Trust and Security

From Humanitarian Computing Library
Jump to: navigation, search
Summary Access to correct and truthful information is very important at times of crisis to help direct the necessary help to the victims. Thus verifying information and their sources becomes an important requirement at times of critical need. Verifying includes being able to judge truth from falsehood and rumors. It also includes having a list of reliable sources of information for each of the crises.

Large amounts of unverified and at times contradictory information often appear on social media following natural disasters. Timely verification of this information can be crucial to saving lives and for coordinating relief efforts.

Examples: Information Verification during Natural Disasters looks into enabling this verification by developing an online platform that involves ordinary citizens in the evidence gathering and evaluation process, the output of which will provide reliable information to humanitarian organizations, journalists, and decision makers involved in relief efforts.

What criteria defines the quality of the information that is shared and their importance for experts during crisis is also highly relevant. Also since the usage of social media is now becoming popular among all the community members Evaluating the Impact of Incorporating Information from Social Media Streams in Disaster Relief Routing is another relevant publication to look into.

Guidelines Everything related to veracity, verification, truth, falsehood, rumors, etc.

Title Author(s) Date Citation Count
A Disruption-Tolerant Architecture for Secure and Efficient Disaster Response Communications Kevin Fall
Gianluca Iannaccone
Jayanthkumar Kannan
Fernando Silveira
Nina Taft
2 May 2010 17
Alerting Security Authorities and Civilians with Smartphones in Acute Situations Jaana Kuula
Olli Kauppinen
Vili Auvinen
Santtu Viitanen
Pauli Kettunen
Tuomo Korhonen
Aligning Border Security Workflow and Decision Making With Supporting Information and Communication Systems Robin Mays
Mark Zachry
Alper Murat
Mark Haselkorn
8 May 2011
An Agent-Based Approach to Envision the Future José Castillo 8 May 2011 1
Citizen (in)security?: social media, citizen journalism and crisis response Hayley Watson
Lemi Baruh
Rachel L. Finn
Salvatore Scifo
18 May 2014
Cross Impact Security Analysis using the HACKING Game Arthur Henry Hendela
Murray Turoff
Roxanne Hiltz
2 May 2010 2
Developing Information Technologies for Citizens Experiencing Disruption: The Role of Trust and Context Bryan Semaan
Gloria Mark
2 May 2010 6
Dialogical Emergency Management and Strategic Awareness in Emergency Communication Henrik Artman
Joel Brynielsson
Björn Johansson
Jiri Trnka
8 May 2011 6
Evaluating the Impact of Incorporating Information from Social Media Streams in Disaster Relief Routing Ashlea Bennett Milburn
Clarence L. Wardell III
17 April 2012
Evolution of Communities on Twitter and the Role of their Leaders during Emergencies Yulia Tyshchuk
Hao Li
Heng Ji
William A. Wallace
August 2013
Exploiting Social Media to Provide Humanitarian Users with Event Search and Recommendations John Edmonds
Louiqa Raschid
Hassan Sayyadi
Shanchan Wu
2 May 2010 4
Fear and the City: Role of Mobile Services in Harnessing Safety and Security in Urban Use Contexts Jan Blom
Et. al
2010 13
Fuzzy-Genetic Algorithm For Patient Data Processing In Telemedicine Richa Gupta
Parmod Kumar
21 October 2012
Homebound Security: Migrant Support for Improved Public Safety in Conflict Prone Settings Justine Fleischner et. al 2009
Information Quality Criteria and Their Importance for Experts in Crisis Situations Therese Friberg
Stephan Prödel
Rainer Koch
8 May 2011 5
Information Verification during Natural Disasters Abdulfatai Popoola
Dmytro Krasnoshtan
Attila Toth
Victor Naroditskiy
Carlos Castillo
Patrick Meier
Iyad Rahwan
14 May 2013
Light-Weight Model-Based Realization of a B2b Protocol and a Soa Integration Engine Theo Meijler
Frank Nietzold
8 May 2011
Optimizing Mobile Social Media Interfaces for Rapid Internal Communication by Emergency Services Erkki Kurkinen
Helen Sullivan
Markku Häkkinen
Markku Lauttamus
2 May 2010 2
Organizing Emergent Safety Organizations: The travelling of the concept 'Netcentric Work' in the Dutch Safety sector Kees Boersma
Jeroen Wolbers
Pieter Wagenaar
2 May 2010
Preventing Violence, War and State Collapse: The Future of Conflict Early Warning and Response David Nyheim 19 February 2009 13
Privacy and ethical implications of the use of social media during a volcanic eruption: some initial thoughts Hayley Watson
Rachel L. Finn
May 2013 3
Privacy, Security, Liberty: Informing the Design of EMIS Monika Buscher
Lisa Wood
Sung-Yueh Perng
May 2013 3
Rumor Spreading and Inoculation of Nodes in Complex Networks Anurag Singh
Yatindra Nath Singh
17 April 2012 6
Securing Crisis Maps in Conflict Zones George Chamales
Rob Baker
1 November 2011 2
Seeking the Trustworthy Tweet: Can Microblogged Data Fit the Information Needs of Disaster Response and Humanitarian Relief Organizations Andrea Tapia
Kartikeya Bajpai
Bernard Jansen
John Yen
8 May 2011 26
Situational Awareness in Mass Emergency: A Behavioral and Linguistic Analysis of Microblogged Communications Sarah Vieweg January 2012 14
Special Report Crowdsourcing Crisis Information in Disaster Affected Haiti Jessica Heinzelman
Carol Waters
29 September 2010
Text vs. Images: On the Viability of Social Media to Assess Earthquake Damage Yuan Liang
James Caverlee
John Mander
14 May 2013 1
Towards a formalization of inter organizational trust networks for crisis management Thomas Foulquier
Claude Caron
2 May 2010
Twitter Under Crisis: Can we trust what we RT? Marcelo Mendoza
Barbara Poblete
Carlos Castillo
July 2010 214
User Study: Involving Civilians by Smart Phones During Emergency Situations Amro Al-Akkad
Andreas Zimmermann
8 May 2011 5
Using Spatial Hypertext to Visualize Composite Knowledge in Emergency Responses José H. Canós
M. Carmen Penadés
Carlos Solís
Marcos R. S. Borges
Manuel Llavador
2 May 2010 8
Verifying Crowdsourced Social Media Reports for Live Crisis Mapping: An Introduction to Information Forensics Patrick Meier November 2011 8

Search Papers Related to "Trust and Security" keyword