toggle visibility Search & Display Options

Select All    Deselect All
 |   | 
Details
   print
  Records Links
Author (up) Aarland, M.; Radianti, J.; Gjøsæter, T. pdf  doi
isbn  openurl
  Title Using System Dynamics to Simulate Trust in Digital Supply Chains Type Conference Article
  Year 2023 Publication Proceedings of the 20th International ISCRAM Conference Abbreviated Journal Iscram 2023  
  Volume Issue Pages 516-529  
  Keywords System Dynamics; Critical Infrastructure; Digital Supply Chain; Cybersecurity, Trust  
  Abstract The power industry is outsourcing and digitalising their services to provide better, faster, and more reliable supply of electric power to the society. As a result, critical infrastructure increases in complexity and tight couplings between multiple suppliers and systems in digital supply chains. It also introduces new risks and challenges that are difficult to manage for critical infrastructure owners. To address the vulnerability in digital supply chains, we have developed a system dynamics model that represent important challenges to manage cybersecurity in digital supply chains, based on input from an expert group in the power industry. The system dynamics model illustrates how trust in suppliers as well as the need for control play important roles in outsourcing. Scenarios were developed and simulated.  
  Address Center for Integrated Emergency Research, University of Agder  
  Corporate Author Thesis  
  Publisher University of Nebraska at Omaha Place of Publication Omaha, USA Editor Jaziar Radianti; Ioannis Dokas; Nicolas Lalone; Deepak Khazanchi  
  Language English Summary Language Original Title  
  Series Editor Hosssein Baharmand Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition 1  
  ISSN 2411-3387 ISBN 979-8-218-21749-5 Medium  
  Track Analytic Modeling and Simulation Expedition Conference  
  Notes http://dx.doi.org/10.59297/CAGD9224 Approved no  
  Call Number ISCRAM @ idladmin @ Serial 2544  
Share this record to Facebook
 

 
Author (up) Alena L. Benson; Keith Biggers; Jim Wall; Mark P. Haselkorn pdf  openurl
  Title Adaptive development of a common operating environment for crisis response and management Type Conference Article
  Year 2010 Publication ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings Abbreviated Journal ISCRAM 2010  
  Volume Issue Pages  
  Keywords Information services; Information systems; Interoperability; Network security; Service oriented architecture (SOA); Collaborative decision making; Common operating environments; Information environment; Situational awareness; System development; Response time (computer systems)  
  Abstract Complex information and communication systems present a special challenge to system designers because these are generally deployed as large, distributed systems with diverse user groups. Crisis response and management organizations in particular expect systems to be interoperable, resilient, flexible and provide lasting benefit. Currently, systems such as Virtual USA (Department of Homeland Security) and WatchKeeper (United States Coast Guard) seek to create common situational awareness for all participating agencies in security and incident response operations. We propose adaptive development as a system development model to build upon the ideas of systems such as Virtual USA and WatchKeeper in order to create sustainable and adaptable systems. Adaptive development supports ongoing improvement through user-driven design and modification in the target environment. An internet-based dashboard demonstrated during a United States Coast Guard Sector Seattle incident response exercise serves as an emergent case study for the adaptive model.  
  Address University of Washington, United States; Texas AandM University, United States  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Seattle, WA Editor S. French, B. Tomaszewski, C. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN Medium  
  Track Special Session: Puget Sound Regional Initiatives towards a Common Operating Environment Expedition Conference 7th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 305  
Share this record to Facebook
 

 
Author (up) Alexandre Ahmad; Olivier Balet; Arjen Boin; Julien Castet; Maureen Donnelley; Fabio Ganovelli; George Kokkinis; Giovanni Pintore pdf  isbn
openurl 
  Title Assessing the Security of Buildings: A Virtual Studio Solution Type Conference Article
  Year 2016 Publication ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2016  
  Volume Issue Pages  
  Keywords 3D Representation of Buildings; Security Assessment; Indoor Reconstruction; Collaborative Environment; Mission Planning  
  Abstract This paper presents an innovative IT solution, a virtual studio, enabling security professionals to formulate, test and adjust security measures to enhance the security of critical buildings. The concept is to virtualize the environment, enabling experts to examine and assess and improve on a building?s security in a cost-effective and risk-free way. Our virtual studio solution makes use of the latest advances in computer graphics to reconstruct accurate blueprints as well as 3D representations of entire buildings in a very short timeframe. In addition, our solution enables the creation and simulation of multiple threat situations, allowing users to assess security procedures and various responses. Furthermore, we present a novel device, tailored to support collaborative security planning needs. Security experts from various disciplines evaluated our virtual studio solution, and their analysis is presented in this paper.  
  Address  
  Corporate Author Thesis  
  Publisher Federal University of Rio de Janeiro Place of Publication Rio de Janeiro, Brasil Editor A. Tapia; P. Antunes; V.A. Bañuls; K. Moore; J. Porto  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3408 ISBN 978-84-608-7984-29 Medium  
  Track Planning, Foresight and Risk Analysis Expedition Conference 13th International Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 1348  
Share this record to Facebook
 

 
Author (up) Ana Rodríguez-Hoyos; José Estrada-Jiménez; David Rebollo-Monedero; Jordi Forné; Rubén Trapero Burgos; Antonio Álvarez Romero; Rodrigo Diaz Rodríguez pdf  isbn
openurl 
  Title Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach Type Conference Article
  Year 2019 Publication Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management Abbreviated Journal Iscram 2019  
  Volume Issue Pages  
  Keywords privacy, critical infrastructures, data anonymization, CIPSEC, security logs  
  Abstract Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern

computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold.

To improve these capabilities, logs are usually shared with external entities. However, since cybersecurity logs

might contain sensitive data, serious privacy concerns arise, even more when critical infrastructures (CI), handling

strategic data, are involved.

We propose a tool to protect privacy by anonymizing sensitive data included in cybersecurity logs. We implement

anonymization mechanisms grouped through the definition of a privacy policy. We adapt said approach to the

context of the EU project CIPSEC that builds a unified security framework to orchestrate security products, thus

offering better protection to a group of CIs. Since this framework collects and processes security-related data from

multiple devices of CIs, our work is devoted to protecting privacy by integrating our anonymization approach.
 
  Address Universitat Politécnica de Catalunya (UPC), Barcelona, España;Escuela Politécnica Nacional (EPN), Quito, Ecuador;ATOS, Madrid, España  
  Corporate Author Thesis  
  Publisher Iscram Place of Publication Valencia, Spain Editor Franco, Z.; González, J.J.; Canós, J.H.  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 978-84-09-10498-7 Medium  
  Track T13 - Privacy Risk Management in Critical Infrastructures Expedition Conference 16th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2019)  
  Notes Approved no  
  Call Number Serial 1934  
Share this record to Facebook
 

 
Author (up) Annie Searle pdf  openurl
  Title A seat at the table for operational risk Type Conference Article
  Year 2010 Publication ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings Abbreviated Journal ISCRAM 2010  
  Volume Issue Pages  
  Keywords Information systems; Pattern recognition; Security of data; Aggregate risk; Business continuity; Crisis management; Disaster recovery projects; Executive decisions; Operational risks; Risk assessment  
  Abstract What role should operational risk leaders have in the executive suite? This paper argues that, when nervous CEOs ask “What can go wrong? How can we get ahead of the curve?”, they should look to their operational risk leaders. Those leaders oversee corporate and information security as well as business continuity, crisis management and disaster recovery programs inside companies. That makes them ideally qualified to take the process of crisis management, including analysis of aggregate risk across all silos – To the CEO and then into the boardroom when the need arises, before the corporate crisis is full-blown.  
  Address ASA Risk Consultants, United States  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Seattle, WA Editor S. French, B. Tomaszewski, C. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN Medium  
  Track Planning, Foresight and/or Risk Analysis Expedition Conference 7th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 929  
Share this record to Facebook
 

 
Author (up) Anthony C. Robinson; Robert E. Roth; Alan M. MacEachren pdf  openurl
  Title Challenges for map symbol standardization in crisis management Type Conference Article
  Year 2010 Publication ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings Abbreviated Journal ISCRAM 2010  
  Volume Issue Pages  
  Keywords Disasters; Information systems; Interoperability; Map symbols; Mapping; National security; Risk management; Security systems; Crisis management; Department of Homeland Security; Emergency management; Emergency situation; Geo-spatial informations; Home land security; Key Issues; Symbology; Standardization  
  Abstract A wide range of local, regional, and federal authorities will generate maps to help respond to and recover from a disaster. It is essential that map users in an emergency situation can readily understand what they are seeing on these maps. Standardizing map symbology is one mechanism for ensuring that geospatial information is interpretable during an emergency situation, but creating an effective map symbol standard is a complex and evolving task. Here we present preliminary results from research into the application of the ANSI 415-2006 INCITS Homeland Security Map Symbol Standard, a point symbol standard intended to support emergency management mapping for the U.S. Department of Homeland Security. This standard has so far not been widely adopted across the full range of DHS missions, and we elaborate on key issues and challenges that should be accounted for when developing future map symbol standards for crisis management.  
  Address Department of Geography, GeoVISTA Center, Pennsylvania State University, United States  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Seattle, WA Editor S. French, B. Tomaszewski, C. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN Medium  
  Track Geo-Information Support Expedition Conference 7th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 882  
Share this record to Facebook
 

 
Author (up) Arthur H. Hendela; Murray Turoff; Starr Roxanne Hiltz pdf  openurl
  Title Cross impact security analysis using the HACKING Game Type Conference Article
  Year 2010 Publication ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings Abbreviated Journal ISCRAM 2010  
  Volume Issue Pages  
  Keywords Crime; Information systems; Models; Personnel training; Collaborative model; Cross-impact analysis; Gaming; Government organizations; Mathematical basis; Natural and man-made disasters; Planning tools; Security expenditures; Personal computing  
  Abstract Security of network assets is a high priority with little traditional return on investment. Increasingly, cyber attacks are being used by both terrorist and unfriendly government organizations. The HACKING Game, a Cross Impact Analysis planning tool, can be used to plan security resource allocation in computer networks. Cross Impact Analysis provides a mathematical basis to determine the interrelationships of one event with a set of other events. Output from the HACKING Game's Cross Impact Analysis model can be used to help justify security expenditures, with an added benefit of being a training tool for employees learning to protect networks. This paper presents details of the Hacking Game's design and its capabilities. Cross impact modeling can be used to develop games for any situation characterized by a set of offense and defense events to produce an individual or collaborative model for such things as natural and man-made disasters.  
  Address New Jersey Institute of Technology, United States  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Seattle, WA Editor S. French, B. Tomaszewski, C. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN Medium  
  Track Planning, Foresight and/or Risk Analysis Expedition Conference 7th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 569  
Share this record to Facebook
 

 
Author (up) Asa Weinholt; Tobias Andersson Granberg pdf  isbn
openurl 
  Title Evaluation of enhanced collaboration between fire and rescue services and security officers Type Conference Article
  Year 2013 Publication ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2013  
  Volume Issue Pages 735-740  
  Keywords Cost benefit analysis; Information systems; Cost effective; Crisis management; Emergency response; Fire and rescue services; Interview study; New actors; Security officers; Semi structured interviews; Emergency services  
  Abstract The hypothesis of this study is that collaboration between fire and rescue services and new actors, with basic rescue skills, might be a cost effective way to improve emergency response. Interview studies of collaborations between fire and rescue services and security officers in three Swedish municipalities are presented. Seven semi-structured interviews are conducted with representatives from the security officer companies, the fire and rescue services and security managers at the municipalities. The method used to evaluate the collaborations quantitatively is Cost-benefit analysis. The collaborations have positive economic effects for society that most likely outweighs the costs. There also exist several external effects that are not possible to value monetarily, but that represent positive values for society. The results and their generalizability are discussed, as well as the possibility for these new collaborations to improve crisis management.  
  Address Div. Communication and Transport Systems, ITN. Linkoping University, Sweden  
  Corporate Author Thesis  
  Publisher Karlsruher Institut fur Technologie Place of Publication KIT; Baden-Baden Editor T. Comes, F. Fiedrich, S. Fortier, J. Geldermann and T. Müller  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9783923704804 Medium  
  Track Planning and Foresight Expedition Conference 10th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 1074  
Share this record to Facebook
 

 
Author (up) Bartel A. Van De Walle; Ronald Spanjers; Dirk De Wit pdf  isbn
openurl 
  Title Stakeholder perceptions and standards for information security risks : A case study at a dutch health care organization Type Conference Article
  Year 2006 Publication Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2006  
  Volume Issue Pages 513-527  
  Keywords Health care; Information systems; Security of data; Healthcare organizations; Information security risks; Nen 7510; Patient information; Personal health record; Stakeholder groups; Stakeholder perception; Stakeholders analysis; Risk perception  
  Abstract With the increased use of electronic patient files in Health Care Organizations (HCOs), addressing the risks related to the storage and use of patient information has become increasingly important to avoid intentional or unintentional disclosure, damage to or abuse of patients' personal health records. This has lead governments from various countries to introduce and impose information security standards for HCOs. The Dutch government introduced the NEN 7510 national information security standard; a standard derived from the international ISO 17799 norm. Preceding the implementation phase of NEN 7510 standard at a Dutch HCO, we conducted a field study to identify the information security risks as perceived by the main stakeholder groups in the HCO. We present the differences in the perceived information security risks and threats by end users, management and suppliers, and the degree to which these identified risks will be addressed by the implementation of the NEN 7510 standard.  
  Address Tilburg University, Netherlands  
  Corporate Author Thesis  
  Publisher Royal Flemish Academy of Belgium Place of Publication Newark, NJ Editor B. Van de Walle, M. Turoff  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9090206019; 9789090206011 Medium  
  Track STAKEHOLDER COORDINATION FOR CRISIS MANAGEMENT Expedition Conference 3rd International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 1039  
Share this record to Facebook
 

 
Author (up) Chiara Bassetti; Roberta Ferrario; Maria Luiza M. Campos pdf  isbn
openurl 
  Title Airport security checkpoints: an empirically-grounded ontological model for supporting collaborative work practices in safety critical environments Type Conference Article
  Year 2015 Publication ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2015  
  Volume Issue Pages  
  Keywords Airport security; collaboration model; ethnography; Ontology; work practices  
  Abstract Resulting from an interdisciplinary endeavor, the paper proposes an ontological model for supporting collaborative work practices in critical settings, and shows its application to a specific domain. The model is empirically-grounded, as based on ethnographic research carried out at an international airport ?clearly an example of safety-critical environment, where emergency prevention and preparedness are crucial. On the other hand, the model leverages on previous ontological work on collaboration and observation in emergency response, and revises it when necessary, thus contributing to its development. Taking hand-baggage screening as an example, the paper shows how the model can be applied, and how it could be used to run model-based simulation in order to better understand collaborative work practices and analyze the impact of different techno-organizational changes on such practices and their effectiveness. This could result in suggesting guidelines for enhancing workflow, security policies and, more generally, time- and safety-critical situations management.  
  Address  
  Corporate Author Thesis  
  Publisher University of Agder (UiA) Place of Publication Kristiansand, Norway Editor L. Palen; M. Buscher; T. Comes; A. Hughes  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9788271177881 Medium  
  Track Understanding Collaborative Work Practices Expedition Conference ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management  
  Notes Approved yes  
  Call Number Serial 1258  
Share this record to Facebook
 

 
Author (up) Daniel Lichte; Dustin Witte; Kai-Dietrich Wolf pdf  isbn
openurl 
  Title Comprehensive Security Hazard Analysis for Transmission Systems Type Conference Article
  Year 2020 Publication ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal Iscram 2020  
  Volume Issue Pages 1145-1153  
  Keywords Physical Security; Energy Transmission Systems; Scenario Analysis; Threat Analysis; Risk Assessment  
  Abstract Critical energy infrastructures are more and more focused upon by politics and society. Modern society depends on these structures, since they enable the steady support of electricity and other types of energy. Deliberately precipitated hazards of certain critical parts of electrical transmission systems (ETS) can lead to catastrophic consequences. Therefore, the analysis of feasible security hazards and resulting consequences for the operation of transmission systems are a concern to transmission system operators (TSO). Alas, there is no common method available that comprehensively identifies these feasible security related scenarios and classifies them according to their overall criticality for the safe operation of the ETS. To tackle this challenge, we propose a comprehensive, yet easy-to-apply method to systematically identify and assess the criticality of security threat scenarios. It is conducted in four steps and consists of a matrix based consistency check of threat scenarios in a defined solution space and a convenient semi-quantitative assessment of a risk factor for the ETS. The approach is illustrated by the simplified generic example of an EETS.  
  Address German Aerospace Center; University of Wuppertal; University of Wuppertal  
  Corporate Author Thesis  
  Publisher Virginia Tech Place of Publication Blacksburg, VA (USA) Editor Amanda Hughes; Fiona McNeill; Christopher W. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 978-1-949373-27-104 ISBN 2411-3490 Medium  
  Track Open Track Expedition Conference 17th International Conference on Information Systems for Crisis Response and Management  
  Notes daniel.lichte@dlr.de Approved no  
  Call Number Serial 2305  
Share this record to Facebook
 

 
Author (up) Douglas A. Samuelson; Matthew Parker; Austin Zimmerman; Loren Miller; Stephen Guerin; Joshua Thorp; Owen Densmore pdf  isbn
openurl 
  Title Agent-based simulations of mass egress after Improvised Explosive Device attacks Type Conference Article
  Year 2008 Publication Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2008  
  Volume Issue Pages 59-70  
  Keywords Computer simulation; Recreation centers; Stadiums; Subway stations; Agent based simulation; Department of Homeland Security; Emergency preparedness; Event management; Improvised explosive devices; Mass egress; Real-time information systems; Science and Technology; Information systems  
  Abstract For the Science and Technology Directorate (S&T) of the U. S. Department of Homeland Security, we developed agent-based computer simulation models of mass egress from a stadium and a subway station following one or more attacks with Improvised Explosive Devices (IEDs.) Anti-IED countermeasures we modeled included improved guidance to exits, baffles to absorb shock and shrapnel, and, for the stadium, egress onto the playing field. We found improved real-time information systems that provide better guidance to exits would substantially expedite egress and could reduce secondary (trampling and crush) casualties. Our results indicate that models like these can be useful aids to selecting countermeasures, and for training, preparation and exercises. We also discuss the unusual problems such models pose for real-time event management and for validation and evaluation.  
  Address Serco, United Kingdom; ANSER, United Kingdom; Homeland Security Institute, United States; Redfish Group, United Kingdom  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Washington, DC Editor F. Fiedrich, B. Van de Walle  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9780615206974 Medium  
  Track Virtual Systems for Emergency Management Simulation & Training Expedition Conference 5th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 908  
Share this record to Facebook
 

 
Author (up) Duco N. Ferro; Jeroen M. Valk; Alfons H. Salden pdf  isbn
openurl 
  Title A robust coalition formation framework for mobile surveillance incident management Type Conference Article
  Year 2007 Publication Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers Abbreviated Journal ISCRAM 2007  
  Volume Issue Pages 479-488  
  Keywords Artificial intelligence; Decision support systems; Knowledge management; Robustness (control systems); Security systems; Coalition formations; Coordination; Incident Management; Mobile surveillance; Reconfiguration; Scale-space; Network security  
  Abstract Given unexpected incidents on routes of guards that check security objects, like banks, one of the most challenging problems is still how to support improvisation by security personnel in taking decisions to prevent or resolve such incidents. Another as important associated problem is how a security company can naturally take advantage of its existing and novel knowledge about its organizational and ICT infrastructures, and the introduction of a decision support system to help leverage of improvisation by humans. To tackle all this, on the one hand we present a dynamic coalition formation framework that allows the (re)configurations of agents that are associated with joint tasks in situational contexts to be evaluated by appropriate value functions. On the other hand, we present a dynamic scale-space paradigm that allows a security company to distill ranked lists of robust context-dependent reconfigurations at critical scales. We highlight the merits of ASK-ASSIST as a solution to the problem of supporting human improvisation.  
  Address Almende B. V., Netherlands  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Delft Editor B. Van de Walle, P. Burghardt, K. Nieuwenhuis  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9789054874171; 9789090218717 Medium  
  Track IMPR Expedition Conference 4th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 489  
Share this record to Facebook
 

 
Author (up) Edward J. Glantz; Frank E. Ritter pdf  openurl
  Title Integrative Risk Identification Approach for Mass-Gathering Security Type Conference Article
  Year 2017 Publication Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management Abbreviated Journal Iscram 2017  
  Volume Issue Pages 363-373  
  Keywords risk identification; risk management; resilience; agility; crisis; stadium security; mass-gathering security  
  Abstract Effective risk management begins with successful risk identification. Unfortunately, traditional approaches may lead to haphazard and incomplete results. To overcome this, we present a new integrative approach to improve risk identification that sequentially investigates protector-views and narrow scopes using literature review, ethnography, and subject matter expertise. This paper illustrates this approach by identifying man-made and natural threats to mass-gathering events in general, and stadium security as an example. Improving risk identification enhances resilience to known risks by enabling planning and development of targeted response strategies. Working from a more complete portfolio of risk resilience strategies may also improve flexibility and agility to respond to new and emerging risks.  
  Address The Pennsylvania State University  
  Corporate Author Thesis  
  Publisher Iscram Place of Publication Albi, France Editor Tina Comes, F.B., Chihab Hanachi, Matthieu Lauras, Aurélie Montarnal, eds  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN Medium  
  Track Planning, Foresight and Risk analysis Expedition Conference 14th International Conference on Information Systems for Crisis Response And Management  
  Notes Approved no  
  Call Number Serial 2025  
Share this record to Facebook
 

 
Author (up) Elizabeth Avery Gomez; Katia Passerini; Karen Hare pdf  isbn
openurl 
  Title Public health crisis management: Community level roles and communication options Type Conference Article
  Year 2006 Publication Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2006  
  Volume Issue Pages 435-443  
  Keywords Bioterrorism; Information systems; Information use; National security; Security systems; Telecommunication equipment; Community informatics; Crisis management; Epidemics; Gap analysis; Home land security; Media richness; Mobile Technology; Public health  
  Abstract Crisis management efforts in the United States public health sector aim to prepare and protect the life of an individual, family or group against a health-related event. These efforts span governmental, nongovernmental and private sectors. The need for coordination between these organizations has never been more apparent. A solution will depend heavily on standardized communication protocols using information and communication technology (ICT). Numerous initiatives are currently addressing the needs of our nation with respect to homeland security and public health, yet remain in the early stages for the nongovernmental sector. The emphasis of our research is at the local level where the governmental sector extends to the nongovernmental sector (NGO), particularly community outreach. Our analysis of the local community suggests focusing on the management of communication during public health crises to better understand the complexities and variations presented in these communities. Leveraging experiences from media-technology literature findings and emergency-response efforts, we seek to identify a framework and tools to enable effective communication for those public health practitioners who serve as front-line responders to public health crises. The major contributions of this research will be to extend the use of information systems and mobile technology to the local United States public health communities to increase effective communication between organizations, while providing a state of readiness for homeland security related events.  
  Address New Jersey Institute of Technology, United States  
  Corporate Author Thesis  
  Publisher Royal Flemish Academy of Belgium Place of Publication Newark, NJ Editor B. Van de Walle, M. Turoff  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9090206019; 9789090206011 Medium  
  Track COMMUNITIES IN EMERGENCY MANAGEMENT Expedition Conference 3rd International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 531  
Share this record to Facebook
 

 
Author (up) Elizabeth Losh pdf  isbn
openurl 
  Title The birth of the Virtual Clinic: Game spaces in the Virtual Practicum and the Virtual Terrorism Response Academy Type Conference Article
  Year 2007 Publication Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers Abbreviated Journal ISCRAM 2007  
  Volume Issue Pages 551-556  
  Keywords Computer games; Education; Multimedia systems; Department of Homeland Security; Digital experience; First responders; Game technologies; Interactive media; Multimedia programs; Public health preparedness; Risk communication; Terrorism  
  Abstract The Interactive Media Laboratory at Dartmouth Medical School produces computer games and multimedia programs for public health preparedness. With Department of Homeland Security funding, the IML is developing the Virtual Terrorism Response Academy, which uses game technology to prepare first responders for rescue efforts in which hazardous materials may be involved. This paper looks at the history of the “Virtual Clinic” concept and the original rationale for creating what Max Boisot calls “epistemology space.” It also offers an account of the VRTA designers' responses to potential criticism from learning specialists in game studies who object that the game is too didactic and discourages trial-and-error by restraining the learner in the narrative conceit of a “simulation of a simulation.”.  
  Address University of California, Irvine, United States  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Delft Editor B. Van de Walle, P. Burghardt, K. Nieuwenhuis  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9789054874171; 9789090218717 Medium  
  Track GAME Expedition Conference 4th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 724  
Share this record to Facebook
 

 
Author (up) Emir Dervisevic; Miralem Mehic pdf  openurl
  Title Overview of Quantum Key Distribution Technique within IPsec Architecture Type Conference Article
  Year 2021 Publication ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal Iscram 2021  
  Volume Issue Pages 391-403  
  Keywords Quantum key distribution (QKD), Internet Protocol security (IPsec), Internet Key Exchange (IKE)  
  Abstract Quantum key distribution (QKD) is a method for secret key distribution which is secure against any future computational threat. In this paper we give an overview of existing solutions that integrate QKD method within the most popular architecture for establishing secure communication in modern IP (Internet Protocol) networks – IPsec (Internet Protocol security). The provided overview can be used to further design the integration of QKD within IPsec architecture striving for a standardized solution.  
  Address University of Sarajevo; University of Sarajevo  
  Corporate Author Thesis  
  Publisher Virginia Tech Place of Publication Blacksburg, VA (USA) Editor Anouck Adrot; Rob Grace; Kathleen Moore; Christopher W. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 978-1-949373-61-5 ISBN Medium  
  Track Enhancing Protection of Critical Infrastructures Expedition Conference 18th International Conference on Information Systems for Crisis Response and Management  
  Notes edervisevi1@etf.unsa.ba Approved no  
  Call Number ISCRAM @ idladmin @ Serial 2341  
Share this record to Facebook
 

 
Author (up) Erman Coskun; Jessica Hoey pdf  isbn
openurl 
  Title Airport security complexity: Problems with the information system components Type Conference Article
  Year 2005 Publication Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2005  
  Volume Issue Pages 61-66  
  Keywords Information systems; Security systems; Complexity; Implementation process; Safety critical systems; September 11; Airport security  
  Abstract Airport security is a very relevant, diverse, and complex system in any country. September 11th made this issue an increasing concern for almost every country in the world. Prior to September 11th the media, watchdog groups, and commissions established by the United States Congress, were adamant that airport security had major flaws. Currently many countries are revamping their airport security systems. The U.S. and other governments are implementing many new systems and procedures. There are numerous potential pitfalls with this implementation process and these new systems will have impacts on the public. For example, these systems could reduce freedom, still be flawed, and affect the economy. The primary intents of this paper are to classify airport security as a complex large-scale safety-critical system, to discuss what make airports so complex, describe the information systems that are involved with such systems, and discuss the impacts on the people involved.  
  Address Sakarya University Business Department, Sakarya, Turkey; LeMoyne College Business Department, Syracuse, NY, United States  
  Corporate Author Thesis  
  Publisher Royal Flemish Academy of Belgium Place of Publication Brussels Editor B. Van de Walle, B. Carle  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9076971099 Medium  
  Track COMPLEXITY and INTEROPERABILITY Expedition Conference 2nd International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 416  
Share this record to Facebook
 

 
Author (up) Florian Brauner; Julia Maertens; Holger Bracker; Ompe Aimé Mudimu; Alex Lechleuthner pdf  isbn
openurl 
  Title Determination of the effectiveness of security measures for low probability but high consequence events: A comparison of multi-agent-simulation & process modelling by experts Type Conference Volume
  Year 2015 Publication ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2015  
  Volume Issue Pages  
  Keywords Decision Support; Efficient Strategy Planning; Modelling and Simulation; Multi-Agent-Simulation; Prioritizing security measures; Scenario-based Risk Assessment Method  
  Abstract Due to the increasing danger of terrorist attacks, it is necessary to determine the preventive effects of security measures installed in e.g. public transportation systems. Since, there is no common practice to determine the preventive effects; we developed two different methodologies to analyse those effects, both are suitable for the assessment of security measures. The first method is a semi-quantitative method based on expert-estimations combined with a modelled process of an attack.The second method models the scenarios using a multi-agent-based simulation framework. Simulating a large number of runs, it is possible to derive values for indicators of interest on statistical basis. We show the suitability of both methods by applying them on a practical example of a public transportation system. In this paper we introduce both methodologies, show an exemplary application and present the strengths and weaknesses and how they can be linked to get an increased benefit.  
  Address  
  Corporate Author Thesis  
  Publisher University of Agder (UiA) Place of Publication Kristiansand, Norway Editor L. Palen; M. Buscher; T. Comes; A. Hughes  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9788271177881 Medium  
  Track Planning, Foresight and Risk Analysis Expedition Conference ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management  
  Notes Approved yes  
  Call Number Serial 1322  
Share this record to Facebook
 

 
Author (up) Gabriel Bartl; Lars Gerhold; Matthias Wählisch pdf  isbn
openurl 
  Title Towards a theoretical framework of acceptance for surveillance systems at airports Type Conference Article
  Year 2014 Publication ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2014  
  Volume Issue Pages 299-303  
  Keywords Information systems; Acceptability; Acceptance; In contexts; Public infrastructures; Surveillance systems; Security systems  
  Abstract In this paper we illustrate (a) the background and goals of the interdisciplinary research project SAFEST and (b) first insights from the socio-scientific part within the project. Technical systems are often established without considering explicitly ethical, legal, and social implications. This frequently leads to a lack of acceptance. This paper aims at compiling an analytical scheme that tries to demonstrate the relevance of the social context for the emergence of different modes of acceptance in reference to surveillance systems at airports. It is intended to guide the technical experts to deal with and reflect acceptance issues in the process of technical development.  
  Address Freie Universität Berlin, Germany  
  Corporate Author Thesis  
  Publisher The Pennsylvania State University Place of Publication University Park, PA Editor S.R. Hiltz, M.S. Pfaff, L. Plotnick, and P.C. Shih.  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9780692211946 Medium  
  Track Ethical, Legal and Social Issues of IT Supported Emergency Response Expedition Conference 11th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 293  
Share this record to Facebook
 

 
Author (up) Harrasi, A.A.; Grispos, G.; Gandhi, R. pdf  doi
openurl 
  Title Using Cybersecurity Testbeds to Evaluate (In)Secure Structural Health Monitoring Systems Type Conference Article
  Year 2023 Publication Proceedings of the 20th International ISCRAM Conference Abbreviated Journal Iscram 2023  
  Volume Issue Pages 902-908  
  Keywords Cybersecurity; Structural Health Monitoring Systems; Incident Response; Testbed  
  Abstract An increasing amount of technology is being integrated into bridges and other structures, such as dams and buildings, to proactively look for signs of deterioration or damage. These technologies are collectively known as structural health monitoring systems. While the benefits of integrating this technology are attractive, this integration is also creating an environment that is conducive to security vulnerabilities. While previous research has focused on the broader cybersecurity challenges associated with structural health monitoring systems, limited guidance is available for identifying specific security vulnerabilities in these systems and their implications for responding to security incidents. Hence, this paper presents CYBRBridge, a cybersecurity testbed that provides a sacrificial environment to assist in identifying and exploring vulnerabilities associated with structural health monitoring systems. This paper reports ongoing research efforts to develop the CYBRBridge testbed and initial results identifying vulnerabilities within the wireless components of a commercial structural health monitoring system  
  Address University of Nebraska at Omaha; University of Nebraska at Omaha; University of Nebraska at Omaha  
  Corporate Author Thesis  
  Publisher University of Nebraska at Omaha Place of Publication Omaha, USA Editor Jaziar Radianti; Ioannis Dokas; Nicolas Lalone; Deepak Khazanchi  
  Language English Summary Language Original Title  
  Series Editor Hosssein Baharmand Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition 1  
  ISSN ISBN Medium  
  Track Cybersecurity and Emergency Management Expedition Conference  
  Notes http://dx.doi.org/10.59297/CPXU9228 Approved no  
  Call Number ISCRAM @ idladmin @ Serial 2574  
Share this record to Facebook
 

 
Author (up) Hayley Watson; Lemi Baruh; Rachel L. Finn; Salvatore Scifo pdf  isbn
openurl 
  Title Citizen (in)security?: Social media, citizen journalism and crisis response Type Conference Article
  Year 2014 Publication ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2014  
  Volume Issue Pages 294-298  
  Keywords Information dissemination; Information systems; Philosophical aspects; Citizen journalism; Crisis response; Ethics; Security; Social media; Information filtering  
  Abstract The use of social media in a crisis has been applauded, and is witnessing an increase in uptake among those involved in crisis management activities, including citizens. Whilst some challenges have been discussed elsewhere, somewhat lacking is a discussion on the impact of sharing information on the security of those that may have been recorded. Accordingly, this working paper aims to provide preliminary results of an initial mapping task that seeks to examine the impact of the use of social media in a crisis on the social and ethical wellbeing of the security of the citizen. Authors argue that the heightened involvement of citizen journalism results in the filtering of information after its online publication which raises concerns relating to the dissemination of false information and a threat to an individual's privacy. Such issues should be adequately addressed in the encouragement and use of citizen contributions in crisis response.  
  Address Trilateral Research and Consulting, Turkey; Koç University, Turkey; Maltepe University, Turkey  
  Corporate Author Thesis  
  Publisher The Pennsylvania State University Place of Publication University Park, PA Editor S.R. Hiltz, M.S. Pfaff, L. Plotnick, and P.C. Shih.  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9780692211946 Medium  
  Track Ethical, Legal and Social Issues of IT Supported Emergency Response Expedition Conference 11th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 1071  
Share this record to Facebook
 

 
Author (up) Ivar Svare Holand; Peter Mozelius; Trond Olav Skevik pdf  openurl
  Title A structured and dynamic model for emergency management exercises Type Conference Article
  Year 2021 Publication ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal Iscram 2021  
  Volume Issue Pages 186-197  
  Keywords Emergency exercises, Vulnerability assessment, Non-linear emergency exercise model, Norwegian-Swedish cross-border collaboration, Gaining Security Symbiosis (GSS) projects  
  Abstract Emergencies are management challenges, and emergency exercises that involve multiple collaborating parties is a means towards mastering them. Such exercises are often conducted in a virtual training environment based on complex disaster scenarios. The reported study was carried out using a requirement-focused design approach. The aim was to describe and discuss a relevant design for lean, dynamic, and cost-efficient emergency management exercise systems. Data were gathered from a literature study and analyses of earlier emergency management projects in which the authors had participated. Despite the complexity of many current emergency management exercises, the scenarios usually involve only the response phases and have a linear structure that hinders both didactic aspects and the software structure. The conclusion drawn from the study is that an emergency management exercise model should focus on managing the activities that correspond to alternatives that unfold from a dynamic scenario. Finally, the authors recommend the principles of alternate reality games as a way towards more dynamic and cost-efficient emergency exercise systems.  
  Address Nord University; Mid Sweden University; Nord University  
  Corporate Author Thesis  
  Publisher Virginia Tech Place of Publication Blacksburg, VA (USA) Editor Anouck Adrot; Rob Grace; Kathleen Moore; Christopher W. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 978-1-949373-61-5 ISBN Medium  
  Track Analytical Modeling and Simulation Expedition Conference 18th International Conference on Information Systems for Crisis Response and Management  
  Notes ivar.s.holand@nord.no Approved no  
  Call Number ISCRAM @ idladmin @ Serial 2324  
Share this record to Facebook
 

 
Author (up) Janine S. Hiller; Roberta S. Russell pdf  isbn
openurl 
  Title Modalities for Cyber Security and Privacy Resilience: The NIST Approach Type Conference Article
  Year 2015 Publication ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2015  
  Volume Issue Pages  
  Keywords Cybersecurity; framework; NIST; Privacy; resilience; risk  
  Abstract Cybersecurity was a major topic of discussion at the 2015 World Economic Forum in Davos – the Sony attack; huge data breaches at Target and Adobe; a 91% increase in targeted cyber-attacks; annual losses of over $400 billion; the exposure of 904 million personal data records; cyber-attacks on a Finnish bank, a South Korean credit bureau, a German factory?s industrial controls, and the Ukrainian government; as well as increased general anxiety over critical infrastructure exposure (Tobias 2014; WEC 2015). These incidents highlight the risks inherent in a world increasingly complex, interconnected, and cyber-based. Much like thinking in other fields of disaster and crisis management, creating an impenetrable boundary or eliminating cyber risk entirely has given way to building cyber resilience. Cyber resilience is a social, economic and national security issue. This paper examines one approach, the NIST Cybersecurity Framework, in terms of building resilience in both cybersecurity and privacy.  
  Address  
  Corporate Author Thesis  
  Publisher University of Agder (UiA) Place of Publication Kristiansand, Norway Editor L. Palen; M. Buscher; T. Comes; A. Hughes  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9788271177881 Medium  
  Track Ethical, Legal and Social Issues Expedition Conference ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 1203  
Share this record to Facebook
 

 
Author (up) Johannes Sautter; Sebastian Kurowski; Heiko Roßnagel; Wolf Engelbach; Jan Zibuschka pdf  isbn
openurl 
  Title Interoperability for information systems in public urban transport security: The SECUR-ED interoperability notation Type Conference Article
  Year 2012 Publication ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2012  
  Volume Issue Pages  
  Keywords Information systems; Mass transportation; Unified Modeling Language; Urban transportation; Notation; Public transport; Secur-Ed; Security; Uml; Interoperability  
  Abstract In public transport and at large urban hubs, such as metro or train stations, transport operators and first responders collaborate in the prevention of and reaction to security issues. Within the EU demonstration project SECUR-ED a specific notation for interoperability of information systems in the domain of public transport security was developed. (In this context, the interoperability of actual operating systems is not the focus.) Based on UML (Unified Modelling Language), the notation language offers the possibility for structured modelling of system-of-systems architectures. Four interoperability object templates and their interdependencies form the underlying basis. Domain-specific annotation rules and guidelines for interoperability objects and their sub-component structures allow collaboration and interpretation of this model on various granularities and stages during a systems engineering process. © 2012 ISCRAM.  
  Address Fraunhofer IAO, Germany  
  Corporate Author Thesis  
  Publisher Simon Fraser University Place of Publication Vancouver, BC Editor L. Rothkrantz, J. Ristvej, Z.Franco  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9780864913326 Medium  
  Track Open Track Expedition Conference 9th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 200  
Share this record to Facebook
Select All    Deselect All
 |   | 
Details
   print

Save Citations:
Export Records: