{"id":"https://openalex.org/W2973661938","doi":"https://doi.org/10.1109/ghtc.2016.7857261","title":"Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises","display_name":"Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises","publication_year":2016,"publication_date":"2016-10-01","ids":{"openalex":"https://openalex.org/W2973661938","doi":"https://doi.org/10.1109/ghtc.2016.7857261","mag":"2973661938"},"language":"en","primary_location":{"id":"doi:10.1109/ghtc.2016.7857261","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ghtc.2016.7857261","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Global Humanitarian Technology Conference (GHTC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["arxiv","crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://arxiv.org/pdf/1808.04683","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Flor Alvarez","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"Flor Alvarez","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"middle","author":{"id":null,"display_name":"Matthias Hollick","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Matthias Hollick","raw_affiliation_strings":[],"affiliations":[]},{"author_position":"last","author":{"id":null,"display_name":"Paul Gardner-Stephen","orcid":null},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Paul Gardner-Stephen","raw_affiliation_strings":[],"affiliations":[]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":3,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.6072,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.7651489,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"62","last_page":"70"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11896","display_name":"Opportunistic and Delay-Tolerant Networks","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10246","display_name":"Mobile Ad Hoc Networks","score":0.9897000193595886,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10747","display_name":"Disaster Management and Resilience","score":0.9753000140190125,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.5425000190734863},{"id":"https://openalex.org/keywords/work","display_name":"Work (physics)","score":0.4925000071525574},{"id":"https://openalex.org/keywords/security-information-and-event-management","display_name":"Security information and event management","score":0.4505999982357025},{"id":"https://openalex.org/keywords/data-security","display_name":"Data security","score":0.44020000100135803},{"id":"https://openalex.org/keywords/security-service","display_name":"Security service","score":0.39969998598098755},{"id":"https://openalex.org/keywords/information-privacy","display_name":"Information privacy","score":0.3905999958515167},{"id":"https://openalex.org/keywords/data-breach","display_name":"Data breach","score":0.37439998984336853},{"id":"https://openalex.org/keywords/security-through-obscurity","display_name":"Security through obscurity","score":0.36390000581741333}],"concepts":[{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6869000196456909},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.571399986743927},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.5425000190734863},{"id":"https://openalex.org/C18762648","wikidata":"https://www.wikidata.org/wiki/Q42213","display_name":"Work (physics)","level":2,"score":0.4925000071525574},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.47269999980926514},{"id":"https://openalex.org/C103377522","wikidata":"https://www.wikidata.org/wiki/Q3493999","display_name":"Security information and event management","level":4,"score":0.4505999982357025},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.44020000100135803},{"id":"https://openalex.org/C112930515","wikidata":"https://www.wikidata.org/wiki/Q4389547","display_name":"Risk analysis (engineering)","level":1,"score":0.428600013256073},{"id":"https://openalex.org/C29983905","wikidata":"https://www.wikidata.org/wiki/Q7445066","display_name":"Security service","level":3,"score":0.39969998598098755},{"id":"https://openalex.org/C123201435","wikidata":"https://www.wikidata.org/wiki/Q456632","display_name":"Information privacy","level":2,"score":0.3905999958515167},{"id":"https://openalex.org/C165609540","wikidata":"https://www.wikidata.org/wiki/Q1172486","display_name":"Data breach","level":2,"score":0.37439998984336853},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.36809998750686646},{"id":"https://openalex.org/C114869243","wikidata":"https://www.wikidata.org/wiki/Q133735","display_name":"Security through obscurity","level":5,"score":0.36390000581741333},{"id":"https://openalex.org/C184842701","wikidata":"https://www.wikidata.org/wiki/Q370563","display_name":"Cloud computing security","level":3,"score":0.3319999873638153},{"id":"https://openalex.org/C527648132","wikidata":"https://www.wikidata.org/wiki/Q189900","display_name":"Information security","level":2,"score":0.30880001187324524},{"id":"https://openalex.org/C148976360","wikidata":"https://www.wikidata.org/wiki/Q1662500","display_name":"Information security management","level":5,"score":0.3050999939441681},{"id":"https://openalex.org/C69360830","wikidata":"https://www.wikidata.org/wiki/Q1172237","display_name":"Data Protection Act 1998","level":2,"score":0.30390000343322754},{"id":"https://openalex.org/C32896092","wikidata":"https://www.wikidata.org/wiki/Q189447","display_name":"Risk management","level":2,"score":0.2754000127315521},{"id":"https://openalex.org/C33762810","wikidata":"https://www.wikidata.org/wiki/Q461671","display_name":"Data integrity","level":2,"score":0.27459999918937683},{"id":"https://openalex.org/C101765175","wikidata":"https://www.wikidata.org/wiki/Q577764","display_name":"Communications system","level":2,"score":0.2515999972820282},{"id":"https://openalex.org/C3017634809","wikidata":"https://www.wikidata.org/wiki/Q84862664","display_name":"Risk communication","level":2,"score":0.2515999972820282},{"id":"https://openalex.org/C195518309","wikidata":"https://www.wikidata.org/wiki/Q13424265","display_name":"Security testing","level":5,"score":0.2502000033855438}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/ghtc.2016.7857261","is_oa":false,"landing_page_url":"https://doi.org/10.1109/ghtc.2016.7857261","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 IEEE Global Humanitarian Technology Conference (GHTC)","raw_type":"proceedings-article"},{"id":"pmh:oai:arXiv.org:1808.04683","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1808.04683","pdf_url":"https://arxiv.org/pdf/1808.04683","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},{"id":"pmh:oai:tubiblio.ulb.tu-darmstadt.de:110757","is_oa":false,"landing_page_url":"http://tubiblio.ulb.tu-darmstadt.de/110757/","pdf_url":null,"source":{"id":"https://openalex.org/S4377196390","display_name":"TUbilio (Technical University of Darmstadt)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I31512782","host_organization_name":"Technische Universit\u00e4t Darmstadt","host_organization_lineage":["https://openalex.org/I31512782"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Konferenzver\u00f6ffentlichung"}],"best_oa_location":{"id":"pmh:oai:arXiv.org:1808.04683","is_oa":true,"landing_page_url":"http://arxiv.org/abs/1808.04683","pdf_url":"https://arxiv.org/pdf/1808.04683","source":{"id":"https://openalex.org/S4306400194","display_name":"arXiv (Cornell University)","issn_l":null,"issn":null,"is_oa":true,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I205783295","host_organization_name":"Cornell University","host_organization_lineage":["https://openalex.org/I205783295"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"text"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":28,"referenced_works":["https://openalex.org/W134292135","https://openalex.org/W1573880431","https://openalex.org/W1602614289","https://openalex.org/W1975113377","https://openalex.org/W1989879199","https://openalex.org/W1998451262","https://openalex.org/W1999683085","https://openalex.org/W2029826216","https://openalex.org/W2032446614","https://openalex.org/W2034127776","https://openalex.org/W2039074490","https://openalex.org/W2049306103","https://openalex.org/W2056007486","https://openalex.org/W2096745865","https://openalex.org/W2112778826","https://openalex.org/W2116619054","https://openalex.org/W2126352534","https://openalex.org/W2129281072","https://openalex.org/W2130553043","https://openalex.org/W2251599967","https://openalex.org/W2313948007","https://openalex.org/W2327994742","https://openalex.org/W2334639351","https://openalex.org/W6634518899","https://openalex.org/W6636832860","https://openalex.org/W6637649018","https://openalex.org/W6713797464","https://openalex.org/W6729529569"],"related_works":[],"abstract_inverted_index":{"Communications":[0],"play":[1],"a":[2],"vital":[3],"role":[4],"in":[5],"the":[6,28,70,78,99,113,144],"response":[7],"to":[8,27,68,72],"disasters":[9],"and":[10,74,101,105,116,121,137,142,146],"crises.":[11,129],"However,":[12],"existing":[13],"communications":[14,32,61,81,151],"infrastructure":[15],"is":[16,57,66,90,96],"often":[17,63],"impaired,":[18],"destroyed":[19],"or":[20,38,85],"overwhelmed":[21],"during":[22,128],"such":[23],"events.":[24],"This":[25,89],"leads":[26],"use":[29,79],"of":[30,80,103,149],"substitute":[31,60],"solutions":[33,49],"including":[34,98],"analog":[35],"two-way":[36],"radio":[37],"unsecured":[39],"internet":[40],"access.":[41],"Often":[42],"provided":[43],"by":[44],"unknown":[45,86],"third":[46],"parties,":[47],"these":[48],"may":[50,119],"have":[51],"less":[52],"sophisticated":[53],"security":[54,87,145],"characteristics":[55],"than":[56],"desirable.":[58],"While":[59],"are":[62],"invaluable,":[64],"care":[65],"required":[67],"minimize":[69],"risk":[71],"NGOs":[73],"individuals":[75,104],"stemming":[76],"from":[77,134],"channels":[82],"with":[83],"reduced":[84],"properties.":[88],"particularly":[91],"true":[92],"if":[93],"private":[94],"information":[95],"involved,":[97],"location":[100],"disposition":[102],"first":[106],"responders.":[107],"In":[108],"this":[109],"work":[110],"we":[111],"enumerate":[112],"principal":[114],"risks":[115],"challenges":[117],"that":[118],"arise,":[120],"provide":[122],"practical":[123],"guidelines":[124],"for":[125],"mitigating":[126],"them":[127],"We":[130],"take":[131],"plausible":[132],"threats":[133],"contemporary":[135],"disaster":[136],"crisis":[138],"events":[139],"into":[140],"account":[141],"discuss":[143],"privacy":[147],"features":[148],"state-of-the-art":[150],"mechanisms.":[152]},"counts_by_year":[{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2026-03-10T16:38:18.471706","created_date":"2019-09-26T00:00:00"}
