Tuesday, September 03, 2019

Social Media in Disaster Response


The Potential Uses or Pitfalls of Social Media in Disaster Response
Zachary Neilson
Case Study Issues in Mass Communication 07 September 2018

Executive Summary:


The ability to use social media by emergency managers in response to a disaster or emergency situation has the potential of being indispensable because it allows managers to have current and real-time updates on situations going on in the affected areas. However, the ability to collect that information can be quiet daunting for any one single entity to monitor and analyze on their own. Thus the need to possible have some form of automated computer system to monitor this information is needed. But there is the question on if such collection of data can be an intrusion of one’s privacy if no prior consent or agreement was ever made.

Case Details:


In today’s society the use of social media as an information sources outlet has become so prevalent that people have used it to talk about current events, political ideals or beliefs, and more recently to inform those that care about them if they are safe during a disaster or emergency situation. With all this information out there the use of these social media outlets could be an invaluable tool to emergency managers by being able to put out warnings or preparation information before a disaster, enable managers to effectively deploy and use humanitarian resource during a disaster, and to collect data on the recovery process and results after a disaster. However, being able to collect, analyze, and disseminate all that information can be too much for one person, or group to handle thus the need for an automated process in needed. But for many people they view their social media accounts and information as private and would consider it an invasion of their privacy if emergency managers were collecting or using their information in any way. This case study will look at the potential legal issues, possible framework to use social media, and how social media has been effective before.

Issue:


The focus of this study is to answer: How can social media be effectively and legally used by emergency managers?

Data analysis:


Throughout the process of building this case study multiple articles and websites were looked at to find data to help answer the question of how to use social media in a disaster response.

It is a human right to have one’s privacy protected. The use of social media outlets and platforms may from a legal viewpoint have many obstacles and laws that need to be navigated. Some areas of concern may include copyright laws and privacy and data protection laws as well as intellectual property laws and potentially intrudes into social media and social networks where personal and even sensitive data may be exchanged. International law recognizes human right to privacy in all situations except in extreme situations like war or another public emergency which ‘threatens the life of the nation’ (De Stefani, 2017 p.200). While it may not have specifically mentioned a natural or man-made disaster states can temporary suspend fundamental rights as long as this is a necessary, nondiscriminatory and proportionate measure, and does not breach other international obligations such refugee protection, right to life or prohibitions of torture or bans on genocide (De Stefani, 2017 p.201).

Violation of Contextual Integrity:

In an article written by Paul Hayes and Stephen Kelly titled “Distributed morality, privacy, and social median natural disaster response they wrote of an incident that happened in the United Kingdoms involving the CCTV system used throughout the country(Peck v the United Kingdom). There in order to show the effectiveness of the CCTV system local authorities released unobscured images of an individual performing self-harm but through the use of the CCTV system emergency responders where able to react and safe the person’s life (Hayes & Kelly, 2018 p162). However, because authorities released unobscured images to entities outside of the normal spectrum of emergency services this person’s privacy was violated in what Hayes and Kelly called the theory of Contextual Integrity of Information (Hayes & Kelly, 2018 p161). This Contextual Integrity deals with violations of privacy where information gained by one person is then shared with another who has no right or needed to know that information. An example given of this violation to privacy is like “a priest is expected to keep the contents of a confessor's confession confidential, if he were to gossip with the milkman he would have violated the Contextual Integrity of that information—there is no established norm for the priest to share details of confessions with the milkman” (Hayes & Kelly, 2018 p161).

A social media platform that works:

One social media platform that already has a successful disaster response is the Crisis Response page on Facebook. On this page there are a list of disasters going on in the world where people are able to mark themselves safe if it is determined that they are in an affected area. It also allows for people to offer help, people to ask for help, as well as allow for fundraiser to be created in response to the disaster. After reading through how and why Facebook can determine this information it was found that Facebook uses the information it’s users have already consented to providing like, names of cities listed in their profile, access to location through personal devices (if users already agreed to allow this access), and other factors like where you might be using the internet in order to activate its Safe Check function. Users will receive a notification asking if they would like to mark themselves safe however, users have the option to not respond or to turn this function off if they choose not to participate in this function. This has allowed Facebook and emergency managers to monitor and react to disasters and emergency situations in a legal manner without violating users right to privacy.

Key Decision Criteria:


When it comes to deciding what type of method to use for data collection and monitoring for emergency managers it should be one that mitigates privacy risks and violations. This is done by first having a system that replaces digital volunteers (who may be bad actors) with autonomous computational artifacts. Secondly, following ethical and legal research include a caucus of legal experts, a system that could be designed to be licensed to vetted and approved emergency management entities. Thirdly, the system would be developed under a comprehensive ethical framework indicating to end-users that it should only be utilized as dictated by necessity, and that access should be limited and secured, and information collected appropriately encrypted (Hayes & Kelly, 2018 p162). Also when deciding how to use social media one will also need to verify if the information coming in is real both from the affected population and from the emergency managers. Trust is built on three characteristics—ability, benevolence, and integrity (Mehta, Bruns, & Newton, 2016 p.515). The following table can also be used to determine when and how to use social media:

Table 1. Functions of disaster social media (Houston, et al., 2014 p. 8)

Disaster social media use
Disaster phase
Provide and receive disaster preparedness information
Pre-event
Provide and receive disaster warnings
Pre-event
Signal and detect disasters
Pre-event!Event
Send and receive requests for help or assistance
Event
Inform others about one’s own condition and location and learn about a disaster- affected individual’s condition and location
Event
Document and learn what is happening in the disaster
Event!Post-event
Deliver and consume news coverage of the disaster
Event!Post-event
Provide and receive disaster response information; identify and list ways to assist in the disaster response
Event!Post-event
Raise and develop awareness of an event; donate and receive donations; identify and list ways to help or volunteer
Event!Post-event
Provide and receive disaster mental/behavioural health support
Event!Post-event
Express emotions, concerns, well-wishes; memorialise victims
Event!Post-event
Provide and receive information about (and discuss) disaster response, recovery, and rebuilding; tell and hear stories about the disaster
Event!Post-event

Discuss socio-political and scientific causes and implications of and responsibility for events
Post-event
(Re)connect community members
Post-event
Implement traditional crisis communication activities
Pre-event!Post-event

Alternatives Analysis:


There are many different times that social media can be used in response to a disaster and there other means that can be used like major news broadcasting agencies, newspapers, radio and other website dedicated to disaster response in the a local area. During the 2007 Southern Californian Wildfires many different websites and web based outlets help keep people informed of what was going in their area and when they would be allowed back into areas they were evacuated from. One website was called rimoftheworld.net contained extensive collection of area news collected and submitted by residents, discussions forums, photo galleries, maps of the area and links to local and government information websites (Sutton, Palen, & Shklovski, 2008 p.629). This was accomplished through a close collaborating with local officials and firefighters to provide up-to-date information. After the fires were contained site operates for rimoftheworld.net conducted photo tours of the affected areas street by street, posting pictures of each affected area in a public gallery.

Recommendations:


Following the table provided by Houston, et al., 2014 emergency managers can have a predefined timetable on when and what information they may need to provided to the public through social media and other media outlets. Also establish disaster response websites for local areas that is maintained and updated by certified emergency responders Public Information Officers (PIO) as well as emergency response volunteers who’s sole purpose is to maintain the website.

Action and Implementation Plan:


In order to implement the most effective and method using social media PIOs and emergency managers should create, unless already created, a public Facebook page for their local area and make sure that the availability of the page be made known to local residents through informational meetings and on their own public information. Also PIOs and emergency managers should make sure they have access to legal counsel who are well versed in human right and privacy laws. This will be sure to provided them with counsel in knowing if they are violating any laws or protections. Finally emergency responders should also be given training on a regular basis either annually, semi-annually or whatever the PIO or emergency manager may deem necessary.

References:

De Stefani, P. (2017). Using social media in natural disaster management: A human-rights based approach. Peace Human Rights Governance, 1(2), 195-221. doi:10.14658/pupj-phrg-2017-2-3

Facebook. (n.d.). Retrieved from https://www.facebook.com/crisisresponse/

Hayes, P., & Kelly, S. (2018). Distributed morality, privacy, and social media in natural disaster response. Technology in Society, 54, 155-167. doi:10.1016/j.techsoc.2018.05.003

Houston, J. B., Hawthorne, J., Perreault, M. F., Park, E. H., Hode, M. G., Halliwell, M. R., . . . Griffith, S. A. (2014). Social media and disasters: A functional framework for social media use in disaster planning, response, and research. Disasters, 39(1), 1-22. doi:10.1111/disa.12092

Mehta, A. M., Bruns, A., & Newton, J. (2016). Trust, but verify: Social media models for disaster management. Disasters, 41(3), 549-565. doi:10.1111/disa.12218

Sutton, J., Palen, L., & Shklovski, I. (2008, May). Backchannels on the Front Lines: Emergent Uses of Social Media in the. Retrieved from http://citeseerx.ist.psu.edu/viewdoc/summary? doi=10.1.1.156.9517

No comments: