IT concept Alex (WAB) Yae (BISS). Summary of the article Technology & tool for helping people from disaster /blog/communication.gif.

Slides:



Advertisements
Similar presentations
Digital Vulnerability Atlas of South Asia
Advertisements

Classroom Level 2. Technology use provides added value to teaching and learning. For Teaching adding value might mean individualizing instruction or making.
Classroom Level 1. Learning outcomes drive the selection of technology. First clarify your lesson or unit's student learning outcomes. Then, determine.
WLI Regional Knowledge Exchange Workshop on Decision- support Tools and Models September, 2013, Djerba, Tunisia Projecting Impact on Water Balance.
- Recent innovative start-up based in Marseille - -Development of Wesby Patented solution - Important experience in the industry -Start : software to communicate.
WiFi Multi Model Management Swapna Palaniswamy Overall Structure Introduction Use Cases Methods Results Other Outcomes Future Directions Summary.
Social Context of Computing Chapter 7. Digital Divide  Technological inequalities  Impact of communication technologies  Radio  Television  Press.
4.1.5 System Management Background What is in System Management Resource control and scheduling Booting, reconfiguration, defining limits for resource.
New technologies and disaster information resources Part 2. The right information, at the right time, the right way.
Software Structure CHAPTER 4 The overall structure of the online learning community system : 1.user database 2.content database 3.user/content map 4.user/user.
Multi-layer ICT Management Presented by Andy Park.
Broadband & Libraries: Measuring Levels of Broadband Access and Perceptions of Broadband Impact and Value Jeff D. Saunders Research Associate
Introduction and Overview “the grid” – a proposed distributed computing infrastructure for advanced science and engineering. Purpose: grid concept is motivated.
OHT 14.1 Galin, SQA from theory to implementation © Pearson Education Limited 2004 Software quality infrastructure components The need for procedures and.
COSO Framework A company should include IT in all five COSO components: –Control Environment –Risk Assessment –Control activities –Information and communication.
Sanjay Goel, School of Business/Center for Information Forensics and Assurance University at Albany Proprietary Information 1 Unit Outline Information.
Analysing News Articles. Questions for Analyzing Social Issues 1. What are the social issues associated with a particular IT development? 2. How did.
In today’s lesson: 1.Understand the key characteristics of aid and insurance (risk spreading) and land-use zoning (planning). 2.Give examples of where.
BEGIN. 1. When was the Facebook found? A. February 14,2004. February 14,2004 B. February 04, 2004 C. February 05, 2004 Show Score.
INFORMATION SYSTEM AND ELECTRONIC COMMERCE GST-5083 Case Title : Should Businesses Move to the Cloud NoNameStudent IDProgram 1SAYNUL ISLAMP13D092PMBA 2DATO.
Chapter 6 How to use chat.
Cloud Computing All Copyrights reserved to Talal Abu-Ghazaleh Organization
Tensions in Society.  How can we prevent young people being disaffected?  How and why do we categorise people?  What are the factors that divide society?
Electronic Health Records 3.3 Health. Definition “An electronic health record (EHR) (also electronic patient record/computerised patient record/electronic.
ITGS Standard Level Mr Gavin Johnson. ITGS The Diploma Programme information technology in a global society (ITGS) course is the study and evaluation.
By Chris Versaci CLOUD SECURITY. WHAT IS CLOUD COMPUTING? Cloud computing is a concept that involves a large number of computers connected through a real-time.
Online Communities. Topics Social Networking Online Work Spaces Virtual Learning Environments User-Generated Reference Sites.
 Writing is a process, a series of steps that begins when you get an assignment. › Step 1: Planning › Step 2: Organizing › Step 3: Drafting › Step 4:
Analyze Opportunity Part 1
IB Business and Management 2.3 The impact of ICT on Communication.
BeTelGeuse: Tool for Bluetooth Data Gathering Petteri Nurmi, Joonas Kukkonen, Eemil Lagerspetz, Jukka Suomela, Patrik Floréen Helsinki Institute for Information.
A A brief description utilizing discussion boards as an internet tool within a classroom environment. T Target audience for this tool is the high school.
INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY
(ITGS) INFORMATION TECHNOLOGY IN A GLOBAL SOCIETY Group 3.
Strengthening Haitian capacities for tsunami early warning and preparedness.
1 The Use of Institutional Controls Under the RCRA Corrective Action Program.
Appendix C: Designing an Operations Framework to Manage Security.
ANDROID DATA CONFIDENTIALITY Tips and tools for keeping corporate confidential information confidential on Android Mobile Devices. Alex Mayer University.
KinX Tony, Shahab, Jaikun, Brandon Mission: Connecting Families in a World of Information.
Cloud Computing Project By:Jessica, Fadiah, and Bill.
 Writing is a process, a series of steps that begins when you get an assignment. › Step 1: Planning › Step 2: Organizing › Step 3: Drafting › Step 4:
Rights Of Library Users By Keao White Rationale for this Workshop The purpose of this workshop is to give an in depth presentation covering the rights.
CHAPTER 9 HARDENING SERVERS. C REATING A BASELINE POLICY Security parameters used to create a baseline installation can be configured using a Group Policy.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
Fred Berry (330) (330) Fax.
Concepts of Database Management Seventh Edition Chapter 1 Introduction to Database Management.
Group member: Kai Hu Weili Yin Xingyu Wu Yinhao Nie Xiaoxue Liu Date:2015/10/
Emergency Telecommunications using AI 3 = E1-TF or Internet Emergency Preparedness of AI 3 (?)
Information Society Portal for the ESCWA Region September 5, 2007.
Tablet Computer Adoption Programs in High School Dean McGee and Jeff VanderNoor
THE “NEXT MILE” PROJECT broadband solutions for Colorado The San Luis Valley “Real-Time” Data / Telecommunications Project Phase I.
1 Summary: Americans Support Increased Economic Aid to Indonesia.
Cloud Computing By Reedy McGeady. What is Cloud Computing? Cloud Computing is using another organisations computer, which are known as hosts.
IS3220 Information Technology Infrastructure Security
S3.1 session day 3 1 training delivered by Oxfam GB, RedR India and Humanitarian Benchmark; January 2012, Yangon, Myanmar approved by the Advisory.
Team Quintinlessness: Antony Johnston Steven Pike Mark Coleman Alex Burch Alex Scleparis Nurbol Baimaganbetov.
ICT For Development Education and Social Justice
A Study of Certification Authority Integration Model in a PKI Trust Federation on Distributed Infrastructures for Academic Research Eisaku SAKANE, Takeshi.
Contingency planning. Contingency planning is the process of preparing an organisation for unexpected or unwanted events.
The Haiti Earthquake 2010 By the end of this lesson you will: Be able to explain the causes of the Haiti Earthquake 2010, and why this led to such enormous.
CONFIGURING A MICROSOFT EXCHANGE SERVER 2003 INFRASTRUCTURE
Addressing the Socio-Economic Gaps in Post-disaster Rental Support Programs Alex Miller Oxford Brookes 2016 LEBANON Hosting support rental program +
Distance Learning By MK.
NTC 326Competitive Success/snaptutorial.com
NTC 326 Education for Service-- snaptutorial.com
CT 1306 Communication Networks Management Lab
SharePoint has been a pioneer of collaborative work culture and has been dubbed as one of the most successful products by Microsoft for enterprise businesses.
World Conflict Nations Report
Main recommendations & conclusions (1)
Climate Migration NATURAL DISASTERS
Presentation transcript:

IT concept Alex (WAB) Yae (BISS)

Summary of the article Technology & tool for helping people from disaster /blog/communication.gif

ISSUE An issue of communication being knocked out by the earthquake and tsunami in the poorer and less developed areas. The article gives examples of concepts that could be implemented into future scenarios, one example being a communication system being added after the Haiti earthquake in 2010.

System A similar system that could use Google maps as a base software has been modeled to potentially be used for communication/ sharing information that could be used in future scenarios.

Areas of impact : Communities Those stuck in the disaster zone, limited access to technology, could be in a developing area with no real technological infrastructure

Areas of impact : People Technology has lives in its hands, system failures could lead to drastic consequences

Advantages and disadvantages on main stakeholders

Main stakeholders Developers Users

Advantages Gathering helps

Disadvantages Limitation of use

Social & Ethical Issues

IT Background Taken from: technology-to-aid-disaster-relief-for-japan- and-beyond082.html

Equality of access Rural areas Areas with no access to internet connection Area due to disaster has no connectivity Poorer people

Reliability Age of information (Whether or not it is recent or old) Lack of synchronous information (No real-time communication)

Authenticity Authenticity of Information Who can post information

Policies and Standards Could help prevent reliability and authenticity problems Although could hinder the amount of information

Sources The Article technology-to-aid-disaster-relief-for-japan-and- beyond082.html