The Community for Technology Leaders
RSS Icon
Issue No.06 - Nov.-Dec. (2012 vol.27)
pp: 90-96
Nabil R. Adam , US Department of Homeland Security
Basit Shafiq , Rutgers University
Robin Staffin , US Department of Defense, Office of Research and Engineering
The growing trend of using smartphones and other GPS-enabled devices has provided new opportunities for developing spatial computing applications and technologies in unanticipated and unprecedented ways. Some capabilities of today's smartphones highlight the potential of citizen sensors to enable the next generation of geoinformatics. One promising application area for this is social media and its application to disaster management. Dynamic, real-time incident information collected from onsite human responders about the extent of damage, the evolution of the event, the community's needs, and responders' ability to deal with the situation, combined with information from the larger emergency management community, could lead to more accurate and real-time situational awareness. This would enable informed decisions, better resource allocation and thus a better response and outcome to the total crisis. In this context, the US Department of Homeland Security's Science & Technology Directorate (DHS-S&T) has initiated the Social Media Alert and Response to Threats to Citizens" (SMART-C) program, which aims to develop citizen participatory sensing capabilities for decision support throughout the disaster life cycle via a multitude of devices and modalities. Here, the authors provide an overview of the envisioned SMART-C system's capabilities and discuss some of the interesting and unique challenges that arise due to the combination of spatial computing and social media within the context of disaster management.
Social network services, Smart phones, Emergencies, Disaster management, Global Positioning System, SMART-C, citizen participatory sensing, geoinformatics, customized alert, data and context privacy
Nabil R. Adam, Basit Shafiq, Robin Staffin, "Spatial Computing and Social Media in the Context of Disaster Management", IEEE Intelligent Systems, vol.27, no. 6, pp. 90-96, Nov.-Dec. 2012, doi:10.1109/MIS.2012.113
1. “IBM, Caltrans, and UC Berkeley Aim to Help Commuters Avoid Congested Roadways Before their Trip Begins,” press release, IBM, 13 Apr. 2011; 34261.wss.
2. M. Youssef, V. Atluri, and N. Adam, “Preserving Mobile Customer Privacy: An Access Control System for Moving Objects and Customer Profiles,” Proc. 6th Int'l Conf. Mobile Data Management (MDM 05), ACM, 2005, pp. 67–76.
3. “More Americans Using Social Media and Technology in Emergencies,” Public Affairs Desk, Am. Red Cross, 24 Aug. 2011; http://tinyurl.com9bylh55.
4. N. Adam et al., “Social Media Alert and Response to Threats to Citizens (SMART-C),” Proc. 8th IEEE Int'l Conf. Collaborative Computing: Networking, Applications, and Worksharing (ColCom 12), to be published, 2012.
5. B. Zhou, J. Pei, and W. Luk, “A Brief Survey on Anonymization Techniques for Privacy Preserving Publishing of Social Network Data,” SIGKDD Explorations Newsletter, vol. 10, no. 2, 2008.
6. C. Aggarwal and P.S. Yu, “A General Survey of Privacy-Preserving Data Mining Models and Algorithms,” Privacy-Preserving Data Mining, vol. 34, Springer, 2008, pp. 11–52.
7. C. Dwork, “Differential Privacy,” Automata, Languages, and Programming, LNCS 4052, M. Bugliesi et al., eds., Springer, 2006, pp. 1–12.
8. C. Wang et al., “Privacy-Preserving Public Auditing for Data Storage Security in Cloud Computing,” IEEE Conf. Computer Communications (INFOCOM 10), IEEE, 2010, pp. 525–533.
9. X. Zhang et al., “, Formal Model and Policy Specification of Usage Control,” ACM Trans. Information and Systems Security, vol. 8, no. 4, 2005, pp. 351–387.
10. J. Wickramasuriya et al., “Privacy Protecting Data Collection in Media Spaces,” Proc. 12th Ann. ACM Int'l Conf. Multimedia (MULTIMEDIA 04), ACM, 2004, pp. 48–55.
11. P. Golle, F. McSherry, and I. Mironov, “Data Collection with Self-Enforcing Privacy,” Proc. 13th ACM Conf. Computer and Communications Security (CCS 06), ACM, 2006, pp. 69–78.
12. N. Li et al., “Privacy Preservation in Wireless Sensor Networks: A State-of-the-Art Survey, Ad Hoc Networks, vol. 7, no. 8, Nov. 2009, pp. 1501–1514.
13. R. Chen et al., “Differentially Private Transit Data Publication: A Case Study on the Montreal Transportation System,” Proc. 18th ACM SIGKDD Int'l Conf. Knowledge Discovery and Data Mining (KDD 12), ACM, 2012, pp. 213–221.
14. H. Shin, J. Vaidya, and V. Atluri, “A Profile Anonymization Model for Location-Based Services,” J. Computer Security, vol. 19, no. 5, 2011, pp. 795–833.
15. B. Hoh et al., “Preserving Privacy in GPS Traces via Uncertainty-Aware Path Cloaking,” Proc. 14th ACM Conf. Computer and Communications Security (CCS 07), ACM, 2007, pp. 161–171.
16. M. Jadliwala, I. Bilogrevic, and J.-P. Hubaux, “Optimizing Mixing in Pervasive Networks: A Graph-Theoretic Perspective,” Proc. 16th European Symp. Research in Computer Security (ESORICS 11), LNCS 6879, Springer, 2011, pp. 548–567.
17. “From GPS and Virtual Globes to Spatial Computing—2020: The Next Transformative Technology,” US Nat'l Science Foundation/Computing Community Consortium workshop proposal, Sept. 2012.
18. N. Adam et al., “Approach for Discovering and Handling Crisis in a Service-Oriented Environment,” Proc. Intelligence and Security Informatics (ISI 2007), IEEE, 2007, pp. 16–24.
19. J. Christensen, “Using RESTful Web Services and Cloud Computing to Create Next-Generation Mobile Applications,” Companion to the 24th Ann. ACM SIGPLAN Conf. Object-Oriented Programming, Systems, Languages, and Applications, ACM, 2009, pp. 627–634.
20. H. Artail, K. Fawaz, and A. Ghandour, “A Proxy-Based Architecture for Dynamic Discovery and Invocation of Web Services from Mobile Devices,” IEEE Trans. Services Computing, vol. 5, no. 1, 2012, pp. 99–115.
21. J. García-Macías et al., “Browsing the Internet of Things with Sentient Visors,” Computer, vol. 44, no. 5, 2011, pp. 46–52.
3 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool