Following an earlier NRC workshop on public response to alerts and warnings delivered to mobile devices, a related workshop was held on February 28 and 29, 2012 to look at the role of social media in disaster response. This was one of the first workshops convened to look systematically at the use of social media for alerts and warningsan event that brought together social science researchers, technologists, emergency management professionals, and other experts on how the public and emergency managers use social media in disasters.In addition to exploring how officials monitor social media, as well as the resulting privacy considerations, the workshop focused on such topics as: what is known about how the public responds to alerts and warnings; the implications of what is known about such public responses for the use of social media to provide alerts and warnings to the public; and approaches to enhancing the situational awareness of emergency managers. Public Response to Alerts and Warnings Using Social Media: Report of a Workshop on Current Knowledge and Research Gaps summarizes presentations made by invited speakers, other remarks by workshop participants, and discussions during parallel breakout sessions. It also points to potential topics for future research, as well as possible areas for future research investment, and it describes some of the challenges facing disaster managers who are seeking to incorporate social media into regular practice.
This book presents a summary of the Workshop on Public Response to Alerts and Warnings on Mobile Devices: Current Knowledge and Research Gaps, held April 13 and 14, 2010, in Washington, D.C., under the auspices of the National Research Council's Committee on Public Response to Alerts and Warnings on Mobile Devices: Current Knowledge and Research Needs. The workshop was structured to gather inputs and insights from social science researchers, technologists, emergency management professionals, and other experts knowledgeable about how the public responds to alerts and warnings, focusing specifically on how the public responds to mobile alerting.
Geotargeted Alerts and Warnings: Report of a Workshop on Current Knowledge and Research Gaps is the summary of a February, 2013 workshop convened by the Computer Science and Telecommunications Board of the National Research Council to examine precise geotargeting of public alerts and warnings using social media. The workshop brought together social science researchers, technologists, emergency management professionals, and other experts to explore what is known about how the public responds to geotargeted alerts and warnings, technologies and techniques for enhancing the geotargeting of alerts and warnings, and open research questions about how to effectively use geotargeted alerts and warnings and technology gaps. This report considers the potential for more precise geographical targeting to improve the effectiveness of disaster alerts and warnings; examines the opportunities presented by current and emerging technologies to create, deliver, and display alerts and warnings with greater geographical precision; considers the circumstances where more granular targeting would be useful; and examines the potential roles of federal, state, and local agencies and private sector information and communications providers in delivering more targeted alerts.
Following an earlier NRC workshop on public response to alerts and warnings delivered to mobile devices, a related workshop was held on February 28 and 29, 2012 to look at the role of social media in disaster response. This was one of the first workshops convened to look systematically at the use of social media for alerts and warnings-an event that brought together social science researchers, technologists, emergency management professionals, and other experts on how the public and emergency managers use social media in disasters.In addition to exploring how officials monitor social media, as well as the resulting privacy considerations, the workshop focused on such topics as: what is known about how the public responds to alerts and warnings; the implications of what is known about such public responses for the use of social media to provide alerts and warnings to the public; and approaches to enhancing the situational awareness of emergency managers. Public Response to Alerts and Warnings Using Social Media: Report of a Workshop on Current Knowledge and Research Gaps summarizes presentations made by invited speakers, other remarks by workshop participants, and discussions during parallel breakout sessions. It also points to potential topics for future research, as well as possible areas for future research investment, and it describes some of the challenges facing disaster managers who are seeking to incorporate social media into regular practice.
Following a series of natural disasters, including Hurricane Katrina, that revealed shortcomings in the nation's ability to effectively alert populations at risk, Congress passed the Warning, Alert, and Response Network (WARN) Act in 2006. Today, new technologies such as smart phones and social media platforms offer new ways to communicate with the public, and the information ecosystem is much broader, including additional official channels, such as government social media accounts, opt-in short message service (SMS)-based alerting systems, and reverse 911 systems; less official channels, such as main stream media outlets and weather applications on connected devices; and unofficial channels, such as first person reports via social media. Traditional media have also taken advantage of these new tools, including their own mobile applications to extend their reach of beyond broadcast radio, television, and cable. Furthermore, private companies have begun to take advantage of the large amounts of data about users they possess to detect events and provide alerts and warnings and other hazard-related information to their users. More than 60 years of research on the public response to alerts and warnings has yielded many insights about how people respond to information that they are at risk and the circumstances under which they are most likely to take appropriate protective action. Some, but not all, of these results have been used to inform the design and operation of alert and warning systems, and new insights continue to emerge. Emergency Alert and Warning Systems reviews the results of past research, considers new possibilities for realizing more effective alert and warning systems, explores how a more effective national alert and warning system might be created and some of the gaps in our present knowledge, and sets forth a research agenda to advance the nation's alert and warning capabilities.
This book presents a summary of the Workshop on Public Response to Alerts and Warnings on Mobile Devices: Current Knowledge and Research Gaps, held April 13 and 14, 2010, in Washington, D.C., under the auspices of the National Research Council's Committee on Public Response to Alerts and Warnings on Mobile Devices: Current Knowledge and Research Needs. The workshop was structured to gather inputs and insights from social science researchers, technologists, emergency management professionals, and other experts knowledgeable about how the public responds to alerts and warnings, focusing specifically on how the public responds to mobile alerting.
Geotargeted Alerts and Warnings: Report of a Workshop on Current Knowledge and Research Gaps is the summary of a February, 2013 workshop convened by the Computer Science and Telecommunications Board of the National Research Council to examine precise geotargeting of public alerts and warnings using social media. The workshop brought together social science researchers, technologists, emergency management professionals, and other experts to explore what is known about how the public responds to geotargeted alerts and warnings, technologies and techniques for enhancing the geotargeting of alerts and warnings, and open research questions about how to effectively use geotargeted alerts and warnings and technology gaps. This report considers the potential for more precise geographical targeting to improve the effectiveness of disaster alerts and warnings; examines the opportunities presented by current and emerging technologies to create, deliver, and display alerts and warnings with greater geographical precision; considers the circumstances where more granular targeting would be useful; and examines the potential roles of federal, state, and local agencies and private sector information and communications providers in delivering more targeted alerts.
In June 2016 the National Academies of Sciences, Engineering, and Medicine convened the Workshop on Encryption and Mechanisms for Authorized Government Access to Plaintext. Participants at this workshop discussed potential encryption strategies that would enable access to plaintext information by law enforcement or national security agencies with appropriate authority. Although the focus of the workshop was on technical issues, there was some consideration of the broader policy context, and discussion about the topics of encryption and authorized exceptional analysis frequently addressed open policy questions as well as technical issues. This publication summarizes the presentations and discussions from the workshop.
The Next Generation Air Transportation System (NextGen) is an effort begun in 2003 whose goals include improving the capacity, efficiency, and safety of the U.S. air transportation system and also enabling reduction in noise, pollution, and energy use. The Federal Aviation Administration and various stakeholders, including equipment providers, airlines, and contractors, are currently implementing both near-term and midterm capabilities of this effort. Interim Report of a Review of the Next Generation Air Transportation System Enterprise Architecture, Software, Safety, and Human Factors is part of a larger project to examine NextGen's enterprise architecture and related issues. This interim report provides an initial assessment focusing on challenges of system architecture for software-intensive systems.
Recent disclosures about the bulk collection of domestic phone call records and other signals intelligence programs have stimulated widespread debate about the implications of such practices for the civil liberties and privacy of Americans. In the wake of these disclosures, many have identified a need for the intelligence community to engage more deeply with outside privacy experts and stakeholders. At the request of the Office of the Director of National Intelligence, the National Academies of Sciences, Engineering, and Medicine convened a workshop to address the privacy implications of emerging technologies, public and individual preferences and attitudes toward privacy, and ethical approaches to data collection and use. This report summarizes discussions between experts from academia and the private sector and from the intelligence community on private sector best practices and privacy research results.
Advanced computing capabilities are used to tackle a rapidly growing range of challenging science and engineering problems, many of which are compute- and data-intensive as well. Demand for advanced computing has been growing for all types and capabilities of systems, from large numbers of single commodity nodes to jobs requiring thousands of cores; for systems with fast interconnects; for systems with excellent data handling and management; and for an increasingly diverse set of applications that includes data analytics as well as modeling and simulation. Since the advent of its supercomputing centers, the National Science Foundation (NSF) has provided its researchers with state-of-the-art computing systems. The growth of new models of computing, including cloud computing and publically available by privately held data repositories, opens up new possibilities for NSF. In order to better understand the expanding and diverse requirements of the science and engineering community and the importance of a new broader range of advanced computing infrastructure, the NSF requested that the National Research Council carry out a study examining anticipated priorities and associated tradeoffs for advanced computing. Future Directions for NSF Advanced Computing Infrastructure to Support U.S. Science and Engineering in 2017-2020 provides a framework for future decision-making about NSF's advanced computing strategy and programs. It offers recommendations aimed at achieving four broad goals: (1) position the U.S. for continued leadership in science and engineering, (2) ensure that resources meet community needs, (3) aid the scientific community in keeping up with the revolution in computing, and (4) sustain the infrastructure for advanced computing.
In May 2016, the National Academies of Sciences, Engineering, and Medicine hosted a workshop on Cryptographic Agility and Interoperability. Speakers at the workshop discussed the history and practice of cryptography, its current challenges, and its future possibilities. This publication summarizes the presentations and discussions from the workshop.
Cyber-physical systems (CPS) are increasingly relied on to provide the functionality and value to products, systems, and infrastructure in sectors including transportation, health care, manufacturing, and electrical power generation and distribution. CPS are smart, networked systems with embedded sensors, computer processors, and actuators that sense and interact with the physical world; support real-time, guaranteed performance; and are often found in critical applications. Cyber-physical systems have the potential to provide much richer functionality, including efficiency, flexibility, autonomy, and reliability, than systems that are loosely coupled, discrete, or manually operated, but also can create vulnerability related to security and reliability. Advances in CPS could yield systems that can communicate and respond faster than humans; enable better control and coordination of large-scale systems, such as the electrical grid or traffic controls; improve the efficiency of systems; and enable advances in many areas of science. As CPS become more pervasive, so too will demand for a workforce with the capacity and capability to design, develop, and maintain them. Building on its research program in CPS, the National Science Foundation (NSF) has begun to explore requirements for education and training. As part of that exploration, NSF asked the National Research Council of the National Academies to study the topic. Two workshops were convened in 2014, on April 30 and October 2-3 in Washington, D.C., to explore the knowledge and skills required for CPS work, education, and training requirements and possible approaches to retooling engineering and computer science programs and curricula to meet these needs. Interim Report on 21st Century Cyber-Physical Systems Education highlights emerging themes and summarizes related discussions from the workshops.
The Forum on Cyber Resilience of the National Academies of Sciences, Engineering, and Medicine hosted the Workshop on Recoverability as a First-Class Security Objective on February 8, 2018, in Washington, D.C. The workshop featured presentations from several experts in industry, research, and government roles who spoke about the complex facets of recoverabilityâ€"that is, the ability to restore normal operations and security in a system affected by software or hardware failure or a deliberate attack. This publication summarizes the presentations and discussions from the workshop.
Following a series of natural disasters, including Hurricane Katrina, that revealed shortcomings in the nation's ability to effectively alert populations at risk, Congress passed the Warning, Alert, and Response Network (WARN) Act in 2006. Today, new technologies such as smart phones and social media platforms offer new ways to communicate with the public, and the information ecosystem is much broader, including additional official channels, such as government social media accounts, opt-in short message service (SMS)-based alerting systems, and reverse 911 systems; less official channels, such as main stream media outlets and weather applications on connected devices; and unofficial channels, such as first person reports via social media. Traditional media have also taken advantage of these new tools, including their own mobile applications to extend their reach of beyond broadcast radio, television, and cable. Furthermore, private companies have begun to take advantage of the large amounts of data about users they possess to detect events and provide alerts and warnings and other hazard-related information to their users. More than 60 years of research on the public response to alerts and warnings has yielded many insights about how people respond to information that they are at risk and the circumstances under which they are most likely to take appropriate protective action. Some, but not all, of these results have been used to inform the design and operation of alert and warning systems, and new insights continue to emerge. Emergency Alert and Warning Systems reviews the results of past research, considers new possibilities for realizing more effective alert and warning systems, explores how a more effective national alert and warning system might be created and some of the gaps in our present knowledge, and sets forth a research agenda to advance the nation's alert and warning capabilities.
The Next Generation Air Transportation System's (NextGen) goal is the transformation of the U.S. national airspace system through programs and initiatives that could make it possible to shorten routes, navigate better around weather, save time and fuel, reduce delays, and improve capabilities for monitoring and managing of aircraft. A Review of the Next Generation Air Transportation provides an overview of NextGen and examines the technical activities, including human-system design and testing, organizational design, and other safety and human factor aspects of the system, that will be necessary to successfully transition current and planned modernization programs to the future system. This report assesses technical, cost, and schedule risk for the software development that will be necessary to achieve the expected benefits from a highly automated air traffic management system and the implications for ongoing modernization projects. The recommendations of this report will help the Federal Aviation Administration anticipate and respond to the challenges of implementing NextGen.
The Department of Commerce operates two telecommunications research laboratories located at the Department of Commerce's Boulder, Colorado, campus: the National Telecommunications and Information Administration's (NTIA's) Institute for Telecommunications Sciences (ITS) and the National Institute of Standards and Technology's (NIST's) Communications Technology Laboratory (CTL). ITS serves as a principal federal resource for solving the telecommunications concerns of federal agencies, state and local governments, private corporations and associations, standards bodies, and international organizations. ITS could provide an essential service to the nation by being a principal provider of instrumentation and spectrum measurement services; however, the inter-related shortages of funding, staff, and a coherent strategy limits its ability to fully function as a research laboratory. This report examines the institute's performance, resources, and capabilities and the extent to which these meet customer needs. The Boulder telecommunications laboratories currently play an important role in the economic vitality of the country and can play an even greater role given the importance of access to spectrum and spectrum sharing to the wireless networking and mobile cellular industries. Research advances are needed to ensure the continued evolution and enhancement of the connected world the public has come to expect.
The Department of Commerce operates two telecommunications research laboratories located at the Department of Commerce's Boulder, Colorado, campus: the National Telecommunications and Information Administration's (NTIA's) Institute for Telecommunications Sciences (ITS) and the National Institute of Standards and Technology's (NIST's) Communications Technology Laboratory (CTL). CTL develops appropriate measurements and standards to enable interoperable public safety communications, effective and efficient spectrum use and sharing, and advanced communication technologies. CTL is a newly organized laboratory within NIST, formed mid-2014. As it is new and its planned work represents a departure from that carried out by the elements of which it was composed, this study focuses on its available resources and future plans rather than past work. The Boulder telecommunications laboratories currently play an important role in the economic vitality of the country and can play an even greater role given the importance of access to spectrum and spectrum sharing to the wireless networking and mobile cellular industries. Research advances are needed to ensure the continued evolution and enhancement of the connected world the public has come to expect.
Software update is an important mechanism by which security changes and improvements are made in software, and this seemingly simple concept encompasses a wide variety of practices, mechanisms, policies, and technologies. To explore the landscape further, the Forum on Cyber Resilience hosted a workshop featuring invited speakers from government, the private sector, and academia. This publication summarizes the presentations and discussions from the workshop.
The 2012 National Research Council report Continuing Innovation in Information Technology illustrates how fundamental research in information technology (IT), conducted at industry and universities, has led to the introduction of entirely new product categories that ultimately became billion-dollar industries. The central graphic from that report portrays and connects areas of major investment in basic research, university-based research, and industry research and development; the introduction of important commercial products resulting from this research; billion-dollar-plus industries stemming from it; and present-day IT market segments and representative U.S. firms whose creation was stimulated by the decades-long research. At a workshop hosted by the Computer Science and Telecommunications Board on March 5, 2015, leading academic and industry researchers and industrial technologists described key research and development results and their contributions and connections to new IT products and industries, and illustrated these developments as overlays to the 2012 "tire tracks" graphic. The principal goal of the workshop was to collect and make available to policy makers and members of the IT community first-person narratives that illustrate the link between government investments in academic and industry research to the ultimate creation of new IT industries. This report provides summaries of the workshop presentations organized into five broad themes - (1) fueling the innovation pipeline, (2) building a connected world, (3) advancing the hardware foundation, (4) developing smart machines, and (5) people and computers - and ends with a summary of remarks from the concluding panel discussion.
The presence and intensity of media influences television, radio, music, computers, films, videos, and the Internet are increasingly recognized as an important part of the social ecology of children and youth, and these influences have become more visible and volatile in recent decades. Research that explores the level and effects of media influences calls for measurements of the quantity and character of exposure to a variety of potentially overlapping media sources, an analysis of the content of the media output, and examination of the social context and relationships that are associated with the media experience. Recognizing the importance of this research, the Board on Children, Youth, and Families, under the auspices of the National Research Council and the Institute of Medicine, and with the sponsorship of the Henry J. Kaiser Family Foundation, held a workshop in March 2006. Its purpose was twofold: to examine the quality of the measures used in studies of the effects of media on children's health and development and to identify gaps in both research and practice. The goal was for a variety of experts to consider steps and strategies that could move this research forward and improve its utility for helping parents, practitioners, and policy makers guide young people in navigating a media-rich environment. Studying Media Effects on Children and Youth provides a summary of that discussion, supplemented with information from two papers prepared for the workshop. It begins with an examination of the potential impact of media exposure, followed by a description of the basic research questions and the methods currently used to study them. Methodological questions and challenges and theoretical approaches are described; they are discussed from the perspective of other kinds of epidemiological research. This report closes with a discussion of future directions for the field.
This workshop summary was produced in the course of a broader study that is exploring how information technology research can foster new and improved government services, operations, and interactions with citizens. This workshop summary examines how this technology can contribute to more-effective response and recovery efforts to crises such as natural disasters or terrorist attacks, as well as to mitigation and preparedness in order to reduce the impact of these events.
This workshop summary was produced in the course of a broader study that is exploring how information technology research can foster new and improved government services, operations, and interactions with citizens. This workshop summary examines how this technology can contribute to more-effective response and recovery efforts to crises such as natural disasters or terrorist attacks, as well as to mitigation and preparedness in order to reduce the impact of these events.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.