The Community for Technology Leaders
RSS Icon
Issue No.06 - Nov.-Dec. (2011 vol.15)
pp: 90-93
Christine Satchell , Queensland University of Technology
Marcus Foth , Queensland University of Technology
<p>People all over the world are regularly hit by floods, cyclones, and other natural disasters. Many use smart phones and social media to stay connected, seek help, improvise, and cope with crises or challenging situations. This column discusses these practices after dark or during disasters to unveil challenges and opportunities for innovative designs that increase resilience and safety.</p>
natural disasters, mobile technology, mobile applications, Internet computing, human-computer interaction
Christine Satchell, Marcus Foth, "Darkness and Disaster in the City", IEEE Internet Computing, vol.15, no. 6, pp. 90-93, Nov.-Dec. 2011, doi:10.1109/MIC.2011.149
1. S. Vogler, "Brisbane Flood Cost City Council $440 Mil," Courier Mail,8 Feb. 2011; story-e6freon6-122600209592 .
2. X. La Canna, "Police Can't Stem Melbourne Violence," Courier Mail,24 Feb. 2011; story-fn6ck4a4-1226011004864 .
3. C. Satchell and M. Foth, "Fear and Danger in Nocturnal Urban Environments," Proc. 22nd Conf. Computer–Human Interaction Special Interest Group of Australia on Computer–Human Interaction (OZCHI 10), S. Viller, and B. Kraal eds., ACM Press, 2010, pp. 380–383.
4. M. Foth, J.H.-J. Choi, and C. Satchell, "Urban Informatics," Proc. ACM 2011 Conf. Computer Supported Cooperative Work (CSCW 11), ACM Press, 2011, pp. 1–8.
5. W. March et al., "Night and Darkness: Interaction After Dark," Extended Abstracts on Human Factors in Computing Systems (CHI EA 08), ACM Press, 2008, pp. 3985–3988.
6. J. Blom et al., "Fear and the City: Role of Mobile Services in Harnessing Safety and Security in Urban Use Contexts," Proc. 28th Int'l Conf. Human Factors in Computing Systems (CHI 10), ACM Press, 2010, pp. 1841–1850.
7. M.A. Blythe, P.C. Wright, and A.F. Monk, "Little Brother: Could and Should Wearable Computing Technologies be Applied to Reducing Older People's Fear of Crime?" Personal Ubiquitous Computing, vol. 8, no. 6, 2004, pp. 402–415.
8. A. Czeskis et al., "Parenting from the Pocket: Value Tensions and Technical Directions for Secure and Private Parent-Teen Mobile Safety," Proc. 6th Symp. Usable Privacy and Security (SOUPS 10), ACM Press, 2010; .
9. E. Troshynski, C. Lee, and P. Dourish, "Accountabilities of Presence: Reframing Location-Based Systems," Proc. 26th Ann. SIGCHI Conf. Human Factors in Computing Systems (CHI 08), ACM Press, 2008, pp. 487–496; .
10. L. Palen and P. Dourish, "Unpacking 'Privacy' for a Networked World," Proc. SIGCHI Conf. Human Factors in Computing Systems (CHI 03), ACM Press, 2003, pp. 29–136;
11. C. Satchell and M. Foth, "Welcome to the Jungle: HCI After Dark," Proc. 29th Int'l Conf. Human Factors in Computing Systems (CHI 11), ACM Press, 2011, pp. 753-762; .
12. J. Elder and J. Pierik, "Just How Dangerous is Melbourne?" The Age,14 Mar. 2010; .
13. J. Lin et al., "Fish'n'Steps: Encouraging Physical Activity with an Interactive Computer Game," Proc. 8th Int'l Conf. Ubiquitous Computing (UbiComp 06), LNCS, Springer, 2006, pp. 261–278.
14. F. Mueller et al., "Sports over a Distance," Personal and Ubiquitous Computing, vol. 11, no. 8, 2007, pp. 633–645.
15. B.J. Fogg, Persuasive Technology: Using Computers to Change What We Think and Do, Morgan Kaufmann, 2003.
31 ms
(Ver 2.0)

Marketing Automation Platform Marketing Automation Tool