxThis case was prepared by Ruth Gilleran, Senior Lectu.docx
This case was prepared by Ruth Gilleran, Senior Lectu.docxgertrudebellgrove
 
This case was prepared by Ruth Gilleran, Senior Lectu.docx
 This case was prepared by Ruth Gilleran, Senior Lectu.docx This case was prepared by Ruth Gilleran, Senior Lectu.docx
This case was prepared by Ruth Gilleran, Senior Lectu.docxgertrudebellgrove
 
Using Remote Sensing Data to Develop Catastrophe Models
Using Remote Sensing Data to Develop Catastrophe ModelsUsing Remote Sensing Data to Develop Catastrophe Models
Using Remote Sensing Data to Develop Catastrophe ModelsChris Ewing
 
BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)- Mark - Fullbright
 
2013 08 26 OFFSHC Newsletter
2013 08 26 OFFSHC Newsletter2013 08 26 OFFSHC Newsletter
2013 08 26 OFFSHC NewsletterOFFSHC
 
Insurance climate volatility infographic
Insurance climate volatility infographicInsurance climate volatility infographic
Insurance climate volatility infographicConsultant
 
Rfs & social media
Rfs & social mediaRfs & social media
Rfs & social mediaBGTT_SYD
 
Kpacket 2014 Top_Ten_Guide
Kpacket 2014 Top_Ten_GuideKpacket 2014 Top_Ten_Guide
Kpacket 2014 Top_Ten_GuideAPEX Global
 
HOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTS
HOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTSHOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTS
HOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTSSunil Kakade
 
Social media use in times of crisis
Social media use in times of crisisSocial media use in times of crisis
Social media use in times of crisisInes Mergel
 
Risk management and the release of microdata:
Risk management and the release of microdata:  Risk management and the release of microdata:
Risk management and the release of microdata: Sonia Whiteley
 
Ferry-Accidents-The-Challenge-of-Rescue-Report
Ferry-Accidents-The-Challenge-of-Rescue-ReportFerry-Accidents-The-Challenge-of-Rescue-Report
Ferry-Accidents-The-Challenge-of-Rescue-ReportKiersten Reid Sander
 
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docxScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docxjeffsrosalyn
 
Past and Future Speaking Engagements
Past and Future Speaking EngagementsPast and Future Speaking Engagements
Past and Future Speaking EngagementsMatthew J McMahon
 
6 Steps to Unlocking the Power of Location
6 Steps to Unlocking the Power of Location6 Steps to Unlocking the Power of Location
6 Steps to Unlocking the Power of LocationJonathan Lazzarotto
 
Global Centre for Disaster Statistics Yuichi ONO
Global Centre for Disaster Statistics  Yuichi ONOGlobal Centre for Disaster Statistics  Yuichi ONO
Global Centre for Disaster Statistics Yuichi ONOGlobal Risk Forum GRFDavos
 
FINAL: San Francisco Cyber TTX exercise -- ESF 18 drill
FINAL: San Francisco Cyber TTX exercise -- ESF 18 drillFINAL: San Francisco Cyber TTX exercise -- ESF 18 drill
FINAL: San Francisco Cyber TTX exercise -- ESF 18 drillDavid Sweigert
 
NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...
NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...
NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...DRIscience
 

Ähnlich wie Utilizing Community Volunteered Information to Enhance Disaster Situational Awareness (20)

This case was prepared by Ruth Gilleran, Senior Lectu.docx
This case was prepared by Ruth Gilleran, Senior Lectu.docxThis case was prepared by Ruth Gilleran, Senior Lectu.docx
This case was prepared by Ruth Gilleran, Senior Lectu.docx
 
This case was prepared by Ruth Gilleran, Senior Lectu.docx
 This case was prepared by Ruth Gilleran, Senior Lectu.docx This case was prepared by Ruth Gilleran, Senior Lectu.docx
This case was prepared by Ruth Gilleran, Senior Lectu.docx
 
Using Remote Sensing Data to Develop Catastrophe Models
Using Remote Sensing Data to Develop Catastrophe ModelsUsing Remote Sensing Data to Develop Catastrophe Models
Using Remote Sensing Data to Develop Catastrophe Models
 
BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)BREACH REPORT 2013: Protected Health Information (PHI)
BREACH REPORT 2013: Protected Health Information (PHI)
 
Em mag jan10
Em mag jan10Em mag jan10
Em mag jan10
 
2013 08 26 OFFSHC Newsletter
2013 08 26 OFFSHC Newsletter2013 08 26 OFFSHC Newsletter
2013 08 26 OFFSHC Newsletter
 
Insurance climate volatility infographic
Insurance climate volatility infographicInsurance climate volatility infographic
Insurance climate volatility infographic
 
Rfs & social media
Rfs & social mediaRfs & social media
Rfs & social media
 
Kpacket 2014 Top_Ten_Guide
Kpacket 2014 Top_Ten_GuideKpacket 2014 Top_Ten_Guide
Kpacket 2014 Top_Ten_Guide
 
HOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTS
HOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTSHOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTS
HOW_DATA_CAN_HELP_TO_REDUCE_AVIATION_ACCIDENTS
 
Social media use in times of crisis
Social media use in times of crisisSocial media use in times of crisis
Social media use in times of crisis
 
Risk management and the release of microdata:
Risk management and the release of microdata:  Risk management and the release of microdata:
Risk management and the release of microdata:
 
Strong Angel - an Evolution in Preparedness
Strong Angel - an Evolution in PreparednessStrong Angel - an Evolution in Preparedness
Strong Angel - an Evolution in Preparedness
 
Ferry-Accidents-The-Challenge-of-Rescue-Report
Ferry-Accidents-The-Challenge-of-Rescue-ReportFerry-Accidents-The-Challenge-of-Rescue-Report
Ferry-Accidents-The-Challenge-of-Rescue-Report
 
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docxScenarioYou are an employee at D&B Investigations, a firm that c.docx
ScenarioYou are an employee at D&B Investigations, a firm that c.docx
 
Past and Future Speaking Engagements
Past and Future Speaking EngagementsPast and Future Speaking Engagements
Past and Future Speaking Engagements
 
6 Steps to Unlocking the Power of Location
6 Steps to Unlocking the Power of Location6 Steps to Unlocking the Power of Location
6 Steps to Unlocking the Power of Location
 
Global Centre for Disaster Statistics Yuichi ONO
Global Centre for Disaster Statistics  Yuichi ONOGlobal Centre for Disaster Statistics  Yuichi ONO
Global Centre for Disaster Statistics Yuichi ONO
 
FINAL: San Francisco Cyber TTX exercise -- ESF 18 drill
FINAL: San Francisco Cyber TTX exercise -- ESF 18 drillFINAL: San Francisco Cyber TTX exercise -- ESF 18 drill
FINAL: San Francisco Cyber TTX exercise -- ESF 18 drill
 
NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...
NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...
NIDIS Upper Colorado River Basin Early Warning System, Lessons Learned and Pl...
 

Kürzlich hochgeladen

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdfChristopherTHyatt
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Utilizing Community Volunteered Information to Enhance Disaster Situational Awareness

  • 1. The Florida State University Tallahassee, Florida Utilizing Community Volunteered Information to Enhance Disaster Situational Awareness David Merrick Tom Duffy Center for Disaster Risk Policy, Florida State University 10th International ISCRAM Conference, May 2013
  • 2. Traditional Inputs to Situational Awareness There are a variety of traditional data inputs feeding situational awareness, including:  Reconnaissance and damage assessments  Weather reports and forecasts  Geographical and population information  Partner organization reports  Private sector reports This data is combined to create a conceptual model of the disaster as it currently exists, as well as projections for how it is going to evolve. Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 3. Community Volunteered Information  Why are response agencies interested in CVI and other crowdsourced information?  Further, it provides a participatory channel for citizens and survivors to help themselves and others. Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 4. Barriers to Adoption There are significant barriers to adoption of CVI into situational awareness processes and workflows. Lack of authenticity and trust  Emergency and disaster managers swear by ‘ground truth’, and they understand how difficult this can be to achieve. How can an average Twitter user be trusted?  And yet… they want fast information. Time intensive  Emergency and disaster managers already have limited personnel resources to accomplish life safety and life sustainment. Resources to process CVI is very limited. Limited models or tools  Existing tools and models for working with CVI (primarily the social media aspect) are aimed at commercial use.  The most powerful systems are too expensive for local EM use. Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 5. Overcoming Barriers  Lack of trust in CVI stems from a perception by emergency managers of poor accuracy.  Increasing trust in CVI requires overcoming these perceptions through research and case studies.  Further, the perception of poor accuracy stems from a misconception of how CVI can be created and utilized.  FSU EMHS has established an ongoing research program examining the validity of CVI.  Broad goals include:  Development of confidence indicators model for utilizing CVI for situational awareness.  Development of best practices and workflows aimed at practitioners.  Using CVI as an additional layer of information – despite its imperfection. Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 6. Tropical Storm Debby (2012) Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany 40 MPH Winds at Landfall Maximum surge of 4.49 ft at Cedar Key, Florida Maximum rainfall of 28 inches in Sanborn, Florida. Minimal wind or surge damage, but spawned at least six tornados. Major inland flooding was the primary impact. NWS Final Track - Debby
  • 7. Tropical Storm Debby (2012)  Before landfall, EMHS began to capture Twitter data based on keyword and hashtag searches.  “Debby”, “TSDebby”, “flwx”, “hurricane”, “TS Debby” and others.  No geographical boundaries were utilized.  In a 7 day period, captured 36,317 tweets.  After analysis, it was determined that over 77% of the data did not pertain to the tropical system.  Of the remaining 23% of the data, the concepts with the largest frequency were “rain” and “flood/flooding”  Only 1.2% of the tweets were geocoded with latitude and longitude coordinates. Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 8. Tropical Storm Debby (2012)  Additional real-time monitoring of Twitter traffic was conducted during landfall and inland progression of the storm.  EMHS used Hootsuite and keywords such as “TSDebby” and “flooding” to identify data points.  Citizen reports were used in the State Emergency Operations Center to get a very basic picture of which counties were receiving flooding.  Significant analysis was not done on this data. Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 9. Hurricane Isaac (2012) Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany NWS Final Track Isaac made landfall on 29 August 2012 with maximum winds of 70 mph. It was classified as a Category 1 storm. Produced a surge of over 14 feet in Braithwaite, La. Levees in Plaqumines Parrish failed, causing significant flooding. Produced over 20 in, of rain in parts of New Orleans.
  • 10. Hurricane Isaac Field Research  FSU EMHS deployed a team to New Orleans immediately following Isaac’s landfall.  Their mission was to physically verify on CVI reports, assessing accuracy of both community and government information.  This project served as a pilot for ongoing research.  Preliminary results include:  CVI that includes media (photos) was found to be more accurate than CVI without media.  Citizens use terminology that is different than those who work as a responder or in emergency management.  Information submitted may be accurate… but that doesn’t make it relevant.  CVI is not comprehensive – and we cannot assume it will be. It must be used as an additional information layer. Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 11. Isaac - Accuracy and Relevance Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 12. Isaac - Accuracy and Relevance Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 13. Isaac - Consistent Terminology Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 14. Isaac - Consistent Terminology Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 15. Ongoing Research  FSU EMHS will continue field research in the United States, particularly as the 2013 Hurricane Season kicks off in June.  We have refined our data collection system to allow us to verify CVI more efficiently in the field.  Expand field research into observations of the State Emergency Operations Center as well as County Emergency Operations Centers.  Utilize the FSU VOST as a test platform for developing models and best practices.  Integrate our developing models into the State of Florida’s Division of Emergency Management through ESF-14 (Public Information), ESF-5 (Planning), and ESF-18 (Business and Industry). Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany
  • 16. Thank you! Questions or Suggestions? For more information: David F. Merrick II dmerrick@fsu.edu Center for Disaster Risk Policy Florida State University 644 Bellamy Tallahassee, Florida 32306-2250 http://em.fsu.edu 850.644.9961 Merrick and Duffy, May 2013 10th International ISCRAM Conference, Baden-Baden, Germany