{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,4]],"date-time":"2025-12-04T01:25:22Z","timestamp":1764811522403,"version":"3.28.0"},"reference-count":43,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/ghtc.2016.7857261","type":"proceedings-article","created":{"date-parts":[[2017,2,16]],"date-time":"2017-02-16T22:19:10Z","timestamp":1487283550000},"page":"62-70","source":"Crossref","is-referenced-by-count":5,"title":["Maintaining both availability and integrity of communications: Challenges and guidelines for data security and privacy during disasters and crises"],"prefix":"10.1109","author":[{"given":"Flor","family":"Alvarez","sequence":"first","affiliation":[]},{"given":"Matthias","family":"Hollick","sequence":"additional","affiliation":[]},{"given":"Paul","family":"Gardner-Stephen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.041513.00174"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2012.136"},{"key":"ref33","first-page":"8","article-title":"Why (special agent) johnny (still) can't encrypt: A security analysis of the apco project 25 two-way radio system","author":"clark","year":"2011","journal-title":"USENIX Security Symposium"},{"article-title":"Facebook safety check: Fury as users who aren't in nepal mark themselves safe from quake","year":"2015","author":"campbell","key":"ref32"},{"key":"ref31","first-page":"15","article-title":"National preparedness report","author":"fema","year":"2013"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2487788.2488110"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOMW.2007.4437813"},{"article-title":"A wake-up call for satcom security","year":"2014","author":"ruben","key":"ref36"},{"key":"ref35","first-page":"249","article-title":"Manet: history, challenges and applications","volume":"2","author":"bang","year":"2013","journal-title":"International Journal of Application or Innovation in Engineering & Management (lJAIEM)"},{"key":"ref34","first-page":"116","article-title":"Insecurity in public-safety communications: Apco project 25","author":"glass","year":"2011","journal-title":"Security and Privacy in Communication Networks"},{"article-title":"Cyberwar case study: Georgia 2008","year":"2011","author":"hollis","key":"ref10"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2010.5510913"},{"article-title":"China quake school critic receives one-year sentence-group","year":"2008","author":"buckley","key":"ref11"},{"year":"2016","key":"ref12","article-title":"delorme inreach"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/0471224561.ch15"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/HMI.2016.7449197"},{"year":"2016","key":"ref15","article-title":"Freifunk"},{"article-title":"Performance analysis and simulation of a freifunk mesh network in paderbom using batman advanced","year":"2015","author":"hardes","key":"ref16"},{"year":"2016","key":"ref17","article-title":"Commotion wireless"},{"key":"ref18","first-page":"38","article-title":"On mobile mesh networks","volume":"3","author":"namiot","year":"2015","journal-title":"International Journal of Open Information Technologies"},{"key":"ref19","article-title":"The serval project: Practical wireless ad-hoc mobile telecommunications","author":"gardner-stephen","year":"2011","journal-title":"Flinders University of South Australia Technical Report"},{"article-title":"Iridium system hacking","year":"2015","author":"schneider","key":"ref28"},{"article-title":"Terminology on disaster risk reduction, from united nations international strategy for disaster reduction","year":"2009","author":"nations","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1102120.1102171"},{"key":"ref3","article-title":"Defining disaster: The need for harmonisation of terminology","volume":"19","author":"mayner","year":"2015","journal-title":"Australasian Journal of Disaster and Trauma Studies Val"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijinfomgt.2010.10.001"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.2328\/jnds.34.3"},{"journal-title":"Media Information Systems and Communities Lessons from Haiti Repor","year":"2010","author":"nelson","key":"ref5"},{"key":"ref8","first-page":"24","article-title":"An economic analysis of boko harams activities in the chad-cameroon-nigeria border area","volume":"3","author":"isaac","year":"2015","journal-title":"The Study of Finance and Economics"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1080\/19361610.2016.1137172"},{"article-title":"How a bunch of tech geeks helped save nepal's earthquake victims","year":"2016","author":"fung","key":"ref2"},{"article-title":"Katrina takes a toll on truth, news accuracy","year":"2005","author":"rosenblatt","key":"ref9"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1177\/1087724X06289052"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.4236\/ijcns.2012.58060"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/GHTC.2013.6713674"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.3844\/jcssp.2013.1680.1685"},{"key":"ref42","article-title":"Voice over ip: Risks, threats and vulnerabilities","author":"keromytis","year":"2011","journal-title":"Cyber Infrastructure Protection"},{"key":"ref24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1016\/j.comcom.2014.06.003","article-title":"Security in wireless ad-hoc networks-a survey","volume":"51","author":"di pietro","year":"2014","journal-title":"Computer Communications"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2011.50"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/INCoS.2014.28"},{"key":"ref26","doi-asserted-by":"crossref","first-page":"872","DOI":"10.3923\/jas.2006.872.877","article-title":"Analysis and enhancement of authentication algorithms in mobile networks","volume":"6","author":"ja\u2019afer","year":"2006","journal-title":"Journal of Applied Sciences"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.031611.00112"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2009.11.015"}],"event":{"name":"2016 IEEE Global Humanitarian Technology Conference (GHTC)","start":{"date-parts":[[2016,10,13]]},"location":"Seattle, WA","end":{"date-parts":[[2016,10,16]]}},"container-title":["2016 IEEE Global Humanitarian Technology Conference (GHTC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7837794\/7857239\/07857261.pdf?arnumber=7857261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,18]],"date-time":"2019-09-18T19:54:45Z","timestamp":1568836485000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7857261\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/ghtc.2016.7857261","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}