Skip to main content

Currently Skimming:

3 A Research Agenda
Pages 56-73

The Chapter Skim interface presents what we've algorithmically identified as the most significant single chunk of text within every page in the chapter.
Select key terms on the right to highlight them within pages of the chapter.


From page 56...
... Nevertheless, as technologies shift, so do public responses; therefore, continued research is invaluable. These responses rely on several things, including 56
From page 57...
... 3  Federal Communications Commission, "FCC Strengthens Wireless Emergency Alerts as a Public Safety Tool," release date September 29, 2016, https://apps.fcc.gov/edocs_public/ attachmatch/DOC-341504A1.pdf. 4  Federal Communications Commission, "Improving Wireless Emergency Alerts and community-initiated alerting," release date November 19, 2015, https://apps.fcc.gov/­ edocs_public/attachmatch/FCC-15-154A1.pdf 5  D
From page 58...
... play major roles relative to other message elements in the outcomes of public understanding and belief of the protective action recommendation and the ability to decide how to respond.6 The other WEA message content elements are hazard, location, and source. Importantly, the START research team found that WEAs should express time as how much time until impact rather than when the message expires, as is the current practice for WEAs.
From page 59...
... Recent research has provided clear evidence that message length influences response; messages that can fit in the initial 90-character length of a WEA message and the 140 characters of Twitter foster milling9 behavior and delayed response.10 At this point, it is unclear what information is best included in a 360-character WEA message and what information is best included in linked content. Prior WEA research did not examine 360-character messages because the research was conducted before the pending FCC rulemaking that extended WEAs from 90 to 360 characters.11 However, research suggests that a mes 8  Considering the sharing of emergency alerting messages, there are several benefits to an ecosystem that incorporates multiple different channels.
From page 60...
... What technical challenges exist in transmitting multiple languages, or relying on the receiving device to translate messages? Additionally, protective action language, such as "shelter in place," might be challenging to translate to various languages and dialects.
From page 61...
... Liu, and M Boyd, 2015, Comprehensive Testing of Imminent Threat Public Messages for Mobile Devices: Final Report, College Park, MD: National Consortium for the Study of Terrorism and Responses to Terrorism.
From page 62...
... Liu, and M Boyd, 2015, Comprehensive Testing of Imminent Threat Public Messages for Mobile Devices: Final Report, College Park, MD: National Consortium for the Study of Terrorism and Responses to Terrorism; B
From page 63...
... Liu, and M Boyd, 2015, Comprehensive Testing of Imminent Threat Public Messages for Mobile Devices: Final Report, College Park, MD: National Consortium for the Study of Terrorism and Responses to Terrorism.
From page 64...
... Several researchers have conducted experiments to explore word choice, message content, and character length. While these experiments provide valuable data, real-world analysis could provide validation and further information on public response.
From page 65...
... measurements in the aftermath of an alert.  TECHNICAL CHALLENGES AND THEIR IMPACT Delivery Technology Enhanced Cell Broadcast and Network Capabilities Cellular networks have become the most popular access mechanism in the current scenario due to the wide use of the device. However, there are
From page 66...
... Bypassing Network Failure During hazards, some cellular networks may not function properly, owing either to overload or to infrastructure damage.23 One existing alternative is the NOAA Weather Radio All Hazards, which relies on a national network of dedicated transmitters and users who obtain suitably equipped receivers.24 Several other technologies exist that might support message receipt, including mesh networks, peer-to-peer communication, 21  The Alliance for Telecommunications Industry Solutions completed feasibility studies on message length in 2015 and recommended the expansion to the current 360-character limit for next-generation networks (https://access.atis.org/apps/group_public/download.
From page 67...
... For example, it took several years for the cellular standard body (3GPP) to recently come up with a specification that allows the transmis sion of 360-character Wireless Emergency Alerts messages.
From page 68...
... Could the increasing number of smart devices better communicate appropriate protective action? For example, if a disaster results in a boil water order, could a smart refrigerator present an alert when the water dispenser is used?
From page 69...
... Security, Trust, and Privacy A system that instructs large populations to take a particular action may represent a significant target for attacks on service availability, compromises of the integrity of valid messages, and spoofed messages. Emergency alerting systems have been directly compromised already, including the use of false Emergency Alert System (EAS)
From page 70...
... • An insider may spoof a colleague's identity to send an illegitimate CAP-compliant message, thereby spreading false information and undermining the colleague's reputation. 26  Carnegie Mellon University, 2014, Wireless Emergency Alerts (WEA)
From page 71...
... Spoofing, in particular, has been recognized as a threat to the validity of many communication channels, including email, the web, GPS data,27 and sensor data, among many others. Already, we have seen spoofing attacks on social media to post fake messages as in the April 2013 case of hackers taking control of the official Associated Press (AP)
From page 72...
... However, the latter types are also an important part of the information space surrounding disaster events. Mis­ information can be defined as factually false information that spreads accidentally or intentionally for non-malicious purposes.
From page 73...
... Considering the goal here of informing emergency alerting practices, re sponders should be encouraged to monitor social media and other online sources to identify and address rumors, misinformation and disinformation that could impact the affected community, and response efforts within that community. If community members are receiving their information from these channels, then responders and other information mediators should assume an active role in curating this content, and research provides some evidence to support the ability for official responders to play a productive role.


This material may be derived from roughly machine-read images, and so is provided only to facilitate research.
More information on Chapter Skim is available.