Breakout Session 3 Community Response

advertisement
Breakout Session 3
Community Response
Chair: Bruce Davis
Co-Chairs: Nalini
Venkatasubramanian, Nancy Suski
• Goals:
Community Response
– Identify challenges and opportunities associated with exploiting
community resources (both IT as well as social networking) for
emergency management
– Define the functional gaps in current UICDS capability that
prevent leverage of community resources for improved
situational awareness and emergency response.
• Issues:
– What do we mean by local IT resources and social
networking?
– How are social networks used prior to, during, and after a
disaster?
– What is the technical nature of these networks?
– What risks do emergency response organizations incur by using
these networks; what are some mitigation strategies?
– How can these networks be incorporated into & facilitated by
UICDS?
– What is the adverse impact on network participants for
Needed Capabilities (Gaps)
•
•
•
•
•
•
•
•
•
•
•
Local database – parcel data, street data, infrastructure
Real time database access on evacuees – real time people tracking
Geospatial databases
Private sector database/resources needed – must be easily accessible
CAD Systems
Vet records/animal identification databases accessing smart chip technology
Population/ point in time Demographic/feature resource needed
Hospital availability and resources
“in field sensors”
Real time traffic flow data
Real time vehicle resource assessment
•
•
Emergency management decision support software
Measurements in the field that can be linked to UICDS
•
•
•
Evacuation plan needed by community
Modeling – “Flood maps”
NGO capability/resources
•
Social Networking sites/assets – blogs, portals, facebook, twitter, myspace, youtube,
movies/photos
Adding the social networking sites to a “Reverse 911” – “Phone trees” – used as an
information source
211 and 311 used in San Bernardino/Riverside – Emergency and Informational reasons
•
•
3
Challenges
•
•
•
•
•
•
•
•
•
Governance structure
The feeling of spam
Fraud
Reliability/verification
Who is going to maintain/take ownership of the
system?
Legal liability
How to prevent dependency on this
Sharing security ideas – UICDS comes into play
Real time monitoring systems – “sensor feeds”
4
Recommendations
- Development of common reference database
- Catalogue of capabilities of each group – National
Information Exchange Model
- Common standards need to be developed for play/input –
minimum core sharing
- Incentives to participate - $$$$/technical support provided
- Implementation guidance
- User training
5
Download