skip to main content
research-article

The Use and Non-Use of Technology During Hurricanes

Published:04 October 2023Publication History
Skip Abstract Section

Abstract

Hurricanes can cause catastrophic damage; it is critical for those affected to access information about conditions, loved ones, and resources. Prior work in the HCI and CSCW communities has focused on how social media can be vital during natural disasters; non-social media technologies have been under-researched. To understand how technology other than social media can support or harm people during crises, we explore hurricane survivors' use and disuse of multiple kinds of technologies in online surveys with 138 US participants. We find substantial technology use supporting survivors' comfort and safety other than social media. We also observe that designing technologies for high-resource environments--as with many mainstream apps--causes users to decrease use of potentially critical technologies during utility outages, which are common during hurricanes. With themes of both (a) broad technology use and (b) conditions preventing technology use, we make recommendations for technical design, policy, and research to empower communities susceptible to hurricanes.

References

  1. 2021. Build a Kit. Retrieved April 1 2021 from https://www.ready.gov/kitGoogle ScholarGoogle Scholar
  2. 2021. Hurricane City. Retrieved June 1 2021 from hurricanecity.comGoogle ScholarGoogle Scholar
  3. 2021. PowerOutage.us. Retrieved March 25, 2022 from https://poweroutage.us/area/state/louisiana [Archived 31-August-2021].Google ScholarGoogle Scholar
  4. Walid Al-Saqaf. 2016. Internet censorship circumvention tools: Escaping the control of the Syrian regime. Media and Communication 4, 1 (2016), 39--50.Google ScholarGoogle ScholarCross RefCross Ref
  5. Morgan G Ames. 2013. Managing mobile multitasking: The culture of iPhones on Stanford campus. In Proceedings of the 2013 conference on Computer supported cooperative work. 1487--1498.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Sandra Appleby-Arnold, Noellie Brockdorff, Laure Fallou, and Rémy Bossu. 2019. Truth, trust, and civic duty: Cultural factors in citizens' perceptions of mobile phone apps and social media in disasters. Journal of contingencies and crisis management 27, 4 (2019), 293--305.Google ScholarGoogle ScholarCross RefCross Ref
  7. Craig Anthony Arnold, Ra'Desha Williams, Holden Pederson, Andrew Schuhmann, Audrey Ernstberger, Tiago de Melo Cartaxo, Connor Cafferty, Taylor Gore, James Mains, Kirk Mattingly, et al . 2020. Resilience justice and community-based green and blue infrastructure. Wm. & Mary Env't L. & Pol'y Rev. 45 (2020), 665.Google ScholarGoogle Scholar
  8. Leah Asmelash and Saeed Ahmed. 2019. Everything you need to know to prepare for a natural disaster. Retrieved April 1 2021 from https://www.cnn.com/2019/07/12/us/how-to-prepare-for-natural-disasters-trndGoogle ScholarGoogle Scholar
  9. Eric PS Baumer. 2015. Usees. In Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems. 3295--3298.Google ScholarGoogle Scholar
  10. Eric PS Baumer, Phil Adams, Vera D Khovanskaya, Tony C Liao, Madeline E Smith, Victoria Schwanda Sosik, and Kaiton Williams. 2013. Limiting, leaving, and (re) lapsing: an exploration of facebook non-use practices and experiences. In Proceedings of the SIGCHI conference on human factors in computing systems. 3257--3266.Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Eric PS Baumer, Jenna Burrell, Morgan G Ames, Jed R Brubaker, and Paul Dourish. 2015. On the importance and implications of studying technology non-use. interactions 22, 2 (2015), 52--56.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Lars Baumgärtner, Paul Gardner-Stephen, Pablo Graubner, Jeremy Lakeman, Jonas Höchst, Patrick Lampe, Nils Schmidt, Stefan Schulz, Artur Sterz, and Bernd Freisleben. 2016. An experimental evaluation of delay-tolerant networking with Serval. In 2016 IEEE Global Humanitarian Technology Conference (GHTC). IEEE, 70--79.Google ScholarGoogle ScholarCross RefCross Ref
  13. Mehrab Bin Morshed, Michaelanne Dye, Syed Ishtiaque Ahmed, and Neha Kumar. 2017. When the internet goes down in Bangladesh. In Proceedings of the 2017 ACM conference on computer supported cooperative work and social computing. 1591--1604.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Matthew Bloch, Charlie Smart, Jesse McKinley, Nate Schweber, Amanda Rosa, Chelsia Rose Marcius, Jon Hurdle, and Campbell Robertson. 2021. Flooding From Ida Kills Dozens of People in Four States. Retrieved March 25 2022 from https://web.archive.org/web/20210905084322/https://www.nytimes.com/live/2021/09/02/nyregion/nyc-storm [Archived Sept 3 2021].Google ScholarGoogle Scholar
  15. Norman M Bradburn, Lance J Rips, and Steven K Shevell. 1987. Answering autobiographical questions: The impact of memory and inference on surveys. Science 236, 4798 (1987), 157--161.Google ScholarGoogle Scholar
  16. Alina Bradford. 2019. 18 tips to prepare for a natural disaster. Retrieved April 1 2021 from https://www.cnet.com/pictures/prepare-for-a-natural-disaster-with-these-tips-wildfire-flood-hurricane-tornado/Google ScholarGoogle Scholar
  17. Virginia Braun and Victoria Clarke. 2006. Using thematic analysis in psychology. Qualitative research in psychology 3, 2 (2006), 77--101.Google ScholarGoogle Scholar
  18. Christine E Cerniglia. 2021. Systemic Injustice: The Need for Disaster and Pandemic Preparedness Legislation. U. Det. Mercy L. Rev. 99 (2021), 53.Google ScholarGoogle Scholar
  19. Nick Charalambides. 2021. We recently went viral on TikTok - here's what we learned. Retrieved September 6 2021 from https://blog.prolific.co/we-recently-went-viral-on-tiktok-heres-what-we-learned/Google ScholarGoogle Scholar
  20. Reuters Fact Check. 2021. Fact Check-Zello ?walkie-talkie' natural disaster app requires internet access. Retrieved April 11 2022 from https://www.reuters.com/article/factcheck-zello-walkie/fact-check-zello-walkie-talkie-natural-disaster-app-requires-internet-access-idUSL1N2Q31SNGoogle ScholarGoogle Scholar
  21. France Cheong and Christopher Cheong. 2011. Social Media Data Mining: A Social Network Analysis Of Tweets During The 2010--2011 Australian Floods. PACIS 11 (2011), 46--46.Google ScholarGoogle Scholar
  22. Jan Wesner Childs. 2021. Hurricane Ida: Roads Flooded, Buildings Ripped Apart, Hundreds of Thousands Without Power in Louisiana. Retrieved March 25 2022 from https://web.archive.org/web/20210829235352/https://weather.com/news/news/2021-08--29-hurricane-ida-louisiana-new-orleans-mississippi-news [Archived 29-August-2021].Google ScholarGoogle Scholar
  23. Camille Cobb, Ted McCarthy, Annuska Perkins, Ankitha Bharadwaj, Jared Comis, Brian Do, and Kate Starbird. 2014. Designing for the deluge: understanding & supporting the distributed, collaborative work of crisis volunteers. In Proceedings of the 17th ACM conference on Computer supported cooperative work & social computing. 888--899.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Sasha Costanza-Chock. 2020. Design justice: Community-led practices to build the worlds we need. The MIT Press.Google ScholarGoogle Scholar
  25. Kate Crawford and Megan Finn. 2015. The limits of crisis data: analytical and ethical challenges of using social and mobile data to understand disasters. GeoJournal 80, 4 (2015), 491--502.Google ScholarGoogle ScholarCross RefCross Ref
  26. Alaa Daffalla, Lucy Simko, Tadayoshi Kohno, and Alexandru G. Bardas. 2021. Defensive Technology Use by Political Activists During the Sudanese Revolution. In 2021 IEEE Symposium on Security and Privacy (SP). IEEE.Google ScholarGoogle Scholar
  27. Dharma Dailey and Kate Starbird. 2014. Visible skepticism: Community vetting after Hurricane Irene. In ISCRAM.Google ScholarGoogle Scholar
  28. Ronald J Deibert and Rafal Rohozinski. 2010. Control and subversion in Russian cyberspace.Google ScholarGoogle Scholar
  29. Claudia Der-Martirosian, Leonie Heyworth, Karen Chu, Yvonne Mudoh, and Aram Dobalian. 2020. Patient characteristics of VA telehealth users during Hurricane Harvey. Journal of Primary Care & Community Health 11 (2020), 2150132720931715.Google ScholarGoogle ScholarCross RefCross Ref
  30. Lisa Eadicicco. 2022. AirTags Are Linked to Stalking, and Apple Can't Solve This Problem Alone. https://www.cnet.com/tech/mobile/airtags-are-being-linked-to-stalking-and-its-a-problem-apple-cant-solve-alone/. [Accessed 11-January-2023].Google ScholarGoogle Scholar
  31. Tristan Endsley, Yu Wu, James Reep, J Eep, and J Reep. 2014. The source of the story: Evaluating the credibility of crisis information sources.. In ISCRAM.Google ScholarGoogle Scholar
  32. Federal Emergency Management Agency (FEMA). 2002. Emergency Management in the United States. https://training.fema.gov/emiweb/downloads/is111_unit%204.pdf. [Accessed 11-April-2023].Google ScholarGoogle Scholar
  33. Federal Emergency Management Agency (FEMA). 2023. Mitigation vs. Preparedness. Retrieved April 14, 2023 from https://emilms.fema.gov/is_0350/groups/20.htmlGoogle ScholarGoogle Scholar
  34. Thomas Ferris, Erick Moreno-Centeno, Justin Yates, Kisuk Sung, Mahmoud El-Sherif, and David Matarrita-Cascante. 2016. Studying the Usage of Social Media and Mobile Technology during Extreme Events and Their Implications for Evacuation Decisions: A Case Study of Hurricane Sandy. International Journal of Mass Emergencies & Disasters 34, 2 (2016).Google ScholarGoogle ScholarCross RefCross Ref
  35. Megan Finn. 2018. Documenting Aftermath: Information Infrastructures in the Wake of Disasters. Massachussetts Institute of Technology.Google ScholarGoogle ScholarCross RefCross Ref
  36. Karen Freberg, Kristin Saling, Kathleen G Vidoloff, and Gina Eosco. 2013. Using value modeling to evaluate social media messages: The case of Hurricane Irene. Public Relations Review 39, 3 (2013), 185--192.Google ScholarGoogle ScholarCross RefCross Ref
  37. JC Gaillard, B Alexander, P Becker, K Blanchard, L Bosher, F Broines, JR Cadag, K Chmutina, et al . 2019. Power, prestige & forgotten values: A disaster studies manifesto. Ipetitions, available at: www. ipetitions. com/petition/power-prestige-forgotten-values-a-disaster (2019). [Accessed 24-April-2022].Google ScholarGoogle Scholar
  38. JC Gaillard and Lori Peek. 2019. Disaster-zone research needs a code of conduct.Google ScholarGoogle Scholar
  39. Paul Gardner-Stephen. 2011. The Serval project: Practical wireless ad-hoc mobile telecommunications. Flinders University, Adelaide, South Australia, Tech. Rep 230 (2011).Google ScholarGoogle Scholar
  40. Paul Gardner-Stephen, Romana Challans, Jeremy Lakeman, Andrew Bettison, Dione Gardner-Stephen, and Matthew Lloyd. 2013. The Serval mesh: A platform for resilient communications in disaster & crisis. In 2013 IEEE Global Humanitarian Technology Conference (GHTC). IEEE, 162--166.Google ScholarGoogle ScholarCross RefCross Ref
  41. Paul Gardner-Stephen, Jeremy Lakeman, Romana Challans, Corey Wallis, Ariel Stulman, and Yoram Haddad. 2012. Meshms: Ad hoc data transfer within mesh network. (2012).Google ScholarGoogle Scholar
  42. Radhika Garg. 2019. An analysis of (non-) use practices and decisions of internet of things. In IFIP Conference on Human-Computer Interaction. Springer, 3--24.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Alexey Gavrilov. 2019. How to use Zello for communication during a disaster. Retrieved April 11 2022 from https://blog.zello.com/how-to-use-zello-during-an-emergencyGoogle ScholarGoogle Scholar
  44. James D Goltz and Dennis S Mileti. 2011. Public response to a catastrophic Southern California earthquake: A sociological perspective. Earthquake spectra 27, 2 (2011), 487--504.Google ScholarGoogle Scholar
  45. Aditi Gupta, Hemank Lamba, Ponnurangam Kumaraguru, and Anupam Joshi. 2013. Faking Sandy: Characterizing and identifying fake images on Twitter during Hurricane Sandy. In Proceedings of the 22nd international conference on World Wide Web. 729--736.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Emily Guskin. 2012. Hurricane Sandy and Twitter. Retrieved April 21 2022 from https://www.pewresearch.org/journalism/2012/11/06/hurricane-sandy-and-twitter/Google ScholarGoogle Scholar
  47. Steffen Haesler, Ragnar Mogk, Florentin Putz, Kevin T Logan, Nadja Thiessen, Katharina Kleinschnitger, Lars Baumgärtner, Jan-Philipp Stroscher, Christian Reuter, Michèle Knodt, et al. 2021. Connected Self-Organized Citizens in Crises: An Interdisciplinary Resilience Concept for Neighborhoods. In Companion Publication of the 2021 Conference on Computer Supported Cooperative Work and Social Computing. 62--66.Google ScholarGoogle Scholar
  48. Arianna Hanchey, Amy Schnall, Tesfaye Bayleyegn, Sumera Jiva, Anna Khan, Vivi Siegel, Renée Funk, and Erik Svendsen. 2021. Notes from the field: deaths related to Hurricane Ida reported by media-nine states, August 29--September 9, 2021. Morbidity and Mortality Weekly Report 70, 39 (2021), 1385.Google ScholarGoogle ScholarCross RefCross Ref
  49. Shaddi Hasan, Mary Claire Barela, Matthew Johnson, Eric Brewer, and Kurtis Heimerl. 2019. Scaling Community Cellular Networks with CommunityCellularManager. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19). 735--750.Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Kurtis Heimerl, Shaddi Hasan, Kashif Ali, Eric Brewer, and Tapan Parikh. 2013. Local, sustainable, small-scale cellular networks. In Proceedings of the Sixth International Conference on Information and Communication Technologies and Development: Full Papers-Volume 1. 2--12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  51. Amanda Lee Hughes and Leysia Palen. 2009. Twitter adoption and use in mass convergence and emergency events. International journal of emergency management 6, 3--4 (2009), 248--260.Google ScholarGoogle ScholarCross RefCross Ref
  52. Amanda L Hughes, Lise AA St. Denis, Leysia Palen, and Kenneth M Anderson. 2014. Online public communications by police & fire services during the 2012 Hurricane Sandy. In Proceedings of the SIGCHI conference on human factors in computing systems. 1505--1514.Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Esther Jang, Mary Claire Barela, Matt Johnson, Philip Martinez, Cedric Festin, Margaret Lynn, Josephine Dionisio, and Kurtis Heimerl. 2018. Crowdsourcing rural network maintenance and repair via network messaging. In Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems. 1--12.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Matthew Johnson, Jenny Liang, Michelle Lin, Sudheesh Singanamalla, and Kurtis Heimerl. 2021. Whale Watching in Inland Indonesia: Analyzing a Small, Remote, Internet-Based Community Cellular Network. In Proceedings of the Web Conference 2021. 1483--1494.Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Matthew William Johnson, Esther Han Beol Jang, Frankie O'Rourke, Rachel Ye, and Kurtis Heimerl. 2021. Network Capacity as Common Pool Resource: Community-Based Congestion Management in a Community Network. Proceedings of the ACM on Human-Computer Interaction 5, CSCW1 (2021), 1--25.Google ScholarGoogle ScholarDigital LibraryDigital Library
  56. Brennan Jones, Anthony Tang, and Carman Neustaedter. 2020. Remote communication in wilderness search and rescue: implications for the design of emergency distributed-collaboration tools for network-sparse environments. Proceedings of the ACM on human-computer interaction 4, GROUP (2020), 1--26.Google ScholarGoogle ScholarDigital LibraryDigital Library
  57. Mark Jurkowitz, Amy Mitchell, Elisa Shearer, and Mason Walker. 2020. U.S. Media Polarization and the 2020 Election: A Nation Divided. https://www.pewresearch.org/journalism/2020/01/24/u-s-media-polarization-and-the-2020-election-a-nation-divided/.Google ScholarGoogle Scholar
  58. Kanchana Kanchanasut, Apinun Tunpan, Mohammad Abdul Awal, Dwijendra Kumar Das, Thirapon Wongsaardsakul, and Yasuo Tsuchimoto. 2007. DUMBONET: a multimedia communication system for collaborative emergency response operations in disaster-affected areas. International Journal of Emergency Management 4, 4 (2007), 670--681.Google ScholarGoogle ScholarCross RefCross Ref
  59. Ruogu Kang, Stephanie Brown, Laura Dabbish, and Sara Kiesler. 2014. Privacy attitudes of Mechanical Turk workers and the US public. In Symposium on Usable Privacy and Security (SOUPS), Vol. 4. 1.Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Sophie Kasakove. 2021. Three Weeks After Hurricane Ida, Parts of Southeast Louisiana Are Still Dark. Retrieved March 25 2022 from https://www.nytimes.com/2021/09/18/us/ida-louisiana-power-outages.htmlGoogle ScholarGoogle Scholar
  61. Marina Kogan, Leysia Palen, and Kenneth M Anderson. 2015. Think local, retweet global: Retweeting by the geographically-vulnerable during Hurricane Sandy. In Proceedings of the 18th ACM conference on computer supported cooperative work & social computing. 981--993.Google ScholarGoogle ScholarDigital LibraryDigital Library
  62. Neha Kumar. 2014. Facebook for self-empowerment? A study of Facebook adoption in urban India. New media & society 16, 7 (2014), 1122--1137.Google ScholarGoogle Scholar
  63. Mark Latonero and Irina Shklovski. 2011. Emergency management, Twitter, and social media evangelism. International Journal of Information Systems for Crisis Response and Management (IJISCRAM) 3, 4 (2011), 1--16.Google ScholarGoogle ScholarCross RefCross Ref
  64. Andy S Latto and Robbie Berg. 2022. National hurricane center tropical cyclone report: Hurricane Nicholas. (1 March 2022).Google ScholarGoogle Scholar
  65. Jessica Li and H Raghav Rao. 2010. Twitter as a rapid response news service: An exploration in the context of the 2008 China earthquake. The Electronic Journal of Information Systems in Developing Countries 42, 1 (2010), 1--22.Google ScholarGoogle ScholarCross RefCross Ref
  66. Xuyang Li, Antara Bahursettiwar, and Marina Kogan. 2021. Hello? Is There Anybody in There? Analysis of Factors Promoting Response From Authoritative Sources in Crisis. Proceedings of the ACM on Human-Computer Interaction 5, CSCW1 (2021), 1--21.Google ScholarGoogle Scholar
  67. JungKyu Rhys Lim, Brooke Fisher Liu, and Anita Atwell Seate. 2022. Are you prepared for the next storm? Developing social norms messages to motivate community members to perform disaster risk mitigation behaviors. Risk analysis 42, 11 (2022), 2550--2568.Google ScholarGoogle Scholar
  68. Brooke Fisher Liu, Anita Atwell Seate, Irina Iles, and Emina Herovic. 2020. Tornado warning: Understanding the National Weather Service's communication strategies. Public Relations Review 46, 2 (2020), 101879.Google ScholarGoogle ScholarCross RefCross Ref
  69. Amy Livingston. 2021. How to Get Emergency Financial Assistance & Help With Bills -- Resources. Retrieved April 1 2021 from https://www.moneycrashers.com/prepare-natural-disaster-emergency-preparedness/Google ScholarGoogle Scholar
  70. Alessandro Lovari and Shannon A Bowen. 2020. Social media in disaster communication: A case study of strategies, barriers, and ethical implications. Journal of Public Affairs 20, 1 (2020), e1967.Google ScholarGoogle ScholarCross RefCross Ref
  71. Mirca Madianou. 2015. Digital inequality and second-order disasters: Social media in the Typhoon Haiyan recovery. Social Media Society 1, 2 (2015), 2056305115603386.Google ScholarGoogle ScholarCross RefCross Ref
  72. Mirca Madianou, Jonathan Corpus Ong, Liezel Longboan, and Jayeel S Cornelio. 2016. The appearance of accountability: Communication technologies and power asymmetries in humanitarian aid and disaster recovery. Journal of Communication 66, 6 (2016), 960--981.Google ScholarGoogle ScholarCross RefCross Ref
  73. Nora McDonald, Sarita Schoenebeck, and Andrea Forte. 2019. Reliability and inter-rater reliability in qualitative research: Norms and guidelines for CSCW and HCI practice. Proceedings of the ACM on human-computer interaction 3, CSCW (2019), 1--23.Google ScholarGoogle ScholarDigital LibraryDigital Library
  74. Chris McGivern. 2019. Paul Gardner-Stephen and the Serval Project: Communications For All. https://shuttleworthfoundation.org/thinking/2019/11/27/thinking-paul-gardner-stephen/. [Accessed 8-January-2023].Google ScholarGoogle Scholar
  75. Volodymyr V Mihunov, Nina SN Lam, Lei Zou, Zheye Wang, and Kejin Wang. 2020. Use of Twitter in disaster rescue: lessons learned from Hurricane Harvey. International Journal of Digital Earth 13, 12 (2020), 1454--1466.Google ScholarGoogle ScholarCross RefCross Ref
  76. Florian 'Floyd' Mueller and Sarah Jane Pell. 2016. Technology meets adventure: Learnings from an earthquake-interrupted Mt. Everest expedition. In Proceedings of the 2016 acm international joint conference on pervasive and ubiquitous computing. 817--828.Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. Dhiraj Murthy and Alexander J Gross. 2017. Social media processes in disasters: Implications of emergent technology use. Social science research 63 (2017), 356--370.Google ScholarGoogle Scholar
  78. NOAA. 2021. What is the difference between a hurricane and a typhoon? Retrieved April 19 2022 from https://oceanservice.noaa.gov/facts/cyclone.htmlGoogle ScholarGoogle Scholar
  79. National Oceanic and Atmospheric Administration (NOAA). 2021. 2021 Atlantic Hurricane Season Summary Table. Retrieved April 15, 2023 from https://www.nhc.noaa.gov/data/tcr/2021_Atlantic_Hurricane_Season_Summary_Table.pdfGoogle ScholarGoogle Scholar
  80. National Oceanic and Atmospheric Administration (NOAA). 2022. NOAA National Centers for Environmental Information (NCEI) U.S. Billion-Dollar Weather and Climate Disasters. https://www.ncdc.noaa.gov/billions/. [Accessed 7-January-2022].Google ScholarGoogle Scholar
  81. National Oceanic and Atmospheric Administration (NOAA). 2022. Tropical Cyclone Climatology. Retrieved March 25 2022 from https://www.nhc.noaa.gov/climo/Google ScholarGoogle Scholar
  82. Onook Oh, Manish Agrawal, and H Raghav Rao. 2011. Information control and terrorism: Tracking the Mumbai terrorist attack through Twitter. Information Systems Frontiers 13, 1 (2011), 33--43.Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. Judith S Olson and Wendy A Kellogg. 2014. Ways of Knowing in HCI. Vol. 2. Springer.Google ScholarGoogle Scholar
  84. Leysia Palen, Sarah Vieweg, and Kenneth Mark Anderson. 2011. Supporting ?everyday analysts" in safety-and time-critical situations. The Information Society 27, 1 (2011), 52--62.Google ScholarGoogle ScholarDigital LibraryDigital Library
  85. Richard J. Pasch, Robbie Berg, and Andrew B. Hagen. 2022. National hurricane center tropical cyclone report: Hurricane Henri. (25 January 2022).Google ScholarGoogle Scholar
  86. Sandy Patton. 2017. How to Be Prepared for a Natural Disaster. Retrieved April 1 2021 from https://selecthealth.org/blog/2017/09/how-to-be-prepared-for-a-natural-disasterGoogle ScholarGoogle Scholar
  87. Eyal Peer, Laura Brandimarte, Sonam Samat, and Alessandro Acquisti. 2017. Beyond the Turk: Alternative platforms for crowdsourcing behavioral research. Journal of Experimental Social Psychology 70 (2017), 153--163.Google ScholarGoogle ScholarCross RefCross Ref
  88. Elissa M Redmiles, Sean Kross, and Michelle L Mazurek. 2019. How well do my results generalize? Comparing security and privacy survey results from MTurk, web, and telephone samples. In 2019 IEEE Symposium on Security and Privacy (SP). IEEE, 1326--1343.Google ScholarGoogle ScholarCross RefCross Ref
  89. Elissa M Redmiles, Noel Warford, Amritha Jayanti, Aravind Koneru, Sean Kross, Miraida Morales, Rock Stevens, and Michelle L Mazurek. 2020. A comprehensive quality evaluation of security and privacy advice on the web. In 29th USENIX Security Symposium (USENIX Security 20). 89--108.Google ScholarGoogle Scholar
  90. Christian Reuter and Marc-André Kaufhold. 2018. Fifteen years of social media in emergencies: a retrospective review and future directions for crisis informatics. Journal of contingencies and crisis management 26, 1 (2018), 41--57.Google ScholarGoogle ScholarCross RefCross Ref
  91. Erika Rosas, Felipe Garay, and Nicolas Hidalgo. 2020. Context-aware self-adaptive routing for delay tolerant network in disaster scenarios. Ad Hoc Networks 102 (2020), 102095.Google ScholarGoogle ScholarCross RefCross Ref
  92. Joel Ross, Lilly Irani, M Silberman, Andrew Zaldivar, and Bill Tomlinson. 2010. Who are the crowdworkers?: Shifting demographics in Mechanical Turk. In CHI'10 extended abstracts on Human factors in computing systems. ACM, 2863--2872.Google ScholarGoogle ScholarDigital LibraryDigital Library
  93. Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. 2010. Earthquake shakes Twitter users: real-time event detection by social sensors. In Proceedings of the 19th international conference on World wide web. 851--860.Google ScholarGoogle ScholarDigital LibraryDigital Library
  94. Christine Satchell and Paul Dourish. 2009. Beyond the user: use and non-use in HCI. In Proceedings of the 21st annual conference of the Australian computer-human interaction special interest group: Design: Open 24/7. 9--16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. Devansh Saxena, Patrick Skeba, Shion Guha, and Eric PS Baumer. 2020. Methods for Generating Typologies of Non/use. Proceedings of the ACM on Human-Computer Interaction 4, CSCW1 (2020), 1--26.Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. Julie A Schumacher, Scott F Coffey, Fran H Norris, Melissa Tracy, Kahni Clements, and Sandro Galea. 2010. Intimate partner violence and Hurricane Katrina: predictors and associated mental health outcomes. Violence and victims 25, 5 (2010), 588--603.Google ScholarGoogle Scholar
  97. Joni Schwartz. 2016. Disconnect to connect: emotional responses to loss of technology during Hurricane Sandy. In Emotions, technology, and behaviors. Elsevier, 107--122.Google ScholarGoogle Scholar
  98. Neil Selwyn. 2003. Apart from technology: understanding people's non-use of information and communication technologies in everyday life. Technology in society 25, 1 (2003), 99--116.Google ScholarGoogle Scholar
  99. Spencer Sevilla, Matthew Johnson, Pat Kosakanchit, Jenny Liang, and Kurtis Heimerl. 2019. Experiences: Design, implementation, and deployment of CoLTE, a community LTE solution. In The 25th Annual International Conference on Mobile Computing and Networking. 1--16.Google ScholarGoogle ScholarDigital LibraryDigital Library
  100. Herring Shava and Willie T Chinyamurindi. 2018. Determinants of social media usage among a sample of rural South African youth. South African Journal of Information Management 20, 1 (2018), 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  101. Irina Shklovski, Moira Burke, Sara Kiesler, and Robert Kraut. 2010. Technology adoption and use in the aftermath of Hurricane Katrina in New Orleans. American Behavioral Scientist 53, 8 (2010), 1228--1246.Google ScholarGoogle ScholarCross RefCross Ref
  102. Hollie Silverman and Michael Guy. 2021. Crews work to restore power for tens of thousands as Henri drenches the Northeast. Retrieved March 25 2022 from https://www.cnn.com/2021/08/23/weather/us-henri-monday/index.htmlGoogle ScholarGoogle Scholar
  103. Tomer Simon, Avishay Goldberg, and Bruria Adini. 2015. Socializing in emergencies-A review of the use of social media in emergency situations. International Journal of Information Management 35, 5 (2015), 609--619.Google ScholarGoogle ScholarDigital LibraryDigital Library
  104. Robert Soden, Lydia Chilton, Scott Miles, Rebecca Bicksler, Kaira Ray Villanueva, and Melissa Bica. 2022. Insights and Opportunities for HCI Research into Hurricane Risk Communication. In CHI Conference on Human Factors in Computing Systems. 1--13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  105. Robert Soden, David Lallemant, Perrine Hamel, and Karen Barns. 2021. Becoming Interdisciplinary: Fostering Critical Engagement With Disaster Data. Proceedings of the ACM on Human-Computer Interaction 5, CSCW1 (2021), 1--27.Google ScholarGoogle ScholarDigital LibraryDigital Library
  106. Robert Soden and Austin Lord. 2018. Mapping silences, reconfiguring loss: Practices of damage assessment & repair in post-earthquake Nepal. Proceedings of the ACM on Human-Computer Interaction 2, CSCW (2018), 1--21.Google ScholarGoogle ScholarDigital LibraryDigital Library
  107. Robert Soden and Embry Owen. 2021. Dilemmas in Mutual Aid: Lessons for Crisis Informatics from an Emergent Community Response to the Pandemic. Proceedings of the ACM on Human-Computer Interaction 5, CSCW2 (2021), 1--19.Google ScholarGoogle ScholarDigital LibraryDigital Library
  108. Katta Spiel, Oliver L Haimson, and Danielle Lottridge. 2019. How to do better with gender on surveys: a guide for HCI researchers. Interactions 26, 4 (2019), 62--65.Google ScholarGoogle ScholarDigital LibraryDigital Library
  109. Kate Starbird, Jim Maddock, Mania Orand, Peg Achterman, and Robert M Mason. 2014. Rumors, false flags, and digital vigilantes: Misinformation on Twitter after the 2013 Boston marathon bombing. IConference 2014 Proceedings (2014).Google ScholarGoogle Scholar
  110. Kate Starbird and Leysia Palen. 2011. ?Voluntweeters" self-organizing by digital volunteers in times of crisis. In Proceedings of the SIGCHI conference on human factors in computing systems. 1071--1080.Google ScholarGoogle ScholarDigital LibraryDigital Library
  111. Rick Stella. 2021. The 6 best emergency kits for coping with severe weather or a natural disaster. Retrieved April 1 2021 from https://www.businessinsider.com/best-emergency-kitGoogle ScholarGoogle Scholar
  112. Anselm Strauss and Juliet Corbin. 1990. Basics of qualitative research. Sage publications.Google ScholarGoogle Scholar
  113. Nurul M Suhaimi, Yixuan Zhang, Mary Joseph, Miso Kim, Andrea G Parker, and Jacqueline Griffin. 2022. Investigating Older Adults' Attitudes towards Crisis Informatics Tools: Opportunities for Enhancing Community Resilience during Disasters. arXiv preprint arXiv:2202.10927 (2022).Google ScholarGoogle Scholar
  114. Marion Lara Tan, Raj Prasanna, Kristin Stock, Emma EH Doyle, Graham Leonard, and David Johnston. 2020. Usability factors influencing the continuance intention of disaster apps: A mixed-methods study. International Journal of Disaster Risk Reduction 50 (2020), 101874.Google ScholarGoogle ScholarCross RefCross Ref
  115. Marion Lara Tan, Raj Prasanna, Kristin Stock, Emma Hudson-Doyle, Graham Leonard, and David Johnston. 2017. Mobile applications in crisis informatics literature: A systematic review. International journal of disaster risk reduction 24 (2017), 297--311.Google ScholarGoogle ScholarCross RefCross Ref
  116. Edgar Marko Trono, Yutaka Arakawa, Morihiko Tamai, and Keiichi Yasumoto. 2015. Dtn mapex: Disaster area mapping through distributed computing over a delay tolerant network. In 2015 Eighth International Conference on Mobile Computing and Ubiquitous Networking (ICarnegie Mellon University). IEEE, 179--184.Google ScholarGoogle ScholarCross RefCross Ref
  117. Kasey Tross. 2020. Emergency Kits 101: How to Be Prepared for Anything. Retrieved April 1 2021 from https://www.safewise.com/blog/emergency-kits/Google ScholarGoogle Scholar
  118. Md Yusuf S Uddin, David M Nicol, Tarek F Abdelzaher, and Robin H Kravets. 2009. A post-disaster mobility model for delay tolerant networking. In Proceedings of the 2009 winter simulation conference (WSC). IEEE, 2785--2796.Google ScholarGoogle ScholarCross RefCross Ref
  119. Jeff Ueland and Barney Warf. 2006. Racialized topographies: Altitude and race in southern cities. Geographical Review 96, 1 (2006), 50--78.Google ScholarGoogle ScholarCross RefCross Ref
  120. Raphael Varieras. 2020. How to use Zello for communication during a disaster. Retrieved April 11 2022 from https://blog.zello.com/how-to-use-zello-for-communication-during-a-disasterGoogle ScholarGoogle Scholar
  121. Sarah Vieweg, Amanda L Hughes, Kate Starbird, and Leysia Palen. 2010. Microblogging during two natural hazards events: what Twitter may contribute to situational awareness. In Proceedings of the SIGCHI conference on human factors in computing systems. 1079--1088.Google ScholarGoogle ScholarDigital LibraryDigital Library
  122. Robin Whittemore, Susan K Chase, and Carol Lynn Mandle. 2001. Validity in qualitative research. Qualitative health research 11, 4 (2001), 522--537.Google ScholarGoogle Scholar
  123. Wirecutter. 2021. The Best Emergency Preparedness Supplies. Retrieved April 1 2021 from https://www.nytimes.com/wirecutter/reviews/emergency-preparedness/Google ScholarGoogle Scholar
  124. V Wiseman, L Conteh, and F Matovu. 2005. Using diaries to collect data in resource-poor settings: questions on design and implementation. Health Policy and Planning 20, 6 (2005), 394--404.Google ScholarGoogle ScholarCross RefCross Ref
  125. Susan Wyche and Charles Steinfield. 2016. Why don't farmers use cell phones to access market prices? Technology affordances and barriers to market information services adoption in rural Kenya. Information Technology for Development 22, 2 (2016), 320--333.Google ScholarGoogle ScholarDigital LibraryDigital Library
  126. Susan P Wyche, Sarita Yardi Schoenebeck, and Andrea Forte. 2013. "Facebook is a luxury": An exploratory study of social media use in rural Kenya. In Proceedings of the 2013 conference on Computer supported cooperative work. 33--44.Google ScholarGoogle ScholarDigital LibraryDigital Library
  127. Susan P Wyche, Thomas N Smyth, Marshini Chetty, Paul M Aoki, and Rebecca E Grinter. 2010. Deliberate interactions: characterizing technology use in Nairobi, Kenya. In Proceedings of the SIGCHI conference on human factors in computing systems. 2593--2602.Google ScholarGoogle ScholarDigital LibraryDigital Library
  128. Seungwon Yang and Brenton Stewart. 2019. @ Houstonpolice: an exploratory case of Twitter during Hurricane Harvey. Online Information Review (2019).Google ScholarGoogle Scholar
  129. Yixuan Zhang, Nurul Suhaimi, Rana Azghandi, Mary Amulya Joseph, Miso Kim, Jacqueline Griffin, and Andrea G Parker. 2020. Understanding the use of crisis informatics technology among older adults. In Proceedings of the 2020 CHI Conference on Human Factors in Computing Systems. 1--13.Google ScholarGoogle ScholarDigital LibraryDigital Library
  130. Lei Zou, Nina SN Lam, Shayan Shams, Heng Cai, Michelle A Meyer, Seungwon Yang, Kisung Lee, Seung-Jong Park, and Margaret A Reams. 2019. Social and geographical disparities in Twitter use during Hurricane Harvey. International Journal of Digital Earth 12, 11 (2019), 1300--1318.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. The Use and Non-Use of Technology During Hurricanes

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in

    Full Access

    • Published in

      cover image Proceedings of the ACM on Human-Computer Interaction
      Proceedings of the ACM on Human-Computer Interaction  Volume 7, Issue CSCW2
      CSCW
      October 2023
      4055 pages
      EISSN:2573-0142
      DOI:10.1145/3626953
      Issue’s Table of Contents

      Copyright © 2023 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 4 October 2023
      Published in pacmhci Volume 7, Issue CSCW2

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article
    • Article Metrics

      • Downloads (Last 12 months)108
      • Downloads (Last 6 weeks)7

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader