Skip to content
View CrisisCore-Systems's full-sized avatar
πŸ™ƒ
πŸ™ƒ

Block or report CrisisCore-Systems

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Maximum 250 characters. Please don't include any personal information such as legal names or email addresses. Markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
CrisisCore-Systems/README.md

CrisisCore Systems

Developing Protective Computing β€” an engineering discipline for safety-critical, vulnerability-aware software.

CrisisCore Systems is the home of work on the Overton Framework and related systems, focused on designing software that remains safe, meaningful, and reversible under real-world conditions of instability, crisis, and human vulnerability.


🧠 Canonical Framework

πŸ“„ The Overton Framework (Protective Computing)

A formal architecture and theory proposing Protective Computing as a discipline.

πŸ”— Zenodo preprint (DOI): https://doi.org/10.5281/zenodo.18688516
Overton, K. (2026). The Overton Framework: Protective Computing in Conditions of Human Vulnerability (v1.3).

Published and under review at ACM Journal on Responsible Computing.


πŸ›  Reference Implementation

🩹 PainTracker

A privacy-first, offline-capable application implementing principles from Protective Computing.

πŸ”— https://github.com/CrisisCore-Systems/PainTracker


πŸ“Š Operational Evidence Companion

🧩 Implementation Companion (v0.2)

Measurement constructs for the Protective Legitimacy Score (PLS), and companion documentation for empirical evaluation.

πŸ”— https://zenodo.org/record/18688516/files/overton-framework-protective-computing-companion-v0.2.pdf


πŸš€ Projects & Contribution

Project Purpose Status
PainTracker Reference example implementation 🟒 Active
Protective Controls Checklist Engineering checklist βš™οΈ In progress
PLS Measurement Suite Metrics & quantification πŸ“Š In planning

Contributions are welcome. Please open issues or PRs aligned with Protective Computing principles and reference the overall framework.


🧭 Positioning

Protective Computing applies when:

  • Connectivity cannot be assumed
  • Users are under stress or crisis
  • Safety and autonomy matter
  • Exposure must be minimized

It prioritizes: βœ” Local authority
βœ” Minimal unnecessary exposure
βœ” Reversibility
βœ” Cognitive load preservation
βœ” Coercion resistance


πŸ“« Connect & Cite


πŸ“ Licensing

  • Framework documentation: CC-BY-4.0
  • Code: MIT / permissive

Popular repositories Loading

  1. pain-tracker pain-tracker Public

    Bridge the gap between patient experience and clinical understanding through comprehensive, secure, and accessible pain tracking technology. A privacy-first, offline-capable PWA for chronic pain ma…

    TypeScript 3

  2. neural-entrainment-system neural-entrainment-system Public

    TypeScript 1

  3. CompressKit CompressKit Public

    Advanced PDF compression toolkit for Termux environments

    Shell

  4. template-store-pro template-store-pro Public

    Python

  5. Image-processor Image-processor Public

    Python

  6. temporal-photo-organizer temporal-photo-organizer Public