Conflict and disaster management in a hyperconnected world – cooperative, collaborative, real time | acidlabs
Conflict and disaster management in a hyperconnected world — cooperative, collaborative, real time
by Stephen Collins, Acid Labs, May 19, 2011
Engagement with connected networks of volunteers outside the official civil-military sector has the potential to see a measurable increase in situational awareness during ongoing and emergent crisis situations. These networks, their culture and the tools they use offer civil-military actors a set of opportunities to improve conflict and disaster management only rarely taken advantage of in current responses. In the 21st Century, active and ongoing participation in a diverse and connected network, the use of social tools and a familiarity with the culture of sharing and openness that accompanies them should be no less core skills for members of the civil-military community than use of email or the web; digital literacy, active digital citizenship and involvement with relevant networked communities is a key competency for knowledge workers and field operatives alike.
This paper was delivered at the Regional Senior Leaders Seminar in Cairns, Australia on 19 May 2011. A referenced version suitable for printing is available.
For full text of the article and copy of the report, visit Conflict and disaster management in a hyperconnected world – cooperative, collaborative, real time | acidlabs.
From Politico Playbook, May 15, 2011
FIRST LOOK – Google’s Eric Schmidt, on CNN’s “Fareed Zakaria GPS” today: “Today, your phone knows who you are, where you are, where you’re going, to some degree, because it can see your path. And with that and with your permission, it’s possible for software and software developers to predict where you’re going to go, to suggest people you should meet, to suggest activities and so forth. So ultimately what happens is, the mobile phone does what it does best, which is remember everything and make suggestions. And then you can be just a better human and have a good time. …”
- Google CEO Eric Schmidt on Mobile First (lukew.com)
- Eric Schmidt’s Exemplary Sweetheart, Britney Spears (theatlantic.com)
- Eric Schmidt Caught By Surprise At Rate Of Mobile Growth (kwiksocial.com)
- Google’s Eric Schmidt Pours $1.5 Million Into An Online Ad Startup (businessinsider.com)
- The 10 Biggest Blunders Of Google Under Eric Schmidt (GOOG) (businessinsider.com)
- Eric Schmidt’s Mobile World Congress Speech: Full Video (webpronews.com)
Posted by SaferMobile onMobileActive, May 10, 2011
Activists, rights defenders, and journalists use mobile devices and communications for reporting, organizing, mobilizing, and documenting. Mobiles provide countless benefits — relatively low cost, increased efficiencies, vast reach — but they also present specific risks to rights defenders and activists. Additionally, information about other mobile uses, such as your photos or video, your data, the Internet sites you visit from your phone, and your physical location, are stored on your device and often logged by your mobile network. How much is this putting you at risk? This Overview will help you evaluate your level of risk in regard to your mobile communications
For full text of the article, visit Mobile Security Risks: A Primer for Activists, Journalists and Rights Defenders | MobileActive.org.
We would like to invite you to read Geodata Policy’s first guest blog posting by Robert Gellman. This article is timely given the update of the Electronic Communications Privacy Act (ECPA) and the recent Federal Trade Commission (FTC) report, Protecting Consumer Privacy in an Era of Rapid Change, which highlights the sensitivety of “precise geolocation data” (p. 61). Robert Gellman is a privacy and information policy consultant in Washington, DC: http://www.bobgellman.com/.
Is Privacy in Public a Contradiction in Terms?
Robert Gellman, Privacy and Information Policy Consultant
February 21, 2011
Is there such a thing as privacy in a public space? When you walk down the street, anyone can observe you, make notes about your location, appearance, and companions, and even take your picture. If so, then it would seem that you have no reasonable expectation of privacy.
However, most people would be unhappy if they found themselves followed all day. For most of human existence, this type of surveillance was impractical because of the great expense of following someone around.
This is a good place to pause and say that this is a short essay and not a law journal article. The law of surveillance is complex, and the answers can be different if the person doing the surveillance is a government agent, an employer, or an average person, or if you’re taking pictures or recording conversations.
Is privacy in public a case of the irresistible force meeting the immoveable object? Should your location privacy deserve some protection even when you are in public?
These questions are much harder to answer today because of technology. It’s cheap to track people in public today. There’s no need to pay a private detective. Technology does it. First on the list are cell phones. Your cell phone broadcasts your location constantly to a cell phone tower, and your provider knows where you are. Cameras are everywhere, taking pictures in malls, parking lots, building corridors, on the street, at red lights, and on the highway. Facial recognition software is getting better all the time. Photos placed on the Internet can be scanned to identify individuals as well as the date and GPS coordinates where the photos were taken. Digital signage in stores and elsewhere can record behavior, approximate age, gender, and ethnicity, and can sometimes identify individuals using a variety of devices. I recommend a pioneering report on digital signage by my colleague Pam Dixon. It’s at the World Privacy Forum website.
Even though not all the technological and organizational links are yet in place, it’s not hard to envision the possibility that, in the near future, every action you take outside your home may be observed and recorded by someone. This is more or less what happens today online, where there is a good chance that some website or advertiser (and probably many more than one) records every site you visit, every page and ad you see, and every click you make.
ArcGIS Server Blog : Lessons learned developing a Web map for volunteered geographic information (VGI) and social media
ArcGIS Server Blog, November 10, 2010
On April 20, 2010 an explosion disabled the offshore drilling rig Deepwater Horizon and touched off a prolonged regional disaster. Several crew members were killed, and a series of equipment failures left a well on the floor of the Gulf of Mexico freely releasing oil into the ocean for several months. The oil posed a very serious threat to the economy and wildlife in the region. The response to this event was massive, and Esri contributed to the containment and recovery with both manpower and software.
One of the ways Esri was able to contribute was with a Web application that brought together some of the new features in ArcGIS 10 with data services for the affected area. The application was unique in that it built on some recent trends in the geospatial community. Specifically, it was focused around authoritative content for projected spill locations (from NOAA), sensitive natural resource areas (from the Louisiana, Mississippi, and Alabama departments of wildlife), a disaster response feed from Ushahidi, and live data feeds from social media outlets such as YouTube, Twitter, and Flickr. Additionally, users of the application could post their own content. This has been commonly referred to as volunteered geographic information, or VGI. The end result was the Esri Social Media/VGI application. …
For full text of the article via ArcGIS Server Blog : Lessons learned developing a Web map for volunteered geographic information (VGI) and social media.
- GIS in the Earth Sciences & Map Library (lib.berkeley.edu)
- Social data and geospatial mapping join the crises response toolset (radar.oreilly.com)