210 research outputs found

    Harnessing location-based services for effective citizen observatories

    Get PDF
    The essence of a city is its citizens and communities. A city’s infrastructure and associated services play a vital role in citizens' day-to-day living and their overall quality of life. Traditionally, services are deployed in a top-down approach where authorities, councils and public bodies take a reactive approach to address community needs and concerns. In this paper, we propose our ‘Citizen Observatory’ approach to enable citizens to take a proactive role in the management of their local communities and environment by supporting their engagement in the decision-making process. We discuss how to empower citizens and communities to engage with and assist authorities to establish a more informed understanding of residents’ needs and the status of their local environments. Through the WeSenseIt project, we employ a location-based crowdsourcing and communication strategy to develop a resilient, efficient and collaborative information ecosystem for decision-making in urban and rural areas

    Communicating with Citizens on the Ground: A Practical Study

    Get PDF
    Availability and access to information is critical for a highly effective response to an ongoing event however, information reported by citizens is based on their context, bias and subjective interpretation, and the channel of communication may be too narrow to provide clear, accurate reporting. This can often lead to inadequate response to an emergency, which can in turn result in loss of property or even lives. Excessive response to an emergency can also result in a waste of highly resources. Our solution to address this problem is to make the citizen act as a camera for the control room by exploiting the user’s mobile camera. The system is designed to provide a live view of the citizen’s immediate surroundings, while control room personnel can provide instructions. In this paper, we introduce our approach and share initial insights from a focus group validation session and then four evaluations with users within a separate but closely related domain. We discuss our observations, evaluation results and provide a set of recommendations for the Emergency Response domain

    Geospatial crowdsourced data fitness analysis for spatial data infrastructure based disaster management actions

    Get PDF
    The reporting of disasters has changed from official media reports to citizen reporters who are at the disaster scene. This kind of crowd based reporting, related to disasters or any other events, is often identified as 'Crowdsourced Data' (CSD). CSD are freely and widely available thanks to the current technological advancements. The quality of CSD is often problematic as it is often created by the citizens of varying skills and backgrounds. CSD is considered unstructured in general, and its quality remains poorly defined. Moreover, the CSD's location availability and the quality of any available locations may be incomplete. The traditional data quality assessment methods and parameters are also often incompatible with the unstructured nature of CSD due to its undocumented nature and missing metadata. Although other research has identified credibility and relevance as possible CSD quality assessment indicators, the available assessment methods for these indicators are still immature. In the 2011 Australian floods, the citizens and disaster management administrators used the Ushahidi Crowd-mapping platform and the Twitter social media platform to extensively communicate flood related information including hazards, evacuations, help services, road closures and property damage. This research designed a CSD quality assessment framework and tested the quality of the 2011 Australian floods' Ushahidi Crowdmap and Twitter data. In particular, it explored a number of aspects namely, location availability and location quality assessment, semantic extraction of hidden location toponyms and the analysis of the credibility and relevance of reports. This research was conducted based on a Design Science (DS) research method which is often utilised in Information Science (IS) based research. Location availability of the Ushahidi Crowdmap and the Twitter data assessed the quality of available locations by comparing three different datasets i.e. Google Maps, OpenStreetMap (OSM) and Queensland Department of Natural Resources and Mines' (QDNRM) road data. Missing locations were semantically extracted using Natural Language Processing (NLP) and gazetteer lookup techniques. The Credibility of Ushahidi Crowdmap dataset was assessed using a naive Bayesian Network (BN) model commonly utilised in spam email detection. CSD relevance was assessed by adapting Geographic Information Retrieval (GIR) relevance assessment techniques which are also utilised in the IT sector. Thematic and geographic relevance were assessed using Term Frequency – Inverse Document Frequency Vector Space Model (TF-IDF VSM) and NLP based on semantic gazetteers. Results of the CSD location comparison showed that the combined use of non-authoritative and authoritative data improved location determination. The semantic location analysis results indicated some improvements of the location availability of the tweets and Crowdmap data; however, the quality of new locations was still uncertain. The results of the credibility analysis revealed that the spam email detection approaches are feasible for CSD credibility detection. However, it was critical to train the model in a controlled environment using structured training including modified training samples. The use of GIR techniques for CSD relevance analysis provided promising results. A separate relevance ranked list of the same CSD data was prepared through manual analysis. The results revealed that the two lists generally agreed which indicated the system's potential to analyse relevance in a similar way to humans. This research showed that the CSD fitness analysis can potentially improve the accuracy, reliability and currency of CSD and may be utilised to fill information gaps available in authoritative sources. The integrated and autonomous CSD qualification framework presented provides a guide for flood disaster first responders and could be adapted to support other forms of emergencies

    Smarter CRM from a Customer Service Perspective: A Process Evaluation on the City of San José\u27s My San Jose Smartphone Application for City Services

    Get PDF
    This research paper provides background on the City of San José’s smart phone application history and reviews other similar municipal smart phone applications. It also analyzes current literature on implementations of non-emergency service communications and service requests (311). Primarily, this research paper investigates whether the functioning of the My San Jose smartphone application and website platforms are meeting the intended goal of improving the customer experience for city services. This paper analyzes My San Jose raw service request data to review performance. In addition, this paper analyzes qualitative information gathered from semi-structured interviews of City of San José employees to shed additional insight into the processes in place to fulfill these service requests from start to finish

    Crowdsourcing User-Centered Teams

    Get PDF
    Crowdsourcing has become an increasingly important tool for team formation and collaboration. This thesis investigates how User-Centered Design, an iterative process that prioritizes users and their needs, can be applied to improve the efficiency and effectiveness of crowdsourcing systems for teamwork and team formation. To achieve this, we conducted a series of studies to explore the role of various factors in shaping crowd workers' behaviour and preferences in collaborative contexts. The main findings of our research are as follows. In online team formation settings, crowd workers prefer disclosing overt traits (e.g., age, gender, topical interests) and avoid sharing sensitive information (e.g., ethnicity, depression). However, they are willing to share information regarding their personality and values, typically considered deep-level sensitive traits. Well-defined digital nudging interventions, such as a diversity progress bar, can promote diverse team formation. In contrast, subtler forms of nudging may inadvertently trigger biases working against the intended objectives. Ad-hoc crowd teams working under pressure can benefit from systems that account for differences in personality traits, as these can influence collaboration outcomes and perceptions. Designing crowdsourcing systems for emergency response requires modelling communication tools that aid, assist, and monitor the shared load, considering the strictly cooperative roles and task- and user-dependent communication styles between collaborators. When forming teams, crowd workers tend to balance attributes between and within groups, with a preference for Openness to Experience among the Big-5 personality traits. Based on these findings, we recommend applying a User-Centered approach to design collaborative crowdsourcing systems, considering user needs, behaviour, intents, and perceptions of digital environments. Future research should continue to explore and evaluate innovative strategies for promoting effective collaboration and team formation in crowdsourcing contexts

    Innovative big data integrationand analysis techniques for urban hazard management

    Get PDF
    PhD ThesisModern early warning systems (EWS) require sophisticated knowledge of natural hazards, the urban context and underlying risk factors to enable dynamic and timely decision making (e.g., hazard detection, hazard preparedness). Landslides are a common form of natural hazard with a global impact and are closely linked to a variety of other hazards. EWS for landslide prediction and detection relies on scienti c methods and models which require input from the time-series data, such as the earth observation (EO) and ancillary data. Such data sets are produced by a variety of remote sensing satellites and Internet of Things sensors which are deployed in landslide-prone areas. Besides, social media-based time-series data has played a signi cant role in modern disaster management. The emergence of social media has led to the possibility of the general public contributing to the monitoring of natural hazard by reporting incidents related to hazard events. To this end, the data integration and analysis of potential time-series data sources in EWS applications have become a challenge due to the complexity and high variety of data sources. Moreover, sophisticated domain knowledge of natural hazards and risk management are also required to enable dynamic and timely decision making about serious hazards. In this thesis, a comprehensive set of algorithmic techniques for managing high varieties of time series data from heterogeneous data sources is investigated. A novel ontology, namely Landslip Ontology, is proposed to provide a knowledge base that establishes the relationship between landslide hazard and EO and ancillary data sources to support data integration for EWS applications. Moreover, an ontology-based data integration and analytics system that includes human in the loop of hazard information acquisition from social media is proposed to establish a deeper and more accurate situational awareness of hazard events. Finally, the system is extended to enable an interaction between natural hazard EWS and electrical grid EWS to contribute to electrical grid network monitoring and support decision-making for electrical grid infrastructure management

    The use of a user-centric smart mobile application prototype for supporting safety and security in a city: a design science method

    Get PDF
    Cities have always been the drivers of innovation, growth and change. Cities around the world are still rapidly expanding, especially on the African and Asian continents. Cape Town is one of those cities, where urbanisation rates are high, and crime is persisting at alarmingly high levels with crime rates being among the worst in the country and the world. Additionally, the city is home to 7 of 10 worst-performing police services in the country. Combining these factors, there is a need to look at ‘smart' ways of growth which includes facilitating a safe and secure city for citizens. Although Cape Town is pursuing smart initiatives, these have failed to place communities and individuals among the key stakeholders in the smart planning process. This research focuses on further researching smart city initiatives in Cape Town, placing citizens at the centre of the development process. As Cape Town's mobile phone penetration rate is high and access to Internet is rapidly expanding, this research aims to use crowdsourcing techniques for developing a smart mobile application prototype that is focused on enhancing community engagement and facilitating increased perceived feelings of safety and security for citizens. The study uses a Design Science Research method with Cape Town citizens as the main stakeholders, to propose an artifact based on their wishes, needs and current issues faced with regards to safety and security in the city. The proposed artifact focuses on enhancing community engagement, through a chat room and user-logged incident reports, as well as a customised safe route planning functionality where users can send emergency signals to comembers with the use of GPS live location tracking. The research shows participants are willing to adopt the use of the mobile application prototype, given there is substantial community buy-in, and the functionalities in the app are easy to use and quickly accessible. The study further identifies the need for better police follow up and involvement, as the city's police system could benefit from crowd-sourced crime-data in reducing the number of crimes in neighbourhoods to make citizens feel more safe and secure

    Standardization Roadmap for Unmanned Aircraft Systems, Version 2.0

    Get PDF
    This Standardization Roadmap for Unmanned Aircraft Systems, Version 2.0 (“roadmap”) is an update to version 1.0 of this document published in December 2018. It identifies existing standards and standards in development, assesses gaps, and makes recommendations for priority areas where there is a perceived need for additional standardization and/or pre-standardization R&D. The roadmap has examined 78 issue areas, identified a total of 71 open gaps and corresponding recommendations across the topical areas of airworthiness; flight operations (both general concerns and application-specific ones including critical infrastructure inspections, commercial services, and public safety operations); and personnel training, qualifications, and certification. Of that total, 47 gaps/recommendations have been identified as high priority, 21 as medium priority, and 3 as low priority. A “gap” means no published standard or specification exists that covers the particular issue in question. In 53 cases, additional R&D is needed. As with the earlier version of this document, the hope is that the roadmap will be broadly adopted by the standards community and that it will facilitate a more coherent and coordinated approach to the future development of standards for UAS. To that end, it is envisioned that the roadmap will continue to be promoted in the coming year. It is also envisioned that a mechanism may be established to assess progress on its implementation

    MODELLING & SIMULATION HYBRID WARFARE Researches, Models and Tools for Hybrid Warfare and Population Simulation

    Get PDF
    The Hybrid Warfare phenomena, which is the subject of the current research, has been framed by the work of Professor Agostino Bruzzone (University of Genoa) and Professor Erdal Cayirci (University of Stavanger), that in June 2016 created in order to inquiry the subject a dedicated Exploratory Team, which was endorsed by NATO Modelling & Simulation Group (a panel of the NATO Science & Technology organization) and established with the participation as well of the author. The author brought his personal contribution within the ET43 by introducing meaningful insights coming from the lecture of \u201cFight by the minutes: Time and the Art of War (1994)\u201d, written by Lieutenant Colonel US Army (Rtd.) Robert Leonhard; in such work, Leonhard extensively developed the concept that \u201cTime\u201d, rather than geometry of the battlefield and/or firepower, is the critical factor to tackle in military operations and by extension in Hybrid Warfare. The critical reflection about the time - both in its quantitative and qualitative dimension - in a hybrid confrontation it is addressed and studied inside SIMCJOH, a software built around challenges that imposes literally to \u201cFight by the minutes\u201d, echoing the core concept expressed in the eponymous work. Hybrid Warfare \u2013 which, by definition and purpose, aims to keep the military commitment of both aggressor and defender at the lowest - can gain enormous profit by employing a wide variety of non-military tools, turning them into a weapon, as in the case of the phenomena of \u201cweaponization of mass migrations\u201d, as it is examined in the \u201cDies Irae\u201d simulation architecture. Currently, since migration it is a very sensitive and divisive issue among the public opinions of many European countries, cynically leveraging on a humanitarian emergency caused by an exogenous, inducted migration, could result in a high level of political and social destabilization, which indeed favours the concurrent actions carried on by other hybrid tools. Other kind of disruption however, are already available in the arsenal of Hybrid Warfare, such cyber threats, information campaigns lead by troll factories for the diffusion of fake/altered news, etc. From this perspective the author examines how the TREX (Threat network simulation for REactive eXperience) simulator is able to offer insights about a hybrid scenario characterized by an intense level of social disruption, brought by cyber-attacks and systemic faking of news. Furthermore, the rising discipline of \u201cStrategic Engineering\u201d, as envisaged by Professor Agostino Bruzzone, when matched with the operational requirements to fulfil in order to counter Hybrid Threats, it brings another innovative, as much as powerful tool, into the professional luggage of the military and the civilian employed in Defence and Homeland security sectors. Hybrid is not the New War. What is new is brought by globalization paired with the transition to the information age and rising geopolitical tensions, which have put new emphasis on hybrid hostilities that manifest themselves in a contemporary way. Hybrid Warfare is a deliberate choice of an aggressor. While militarily weak nations can resort to it in order to re-balance the odds, instead military strong nations appreciate its inherent effectiveness coupled with the denial of direct responsibility, thus circumventing the rules of the International Community (IC). In order to be successful, Hybrid Warfare should consist of a highly coordinated, sapient mix of diverse and dynamic combination of regular forces, irregular forces (even criminal elements), cyber disruption etc. all in order to achieve effects across the entire DIMEFIL/PMESII_PT spectrum. However, the owner of the strategy, i.e. the aggressor, by keeping the threshold of impunity as high as possible and decreasing the willingness of the defender, can maintain his Hybrid Warfare at a diplomatically feasible level; so the model of the capacity, willingness and threshold, as proposed by Cayirci, Bruzzone and Gunneriusson (2016), remains critical to comprehend Hybrid Warfare. Its dynamicity is able to capture the evanescent, blurring line between Hybrid Warfare and Conventional Warfare. In such contest time is the critical factor: this because it is hard to foreseen for the aggressor how long he can keep up with such strategy without risking either the retaliation from the International Community or the depletion of resources across its own DIMEFIL/PMESII_PT spectrum. Similar discourse affects the defender: if he isn\u2019t able to cope with Hybrid Threats (i.e. taking no action), time works against him; if he is, he can start to develop counter narrative and address physical countermeasures. However, this can lead, in the medium long period, to an unforeseen (both for the attacker and the defender) escalation into a large, conventional, armed conflict. The performance of operations that required more than kinetic effects drove the development of DIMEFIL/PMESII_PT models and in turn this drive the development of Human Social Culture Behavior Modelling (HCSB), which should stand at the core of the Hybrid Warfare modelling and simulation efforts. Multi Layers models are fundamental to evaluate Strategies and Support Decisions: currently there are favourable conditions to implement models of Hybrid Warfare, such as Dies Irae, SIMCJOH and TREX, in order to further develop tools and war-games for studying new tactics, execute collective training and to support decisions making and analysis planning. The proposed approach is based on the idea to create a mosaic made by HLA interoperable simulators able to be combined as tiles to cover an extensive part of the Hybrid Warfare, giving the users an interactive and intuitive environment based on the \u201cModelling interoperable Simulation and Serious Game\u201d (MS2G) approach. From this point of view, the impressive capabilities achieved by IA-CGF in human behavior modeling to support population simulation as well as their native HLA structure, suggests to adopt them as core engine in this application field. However, it necessary to highlight that, when modelling DIMEFIL/PMESII_PT domains, the researcher has to be aware of the bias introduced by the fact that especially Political and Social \u201cscience\u201d are accompanied and built around value judgement. From this perspective, the models proposed by Cayirci, Bruzzone, Guinnarson (2016) and by Balaban & Mileniczek (2018) are indeed a courageous tentative to import, into the domain of particularly poorly understood phenomena (social, politics, and to a lesser degree economics - Hartley, 2016), the mathematical and statistical instruments and the methodologies employed by the pure, hard sciences. Nevertheless, just using the instruments and the methodology of the hard sciences it is not enough to obtain the objectivity, and is such aspect the representations of Hybrid Warfare mechanics could meet their limit: this is posed by the fact that they use, as input for the equations that represents Hybrid Warfare, not physical data observed during a scientific experiment, but rather observation of the reality that assumes implicitly and explicitly a value judgment, which could lead to a biased output. Such value judgement it is subjective, and not objective like the mathematical and physical sciences; when this is not well understood and managed by the academic and the researcher, it can introduce distortions - which are unacceptable for the purpose of the Science - which could be used as well to enforce a narrative mainstream that contains a so called \u201ctruth\u201d, which lies inside the boundary of politics rather than Science. Those observations around subjectivity of social sciences vs objectivity of pure sciences, being nothing new, suggest however the need to examine the problem under a new perspective, less philosophical and more leaned toward the practical application. The suggestion that the author want make here is that the Verification and Validation process, in particular the methodology used by Professor Bruzzone in doing V&V for SIMCJOH (2016) and the one described in the Modelling & Simulation User Risk Methodology (MURM) developed by Pandolfini, Youngblood et all (2018), could be applied to evaluate if there is a bias and the extent of the it, or at least making clear the value judgment adopted in developing the DIMEFIL/PMESII_PT models. Such V&V research is however outside the scope of the present work, even though it is an offspring of it, and for such reason the author would like to make further inquiries on this particular subject in the future. Then, the theoretical discourse around Hybrid Warfare has been completed addressing the need to establish a new discipline, Strategic Engineering, very much necessary because of the current a political and economic environment which allocates diminishing resources to Defense and Homeland Security (at least in Europe). However, Strategic Engineering can successfully address its challenges when coupled with the understanding and the management of the fourth dimension of military and hybrid operations, Time. For the reasons above, and as elaborated by Leonhard and extensively discussed in the present work, addressing the concern posed by Time dimension is necessary for the success of any military or Hybrid confrontation. The SIMCJOH project, examined under the above perspective, proved that the simulator has the ability to address the fourth dimension of military and non-military confrontation. In operations, Time is the most critical factor during execution, and this was successfully transferred inside the simulator; as such, SIMCJOH can be viewed as a training tool and as well a dynamic generator of events for the MEL/MIL execution during any exercise. In conclusion, SIMCJOH Project successfully faces new challenging aspects, allowed to study and develop new simulation models in order to support decision makers, Commanders and their Staff. Finally, the question posed by Leonhard in terms of recognition of the importance of time management of military operations - nowadays Hybrid Conflict - has not been answered yet; however, the author believes that Modelling and Simulation tools and techniques can represent the safe \u201ctank\u201d where innovative and advanced scientific solutions can be tested, exploiting the advantage of doing it in a synthetic environment

    PeaceTech:Digital transformation to end wars

    Get PDF
    Why are we willing to believe that technology can bring about war... but not peace? PeaceTech: Digital Transformation to End War is the world's first book dealing with the use of technological innovation to support peace and transition processes. Through an interwoven narrative of personal stories that capture the complexity of real-time peace negotiation, Bell maps the fast-paced developments of PeaceTech, and the ethical and practical challenges involved. Bell locates PeaceTech within the wider digital revolution that is also transforming the conduct of war. She lays bare the 'double disruption' of peace processes, through digital transformation, and through changing conflict patterns that make processes more difficult to mount. Against this backdrop - can digital peacebuilding be a force for good? Or do the risks outweigh the benefits? PeaceTech provides a 12-Step Manifesto laying out the types of practice and commitmentneeded for successful use of digital tools to support peace processes. This open access book will be invaluable primer for business tech entrepreneurs, peacebuilders, the tech community, and students of international relations, informatics, comparative politics, ethics and law; and indeed for those simply curious about peace process innovation in the contemporary world.</p
    corecore