Abstract
Hurricanes can cause catastrophic damage; it is critical for those affected to access information about conditions, loved ones, and resources. Prior work in the HCI and CSCW communities has focused on how social media can be vital during natural disasters; non-social media technologies have been under-researched. To understand how technology other than social media can support or harm people during crises, we explore hurricane survivors' use and disuse of multiple kinds of technologies in online surveys with 138 US participants. We find substantial technology use supporting survivors' comfort and safety other than social media. We also observe that designing technologies for high-resource environments--as with many mainstream apps--causes users to decrease use of potentially critical technologies during utility outages, which are common during hurricanes. With themes of both (a) broad technology use and (b) conditions preventing technology use, we make recommendations for technical design, policy, and research to empower communities susceptible to hurricanes.
- 2021. Build a Kit. Retrieved April 1 2021 from https://www.ready.gov/kitGoogle Scholar
- 2021. Hurricane City. Retrieved June 1 2021 from hurricanecity.comGoogle Scholar
- 2021. PowerOutage.us. Retrieved March 25, 2022 from https://poweroutage.us/area/state/louisiana [Archived 31-August-2021].Google Scholar
- Walid Al-Saqaf. 2016. Internet censorship circumvention tools: Escaping the control of the Syrian regime. Media and Communication 4, 1 (2016), 39--50.Google ScholarCross Ref
- Morgan G Ames. 2013. Managing mobile multitasking: The culture of iPhones on Stanford campus. In Proceedings of the 2013 conference on Computer supported cooperative work. 1487--1498.Google ScholarDigital Library
- Sandra Appleby-Arnold, Noellie Brockdorff, Laure Fallou, and Rémy Bossu. 2019. Truth, trust, and civic duty: Cultural factors in citizens' perceptions of mobile phone apps and social media in disasters. Journal of contingencies and crisis management 27, 4 (2019), 293--305.Google ScholarCross Ref
- Craig Anthony Arnold, Ra'Desha Williams, Holden Pederson, Andrew Schuhmann, Audrey Ernstberger, Tiago de Melo Cartaxo, Connor Cafferty, Taylor Gore, James Mains, Kirk Mattingly, et al . 2020. Resilience justice and community-based green and blue infrastructure. Wm. & Mary Env't L. & Pol'y Rev. 45 (2020), 665.Google Scholar
- Leah Asmelash and Saeed Ahmed. 2019. Everything you need to know to prepare for a natural disaster. Retrieved April 1 2021 from https://www.cnn.com/2019/07/12/us/how-to-prepare-for-natural-disasters-trndGoogle Scholar
- Eric PS Baumer. 2015. Usees. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 3295--3298.Google Scholar
- Eric PS Baumer, Phil Adams, Vera D Khovanskaya, Tony C Liao, Madeline E Smith, Victoria Schwanda Sosik, and Kaiton Williams. 2013. Limiting, leaving, and (re) lapsing: an exploration of facebook non-use practices and experiences. In Proceedings of the SIGCHI conference on human factors in computing systems. 3257--3266.Google ScholarDigital Library
- Eric PS Baumer, Jenna Burrell, Morgan G Ames, Jed R Brubaker, and Paul Dourish. 2015. On the importance and implications of studying technology non-use. interactions 22, 2 (2015), 52--56.Google ScholarDigital Library
- Lars Baumgärtner, Paul Gardner-Stephen, Pablo Graubner, Jeremy Lakeman, Jonas Höchst, Patrick Lampe, Nils Schmidt, Stefan Schulz, Artur Sterz, and Bernd Freisleben. 2016. An experimental evaluation of delay-tolerant networking with Serval. In 2016 IEEE Global Humanitarian Technology Conference (GHTC). IEEE, 70--79.Google ScholarCross Ref
- Mehrab Bin Morshed, Michaelanne Dye, Syed Ishtiaque Ahmed, and Neha Kumar. 2017. When the internet goes down in Bangladesh. In Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing. 1591--1604.Google ScholarDigital Library
- Matthew Bloch, Charlie Smart, Jesse McKinley, Nate Schweber, Amanda Rosa, Chelsia Rose Marcius, Jon Hurdle, and Campbell Robertson. 2021. Flooding From Ida Kills Dozens of People in Four States. Retrieved March 25 2022 from https://web.archive.org/web/20210905084322/https://www.nytimes.com/live/2021/09/02/nyregion/nyc-storm [Archived Sept 3 2021].Google Scholar
- Norman M Bradburn, Lance J Rips, and Steven K Shevell. 1987. Answering autobiographical questions: The impact of memory and inference on surveys. Science 236, 4798 (1987), 157--161.Google Scholar
- Alina Bradford. 2019. 18 tips to prepare for a natural disaster. Retrieved April 1 2021 from https://www.cnet.com/pictures/prepare-for-a-natural-disaster-with-these-tips-wildfire-flood-hurricane-tornado/Google Scholar
- Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77--101.Google Scholar
- Christine E Cerniglia. 2021. Systemic Injustice: The Need for Disaster and Pandemic Preparedness Legislation. U. Det. Mercy L. Rev. 99 (2021), 53.Google Scholar
- Nick Charalambides. 2021. We recently went viral on TikTok - here's what we learned. Retrieved September 6 2021 from https://blog.prolific.co/we-recently-went-viral-on-tiktok-heres-what-we-learned/Google Scholar
- Reuters Fact Check. 2021. Fact Check-Zello ?walkie-talkie' natural disaster app requires internet access. Retrieved April 11 2022 from https://www.reuters.com/article/factcheck-zello-walkie/fact-check-zello-walkie-talkie-natural-disaster-app-requires-internet-access-idUSL1N2Q31SNGoogle Scholar
- France Cheong and Christopher Cheong. 2011. Social Media Data Mining: A Social Network Analysis Of Tweets During The 2010--2011 Australian Floods. PACIS 11 (2011), 46--46.Google Scholar
- Jan Wesner Childs. 2021. Hurricane Ida: Roads Flooded, Buildings Ripped Apart, Hundreds of Thousands Without Power in Louisiana. Retrieved March 25 2022 from https://web.archive.org/web/20210829235352/https://weather.com/news/news/2021-08--29-hurricane-ida-louisiana-new-orleans-mississippi-news [Archived 29-August-2021].Google Scholar
- Camille Cobb, Ted McCarthy, Annuska Perkins, Ankitha Bharadwaj, Jared Comis, Brian Do, and Kate Starbird. 2014. Designing for the deluge: understanding & supporting the distributed, collaborative work of crisis volunteers. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. 888--899.Google ScholarDigital Library
- Sasha Costanza-Chock. 2020. Design justice: Community-led practices to build the worlds we need. The MIT Press.Google Scholar
- Kate Crawford and Megan Finn. 2015. The limits of crisis data: analytical and ethical challenges of using social and mobile data to understand disasters. GeoJournal 80, 4 (2015), 491--502.Google ScholarCross Ref
- Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, and Alexandru G. Bardas. 2021. Defensive Technology Use by Political Activists During the Sudanese Revolution. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE.Google Scholar
- Dharma Dailey and Kate Starbird. 2014. Visible skepticism: Community vetting after Hurricane Irene. In ISCRAM.Google Scholar
- Ronald J Deibert and Rafal Rohozinski. 2010. Control and subversion in Russian cyberspace.Google Scholar
- Claudia Der-Martirosian, Leonie Heyworth, Karen Chu, Yvonne Mudoh, and Aram Dobalian. 2020. Patient characteristics of VA telehealth users during Hurricane Harvey. Journal of Primary Care & Community Health 11 (2020), 2150132720931715.Google ScholarCross Ref
- Lisa Eadicicco. 2022. AirTags Are Linked to Stalking, and Apple Can't Solve This Problem Alone. https://www.cnet.com/tech/mobile/airtags-are-being-linked-to-stalking-and-its-a-problem-apple-cant-solve-alone/. [Accessed 11-January-2023].Google Scholar
- Tristan Endsley, Yu Wu, James Reep, J Eep, and J Reep. 2014. The source of the story: Evaluating the credibility of crisis information sources.. In ISCRAM.Google Scholar
- Federal Emergency Management Agency (FEMA). 2002. Emergency Management in the United States. https://training.fema.gov/emiweb/downloads/is111_unit%204.pdf. [Accessed 11-April-2023].Google Scholar
- Federal Emergency Management Agency (FEMA). 2023. Mitigation vs. Preparedness. Retrieved April 14, 2023 from https://emilms.fema.gov/is_0350/groups/20.htmlGoogle Scholar
- Thomas Ferris, Erick Moreno-Centeno, Justin Yates, Kisuk Sung, Mahmoud El-Sherif, and David Matarrita-Cascante. 2016. Studying the Usage of Social Media and Mobile Technology during Extreme Events and Their Implications for Evacuation Decisions: A Case Study of Hurricane Sandy. International Journal of Mass Emergencies & Disasters 34, 2 (2016).Google ScholarCross Ref
- Megan Finn. 2018. Documenting Aftermath: Information Infrastructures in the Wake of Disasters. Massachussetts Institute of Technology.Google ScholarCross Ref
- Karen Freberg, Kristin Saling, Kathleen G Vidoloff, and Gina Eosco. 2013. Using value modeling to evaluate social media messages: The case of Hurricane Irene. Public Relations Review 39, 3 (2013), 185--192.Google ScholarCross Ref
- JC Gaillard, B Alexander, P Becker, K Blanchard, L Bosher, F Broines, JR Cadag, K Chmutina, et al . 2019. Power, prestige & forgotten values: A disaster studies manifesto. Ipetitions, available at: www. ipetitions. com/petition/power-prestige-forgotten-values-a-disaster (2019). [Accessed 24-April-2022].Google Scholar
- JC Gaillard and Lori Peek. 2019. Disaster-zone research needs a code of conduct.Google Scholar
- Paul Gardner-Stephen. 2011. The Serval project: Practical wireless ad-hoc mobile telecommunications. Flinders University, Adelaide, South Australia, Tech. Rep 230 (2011).Google Scholar
- Paul Gardner-Stephen, Romana Challans, Jeremy Lakeman, Andrew Bettison, Dione Gardner-Stephen, and Matthew Lloyd. 2013. The Serval mesh: A platform for resilient communications in disaster & crisis. In 2013 IEEE Global Humanitarian Technology Conference (GHTC). IEEE, 162--166.Google ScholarCross Ref
- Paul Gardner-Stephen, Jeremy Lakeman, Romana Challans, Corey Wallis, Ariel Stulman, and Yoram Haddad. 2012. Meshms: Ad hoc data transfer within mesh network. (2012).Google Scholar
- Radhika Garg. 2019. An analysis of (non-) use practices and decisions of internet of things. In IFIP Conference on Human-Computer Interaction. Springer, 3--24.Google ScholarDigital Library
- Alexey Gavrilov. 2019. How to use Zello for communication during a disaster. Retrieved April 11 2022 from https://blog.zello.com/how-to-use-zello-during-an-emergencyGoogle Scholar
- James D Goltz and Dennis S Mileti. 2011. Public response to a catastrophic Southern California earthquake: A sociological perspective. Earthquake spectra 27, 2 (2011), 487--504.Google Scholar
- Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, and Anupam Joshi. 2013. Faking Sandy: Characterizing and identifying fake images on Twitter during Hurricane Sandy. In Proceedings of the 22nd international conference on World Wide Web. 729--736.Google ScholarDigital Library
- Emily Guskin. 2012. Hurricane Sandy and Twitter. Retrieved April 21 2022 from https://www.pewresearch.org/journalism/2012/11/06/hurricane-sandy-and-twitter/Google Scholar
- Steffen Haesler, Ragnar Mogk, Florentin Putz, Kevin T Logan, Nadja Thiessen, Katharina Kleinschnitger, Lars Baumgärtner, Jan-Philipp Stroscher, Christian Reuter, Michèle Knodt, et al. 2021. Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for Neighborhoods. In Companion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing. 62--66.Google Scholar
- Arianna Hanchey, Amy Schnall, Tesfaye Bayleyegn, Sumera Jiva, Anna Khan, Vivi Siegel, Renée Funk, and Erik Svendsen. 2021. Notes from the field: deaths related to Hurricane Ida reported by media-nine states, August 29--September 9, 2021. Morbidity and Mortality Weekly Report 70, 39 (2021), 1385.Google ScholarCross Ref
- Shaddi Hasan, Mary Claire Barela, Matthew Johnson, Eric Brewer, and Kurtis Heimerl. 2019. Scaling Community Cellular Networks with CommunityCellularManager. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). 735--750.Google ScholarDigital Library
- Kurtis Heimerl, Shaddi Hasan, Kashif Ali, Eric Brewer, and Tapan Parikh. 2013. Local, sustainable, small-scale cellular networks. In Proceedings of the Sixth International Conference on Information and Communication Technologies and Development: Full Papers-Volume 1. 2--12.Google ScholarDigital Library
- Amanda Lee Hughes and Leysia Palen. 2009. Twitter adoption and use in mass convergence and emergency events. International journal of emergency management 6, 3--4 (2009), 248--260.Google ScholarCross Ref
- Amanda L Hughes, Lise AA St. Denis, Leysia Palen, and Kenneth M Anderson. 2014. Online public communications by police & fire services during the 2012 Hurricane Sandy. In Proceedings of the SIGCHI conference on human factors in computing systems. 1505--1514.Google ScholarDigital Library
- Esther Jang, Mary Claire Barela, Matt Johnson, Philip Martinez, Cedric Festin, Margaret Lynn, Josephine Dionisio, and Kurtis Heimerl. 2018. Crowdsourcing rural network maintenance and repair via network messaging. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--12.Google ScholarDigital Library
- Matthew Johnson, Jenny Liang, Michelle Lin, Sudheesh Singanamalla, and Kurtis Heimerl. 2021. Whale Watching in Inland Indonesia: Analyzing a Small, Remote, Internet-Based Community Cellular Network. In Proceedings of the Web Conference 2021. 1483--1494.Google ScholarDigital Library
- Matthew William Johnson, Esther Han Beol Jang, Frankie O'Rourke, Rachel Ye, and Kurtis Heimerl. 2021. Network Capacity as Common Pool Resource: Community-Based Congestion Management in a Community Network. Proceedings of the ACM on Human-Computer Interaction 5, CSCW1 (2021), 1--25.Google ScholarDigital Library
- Brennan Jones, Anthony Tang, and Carman Neustaedter. 2020. Remote communication in wilderness search and rescue: implications for the design of emergency distributed-collaboration tools for network-sparse environments. Proceedings of the ACM on human-computer interaction 4, GROUP (2020), 1--26.Google ScholarDigital Library
- Mark Jurkowitz, Amy Mitchell, Elisa Shearer, and Mason Walker. 2020. U.S. Media Polarization and the 2020 Election: A Nation Divided. https://www.pewresearch.org/journalism/2020/01/24/u-s-media-polarization-and-the-2020-election-a-nation-divided/.Google Scholar
- Kanchana Kanchanasut, Apinun Tunpan, Mohammad Abdul Awal, Dwijendra Kumar Das, Thirapon Wongsaardsakul, and Yasuo Tsuchimoto. 2007. DUMBONET: a multimedia communication system for collaborative emergency response operations in disaster-affected areas. International Journal of Emergency Management 4, 4 (2007), 670--681.Google ScholarCross Ref
- Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy attitudes of Mechanical Turk workers and the US public. In Symposium on Usable Privacy and Security (SOUPS), Vol. 4. 1.Google ScholarDigital Library
- Sophie Kasakove. 2021. Three Weeks After Hurricane Ida, Parts of Southeast Louisiana Are Still Dark. Retrieved March 25 2022 from https://www.nytimes.com/2021/09/18/us/ida-louisiana-power-outages.htmlGoogle Scholar
- Marina Kogan, Leysia Palen, and Kenneth M Anderson. 2015. Think local, retweet global: Retweeting by the geographically-vulnerable during Hurricane Sandy. In Proceedings of the 18th ACM conference on computer supported cooperative work & social computing. 981--993.Google ScholarDigital Library
- Neha Kumar. 2014. Facebook for self-empowerment? A study of Facebook adoption in urban India. New media & society 16, 7 (2014), 1122--1137.Google Scholar
- Mark Latonero and Irina Shklovski. 2011. Emergency management, Twitter, and social media evangelism. International Journal of Information Systems for Crisis Response and Management (IJISCRAM) 3, 4 (2011), 1--16.Google ScholarCross Ref
- Andy S Latto and Robbie Berg. 2022. National hurricane center tropical cyclone report: Hurricane Nicholas. (1 March 2022).Google Scholar
- Jessica Li and H Raghav Rao. 2010. Twitter as a rapid response news service: An exploration in the context of the 2008 China earthquake. The Electronic Journal of Information Systems in Developing Countries 42, 1 (2010), 1--22.Google ScholarCross Ref
- Xuyang Li, Antara Bahursettiwar, and Marina Kogan. 2021. Hello? Is There Anybody in There? Analysis of Factors Promoting Response From Authoritative Sources in Crisis. Proceedings of the ACM on Human-Computer Interaction 5, CSCW1 (2021), 1--21.Google Scholar
- JungKyu Rhys Lim, Brooke Fisher Liu, and Anita Atwell Seate. 2022. Are you prepared for the next storm? Developing social norms messages to motivate community members to perform disaster risk mitigation behaviors. Risk analysis 42, 11 (2022), 2550--2568.Google Scholar
- Brooke Fisher Liu, Anita Atwell Seate, Irina Iles, and Emina Herovic. 2020. Tornado warning: Understanding the National Weather Service's communication strategies. Public Relations Review 46, 2 (2020), 101879.Google ScholarCross Ref
- Amy Livingston. 2021. How to Get Emergency Financial Assistance & Help With Bills -- Resources. Retrieved April 1 2021 from https://www.moneycrashers.com/prepare-natural-disaster-emergency-preparedness/Google Scholar
- Alessandro Lovari and Shannon A Bowen. 2020. Social media in disaster communication: A case study of strategies, barriers, and ethical implications. Journal of Public Affairs 20, 1 (2020), e1967.Google ScholarCross Ref
- Mirca Madianou. 2015. Digital inequality and second-order disasters: Social media in the Typhoon Haiyan recovery. Social Media Society 1, 2 (2015), 2056305115603386.Google ScholarCross Ref
- Mirca Madianou, Jonathan Corpus Ong, Liezel Longboan, and Jayeel S Cornelio. 2016. The appearance of accountability: Communication technologies and power asymmetries in humanitarian aid and disaster recovery. Journal of Communication 66, 6 (2016), 960--981.Google ScholarCross Ref
- Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on human-computer interaction 3, CSCW (2019), 1--23.Google ScholarDigital Library
- Chris McGivern. 2019. Paul Gardner-Stephen and the Serval Project: Communications For All. https://shuttleworthfoundation.org/thinking/2019/11/27/thinking-paul-gardner-stephen/. [Accessed 8-January-2023].Google Scholar
- Volodymyr V Mihunov, Nina SN Lam, Lei Zou, Zheye Wang, and Kejin Wang. 2020. Use of Twitter in disaster rescue: lessons learned from Hurricane Harvey. International Journal of Digital Earth 13, 12 (2020), 1454--1466.Google ScholarCross Ref
- Florian 'Floyd' Mueller and Sarah Jane Pell. 2016. Technology meets adventure: Learnings from an earthquake-interrupted Mt. Everest expedition. In Proceedings of the 2016 acm international joint conference on pervasive and ubiquitous computing. 817--828.Google ScholarDigital Library
- Dhiraj Murthy and Alexander J Gross. 2017. Social media processes in disasters: Implications of emergent technology use. Social science research 63 (2017), 356--370.Google Scholar
- NOAA. 2021. What is the difference between a hurricane and a typhoon? Retrieved April 19 2022 from https://oceanservice.noaa.gov/facts/cyclone.htmlGoogle Scholar
- National Oceanic and Atmospheric Administration (NOAA). 2021. 2021 Atlantic Hurricane Season Summary Table. Retrieved April 15, 2023 from https://www.nhc.noaa.gov/data/tcr/2021_Atlantic_Hurricane_Season_Summary_Table.pdfGoogle Scholar
- National Oceanic and Atmospheric Administration (NOAA). 2022. NOAA National Centers for Environmental Information (NCEI) U.S. Billion-Dollar Weather and Climate Disasters. https://www.ncdc.noaa.gov/billions/. [Accessed 7-January-2022].Google Scholar
- National Oceanic and Atmospheric Administration (NOAA). 2022. Tropical Cyclone Climatology. Retrieved March 25 2022 from https://www.nhc.noaa.gov/climo/Google Scholar
- Onook Oh, Manish Agrawal, and H Raghav Rao. 2011. Information control and terrorism: Tracking the Mumbai terrorist attack through Twitter. Information Systems Frontiers 13, 1 (2011), 33--43.Google ScholarDigital Library
- Judith S Olson and Wendy A Kellogg. 2014. Ways of Knowing in HCI. Vol. 2. Springer.Google Scholar
- Leysia Palen, Sarah Vieweg, and Kenneth Mark Anderson. 2011. Supporting ?everyday analysts" in safety-and time-critical situations. The Information Society 27, 1 (2011), 52--62.Google ScholarDigital Library
- Richard J. Pasch, Robbie Berg, and Andrew B. Hagen. 2022. National hurricane center tropical cyclone report: Hurricane Henri. (25 January 2022).Google Scholar
- Sandy Patton. 2017. How to Be Prepared for a Natural Disaster. Retrieved April 1 2021 from https://selecthealth.org/blog/2017/09/how-to-be-prepared-for-a-natural-disasterGoogle Scholar
- Eyal Peer, Laura Brandimarte, Sonam Samat, and Alessandro Acquisti. 2017. Beyond the Turk: Alternative platforms for crowdsourcing behavioral research. Journal of Experimental Social Psychology 70 (2017), 153--163.Google ScholarCross Ref
- Elissa M Redmiles, Sean Kross, and Michelle L Mazurek. 2019. How well do my results generalize? Comparing security and privacy survey results from MTurk, web, and telephone samples. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 1326--1343.Google ScholarCross Ref
- Elissa M Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle L Mazurek. 2020. A comprehensive quality evaluation of security and privacy advice on the web. In 29th USENIX Security Symposium (USENIX Security 20). 89--108.Google Scholar
- Christian Reuter and Marc-André Kaufhold. 2018. Fifteen years of social media in emergencies: a retrospective review and future directions for crisis informatics. Journal of contingencies and crisis management 26, 1 (2018), 41--57.Google ScholarCross Ref
- Erika Rosas, Felipe Garay, and Nicolas Hidalgo. 2020. Context-aware self-adaptive routing for delay tolerant network in disaster scenarios. Ad Hoc Networks 102 (2020), 102095.Google ScholarCross Ref
- Joel Ross, Lilly Irani, M Silberman, Andrew Zaldivar, and Bill Tomlinson. 2010. Who are the crowdworkers?: Shifting demographics in Mechanical Turk. In CHI'10 extended abstracts on Human factors in computing systems. ACM, 2863--2872.Google ScholarDigital Library
- Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. 2010. Earthquake shakes Twitter users: real-time event detection by social sensors. In Proceedings of the 19th international conference on World wide web. 851--860.Google ScholarDigital Library
- Christine Satchell and Paul Dourish. 2009. Beyond the user: use and non-use in HCI. In Proceedings of the 21st annual conference of the Australian computer-human interaction special interest group: Design: Open 24/7. 9--16.Google ScholarDigital Library
- Devansh Saxena, Patrick Skeba, Shion Guha, and Eric PS Baumer. 2020. Methods for Generating Typologies of Non/use. Proceedings of the ACM on Human-Computer Interaction 4, CSCW1 (2020), 1--26.Google ScholarDigital Library
- Julie A Schumacher, Scott F Coffey, Fran H Norris, Melissa Tracy, Kahni Clements, and Sandro Galea. 2010. Intimate partner violence and Hurricane Katrina: predictors and associated mental health outcomes. Violence and victims 25, 5 (2010), 588--603.Google Scholar
- Joni Schwartz. 2016. Disconnect to connect: emotional responses to loss of technology during Hurricane Sandy. In Emotions, technology, and behaviors. Elsevier, 107--122.Google Scholar
- Neil Selwyn. 2003. Apart from technology: understanding people's non-use of information and communication technologies in everyday life. Technology in society 25, 1 (2003), 99--116.Google Scholar
- Spencer Sevilla, Matthew Johnson, Pat Kosakanchit, Jenny Liang, and Kurtis Heimerl. 2019. Experiences: Design, implementation, and deployment of CoLTE, a community LTE solution. In The 25th Annual International Conference on Mobile Computing and Networking. 1--16.Google ScholarDigital Library
- Herring Shava and Willie T Chinyamurindi. 2018. Determinants of social media usage among a sample of rural South African youth. South African Journal of Information Management 20, 1 (2018), 1--8.Google ScholarCross Ref
- Irina Shklovski, Moira Burke, Sara Kiesler, and Robert Kraut. 2010. Technology adoption and use in the aftermath of Hurricane Katrina in New Orleans. American Behavioral Scientist 53, 8 (2010), 1228--1246.Google ScholarCross Ref
- Hollie Silverman and Michael Guy. 2021. Crews work to restore power for tens of thousands as Henri drenches the Northeast. Retrieved March 25 2022 from https://www.cnn.com/2021/08/23/weather/us-henri-monday/index.htmlGoogle Scholar
- Tomer Simon, Avishay Goldberg, and Bruria Adini. 2015. Socializing in emergencies-A review of the use of social media in emergency situations. International Journal of Information Management 35, 5 (2015), 609--619.Google ScholarDigital Library
- Robert Soden, Lydia Chilton, Scott Miles, Rebecca Bicksler, Kaira Ray Villanueva, and Melissa Bica. 2022. Insights and Opportunities for HCI Research into Hurricane Risk Communication. In CHI Conference on Human Factors in Computing Systems. 1--13.Google ScholarDigital Library
- Robert Soden, David Lallemant, Perrine Hamel, and Karen Barns. 2021. Becoming Interdisciplinary: Fostering Critical Engagement With Disaster Data. Proceedings of the ACM on Human-Computer Interaction 5, CSCW1 (2021), 1--27.Google ScholarDigital Library
- Robert Soden and Austin Lord. 2018. Mapping silences, reconfiguring loss: Practices of damage assessment & repair in post-earthquake Nepal. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 1--21.Google ScholarDigital Library
- Robert Soden and Embry Owen. 2021. Dilemmas in Mutual Aid: Lessons for Crisis Informatics from an Emergent Community Response to the Pandemic. Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021), 1--19.Google ScholarDigital Library
- Katta Spiel, Oliver L Haimson, and Danielle Lottridge. 2019. How to do better with gender on surveys: a guide for HCI researchers. Interactions 26, 4 (2019), 62--65.Google ScholarDigital Library
- Kate Starbird, Jim Maddock, Mania Orand, Peg Achterman, and Robert M Mason. 2014. Rumors, false flags, and digital vigilantes: Misinformation on Twitter after the 2013 Boston marathon bombing. IConference 2014 Proceedings (2014).Google Scholar
- Kate Starbird and Leysia Palen. 2011. ?Voluntweeters" self-organizing by digital volunteers in times of crisis. In Proceedings of the SIGCHI conference on human factors in computing systems. 1071--1080.Google ScholarDigital Library
- Rick Stella. 2021. The 6 best emergency kits for coping with severe weather or a natural disaster. Retrieved April 1 2021 from https://www.businessinsider.com/best-emergency-kitGoogle Scholar
- Anselm Strauss and Juliet Corbin. 1990. Basics of qualitative research. Sage publications.Google Scholar
- Nurul M Suhaimi, Yixuan Zhang, Mary Joseph, Miso Kim, Andrea G Parker, and Jacqueline Griffin. 2022. Investigating Older Adults' Attitudes towards Crisis Informatics Tools: Opportunities for Enhancing Community Resilience during Disasters. arXiv preprint arXiv:2202.10927 (2022).Google Scholar
- Marion Lara Tan, Raj Prasanna, Kristin Stock, Emma EH Doyle, Graham Leonard, and David Johnston. 2020. Usability factors influencing the continuance intention of disaster apps: A mixed-methods study. International Journal of Disaster Risk Reduction 50 (2020), 101874.Google ScholarCross Ref
- Marion Lara Tan, Raj Prasanna, Kristin Stock, Emma Hudson-Doyle, Graham Leonard, and David Johnston. 2017. Mobile applications in crisis informatics literature: A systematic review. International journal of disaster risk reduction 24 (2017), 297--311.Google ScholarCross Ref
- Edgar Marko Trono, Yutaka Arakawa, Morihiko Tamai, and Keiichi Yasumoto. 2015. Dtn mapex: Disaster area mapping through distributed computing over a delay tolerant network. In 2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICarnegie Mellon University). IEEE, 179--184.Google ScholarCross Ref
- Kasey Tross. 2020. Emergency Kits 101: How to Be Prepared for Anything. Retrieved April 1 2021 from https://www.safewise.com/blog/emergency-kits/Google Scholar
- Md Yusuf S Uddin, David M Nicol, Tarek F Abdelzaher, and Robin H Kravets. 2009. A post-disaster mobility model for delay tolerant networking. In Proceedings of the 2009 winter simulation conference (WSC). IEEE, 2785--2796.Google ScholarCross Ref
- Jeff Ueland and Barney Warf. 2006. Racialized topographies: Altitude and race in southern cities. Geographical Review 96, 1 (2006), 50--78.Google ScholarCross Ref
- Raphael Varieras. 2020. How to use Zello for communication during a disaster. Retrieved April 11 2022 from https://blog.zello.com/how-to-use-zello-for-communication-during-a-disasterGoogle Scholar
- Sarah Vieweg, Amanda L Hughes, Kate Starbird, and Leysia Palen. 2010. Microblogging during two natural hazards events: what Twitter may contribute to situational awareness. In Proceedings of the SIGCHI conference on human factors in computing systems. 1079--1088.Google ScholarDigital Library
- Robin Whittemore, Susan K Chase, and Carol Lynn Mandle. 2001. Validity in qualitative research. Qualitative health research 11, 4 (2001), 522--537.Google Scholar
- Wirecutter. 2021. The Best Emergency Preparedness Supplies. Retrieved April 1 2021 from https://www.nytimes.com/wirecutter/reviews/emergency-preparedness/Google Scholar
- V Wiseman, L Conteh, and F Matovu. 2005. Using diaries to collect data in resource-poor settings: questions on design and implementation. Health Policy and Planning 20, 6 (2005), 394--404.Google ScholarCross Ref
- Susan Wyche and Charles Steinfield. 2016. Why don't farmers use cell phones to access market prices? Technology affordances and barriers to market information services adoption in rural Kenya. Information Technology for Development 22, 2 (2016), 320--333.Google ScholarDigital Library
- Susan P Wyche, Sarita Yardi Schoenebeck, and Andrea Forte. 2013. "Facebook is a luxury": An exploratory study of social media use in rural Kenya. In Proceedings of the 2013 conference on Computer supported cooperative work. 33--44.Google ScholarDigital Library
- Susan P Wyche, Thomas N Smyth, Marshini Chetty, Paul M Aoki, and Rebecca E Grinter. 2010. Deliberate interactions: characterizing technology use in Nairobi, Kenya. In Proceedings of the SIGCHI conference on human factors in computing systems. 2593--2602.Google ScholarDigital Library
- Seungwon Yang and Brenton Stewart. 2019. @ Houstonpolice: an exploratory case of Twitter during Hurricane Harvey. Online Information Review (2019).Google Scholar
- Yixuan Zhang, Nurul Suhaimi, Rana Azghandi, Mary Amulya Joseph, Miso Kim, Jacqueline Griffin, and Andrea G Parker. 2020. Understanding the use of crisis informatics technology among older adults. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--13.Google ScholarDigital Library
- Lei Zou, Nina SN Lam, Shayan Shams, Heng Cai, Michelle A Meyer, Seungwon Yang, Kisung Lee, Seung-Jong Park, and Margaret A Reams. 2019. Social and geographical disparities in Twitter use during Hurricane Harvey. International Journal of Digital Earth 12, 11 (2019), 1300--1318.Google ScholarCross Ref
Index Terms
- The Use and Non-Use of Technology During Hurricanes
Recommendations
Social Media for Earthquake Response: Unpacking its Limitations with Care
When a 7.8 intensity earthquake caused widespread disaster in Ecuador on April 16, 2016, citizens across the country self-organized to gather, mobilize, and distribute supplies to affected populations, assuming the role of ad hoc humanitarian ...
Understanding the Use of Crisis Informatics Technology among Older Adults
CHI '20: Proceedings of the 2020 CHI Conference on Human Factors in Computing SystemsMass emergencies increasingly pose significant threats to human life, with a disproportionate burden being incurred by older adults. Research has explored how mobile technology can mitigate the effects of mass emergencies. However, less work has examined ...
Digital commemoration: surveying the social media revival of historical crises
CHI EA '11: CHI '11 Extended Abstracts on Human Factors in Computing SystemsSocial media has facilitated coordination efforts to help save lives, but are people using social media after the emergency phase? To answer this question, the author conducted a study surveying the social media revival of 111 crisis events that ...
Comments