Home > Articles > Networking

The Role of Technology in Communication and News Management

New communication management technology provides the means to manage the most challenging issue or crisis situations. Gerald Baron explains how to manage information distribution, inquiry management, internal communication, user access, and other demands of the instant news world.
This chapter is from the book

The first notice came from the border patrol manager at the international boundary between the United States and Canada. The local Department of Emergency Management (DEM) was notified and the volunteer Information Officer was alerted and activated. The situation: Someone had stopped a large motor home at the border crossing and a cloud of steam or gas was escaping from the air conditioning unit on the top. When approached by agents, the driver ran off and escaped on the Canadian side. The agents on the scene suspected it was a bioterrorist attack and the gas escaping contained a toxic substance, possibly anthrax. This occurred 4 p.m. on a Saturday afternoon.

The Information Officer was home mowing his lawn when he got the call. He quickly went to his home office with his computer and broadband Internet connection. The local DEM public information site had been prepared for just such an eventuality. He opened up the "dark site" and filled out the templates for public notices and press information. The incident dark site had been prepared in advance and was available on the Internet for immediate public launch, but was not visible to anyone except the communication team.

Using the internal message center and chat room functions built into his communication management system, he confirmed some of the latest information and completed a draft of the initial statement. The ICS was just beginning to be implemented and the local police chief was serving as Incident Commander while other agencies such as the FBI and the Royal Canadian Mounted Police were notified and activated. The Incident Commander approved the draft public notice and press release and the Information Officer pushed another button, posting the approved documents to the incident site, and then clicked another button to launch it as a public site available to anyone.

He also then reviewed the contact names contained within the system. He selected all the reporters in the immediate area and some of the major media reporters in the region, then he clicked a button to send the release. He decided that this release would go out via email and telephone. The system automatically converted the text of the release to voice, and across the region reporters began to receive telephone calls with the information. At the same time, the press release popped up in their emails, and if they didn't have email, their fax machines were humming with the startling news.

The Incident Commander said he wanted all agencies involved to be kept informed of the event and the unfolding response and activities. Simultaneous with the release of the press information, the Information Officer selected prepared mailing lists of community leaders, as well as local and state government officials. They also received emails or faxes with the news, as did the local hospital, the Red Cross, the local and state health departments, and every police and fire agency in a 30-mile radius.

It was now 4:30. Reporter calls were coming in, but many of the reporters were following the advice offered on the release, indicating that the best way to submit questions would be through the media inquiry function on the public Web site. The Information Officer monitored the inquiries coming in even while he activated the JIC team of volunteer and agency information professionals. He activated them using the system to send a simultaneous email and telephone message. He monitored their involvement by seeing who had "signed in" to the password-protected intranet site that served as their common desktop. He decided given the urgency and time, it was best they operate a "virtual JIC" for a couple of hours. They would operate from their homes or offices until a command center with sufficient computer resources was established nearer to the scene. He assigned one of the JIC staffers as Assistant Information Officer External and redirected calls coming in to his busy cell phone to the new Assistant Information Officer's home phone. The assistant grabbed a couple of other JIC volunteers and assigned one to handle local media, public, and government inquiries, whereas the other was to take state, national, and international inquiries.

The inquiries coming in by phone were captured by the team entering the relevant information into the communication system. Other inquiries coming in via the public Web site would show up on the "uncompleted inquiries" list. To complete the inquiries, information responders would answer the question and click a button to automatically email them, at which point they automatically moved into the "completed" category. Inquiries were shifted among team members by another click of the button. Meanwhile, the Information Officer could observe all this activity from his home office and send messages to responders when they were getting off track or weren't using the latest approved information. Using the internal email and secured chat room to communicate among team members meant they never needed to leave their common work platform, the intranet site, and the New Message button would light up when a message was directed to them.

The Assistant Information Officer Internal was given the duty of keeping up with the rapidly unfolding events and preparing the needed updates. One person was sent to the scene to be the liaison on scene with the Unified Command. A computer was now available at the scene so he used this to keep a running update of the rapidly unfolding situation. Multitiered access levels allowed key members of the information team as well as leaders of the responding agencies to review this minute-by-minute document online, whereas others on the team, such as those responding to inquiries, were not granted access to this "raw" information to prevent inadvertent release of unconfirmed or unapproved information.

An hour into the event, the hit counter on the crisis-capable server was moving into the hundreds of thousands of hits, but it was built to withstand millions of hits so it was in no danger of crashing. Members of the public, the media, and the government who were not on the initial release list were now taking up the offer to get automatic email updates and were adding their names by the hundreds to the mailing list available on the public site. The next email update was sent to all those who had just signed up. A press conference was scheduled and all reporters, including those who had added themselves, received an email notice as well as a phone call alerting them to time and place. An additional and connected Web site was established, this one without public access. The Information Officers for the response agencies were given passwords for this private site so that their agency leaders and top U.S. and Canadian government officials could get immediate access to the most complete information before it was released to the public. This site was launched and managed by the Information Officer, still operating from the vast high-tech control room that used to be his daughter's bedroom.

Did this event happen? No, but an international bioterrorism drill playing out this scenario did happen in August 2000. Called Northern Exposure, this drill brought together more than 40 federal, state, provincial, and local agencies from the United States and Canada in a table-top exercise to prepare for just such an event. I served as the Information Officer and the technology just described was available. If the drill had not been a table-top exercise, the communication technology could have been implemented in much the same way as described.

The new media environment requires that today's executives and communicators have a different picture in their heads about communicating with the public and the many stakeholder audiences. The old picture revolves around sending out press releases by broadcast fax and holding a press conference or conducting media interviews. The new picture is more like managing a control room in a highly complex industrial facility where multiple processes are occurring at the same time and everything needs to be carefully managed and controlled. Such a complex operation cannot be managed by sending runners out to check on this unit or that operation and having them report back to the office. Complex process management, in which speed is the driving element, requires all aspects to be networked together, with monitors displaying real-time information about what is happening.

New communication management technology provides the means to manage the most challenging issue or crisis situations. Even a relatively small team can manage the quickly escalating demands of multiple audiences wanting immediate, direct, and individualized information. This technology is entirely Internet-based, providing universal access. However, it is highly secure and controlled with multiple levels of user access. The most important advantage of using the new breed of communication management technology is that it puts the full potential of the Internet as a communication tool in the hands of executives and communicators and removes control from technicians, Web programmers, and IT managers who understand technology but don't understand the communication demands of the instant news world. You might note that in the scenario just described, not a single programmer or technician was part of the information team and there were no delays or additional steps required to make use of any aspect of the Internet.

The term communication management must be distinguished from the now commonly used term content management. There is a critical difference. Content management is focused on allowing a group of users with password access to jointly manage and control content on a Web site or Web sites. Communication management incorporates the content management function but goes considerably beyond it. Content management is aimed at "pull" communications, where viewers come to your Web site when they want and view or download information that they are seeking. Communication management incorporates interactive communication and "push" communications. Interaction involves the give and take, input and response, of most human communication. Push means directing the information to specific individual users via email or other more traditional means such as fax, telephone, or mail.

The many tasks to be managed by the communication team can all be supported by currently available technology. We'll break these tasks into various elements, understanding that in an instant news event, they flow seamlessly and simultaneously together.

Information Development

If we look at the task of the communicator as getting the right information to the right people, right now, the first facet is the right information. Information development involves collecting the facts, data, comments, images, and all other elements needed, and then drafting those elements into an appropriate form such as a press release, backgrounder, fact sheet, or other type of document. Normally, the draft needs to go through a review process. The more important it is in terms of the company's or organization's reputation and credibility, the more thoroughly it will be reviewed. The editing process might put it through many hands and eyes, with a variety of people marking changes. It is not uncommon for people outside the organization such as attorneys, consultants, or communication professionals to be consulted or to actively participate in this process. Finally, it must be approved. A communication manager might have approval authority over most such documents but when the company's present and future rests on what is said, the CEO or another top executive might be the final approval authority. In a crisis situation, this is most frequently the case, and if the ICS is implemented, nothing can go out without the approval of the Unified Command.

All this can work relatively smoothly using today's common computer and Internet tools, such as word processing software and email programs. Documents are stored on network servers, outsiders participate via email, and their changes are incorporated back into the drafts on the server. The problem with the normal way is the need for speed. In a crisis situation, the normal way of doing things is almost always too slow. The instant news environment and the expectations of Internet users require a process that takes just minutes rather than days or hours. The urgency of getting it out is matched by the urgency of getting it right because no other releases or documents might be more important to the viability of the organization than the first few releases going out after a major event has occurred. Equally important is the development and distribution of information inside the organization to employees, managers, and families.

The only viable solution today is to place the process on an Internet platform. Document and information development needs to be accomplished completely on a common desktop made possible by the Internet. Team members can participate regardless of location, provided they have password access. Current technology provides for intranet sites specifically designed for this purpose. Drafters can create new documents in advanced Web editing tools that present a word-processor-like functionality. These same advanced editors provide those used to common word processing software the tools to place images, design pages, and fully control how they want the information to look.

Images and files can be uploaded for placement in documents or on a public Web site simply by browsing for the file on a desktop or network server. Each person with appropriate password access who signs into the intranet site can then see which drafts are available for editing and what changes to earlier drafts have been made by other editors. Designated "approvers" are established by the intranet site manager, and only they have the approval buttons on their screens allowing them to move the document forward, posting it to the public site or sending it for automatic distribution via email, fax, or telephone.

The very significant speed versus accuracy issue can only be effectively resolved by having a team prepared to work together instantly and providing a platform that makes that possible. Having document creation, editing, and approving set up on a universally available but highly secured intranet site is the only practical solution for this problem. It has proven its worth in numerous crisis situations, demonstrating that it is possible to resolve this difficult dilemma.

In addition to providing an Internet platform for document creation, more companies and organizations are also preparing for the demands of the instant news world by preparing incident dark sites. These are fully prepared Web sites that are not available to the public but can be made available in very short order when launched to provide the information that the public and the media are looking for about an event. These sites are exceptionally helpful in getting a headstart in providing information, and they provide an important opportunity to get ahead of the information curve.

However, most of these sites are built with common static Hypertext Markup Language (HTML) technology, which means they are dependent on technicians or programmers to keep them updated as an event unfolds. This might not be a problem for an event that has no changing information, but such events are quite unlikely. By building dark sites on a fully dynamic communication management platform, a company has a better chance of staying ahead of the curve. Drafting, editing, and approving information online is one critical element, as is the ability to instantly post existing digital documents without technical assistance. The option, of course, is to have an exceptionally efficient and responsive Web team able to keep up on a 24/7 basis for an indefinite period of time. The cost and inefficiency of this suggests that the technology platform is a more suitable solution.

InformIT Promotional Mailings & Special Offers

I would like to receive exclusive offers and hear about products from InformIT and its family of brands. I can unsubscribe at any time.

Overview


Pearson Education, Inc., 221 River Street, Hoboken, New Jersey 07030, (Pearson) presents this site to provide information about products and services that can be purchased through this site.

This privacy notice provides an overview of our commitment to privacy and describes how we collect, protect, use and share personal information collected through this site. Please note that other Pearson websites and online products and services have their own separate privacy policies.

Collection and Use of Information


To conduct business and deliver products and services, Pearson collects and uses personal information in several ways in connection with this site, including:

Questions and Inquiries

For inquiries and questions, we collect the inquiry or question, together with name, contact details (email address, phone number and mailing address) and any other additional information voluntarily submitted to us through a Contact Us form or an email. We use this information to address the inquiry and respond to the question.

Online Store

For orders and purchases placed through our online store on this site, we collect order details, name, institution name and address (if applicable), email address, phone number, shipping and billing addresses, credit/debit card information, shipping options and any instructions. We use this information to complete transactions, fulfill orders, communicate with individuals placing orders or visiting the online store, and for related purposes.

Surveys

Pearson may offer opportunities to provide feedback or participate in surveys, including surveys evaluating Pearson products, services or sites. Participation is voluntary. Pearson collects information requested in the survey questions and uses the information to evaluate, support, maintain and improve products, services or sites, develop new products and services, conduct educational research and for other purposes specified in the survey.

Contests and Drawings

Occasionally, we may sponsor a contest or drawing. Participation is optional. Pearson collects name, contact information and other information specified on the entry form for the contest or drawing to conduct the contest or drawing. Pearson may collect additional personal information from the winners of a contest or drawing in order to award the prize and for tax reporting purposes, as required by law.

Newsletters

If you have elected to receive email newsletters or promotional mailings and special offers but want to unsubscribe, simply email information@informit.com.

Service Announcements

On rare occasions it is necessary to send out a strictly service related announcement. For instance, if our service is temporarily suspended for maintenance we might send users an email. Generally, users may not opt-out of these communications, though they can deactivate their account information. However, these communications are not promotional in nature.

Customer Service

We communicate with users on a regular basis to provide requested services and in regard to issues relating to their account we reply via email or phone in accordance with the users' wishes when a user submits their information through our Contact Us form.

Other Collection and Use of Information


Application and System Logs

Pearson automatically collects log data to help ensure the delivery, availability and security of this site. Log data may include technical information about how a user or visitor connected to this site, such as browser type, type of computer/device, operating system, internet service provider and IP address. We use this information for support purposes and to monitor the health of the site, identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents and appropriately scale computing resources.

Web Analytics

Pearson may use third party web trend analytical services, including Google Analytics, to collect visitor information, such as IP addresses, browser types, referring pages, pages visited and time spent on a particular site. While these analytical services collect and report information on an anonymous basis, they may use cookies to gather web trend information. The information gathered may enable Pearson (but not the third party web trend services) to link information with application and system log data. Pearson uses this information for system administration and to identify problems, improve service, detect unauthorized access and fraudulent activity, prevent and respond to security incidents, appropriately scale computing resources and otherwise support and deliver this site and its services.

Cookies and Related Technologies

This site uses cookies and similar technologies to personalize content, measure traffic patterns, control security, track use and access of information on this site, and provide interest-based messages and advertising. Users can manage and block the use of cookies through their browser. Disabling or blocking certain cookies may limit the functionality of this site.

Do Not Track

This site currently does not respond to Do Not Track signals.

Security


Pearson uses appropriate physical, administrative and technical security measures to protect personal information from unauthorized access, use and disclosure.

Children


This site is not directed to children under the age of 13.

Marketing


Pearson may send or direct marketing communications to users, provided that

  • Pearson will not use personal information collected or processed as a K-12 school service provider for the purpose of directed or targeted advertising.
  • Such marketing is consistent with applicable law and Pearson's legal obligations.
  • Pearson will not knowingly direct or send marketing communications to an individual who has expressed a preference not to receive marketing.
  • Where required by applicable law, express or implied consent to marketing exists and has not been withdrawn.

Pearson may provide personal information to a third party service provider on a restricted basis to provide marketing solely on behalf of Pearson or an affiliate or customer for whom Pearson is a service provider. Marketing preferences may be changed at any time.

Correcting/Updating Personal Information


If a user's personally identifiable information changes (such as your postal address or email address), we provide a way to correct or update that user's personal data provided to us. This can be done on the Account page. If a user no longer desires our service and desires to delete his or her account, please contact us at customer-service@informit.com and we will process the deletion of a user's account.

Choice/Opt-out


Users can always make an informed choice as to whether they should proceed with certain services offered by InformIT. If you choose to remove yourself from our mailing list(s) simply visit the following page and uncheck any communication you no longer want to receive: www.informit.com/u.aspx.

Sale of Personal Information


Pearson does not rent or sell personal information in exchange for any payment of money.

While Pearson does not sell personal information, as defined in Nevada law, Nevada residents may email a request for no sale of their personal information to NevadaDesignatedRequest@pearson.com.

Supplemental Privacy Statement for California Residents


California residents should read our Supplemental privacy statement for California residents in conjunction with this Privacy Notice. The Supplemental privacy statement for California residents explains Pearson's commitment to comply with California law and applies to personal information of California residents collected in connection with this site and the Services.

Sharing and Disclosure


Pearson may disclose personal information, as follows:

  • As required by law.
  • With the consent of the individual (or their parent, if the individual is a minor)
  • In response to a subpoena, court order or legal process, to the extent permitted or required by law
  • To protect the security and safety of individuals, data, assets and systems, consistent with applicable law
  • In connection the sale, joint venture or other transfer of some or all of its company or assets, subject to the provisions of this Privacy Notice
  • To investigate or address actual or suspected fraud or other illegal activities
  • To exercise its legal rights, including enforcement of the Terms of Use for this site or another contract
  • To affiliated Pearson companies and other companies and organizations who perform work for Pearson and are obligated to protect the privacy of personal information consistent with this Privacy Notice
  • To a school, organization, company or government agency, where Pearson collects or processes the personal information in a school setting or on behalf of such organization, company or government agency.

Links


This web site contains links to other sites. Please be aware that we are not responsible for the privacy practices of such other sites. We encourage our users to be aware when they leave our site and to read the privacy statements of each and every web site that collects Personal Information. This privacy statement applies solely to information collected by this web site.

Requests and Contact


Please contact us about this Privacy Notice or if you have any requests or questions relating to the privacy of your personal information.

Changes to this Privacy Notice


We may revise this Privacy Notice through an updated posting. We will identify the effective date of the revision in the posting. Often, updates are made to provide greater clarity or to comply with changes in regulatory requirements. If the updates involve material changes to the collection, protection, use or disclosure of Personal Information, Pearson will provide notice of the change through a conspicuous notice on this site or other appropriate way. Continued use of the site after the effective date of a posted revision evidences acceptance. Please contact us if you have questions or concerns about the Privacy Notice or any objection to any revisions.

Last Update: November 17, 2020