Abstract

Natural disasters are one of the most dangerous challenges facing societies because of the heavy human, economic, and social losses they cause, besides the damages in infrastructure and holdings. While it is difficult to prevent some risks or disasters, the efficiency and effectiveness of communications during these periods can reduce their consequences and serious damage, especially in light of the development of digital communication technology, the increased use of social media platforms, and the widespread use of smartphones that have come to be an essential part of our daily activities. In this context, thousands of smartphone applications have emerged in various fields including commercial, medical, industrial, entertainment, public services, etc. Faced with grave risks and disasters, the importance of smartphone technology has developed, which has helped to mitigate the devastating effects of such disasters by saving the lives of thousands of citizens and enhancing the ability of affected communities to help themselves. This study adopts the case study method with the aim of extrapolation and reasoning, by reviewing the most popular smartphone applications used in risk and disaster communication management. To explore the role of these applications in increasing the effectiveness and efficiency of risk and disaster communications and their benefits in reducing the serious damage caused by these disasters. The study concluded a set of results; researchers emphasize the important role of smartphone applications as an integrated information guide to educate users about all types of natural disasters and risks, and as an interactive social network, that saves many lives, property, and natural resources. Moreover, the researchers concluded a proposed model that illustrates six quality standards of smartphone applications in general, and in times of emergency and natural disasters in particular in terms of operating specifications, information quality, design quality, reliability, interactive, privacy, and security.

Full Text
Paper version not known

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.