Showing posts with label crisis. Show all posts
Showing posts with label crisis. Show all posts

Thursday, November 24, 2016

Census 2016 Senate Inquiry report - what's been recommended to avoid another #CensusFail

Both the Senate Inquiry report on Census 2016 and the Review of the Events Surrounding the 2016 eCensus (by Alastair MacGibbon, Special Adviser to the Prime Minister on Cyber Security) have just been released - I've embedded both reports below (so they appear in one place).

They are a good read with some useful recommendations for the future.

Reflecting on what has become known as #CensusFail, in comparison to other technical issues experienced by government, the Census 2016 experience probably rates as the most significant public ICT issue experienced by the Australian Government so far this century.

While in the last 15 years the Australian Government has had other incidents, these have been relatively minor, with limited public visibility or impact.

This includes incidents such as the 15 year delay in creating an Apple version of e-Tax (now rectified), launch issues with sites such as MySchool, challenges with access and security within the MyGov system, data breaches from the PCEHR (personally controlled electronic health records) eHealth system and the accidental exposure of private data for asylum seekers.

In contrast, the issues experienced during the 2016 Census have been far more widespread in their public visibility, impact and long-term ramifications for trust in government.

However, to put "the most significant public ICT issue experienced by the Australian Government this so far this century" into perspective - no-one died, no-one was hurt and no-one even lost control of their personal data.

At worst a number of government and IBM staff experienced unhealthy levels of anxiety for several days.

Given the struggles that developing countries have had to get their egovernment ICT working in the first place (with a reported 15% success rate); or the challenges advanced countries like the US have had with national systems (such as ObamaCare); or the experience of states like Queensland, which could not pay some of its Health staff for some time when its new payroll system failed, CensusFail just doesn't rate as an ICT disaster.

The actual operational impact of the 2016 Census problems was merely a short delay for people attempting to fill in the Census online.

Ultimately the ABS still exceeded the desired Census response rate, will still be releasing Census data much faster than ever before, and the agency still saved over $70 million dollars by moving more of the Census online.

However despite not actually rating as a ICT disaster, there was still a real cost to CensusFail - the perceptual and reputational damage from the ABS publicly failing to deliver on its Census Night promise, exacerbated by poor crisis engagement.

As a net result the real impact of CensusFail is on long-term governance in Australian, due to a reduction in trust in public institutions to 'do the job right the first time'.

I'm aware of other agencies now being regularly questioned by their Ministerial offices on whether they have any systems or projects which pose a similar reputational risk to the Australian Government. I've watched as the term 'CensusFail' has become the 'go to' term raised whenever a new government ICT issue is reported.

As a result the trust in government agencies to deliver complex technical solutions has been diminished, and it will take years to recover.

I hope that the recommendations in this Senate report, the lessons from Census 2016, will be top-of-mind for every public servant and Minister engaged in a significant government ICT project for years to come.

Hopefully the right lessons will be learnt - that managing your communications and public engagement well when the ICT gets wonky is critical.

In fact you can even transform a technical failure into an engagement success, if you get your messaging and timing right - strengthening, rather than weakening, trust in government.

Census 2016 Senate Inquiry Report as redistributed by Craig Thomler on Scribd


Read full post...

Friday, August 26, 2016

How to shut down the easiest path for hackers into your organisation

In the news today is a story about how the Department of Prime Minister and Cabinet has issued guidance to staff on how to manage their personal profiles on Facebook.

According to the The Age's article, 'Nanny state!' New crackdown on public servants' Facebook the department "now insists its public servants lock their personal Facebook accounts with the tightest possible privacy settings and tells them how to configure their passwords".

Based on The Age's article the policy states that "Profiles must use a robust and secure password to protect the account from brute-force hacking attempts".

"This password must be at least seven characters long and contain a mixture of punctuation and alpha-numeric characters".

The policy apparently threatens disciplinary action and even dismissal for non-compliance for both staff and contractors.

I've not yet read the policy so can't comment on the details, and there's also apparently some other parts of the policy dealing with what public servants can comment on, which I don't expect to agree with.

However, I find the advice on security and passwords as fair, long overdue, and something that all organisations should consider providing to their staff.

Hacking is fast emerging as one of the most significant commercial risks for corporations and public agencies, with organised crime and nation-states mobilising sophisticated teams of computer hackers in the search for commercial and political advantage.

Few weeks go by without a major international company or online service being hacked for data, and alongside this the growth of ransomware - where hackers lock organisations out of their own systems and demand money for access - is proving to be a challenge worldwide.

Many large organisations have extensive security provisions in place to protect their data and services against hackers and security advisors are working as hard to keep their system protected as hackers are to find new ways in, in a cyber cold war.

However IT systems are not the only way into an organisation's data heart. 'Social engineering', a term referring to coercing staff to create a chink in an organisation's security armour, is increasingly one of the easiest ways for hackers to sidestep security professionals.

Social engineering takes many forms.

Leaving USBs with malware at a location where staff might pick them up and unsuspectingly put them into an organisational system, sending them email attachments supposedly containing cute kittens (with a cyberworm inside), fooling them with a fake email from security into believing they need to reset a system password by clicking on a link - which gives a hacker access.

There are many many ways in which employees can be fooled, even the most highly intelligent people, and used to evade or break their organisation's security.

Even if people can't be fooled, there's ways to get critical information about them which can provide clues to passwords, or provide blackmail opportunities.

For example, many people still use memorable passwords - children's names and dates of birth, anniversaries, pet and street names, achievements and more. With a little digging through publicly available information, or even information compromised from a weaker external service, hackers can quickly create a potential password list which might give them a route into a more secure system.

Unfortunately many organisations have been slow to address this threat by educating and supporting staff on protecting ALL their information online - from their secure employee logins, to their Facebook accounts and random mailing lists they sign up to.

This education is important not simply for the organisation's security, but for the personal security of individual staff members, who are also at risk from hackers who simply want to steal from them.

In fact there's every reason to believe that well constructed advice to an organisation's staff on protecting themselves online will be well received. It not only protects the organisation, it protects each individual staff member and often their families as well.

So what PM&C is doing with suggestions on passwords and locking down Facebook isn't a 'Nanny State' act - it's a sensible step that every organisation should be doing to protect their commercial information and client data, and to protect their employees.

Now a 'policy' may not be the best structure for this education - I strongly recommend that every organisation should have a 'security awareness' module in their induction program, and ensure that all existing staff receive regular training on how to protect themselves and the organisation they work for from external hacking threats.

This needs to be regular, not once-off, because of the rapid evolution of hacking and IT systems. New threats emerge regularly, as do new social engineering attacks.

Training all staff on how to secure ALL their online accounts is becoming vital for organisations that are serious about security.

In fact I believe that organisations who lose control of personal, private or confidential client, staff or government data should be penalised more harshly if they've not taken steps to guard against social engineering through staff training.

So if your organisation wants to continue to improve your security, don't simply invest in new IT systems and security advisors. Regularly train your staff on how to protect themselves online and they'll help you protect your organisation.

Read full post...

Monday, February 22, 2016

There's two things organisations need to effectively manage social media crises - great people and great systems

More and more organisations are finding themselves the focus of social media crises.

Whether the crisis originates online, or from another source, it is frequently expressed, shared and amplified via social channels, and can become a matter of national or even international attention very rapidly when handled poorly.

Many organisations still struggle to deal effectively with these crises, however some are getting good at managing these situations.

There's two things these effective organisations have in common, great people and great systems.

Great people speaks for itself. When you have people skilled and experienced in social media engagement and community management they are able to rapidly respond to a crisis as it occurs, providing the right blend of content and empathy to address a fast-changing situation.

However having great people in your team has its limits.

If those responding on behalf of the organisation via social channels are disconnected from the rest of the organisation, don't have clear triage, escalation and management guidance, are restricted from engaging due to legacy policies and attitudes or are simply not available when a social media crisis occurs, an organisation can rapidly lose control of a situation.

That's where systems come in.

There's a range of systems organisations can develop to proactively prepared for crisis and emergency services and, in many cases, they already have systems in place for their physical response to situations, how they engage with journalists and communicate with the public through phone and even email.

By developing appropriate systems for social media crises organisations can take their preparedness to the next level - leading to a situation where they can proactively manage and contain situations as they are discussed online.

Systems for social media crisis communications addresses many of the issues that great staff can face such as disconnects between management, operational and communications teams, difficulty in rapidly identifying the appropriate actions for specific comments and addressing controversial topics while fatigued.

Systems also help proactively address any legacy policy or legal issues in how and what can be communicated, by challenging organisations to actively reconsider and adjust their approach before crises occur, rather than attempting to change policies during an actual crisis.

Other benefits include mitigating some risks organisations face when less trained or experienced staff engage in crisis communications on social media channels, where a slight misstep - even by great staff - in how or when something is said or responded to can quickly escalate into a secondary crisis that requires additional management.

Having systems in place also makes it possible to test and benchmark an organisation's capability to address a social media crisis. Organisations can simulate a crisis and test how well the systems work and adjust them as needed before they get blooded in a real incident.

Given a choice between great people and great systems for social media crisis management, I'd pick systems every time.

Systems allow less-experienced staff to respond almost as effectively as great staff and provides a standard, repeatable environment for managing successive crisis situations.

While great staff are valuable and can be very effective in managing an organisations reputation and a situation on social media, they are in short supply - harder to find and retain. Staff are also not available 24/7 and are subject to stress, fatigue and emotions which can affect the ongoing quality of a crisis response online.

So even if you're fortunate enough to have great people in your social media crisis response team, don't neglect your systems. They provide consistency for your organisation and support your team, helping them remain great for as long as a crisis persists.

If you want help designing or testing your social media crisis systems, please get in touch, I've been helping organisations manage online and social media crises since 1998 and have a range of strategies, tactics and tools available.

Read full post...

Monday, September 07, 2015

What defines you on social media?

While travelling to and from the GovHack international awards red carpet event (which was great BTW), I've been reading 'So you've been publicly shamed', the latest book by Jon Ronson (the author of The men who stare at goats), and was reflecting on some of the experiences he talks about.

A common theme throughout the book is how easy it can be for a single comment or photo to define a person on social media and become their personal brand - whether they wish it to or not.

In many instances the defining tweet or image is created in a moment of passion, humour or poor judgement - a moment of weakness or lack of clarity where a poorly worded joke or action becomes misinterpreted and spreads widely across the Internet.

Avoiding online media is no defense against the potential for an individual to be incorrectly defined. Ronson gives an example of an individual whose moment of infamy has affected, to varying extents, over 60 people who share the same name.

Even for individuals who choose not to have their own social accounts, it can only require someone to quote their comment (accurately or not) or sharing an image or video of their actions online to create a storm of concern.

So if an absence from social media is ineffective and all of us who are online are prone to moments where our judgement and anticipation is not perfect, what is the appropriate way to minimise the risk of mislabeling or public shaming?

One of the approaches explored by Ronson involved ensuring that an individual is honestly represented online, not by a single misinterpreted comment, but by the sum of their actions, views and experience.

When there's only a few search results for an individual's name they can easily be defined in Google, and hence online, as being a single thing - be it accurate or not. Even worse, if someone is effectively invisible online they may find themselves defined by someone else who shares their name.

When an individual has a history on the Internet, with an honest record of their thoughts and actions and are continuing to update this through posts, tweets, articles and images, they are far less likely to find themselves defined (or misdefined) by a single perceived mistake.

While a sarcastic comment or badly timed photo may still reach further than normal engagement would, it is far harder for strangers to define an individual as just one thing online.

In my view this principle applies as strongly for organisations as it does for individuals. 

We've seen many social media disasters over the years spurred by a poorly timed or worded comment. Where the organisation or individual 'shuts down' ('removing the oxygen' in PR speak) or changes their behaviour ('damage control') it grant the mistake greater credibility and can lead to far greater attention and negative.

Acknowledging the mistake, taking appropriate remedial steps immediately (such as an apology or correction), and then moving forward with normal engagement levels is often the most effective approach to address a single instance of error or community concern.

Also critical is having a rich and deep history of engagement, a 'resume' demonstrating how that organisation has engaged effectively over a significant period of time. This makes it very difficult for detractors to position an organisation as one (negative) thing, or for individuals stumbling on the error to accidentally assume that it represents the true values and approach of the organisation.

On that basis I believe that the best thing that both individuals and organisations can do to mitigate the risk of misunderstandings and public shaming online is to clearly define themselves, and keep defining themselves through ongoing effective online engagement.

Being absent, silent or putting up the barricades when an error is made creates space for others to define you, in ways that are likely inaccurate and almost always do not represent your own values and actions.

Read full post...

Wednesday, October 08, 2014

How current events play out in search requests - terrorism & related terms in Google trends

While agencies often invest significant money into tools for tracking trends on social media, one of the simplest ways to detect and monitor the rise and fall of key topics and issues online is through Google Trends.

Google Trends tracks the frequency of use of specific search words in Google searches. This represents the majority of online and mobile searches in countries like Australia (93%) and the US (68%)

As a free service, Google Trends has been used over the years to monitor trends in seasonal diseases, such as influenza and dengue fever, to track the relative level of attention paid to politicians, the number of mentions of sports during grand final seasons, and to understand the impact of advertising on product sales.

I used the service back in 2006-2007 to help track a government agency's rebranding program, and have used it subsequently, both with and outside government, to track the level of interest in particular issues and topics.

So today I decided to see what Google Trends can tell us about the level of interest or concern in terrorism, specifically related to ISIS and concerns about muslim extremists.

I chose five main words to track - 'Terrorist', 'ISIS', 'Islam', 'Muslim' and 'Burqa' - which told an interesting story.



Until May 2010 the burqa does not appear to be a particular concern for Australians, with few searches of the term.

However since then it has become more topical, with some interest throughout 2011, then a sudden surge in September 2014 when the 'ban the burqa' movement began to receive significant political support and media coverage.

In contrast, terrorist was a term of interests to Australians in 2004 and particularly in the second half of 2005, with surging interest in July and November of that year. Following this, it settled down into a largely quiescent state, with only a small surge in November 2008 interrupting the mostly flat line.

This changed in August 2014, with a huge rise in searches for the term across Australia resulting in the highest level of searches for the term in the history of Google Trends in September this year.

The same trend can be seen for mentions of ISIS, which were flat until May 2014 and have rapidly escalated since. Early mentions of the term presumably relate to other uses of the term (such as the Egyptian god), with the sudden rise in searches only attributable to the rise of the Islamic State.

Searches for Islam and Muslim have also been rising this year after a long largely flat period. While these terms are the subject of many legitimate searches related to the culture and religion, the recent rise in searches does tend to suggest and correlate with the rise in searches for terror-related terms, indicating that people have linked the terms in some way, at least out of curiosity.

It's possible to compare and contrast these trends with global trends in Google Trends, per the chart below.



This chart provides evidence of growing global interest in terms such as Islam, Muslim and, particularly, ISIS. However it shows little international concern over the burqa or regarding terrorism.

This can be seen in detail when looking at individual countries.

For example while similar trends of increased interest in searching the term ISIS are visible for the USUK, Canada, SwedenJapan, Thailand and many others, only a relative few see the burqa as a rising source of concern and many also are not experiencing heightened searches for terms such as islam or muslim.

This may be coincidental, or may reflect political statements and media reports on these topics - a more detailed review of coverage would be needed to confirm direct links.

However given that researchers have found that Google Trends can provide an accurate view of community concerns regarding infectious diseases and product trends, I believe there's sound reasons to suppose a correlation between what leaders say and what people search for.

Read full post...

Thursday, October 10, 2013

The road to public sector IT hell may not be paved with intentions at all

Something that scares me enormously is the house of cards that many (if not most) governments have built with their IT systems.

It can be witnessed every time government agencies get 'MOGed' - Machinery of Government changes where parts of agencies are shifted to other agencies to meet the latest political whim.

In these cases it's not simply a matter of moving tens, hundreds or even thousands of public servants to new offices - in fact in many cases they may not move at all - it is about extracting them from the secure environment, software and network systems of one agency and connecting them (including all their historical records, emails and files) to the network and software of another.

This is a hugely complex and increasingly expensive exercise that can have an enormous productivity and cost hit each time it occurs.

Why is it complex and expensive? Because every agency uses different systems - or different versions of systems - and agencies are now so wedded to these systems after a purchase decision many years earlier that, even though senior bureaucrats recognise the issue, they can not address it without a complete (expensive and time-consuming) overhaul of how government runs its information technology.

Another example is eTax. While I have a great deal of praise for eTax, and it has been very successful by most measures, when the system was originally procured and built it was done in such a way that limited it to the IBM-PC platform. Certainly no-one can blame the ATO for not foreseeing the rise of Apple or the arrival of smartphones and tablets - however the decisions made at the time locked the system into a single platform, which has caused significant pain over the years.

Other examples include the Department of Finance and Deregulation's choice of a document management system as a Web Content Management System for www.australia.gov.au, an entirely appropriate decision at the time based on their well-governed procurement approach, but which led to delays and cost blowouts, constraining the site from what it could have become.

A better known example would be the failure of the Queensland Health payroll system several years ago, where an enquiry is still ongoing. It even has its own website - www.healthpayrollinquiry.qld.gov.au

Indeed, there are hundreds of examples both big and small, where this has occurred - a decision has been taken with the best possible knowledge at the time, or small incremental decisions have been taken over time - all for the right reasons - which have inadvertantly led into blind alleys or very expensive remedial work years later.

And lest you think this is an issue only for the public sector, consider the disaster that was Telstra's bill payment system, the issues our largest banks have had keeping their systems operating, or Virgin's booking system.

With the pace of change accelerating and the increasing limits on public sector employment, the likelihood is that these types of issue will continue to grow and plague IT, becoming even more widespread and expensive.

Agencies could increasingly find themselves trapped into slow and inefficient systems, restricting staff productivity and absorbing more and more of their resources to maintain, with no funds to 'jump tracks' to more future-proofed solutions.

This can even affect the performance of elected governments - who may be forced to change their policies to fit IT limitations. I am already aware of government initiatives that have had to be abandoned (never having seen the light of day) not because they were bad ideas but because the IT constraints in government make them impossible to cost-effectively deliver.

This isn't the fault of public servants or of politicians - seeing that far into the future simply isn't possible anymore. Technology isn't progress linearly and the accelerating rate of change means left-field technologies can appear and radically transform peoples' expectations and strain existing IT systems within a few years (remember the iPhone).

There's many more of these technologies emerging around us. For example 3D printers, capable of printing anything from kitchen utensils to medical devices to firearms, disintermediating physical manufacturers, opening a new front in the ownership of intellectual property and providing access to deadly weapons. There's also unmanned aerial vehicles (UAVs), drones that are capable of live-streaming video, or even carrying weapons, that can be bought online for a few hundred dollars and flown with limited chance of detection by individuals or corporations.

Many others technologies from Google Goggles to driverless cars are in development and could, in increasingly shorter timeframes, radically transform societies.

So when government agencies are still struggling to manage and maintain their legacy green-screen mainframe systems, out-dated (insecure and unsupported) web browsers, where they are locked into increasingly expensive proprietary technologies (due to the cost and resourcing required to migrate - even changing email systems can cost our largest agencies $100 million or more), what are they to do?

There's little time for innovation or for thinking of consequences - the majority of resources in an agency's IT team are committed to maintenance and quick patches on existing solutions.

The likely outcome over time is that we'll start to see more catastrophic IT failures - particularly across the most complex and most essential systems - such as welfare, payroll and grants management.

So how do we fix this? How do we break the cycle before the cycle breaks us?

There's no simply solution, but there's fortunately some trends which work for government agencies facing this challenge - if they're prepared to consider them.

A big area is open source software, which is increasingly being used by agencies in a variety of ways. While open source can run into the same issues as proprietary software, a platform with a large and diverse group of users can combine their IT assets to ensure the system is more useful to agencies and more rapidly updated as the world around it changes.

Another area is cloud-based solutions, which allow a government to more rapidly reconfigure itself to meet the needs of political masters. When software is independent from computer systems and there's a government-wide secure environment which can host software approved for use it can be far faster and cheaper for people moving agencies to retain the files and applications they require.

There's open data - which when made available in machine-readable formats liberates the data from proprietary systems and simplifies how it may be discovered and reused by other agencies (as well as the public).

These trends do not allow governments to replace all their existing systems - however they allow agencies to contain the problem to critical systems, which allowing all other services to be done 'in the cloud'. Imagine, a single email system and intranet across government. A web-based suite of office tools, graphic design tools, finance and HR tools - which can be managed centrally within a government, leaving agency IT teams to focus on the unique systems they can't share.

What does this vision take? Intention, planning and choice.

Governments that fail to proactively and intentionally plan their futures, who simply live on autopilot, will inevitable crash - not today, not tomorrow, maybe not in five years, but eventually - and the damage that their crashes will cause may take decades to recover from.

So for agencies who see themselves as being a continuous entity, with an existence that will exist as long as the state they serve, it is imperative that they plan intentionally, that they engage their Ministers and all their staff in understanding and addressing this issue.

It is not good intentions that will cause agency IT to fail, it is the lack of intention, and that is highly addressable.

CORRECTION: I have been advised by John Sheridan, the Australian Government CTO, there was no cost-overrun on australia.gov.au, it was a fixed price contract.


Read full post...

Wednesday, March 13, 2013

Using social media in emergency and disaster management

I’m currently in Singapore, having just finished running a two-day masterclass for Singaporean public servants on how to use social media in emergency management.

It is a very interesting topic and one I don’t think is high enough on the radar in Australia or many other countries, although there’s now plenty of case studies on the topic.

Source: http://visual.ly/case-emergency-use-social-media
I’m not going to share the full two day master class (it is both too long and too complex to go through) – particularly as it includes several in-depth exercises where teams create their social media infrastructure for an emergency and then test it in a custom simulation exercise.

However I thought it worth sharing a few of my thoughts on the topic.

Firstly, in my view, not using social media for emergency management invites disaster.

Whether emergency service personnel and management ‘like’ or ‘dislike’ Facebook, Twitter or other social media and online channels is now irrelevant. Citizens, media organisations and other groups increasingly rely on them to share information, tactics and to organise outside of any central control by an agency and regardless of their wishes.

A clear example of this was reported in the Crisis Comms blog, which has a great example of a police department reaching out to media and the public to help them by checking surveillance footage, looking for a suspected murderer.

The media and public were so willing to help that the SB District Attorney then attempted to rein in the situation with a tweet ‘The sheriff has asked all members of the press to stop tweeting immediately. It is hindering officer safety. #Dorner’

Mumbai terrorist attacks (2008)
As the Crisis Comms blog points out, and I agree, it is ludicrous to ask people to stop engaging, particularly after they were specifically invited to help. This misrepresents the authority and influence held by official bodies in our new connected world.

In other emergencies where official bodies have chosen to not engage via social media channels, the gap has been filled by the public, such as in the Mumbai terrorist attacks. There’s simply no way for emergency services to prevent this – and nor should they.

For example after the London riots, some members of parliament suggested closing down the internet to prevent rioters from spreading information.
London riots (2011)

This was in apparently unawareness that rioters were actually using Blackberry’s encrypted message service which wasn’t connected to the internet, and overlooked how valuable the internet was in allowing authorities to elicit the public’s help in identifying rioters (via a Flickr group), helping London residents to inform police where riots were underway and to help other residents stay clear or in the cleanup efforts afterwards, where social media was used as a primary way to organize citizens to clean-up different parts of the city.

Social media also allowed London Police to monitor the relative intensity of riots and allocate their officers more effectively – essentially giving them more than six million additional pairs of eyes in Greater London, without the inefficiency of manning phone lines or sending police out as ‘scouts’ (with all the risks this would entail).

So how can social media help around emergencies and disasters?

Source: http://visual.ly/case-emergency-use-social-media
I believe social media can help in all stages – from helping to inform citizens of what they should do in case of a particular emergency, letting them know when one is emerging/impending (such as a bushfire or flood), sourcing intelligence and communicating information during emergencies to help minimise casualties and direct resources where they are needed and, in the recovery, to marshal the right resources and supplies to the right places via volunteer citizen labor and donations.

Social media, in helping people share their experiences during a disaster, can also help with psychological recovery, something strongly reported in the aftermath of the Christchurch earthquake, where its been reported that social media has replaced churches and community centres (many of which were destroyed) as the place where people support one another and share experiences.

Christchurch earthquake (2011)
To conclude, social media is now part of the fabric of society, normalized into how many people communicate and share information.

It needs to similarly be normalized into emergency and disaster management plans and activities, used productively and effectively to aid professional emergency workers in their roles and to inform and engage citizens as appropriate in specific situations.

Emergency authorities who are still stand-offish about social media, because their management and staff don’t use these channels themselves, or because they have particular concerns or fears, need to bring in the appropriate talent to help them normalize social media in their own operations, otherwise they may be placing lives at risk.

Read full post...

Friday, February 22, 2013

Moderating friends and relatives - when official duties and personal life collide

I've had several discussions lately with people managing official government social media channels about the most difficult moderation challenge they face - their families and friends.

It is very common practice for people launching a new social media channel for their agency to tell their friends and relatives about it, both to share something they are enthusiastic and proud of doing and to help get an early boost in numbers - which may significantly amplify growth of the channel over time.

However this approach can also bear risk. While you may care for them dearly, friends and family may be just as prone to ignore the terms of use or moderation guidelines for a social media channel - saying something off-topic, out-of-line, trolling or simply being inappropriate - as complete strangers.

In fact the risk might even be greater with some of these relationships. Some of them may have limited experience using social media and be less familiar with the ground rules of online conversation. Others may feel that your relationship with them allows them to speak more frankly or reveal personal information - an equivalent situation to when your parents tell a new boy or girlfriend embarrassing stories from your childhood.

Clearly it's inappropriate to favour friends and family, giving them special treatment when they break any of the rules of an official agency (or, for that matter, company) page. However it is often more difficult to moderate your mother or best friend than a total stranger due to your personal relationship and the potential personal fall out of a moderation decision or ban.

At the same time it can be impractical or impossible to simply exclude them from a social networking page. Your friends and family members might be in the target audience you're seeking to reach, if not they can be curious or proud of your achievements and may follow or friend the official pages you manage as a show of support.

So how should you handle situations where a family member or friend bends or breaks the rules of an official community you manage?

Below I've identified four different tactics, which should be considered based on the nature of the community, the closeness of your relationship and the type and extent of the breach.

Delegate
Often the best approach is to delegate moderation to an uninvolved party at your work, someone who doesn't know your friend or relative and is able to review the situation with an objective eye. This gives you an appropriate separation from the situation, both for official and personal purposes.

This approach works well when a page is run collectively by several people, or where the breach is borderline and your judgement might be suspect due to a personal connection.

However it does run the risk of both official and personal fallout. Some people may not appreciate that you were arms-length from the decision, leading to personal relationship issues, a few may even see the moderation call as a personal affront and contact your agency, Minister, the media or broadcast their concerns via other social media channels and groups.

This is where personal judgement comes in. If Uncle Jack is known for his strong responses to perceived snubs, or your friend happens to be a journalist or a blogger and has been known to write about their experiences, you might wish to consider a different tactic before delegating responsibility for a decision.

Personal approach
Another way of dealing with inappropriate conduct by family or friends is to make a personal approach to them, by phone, in person or (at worst) by email.

The approach would be to make them aware of their conduct and how it breaches, or seems to be leading towards a breach, of the terms of use for the community and help them understand the difficult position this places you in as their relative or friend.

Some people respond well to this approach, appreciating that it is your job, career and reputation that they might be damaging through their actions. They may be willing to either step down their engagement or step away from the community altogether in order to not hurt you publicly and professionally.

This 'softly softly' approach works well with close relatives and friends who care more about you than about the topic of discussion, and can head off potential issues quickly, though may need to be repeated with some people who have difficulty curbing their enthusiasm or are unaware when their behaviour is offensive or inappropriate towards others.

It doesn't work as well with people more distant or who have strong ideological views on a topic. Equally it might not be effective with friends or relatives who are very unfamiliar with or poor at social media or other social conventions, essentially those known for putting their foots in their mouths at every opportunity (though you love them dearly).

It is important to use your critical judgement as to your relative or friend's character before approaching them personally as some people may react indignantly or angrily to what they see as accusations that they did something wrong. Equally the channel by which you approach them is important - some people prefer face-to-face, others phone. Rarely does email (with its lack of personal touch) work in this situation.

Bite the bullet
On some occasions, such as when you are the sole manager of an official community, where a person is only distantly a friend or relative, where you know they can handle 'rejection' or where potential personal relationship damage isn't a concern, you might choose to simply bite the bullet and moderate their comments or ban them, just like any other participant.

This, while challenging, is often the best approach professionally as it demonstrates your commitment to being fair in all circumstances, even when there is potential personal cost. It can also help build trust in the channel and within your organisation, in you.

There is the potential for this approach to cause tension in family and friendship circles, or even end relationships. However where you either have a limited relationship already with the person, or the situation warrants that you place your professional life ahead of your personal, this approach might be the right one to take.

Again this is a judgement call - and a hard one - you need to make based on the breach and the person. However when this approach is used well you can be surprised at the level of support you do receive from other family members or friends. Their respect and pride in your professionalism can outweigh the natural feelings of betrayal when you appear to be 'them' rather than 'us'.

Shut down
The most drastic approach, and the least used, is to close down the official channel in order to avoid professional or personal compromise. This is rarely a viable option, however there may be a few situations where it is better to close down the entire community rather than deal with the fallout of a particular decision.

I can't think of many examples when this would be the appropriate response, except if a community is already near its end and there's significant examples of high levels of inappropriate behaviour by a large number of participants. However the approach is worth keeping in mind as an option just in case such an opportunity presents itself.

While a shutdown can annoy a community, when done right it can be seen as the natural end of a process, leaving good memories without hard feelings. Generally my view is that government agencies have been poor at shutting down social media channels, due to lack of consideration of community lifespans or planning around shutdown procedures. I recommend that agencies develop their shutdown plan when they first establish social media channels, in order to manage the risks ahead of time.


So there's four approaches I recommend considering w dealing with those awkward situations when official duties and personal relationships collide through inappropriate behaviour by family or friends in an official agency social media community.

Can anyone recommend other approaches for dealing with this sensitive, but increasingly common concern?

Read full post...

Friday, November 25, 2011

This week's social media score - Public: 3 Organisations: 0

This has been an insightful week for organisations using, or considering using, social media with three successive events demonstrating how far power has shifted to the public and illustrating how Australians companies are struggling to engage effectively online.

First up was Qantas with its poorly timed "Qantas luxury" promotion. Qantas launched the Twitter competition by inviting the public to tweet their idea of travel luxury using the hashtag #qantasluxury.

However Qantas appears to not have recognized that the tens of thousands of negative comments levied against the organisation since their shutdown represented a deep seated frustration and disillusionment with the company. Even though Qantas had hired four additional staff focused on monitoring social media the week before.

Within minutes of Qantas's tweet announcing the competition the public hijacked the hashtag and turned it against the company, using it to vent their concerns and frustrations at the airline.

This was picked up by traditional media and covered widely, turning a small ($1,500 in prizes) competition into what was called a national PR disaster for Qantas.

Next was Nissan, whose online competition, managed through their Facebook page, went pear-shaped when the winner of the competition turned out to be good friends with one of Nissan's staff running their social media presence.

While the competition was totally above board, with the winner selected objectively by finding the most car graphics on websites, unfortunately the winner's friendship with the Nissan staff member made it appear otherwise.

Nissan themselves were very upfront about it - indicating that while they congratulated the winner they'd have preferred if he hadn't won, but he'd done so fair and square without breaching any competition terms.

In this situation Nissan's approach did a lot to mute the concern, however it demonstrated the issue of friendship networks. If you're a staff member operating social media channels for an organisation it is highly likely you have many friends online. So what do you tell when a new company competition launches? You let your friends know online so they can spread the word and increase the competition's reach. Entirely above board, however risking a backfire if your friends can gain advantage by being first into a competition.

Third, and most significant, has been the social media backlash against the Kyle and Jackie O show following the comments of Kyle Sandilands regarding the deputy editor of news.com.au after her article about the reaction to Kyle and Jackie's TV special (which rated extremely poorly).

The backlash, much of it under the hashtag #vilekyle, has led to around a dozen companies deciding to withdraw their advertising from 2DayFM and sponsorship from the Kyle and Jackie O show - even the Federal government has now withdrawn all advertising from any show hosted by Kyle Sandilands.

Over 15,000 people have signed an online petition calling for advertisers to drop support for Sandilands and a number of people (myself included) have called for Southern Cross Austereo to let Sandilands go. Whether they will or not remains to be seen, however the loss of significant sponsors and advertisers will place significant pressure on the company to reconsider Sandiland's contract and on air presence.

All three examples above this week demonstrate different risks in social media.

Qantas failed to monitor and accurately assess the public view, selecting the wrong social media approach to attempt to rebuild its brand. Nissan made an easy misstep, selecting a competition mechanism that raised the risk of someone close to a staff member winning a prize, however by handling the situation in a proactive and robust way minimized the damage and emerged largely unscathed despite initial public concerns.

The Sandilands incident (which remains ongoing) demonstrates how public outrage can translate into the need for rapid organisational action, both through advertiser withdrawal and the attempts by Sandilands and Austereo to apologies for his behaviour (albeit fairly weak apologies that have not satisfied many online). In this case even though Sandiland's comments were made on radio, not on social media, the backlash occurred online and neither Kyle nor Jackie O, nor their employer Southern Cross Austereo, were prepared to engage with the public online response, whereas many of the sponsors and advertisers did, helping to minimize damage to their own brands.

None of these events impacted the government or public service - and in fact there's never been a significant social media disaster due to online engagement by public servants or agencies in Australia (I don't include media attacks on public servants such as by News Ltd on Greg Jericho) - however they all have lessons for government agencies to learn.

It is important to recognize that being absent or unresponsive online and in social media is no protection against public outrage (as the Sandilands incident shows), and failing to monitor online sentiment is a recipe for PR disaster (as Qantas demonstrated). However if organisations act with good faith, communicate and engage actively (as Nissan and several advertisers from the Sandilands issue did), they can minimize the impact of social media gaffes and build strong online relationships with their customers.

Read full post...

Thursday, August 18, 2011

Can microblogging save or destroy governments?

In Australia many people still treat microblogging tools such as Twitter with scepticism and scorn, or even dismiss it outright as a tool for 'discussing breakfast'.

While the more negative views are beginning to shift, due to the active role Twitter played in the Brisbane floods, Australians still largely consider microblogs as a tool for emergency and breaking news, rather than as a tool for democracy, government engagement and accountability.

In China, in dramatic contrast to Australia, government officials have been waking to the potential of microblogging services for reconnecting with the public - and to the shock of being held accountable at a speed that outraces the fastest censor.

China's first microblogging services were introduced in 2009 and have grown in popularity extremely quickly. Today there are reportedly more than 195 million users of the leading microblogging services, almost ten times the population of Australia and approximately 15 percent of the Chinese population.

Interestingly about the same proportion, 15 percent, of Australians use Twitter, our most popular microblog service.

A Global Times study in March-April this year found that "71 percent of Chinese Web users attribute their growing interest in politics to microblogging". Of the respondents, 59.3 percent said "they had become more inclined to express their political views on microblogs" and 23.1 percent chose politics as their favourite topic of discussion via microblog (with 36.6 percent citing social news and 19.6 percent daily-life topics, such as fashion and heath).

The respondents were highly in favour of politicians using microblogs, with 72.1 percent backing the idea. However two thirds (65.6 percent) complained that most government microblogs were merely publicity stunts.

Microblogs have also become a major source of news in China, with the Communication University of China in Beijing reporting in their Internet Real-time Public Opinion Index Annual Report 2010 that within 20 months of being allowed into China, microblogs had become the third-favorite online source of information, after news portals and online forums.

The report highlighted land acquisition and official corruption scandals as being hot on microblogging sites - both highly sensitive and politicised topics that rarely are discussed in mainstream Chinese news channels.

A separate report in 2010 was reported to state that more than 20 percent of the 50 most-discussed public events in China through 2010 were first reported on by microbloggers.

Government in China has increasingly recognising the potential uses and risks of microblogging.

It has become increasing difficult for the Chinese government to control sensitive discussions online due to the speed and reach of microblogs. Equally the size of the main microblogging networks makes it dangerous for the Chinese government to simply close down them down.

Therefore government officials are increasingly actively engaging via microblogs in order to influence conversations. In fact, "How to open a microblog" has become a training course for high-level Beijing government officials.

Accordingly, in March 2011 Sina, one of the leading microblogging services, reported that there were over 3,000 official government microblog accounts on their service, spread between agencies and high-level officials.

In July it was reported that 4,920 government departments and 3,949 government officials had opened microblog accounts at weibo.com.  The same report indicated that the ten government microblogs in China had a total of 5.08 million followers in the first half of 2011.

It has also been reported that more than 1,200 microblogs have been opened by police authorities throughout China, resulting in a number of high-profile successful convictions.


For example, police in Xiamen, reported that they were able to solve the murder of a three-year-old girl in six days by releasing details of the murder via their microblog, together with a reward offer for further information. The message was forwarded more than 10,000 times and, according to a report by China Daily, led to the collection of more than 100 pieces of information used to solve the case.

The highest ranking individual official microblogging in China is Zhang Chunxian, the party chief of Xinjiang province. He took over in Xinjiang in April 2010, about nine months after ethnic riots led authorities to shut down mobile and internet services across the province.

Zhang has more than 148,000 followers for his microblog and has told the China Daily that microblogging can "be used to promote the government's efforts in Xinjiang's development."

Given there are over 450 million internet users and 900 million mobile phone users (those on smartphones can microblog), there is enormous potential for the sustained growth of microblogging in China.

With microblogging able to circumvent many censorship barriers, China's government is being forced to choose between closing down entire services, potentially facing extreme public backlash, or embracing increased openness and engagement with the public, dealing actively with charges of corruption, inappropriate conduct by officials and allowing citizens to share news before government communications channels can present official viewpoints.

If microblogging has the potential to have this impact in China, it is a channel that cannot be ignored or given lip service by governments in Australia or other nations.

Perhaps the two statements below best sums up the potential of microblogging for the Chinese government - and other governments around the world.

From the People's Daily of 2 August 2011:
Mastering the use of the internet shows a leader’s quality and ability. We hope that more and more leaders show their capacity for speech on the internet and on microblogs, and find popularity. We hope even more that more and more leaders address the conditions of the people in the real world, through real actions.
From the China Daily of 2 July 2011:
If governments can correctly and properly guide public opinions, use microblogging as a good platform to learn about public opinions and the wisdom of the people, and find and solve problems as soon as possible, forming a widely-participated, orderly and interactive microblogging public opinion environment is completely possible. Microblogging will also become a "release valve" of social emotions and the "lubricant" of government-public relations.
References
China’s microbloggers unafraid to rattle the censor’s cage 15/8/2011 - Business World Online
Politics in the age of the microblog 2/8/2011 - Chinese Media Project
China tackles the messy world of microblogs 1/8/2011 - Chinese Media Project
Microblogs a Threat to China's National Security: Official Report 14/7/2011 - The Epoch Times
China's government offcials open up to microblogs 14/7/2011 - Want China Times
How microblogging power shakes reality in China 2/7/2011 - China Daily
Xinhua Insight: Communist Party microblogs to reach out to public 24/6/2011 - English.news.cn
Must Officials Microblog? 6/5/2011 - Beijing Review
University names top ten official microblogs 25/4/2011 - Want China Times
Microblogging to improve governance 6/4/2011 - Global Times
Microblogs in China government's fight to win public approval 9/3/2011 - Reuters
Government Gets Big Into Microblogging 14/1/2011 - China Realtime Report
Police microblog helps catch murderers in East China 1/12/2010 - China Daily

Read full post...

Thursday, June 02, 2011

Coping with the challenges of two-speed government agencies

A couple of weeks ago I blogged about 21st Century society vs 19th Century laws and policing. My post discussed the interview and arrest of Ben Grubb, an Australian Technology Journalist, by Queensland Police in the context of the challenges for legislators and law enforcement in remaining current and relevant in a quickly digitalising world.

A second issue arose on Twitter related to a response by @QPSMedia to a question. The QLD Police Media Unit stated publicly that Grubb had been interviewed but not arrested.

Unfortunately this was untrue at the time. Grubb had been placed under arrest. @QLDMedia corrected their statement as soon as they were made aware of the changed situation (and took a little flak over their correction for "being too informal" - but that's the value of Twitter, short, fast and personable).

My understanding in this case is that the Queensland Police Media Unit had checked and obtained high level clearance for the original 'interview' tweet. As far as they had known the original information was correct at the time of tweeting.

I'm not about to criticise @QPSMedia for providing information they believe is correct at the time and then amend as soon as the error is recognised - that's actually very good practice. Frankly, considering the Queensland Police is a 24-hour organisation with 15,000 staff and over 5.2 million interactions with the public each year, it is unreasonable to assume that every interaction will be perfect.

Even if you could effect a communications accuracy rate of 99.999% (with humans mind you, not machines) this would still leave room for one mistake each week (52 per year).


What this particular situation does highlight for me is a major challenge for government agencies as they begin adopting social media. They are becoming two-speed organisations.

The small teams in agencies that manage online channels and engage via social media are developing the culture, systems and processes to support rapid, open and less formal communication. They have, or are becoming, attuned to how to communicate effectively online and often provide broader advice and support to other teams in using these channels.

However the areas that haven't embedded social media in their toolkit - the much larger 'rumps' of these agencies - are still operating on pre-internet systems and timeframes. Their focus isn't speed, but quality and diligence. They seek to ensure that information is triple checked before it is announced and that policies and communications are carefully deliberated and crafted to be precisely accurate in every particular.

This means that whenever there is a need to respond quickly to public needs in a crisis or event, the social media team is ready and able to rise to the challenge (as @QPSMedia did in the Brisbane floods). However they may still struggle to source relevant, accurate and timely information from the rest of their organisation (as did @QPSMedia in the example I first provided).

This may create communications and engagement breakdowns or slowdowns, leave agency social media teams looking ineffective or evasive and damage their ability to manage online relationships and incidents in effective ways.

These slowdowns may ultimately impact on the overall reputations of agencies, leaving them looking slow or ineffectual.

So how do we manage these two-speed government organisations?

In the long-term we might see agencies capable of operating at internet speeds, with systems and processes that allow them to manage their data flow and quality needs while also meeting the public's desire for fast information.

In the short-term, as our organisations evolve, it is critical to consider bridging tactics to allow agencies to operate at both speeds - deliberative and internet.

These tactics can include preformatting messages wherever possible. For Twitter a former staff member in my team termed these 'Tweetplates', which could be pre-approved by management and then reused without additional approval requirements.

Material or entire websites that aren't time sensitive can be prepared, reviewed and approved ahead of time, then used as needed in crisis (such as a list of hospital locations or standard emergency instructions). They should be reviewed periodically to keep them up-to-date.

It is also possible to use delaying tactics - to a point. Rather than answering a question immediately it is acceptable to acknowledge the question, indicate that you're working on an answer and that you will provide the answer as soon as possible. Of course it remains necessary to actually answer the question when you said you would.

Are there other tactics I've missed? Add them in the comments below.

Read full post...

Monday, February 07, 2011

Good read: Nicholas Gruen on Gov 2.0 in Australia and cultural change

Alex Howard over at GovFresh has a great article and video interview with Nicholas Gruen regarding Gov 2.0 in Australia and some of the challenges of the required cultural change.

Read it over at Nicholas Gruen on Gov 2.0 in Australia and cultural change.

Read full post...

Monday, January 24, 2011

Queensland Police demonstrate best practice emergency communications management via social media

The floods across Queensland, and in other parts of Australia, over the past few months have been a national tragedy.

They have also been a wake-up call to communications and media professionals across government on how to effectively inform and engage the public via social media.

Queensland Police, through their twitter account, @QPSMedia, Facebook page, Queensland Police and YouTube channel, have demonstrated world's best practice emergency communications management through social media.

Their activities have been well documented in the media and blogs, some of which I've linked below, so all I'm going to say is well done Queensland Police.

I hope other government agencies around the country learn from your efforts.

A few good articles and posts about social media use during the Queensland floods




Read full post...

Thursday, November 25, 2010

The ongoing struggles to balance IT security and staff empowerment

Governments around the world are struggling to manage the dual challenges of maintaining IT security while also enabling their staff to do their jobs in a digital world.

The Australian government has endorsed social media engagement by staff in its Open Government Declaration, stating that;

Agencies are to reduce barriers to online engagement, undertake social networking, crowd sourcing and online collaboration projects and support online engagement by employees, in accordance with the Australian Public Service Commission Guidelines.
Meeting this remains a challenge in many agencies. It takes time to assess services, mitigate risks, adjust processes and policies and train staff.

This week we've seen just how hard this balance can be - with one large Australian Government department cutting about 700 staff off from an online service experiencing very rapid growth.

The service was Yammer, a social media network designed to be used within enterprises.

Yammer allows organisations to establish an internal network allowing micro-blogging (like Twitter, but for staff only), file sharing, direct messaging and communities - with every message stored and searchable for knowledge management and security purposes. It supports tagging, integration with third-party applications and has a strong security focus - if Yammer's messages were not secure it would not have a business.

Over 100,000 organisations use Yammer, including large internationals such as Deloittes and Cisco. At least 39 US government agencies are signed up to use the service via Apps.gov and the Flemish government in Belgium uses it as well.

Closer to home the service is in use, to my knowledge, in QLD, NSW and Victorian governments as well as at Federal levels.

Examples include the Victorian Department of Justice, with over 550 members on Yammer as of May 2010. The NSW Department of Education and Training uses Yammer and established a community for teachers to provide feedback on the Australian Curriculum. Queensland Transport has apparently been astounded at the rapid growth of the service amongst staff.

Federally, I'm aware of use of the service in at least six agencies on a trial or active basis.

However Yammer, and other social media services, still face enormous challenges gaining IT acceptance.

In the federal department mentioned above (with 700 or more users, including senior managers), the growth of the service was extremely rapid. Presumably this is because it provided functionality that staff could productively use in their jobs.

However, after a short consideration, the service was banned and blocked from the department. I've heard several versions of why this occurred, with the most common view being that introduction had not followed the correct process and usage was growing too fast to be manageable.

The use of social media in a number of other agencies remains strictly controlled or blocked altogether. I am aware of several other agencies who have been threatened with or had to shut down trials of services such as Yammer due to ICT security concerns.

Security concerns are real. So is the value of online services to government employees.

Where an online service is adopted very quickly it has clearly met a staff need that existing ICT services do not.

However it also poses a fast growing challenge for security people, who must ensure that an agency's network remains secure.

How do we balance these needs to secure organisational networks while empowering staff?

This quandary places senior management in a difficult position. If they take a straight 'block' approach to online services they could face employee dissatisfaction and diminished productivity. If they take an 'allow' approach, they could see networks compromised, data lost or stolen.

With new highly useful online services emerging almost every month, senior management need to educate themselves on the potential risks and benefits and make the most appropriate decisions quickly.

Staff need to be supported with appropriate guidance on how and where to use online collaboration tools.

Sharing information between agencies more actively would also help build a base of experience in the secure management and effective use of online services.

It would also be very beneficial to have centrally secured and approved services through a platform such as apps.gov to help mitigate individual agency risks.

However ultimately ICT security and business areas need to work very closely together, having open and frank discussions to build a mutual understanding of the concerns and benefits surrounding online tools.

Read full post...

Wednesday, August 25, 2010

Disaster management using open source and social media

Some of you may be aware of the Mercury 10 national counter-terrorism exercise currently being held in Australia, involving a variety of government bodies.

While this type of scenario is only one of potentially many different types of crises or disasters that could occur, natural disasters, pandemics, rocks from space, and so on, it does raise the question for me, how is Australia using social media and open source technologies in crisis management.

We've seen quite intensive use of social media in situations such as the Haiti earthquake, Gulf of Mexico oil spill, the Mumbai terrorist attacks and the swine flu pandemic last year.

Across the world authorities are realising how valuable social media can be to help them quickly get information out to the public, to collect information on the extent of a disaster and help prioritise relief efforts.

They are also beginning to realise how dangerous it can be to not engage online, leaving rumours and misinformation to spread even faster and more virulently than was previously possible. A good example was during the Mumbai terrorist attacks when a rumour that the Indian government was asking for all live tweeting from Mumbai to stop in order to avoid giving the terrorists information about police movements.

However the really interesting developments in disaster management are happening outside of government. Software engineers and disaster management specialists have spent the last few years developing better tools for addressing crisis situations - often without any support from the authorities responsible for managing emergencies.

Two of these platforms are Ushahidi and Sahana.

Both of these platforms are open source, free-to-use web-based platforms designed to be highly resilient during disaster situations and flexible to the needs of both developing and developed nations.

Ushahidi, developed to report on violence during the 2008 Kenya election, has been deployed more than 20 times around the world to address situations such as violence in Gaza, the impact of the Gulf of Mexico oil spill, Chile and Haiti's emergency responses to their respective earthquake, track crime levels in Atlanta, medical supply levels in pharmacies across Kenya, Uganda, Malawi and Zambia and track the swine flu pandemic.

The system allows reports by mobile phone SMS and MMS and via the internet to be aggregated into a real-time map, then used to identify priority areas for relief efforts or activities. While the system can be deployed simply for reporting by authorities, it has proven to be strongest where citizens have been able to report incidents directly, allowing emergency authorities to respond with a more complete picture of events.

Ushahidi is entirely free to reuse and can be deployed within a few hours.

The group behind the service are currently working on a second service, Swift River, designed to help manage the flood of online information about a disaster in the first few hours and help both emergency services and the public distinguish between rumour and fact. While Swift River won't be launched until the end of August, a video discussing how it will work is available online.

Sahana is another free open source system developed to assist in disaster management. A a web based collaboration tool, it is designed to help manage common coordination problems, such as locating missing persons, managing volunteers and aid and coordinating efforts between a variety of aid groups, government and those impacted by the disaster.

It was originally developed in 2004 by Sri Lankan developers to support the response to the December 2004 Indian Ocean Tsunami and was deployed by the Sri Lanka government to support disaster recovery efforts. A second phase, funded through Sweden, saw Sahana expanded into a more generic disaster management tool with global application.

Sahana was designed to cope with many of the infrastructure issues that frequently occur during disasters, such as intermittent power, loss of network connectivity and the need to deploy the service on low-end hardware and systems. In fact Sahana can be transported on and operated from a USB stick and is extremely flexible and easy to customise, reflecting the need to adapt quickly to the individual nature of every disaster.

Sahana is in use for the Pakistan floods at the moment and it was also used for the Haiti earthquake - discussed in this case study (PDF). It has also been used in the Phillipines, the US, Peru, China, Indonesia and Pakistan for a range of disaster management needs.

There are other open source tools available for disaster management purposes. It is also possible to rapidly build a custom system for a specific need using free and low cost tools such as Wordpress (for content management), Google Maps (for geospatial representations), YouTube (for video), Flickr (for images), Slideshare and Scribd (for presentations and documents), Twitter (for real-time updates), WidgetBox (for embeddable widgets), Facebook (for group coordination), Wufoo (for forms) and services such as Yahoo Pipes to integrate and process information and news feeds.

In most cases the time required to put together these types of custom systems is significantly less than that required to have systems developed within high-end content management systems - as are normally deployed for normal business needs by government agencies.

In most cases these third party services are also cheaper, more scalable and have greater network resilience and peak usage capability - reflecting their need to cater for millions of simultaneous users, more than most government sites are engineered to handle.

So while some governments appear to be relying on traditional means of communications in disasters - brochures or media releases at carefully timed intervals - it is inevitable that communities will self-organise, create their own tools and deploy them with great speed.

Today's challenge for governments is to use social media and online tools to improve their own disaster management capability, organise the flood of information and provide better outcomes - deploying disaster management systems or throwing together custom solutions in a matter of hours rather than months.

Read full post...

Bookmark and Share