|
Records |
Links |
|
Author |
Aarland, M.; Radianti, J.; Gjøsæter, T. |
|
|
Title |
Using System Dynamics to Simulate Trust in Digital Supply Chains |
Type |
Conference Article |
|
Year |
2023 |
Publication |
Proceedings of the 20th International ISCRAM Conference |
Abbreviated Journal |
Iscram 2023 |
|
|
Volume |
|
Issue |
|
Pages |
516-529 |
|
|
Keywords |
System Dynamics; Critical Infrastructure; Digital Supply Chain; Cybersecurity, Trust |
|
|
Abstract |
The power industry is outsourcing and digitalising their services to provide better, faster, and more reliable supply of electric power to the society. As a result, critical infrastructure increases in complexity and tight couplings between multiple suppliers and systems in digital supply chains. It also introduces new risks and challenges that are difficult to manage for critical infrastructure owners. To address the vulnerability in digital supply chains, we have developed a system dynamics model that represent important challenges to manage cybersecurity in digital supply chains, based on input from an expert group in the power industry. The system dynamics model illustrates how trust in suppliers as well as the need for control play important roles in outsourcing. Scenarios were developed and simulated. |
|
|
Address |
Center for Integrated Emergency Research, University of Agder |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
University of Nebraska at Omaha |
Place of Publication |
Omaha, USA |
Editor |
Jaziar Radianti; Ioannis Dokas; Nicolas Lalone; Deepak Khazanchi |
|
|
Language |
English |
Summary Language |
|
Original Title |
|
|
|
Series Editor |
Hosssein Baharmand |
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
1 |
|
|
ISSN |
2411-3387 |
ISBN |
979-8-218-21749-5 |
Medium |
|
|
|
Track |
Analytic Modeling and Simulation |
Expedition |
|
Conference |
|
|
|
Notes |
http://dx.doi.org/10.59297/CAGD9224 |
Approved |
no |
|
|
Call Number |
ISCRAM @ idladmin @ |
Serial |
2544 |
|
Share this record to Facebook |
|
|
|
|
Author |
Alena L. Benson; Keith Biggers; Jim Wall; Mark P. Haselkorn |
|
|
Title |
Adaptive development of a common operating environment for crisis response and management |
Type |
Conference Article |
|
Year |
2010 |
Publication |
ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings |
Abbreviated Journal |
ISCRAM 2010 |
|
|
Volume |
|
Issue |
|
Pages |
|
|
|
Keywords |
Information services; Information systems; Interoperability; Network security; Service oriented architecture (SOA); Collaborative decision making; Common operating environments; Information environment; Situational awareness; System development; Response time (computer systems) |
|
|
Abstract |
Complex information and communication systems present a special challenge to system designers because these are generally deployed as large, distributed systems with diverse user groups. Crisis response and management organizations in particular expect systems to be interoperable, resilient, flexible and provide lasting benefit. Currently, systems such as Virtual USA (Department of Homeland Security) and WatchKeeper (United States Coast Guard) seek to create common situational awareness for all participating agencies in security and incident response operations. We propose adaptive development as a system development model to build upon the ideas of systems such as Virtual USA and WatchKeeper in order to create sustainable and adaptable systems. Adaptive development supports ongoing improvement through user-driven design and modification in the target environment. An internet-based dashboard demonstrated during a United States Coast Guard Sector Seattle incident response exercise serves as an emergent case study for the adaptive model. |
|
|
Address |
University of Washington, United States; Texas AandM University, United States |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Information Systems for Crisis Response and Management, ISCRAM |
Place of Publication |
Seattle, WA |
Editor |
S. French, B. Tomaszewski, C. Zobel |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
|
Medium |
|
|
|
Track |
Special Session: Puget Sound Regional Initiatives towards a Common Operating Environment |
Expedition |
|
Conference |
7th International ISCRAM Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
305 |
|
Share this record to Facebook |
|
|
|
|
Author |
Alexandre Ahmad; Olivier Balet; Arjen Boin; Julien Castet; Maureen Donnelley; Fabio Ganovelli; George Kokkinis; Giovanni Pintore |
|
|
Title |
Assessing the Security of Buildings: A Virtual Studio Solution |
Type |
Conference Article |
|
Year |
2016 |
Publication |
ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
ISCRAM 2016 |
|
|
Volume |
|
Issue |
|
Pages |
|
|
|
Keywords |
3D Representation of Buildings; Security Assessment; Indoor Reconstruction; Collaborative Environment; Mission Planning |
|
|
Abstract |
This paper presents an innovative IT solution, a virtual studio, enabling security professionals to formulate, test and adjust security measures to enhance the security of critical buildings. The concept is to virtualize the environment, enabling experts to examine and assess and improve on a building?s security in a cost-effective and risk-free way. Our virtual studio solution makes use of the latest advances in computer graphics to reconstruct accurate blueprints as well as 3D representations of entire buildings in a very short timeframe. In addition, our solution enables the creation and simulation of multiple threat situations, allowing users to assess security procedures and various responses. Furthermore, we present a novel device, tailored to support collaborative security planning needs. Security experts from various disciplines evaluated our virtual studio solution, and their analysis is presented in this paper. |
|
|
Address |
|
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Federal University of Rio de Janeiro |
Place of Publication |
Rio de Janeiro, Brasil |
Editor |
A. Tapia; P. Antunes; V.A. Bañuls; K. Moore; J. Porto |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3408 |
ISBN |
978-84-608-7984-29 |
Medium |
|
|
|
Track |
Planning, Foresight and Risk Analysis |
Expedition |
|
Conference |
13th International Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
1348 |
|
Share this record to Facebook |
|
|
|
|
Author |
Ana Rodríguez-Hoyos; José Estrada-Jiménez; David Rebollo-Monedero; Jordi Forné; Rubén Trapero Burgos; Antonio Álvarez Romero; Rodrigo Diaz Rodríguez |
|
|
Title |
Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach |
Type |
Conference Article |
|
Year |
2019 |
Publication |
Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management |
Abbreviated Journal |
Iscram 2019 |
|
|
Volume |
|
Issue |
|
Pages |
|
|
|
Keywords |
privacy, critical infrastructures, data anonymization, CIPSEC, security logs |
|
|
Abstract |
Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern
computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold.
To improve these capabilities, logs are usually shared with external entities. However, since cybersecurity logs
might contain sensitive data, serious privacy concerns arise, even more when critical infrastructures (CI), handling
strategic data, are involved.
We propose a tool to protect privacy by anonymizing sensitive data included in cybersecurity logs. We implement
anonymization mechanisms grouped through the definition of a privacy policy. We adapt said approach to the
context of the EU project CIPSEC that builds a unified security framework to orchestrate security products, thus
offering better protection to a group of CIs. Since this framework collects and processes security-related data from
multiple devices of CIs, our work is devoted to protecting privacy by integrating our anonymization approach. |
|
|
Address |
Universitat Politécnica de Catalunya (UPC), Barcelona, España;Escuela Politécnica Nacional (EPN), Quito, Ecuador;ATOS, Madrid, España |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Iscram |
Place of Publication |
Valencia, Spain |
Editor |
Franco, Z.; González, J.J.; Canós, J.H. |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
978-84-09-10498-7 |
Medium |
|
|
|
Track |
T13 - Privacy Risk Management in Critical Infrastructures |
Expedition |
|
Conference |
16th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2019) |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
1934 |
|
Share this record to Facebook |
|
|
|
|
Author |
Annie Searle |
|
|
Title |
A seat at the table for operational risk |
Type |
Conference Article |
|
Year |
2010 |
Publication |
ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings |
Abbreviated Journal |
ISCRAM 2010 |
|
|
Volume |
|
Issue |
|
Pages |
|
|
|
Keywords |
Information systems; Pattern recognition; Security of data; Aggregate risk; Business continuity; Crisis management; Disaster recovery projects; Executive decisions; Operational risks; Risk assessment |
|
|
Abstract |
What role should operational risk leaders have in the executive suite? This paper argues that, when nervous CEOs ask “What can go wrong? How can we get ahead of the curve?”, they should look to their operational risk leaders. Those leaders oversee corporate and information security as well as business continuity, crisis management and disaster recovery programs inside companies. That makes them ideally qualified to take the process of crisis management, including analysis of aggregate risk across all silos – To the CEO and then into the boardroom when the need arises, before the corporate crisis is full-blown. |
|
|
Address |
ASA Risk Consultants, United States |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Information Systems for Crisis Response and Management, ISCRAM |
Place of Publication |
Seattle, WA |
Editor |
S. French, B. Tomaszewski, C. Zobel |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
|
Medium |
|
|
|
Track |
Planning, Foresight and/or Risk Analysis |
Expedition |
|
Conference |
7th International ISCRAM Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
929 |
|
Share this record to Facebook |
|
|
|
|
Author |
Anthony C. Robinson; Robert E. Roth; Alan M. MacEachren |
|
|
Title |
Challenges for map symbol standardization in crisis management |
Type |
Conference Article |
|
Year |
2010 |
Publication |
ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings |
Abbreviated Journal |
ISCRAM 2010 |
|
|
Volume |
|
Issue |
|
Pages |
|
|
|
Keywords |
Disasters; Information systems; Interoperability; Map symbols; Mapping; National security; Risk management; Security systems; Crisis management; Department of Homeland Security; Emergency management; Emergency situation; Geo-spatial informations; Home land security; Key Issues; Symbology; Standardization |
|
|
Abstract |
A wide range of local, regional, and federal authorities will generate maps to help respond to and recover from a disaster. It is essential that map users in an emergency situation can readily understand what they are seeing on these maps. Standardizing map symbology is one mechanism for ensuring that geospatial information is interpretable during an emergency situation, but creating an effective map symbol standard is a complex and evolving task. Here we present preliminary results from research into the application of the ANSI 415-2006 INCITS Homeland Security Map Symbol Standard, a point symbol standard intended to support emergency management mapping for the U.S. Department of Homeland Security. This standard has so far not been widely adopted across the full range of DHS missions, and we elaborate on key issues and challenges that should be accounted for when developing future map symbol standards for crisis management. |
|
|
Address |
Department of Geography, GeoVISTA Center, Pennsylvania State University, United States |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Information Systems for Crisis Response and Management, ISCRAM |
Place of Publication |
Seattle, WA |
Editor |
S. French, B. Tomaszewski, C. Zobel |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
|
Medium |
|
|
|
Track |
Geo-Information Support |
Expedition |
|
Conference |
7th International ISCRAM Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
882 |
|
Share this record to Facebook |
|
|
|
|
Author |
Arthur H. Hendela; Murray Turoff; Starr Roxanne Hiltz |
|
|
Title |
Cross impact security analysis using the HACKING Game |
Type |
Conference Article |
|
Year |
2010 |
Publication |
ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings |
Abbreviated Journal |
ISCRAM 2010 |
|
|
Volume |
|
Issue |
|
Pages |
|
|
|
Keywords |
Crime; Information systems; Models; Personnel training; Collaborative model; Cross-impact analysis; Gaming; Government organizations; Mathematical basis; Natural and man-made disasters; Planning tools; Security expenditures; Personal computing |
|
|
Abstract |
Security of network assets is a high priority with little traditional return on investment. Increasingly, cyber attacks are being used by both terrorist and unfriendly government organizations. The HACKING Game, a Cross Impact Analysis planning tool, can be used to plan security resource allocation in computer networks. Cross Impact Analysis provides a mathematical basis to determine the interrelationships of one event with a set of other events. Output from the HACKING Game's Cross Impact Analysis model can be used to help justify security expenditures, with an added benefit of being a training tool for employees learning to protect networks. This paper presents details of the Hacking Game's design and its capabilities. Cross impact modeling can be used to develop games for any situation characterized by a set of offense and defense events to produce an individual or collaborative model for such things as natural and man-made disasters. |
|
|
Address |
New Jersey Institute of Technology, United States |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Information Systems for Crisis Response and Management, ISCRAM |
Place of Publication |
Seattle, WA |
Editor |
S. French, B. Tomaszewski, C. Zobel |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
|
Medium |
|
|
|
Track |
Planning, Foresight and/or Risk Analysis |
Expedition |
|
Conference |
7th International ISCRAM Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
569 |
|
Share this record to Facebook |
|
|
|
|
Author |
Asa Weinholt; Tobias Andersson Granberg |
|
|
Title |
Evaluation of enhanced collaboration between fire and rescue services and security officers |
Type |
Conference Article |
|
Year |
2013 |
Publication |
ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
ISCRAM 2013 |
|
|
Volume |
|
Issue |
|
Pages |
735-740 |
|
|
Keywords |
Cost benefit analysis; Information systems; Cost effective; Crisis management; Emergency response; Fire and rescue services; Interview study; New actors; Security officers; Semi structured interviews; Emergency services |
|
|
Abstract |
The hypothesis of this study is that collaboration between fire and rescue services and new actors, with basic rescue skills, might be a cost effective way to improve emergency response. Interview studies of collaborations between fire and rescue services and security officers in three Swedish municipalities are presented. Seven semi-structured interviews are conducted with representatives from the security officer companies, the fire and rescue services and security managers at the municipalities. The method used to evaluate the collaborations quantitatively is Cost-benefit analysis. The collaborations have positive economic effects for society that most likely outweighs the costs. There also exist several external effects that are not possible to value monetarily, but that represent positive values for society. The results and their generalizability are discussed, as well as the possibility for these new collaborations to improve crisis management. |
|
|
Address |
Div. Communication and Transport Systems, ITN. Linkoping University, Sweden |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Karlsruher Institut fur Technologie |
Place of Publication |
KIT; Baden-Baden |
Editor |
T. Comes, F. Fiedrich, S. Fortier, J. Geldermann and T. Müller |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
9783923704804 |
Medium |
|
|
|
Track |
Planning and Foresight |
Expedition |
|
Conference |
10th International ISCRAM Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
1074 |
|
Share this record to Facebook |
|
|
|
|
Author |
Bartel A. Van De Walle; Ronald Spanjers; Dirk De Wit |
|
|
Title |
Stakeholder perceptions and standards for information security risks : A case study at a dutch health care organization |
Type |
Conference Article |
|
Year |
2006 |
Publication |
Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
ISCRAM 2006 |
|
|
Volume |
|
Issue |
|
Pages |
513-527 |
|
|
Keywords |
Health care; Information systems; Security of data; Healthcare organizations; Information security risks; Nen 7510; Patient information; Personal health record; Stakeholder groups; Stakeholder perception; Stakeholders analysis; Risk perception |
|
|
Abstract |
With the increased use of electronic patient files in Health Care Organizations (HCOs), addressing the risks related to the storage and use of patient information has become increasingly important to avoid intentional or unintentional disclosure, damage to or abuse of patients' personal health records. This has lead governments from various countries to introduce and impose information security standards for HCOs. The Dutch government introduced the NEN 7510 national information security standard; a standard derived from the international ISO 17799 norm. Preceding the implementation phase of NEN 7510 standard at a Dutch HCO, we conducted a field study to identify the information security risks as perceived by the main stakeholder groups in the HCO. We present the differences in the perceived information security risks and threats by end users, management and suppliers, and the degree to which these identified risks will be addressed by the implementation of the NEN 7510 standard. |
|
|
Address |
Tilburg University, Netherlands |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Royal Flemish Academy of Belgium |
Place of Publication |
Newark, NJ |
Editor |
B. Van de Walle, M. Turoff |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
9090206019; 9789090206011 |
Medium |
|
|
|
Track |
STAKEHOLDER COORDINATION FOR CRISIS MANAGEMENT |
Expedition |
|
Conference |
3rd International ISCRAM Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
1039 |
|
Share this record to Facebook |
|
|
|
|
Author |
Chiara Bassetti; Roberta Ferrario; Maria Luiza M. Campos |
|
|
Title |
Airport security checkpoints: an empirically-grounded ontological model for supporting collaborative work practices in safety critical environments |
Type |
Conference Article |
|
Year |
2015 |
Publication |
ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
ISCRAM 2015 |
|
|
Volume |
|
Issue |
|
Pages |
|
|
|
Keywords |
Airport security; collaboration model; ethnography; Ontology; work practices |
|
|
Abstract |
Resulting from an interdisciplinary endeavor, the paper proposes an ontological model for supporting collaborative work practices in critical settings, and shows its application to a specific domain. The model is empirically-grounded, as based on ethnographic research carried out at an international airport ?clearly an example of safety-critical environment, where emergency prevention and preparedness are crucial. On the other hand, the model leverages on previous ontological work on collaboration and observation in emergency response, and revises it when necessary, thus contributing to its development. Taking hand-baggage screening as an example, the paper shows how the model can be applied, and how it could be used to run model-based simulation in order to better understand collaborative work practices and analyze the impact of different techno-organizational changes on such practices and their effectiveness. This could result in suggesting guidelines for enhancing workflow, security policies and, more generally, time- and safety-critical situations management. |
|
|
Address |
|
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
University of Agder (UiA) |
Place of Publication |
Kristiansand, Norway |
Editor |
L. Palen; M. Buscher; T. Comes; A. Hughes |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
9788271177881 |
Medium |
|
|
|
Track |
Understanding Collaborative Work Practices |
Expedition |
|
Conference |
ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
yes |
|
|
Call Number |
|
Serial |
1258 |
|
Share this record to Facebook |
|
|
|
|
Author |
Daniel Lichte; Dustin Witte; Kai-Dietrich Wolf |
|
|
Title |
Comprehensive Security Hazard Analysis for Transmission Systems |
Type |
Conference Article |
|
Year |
2020 |
Publication |
ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
Iscram 2020 |
|
|
Volume |
|
Issue |
|
Pages |
1145-1153 |
|
|
Keywords |
Physical Security; Energy Transmission Systems; Scenario Analysis; Threat Analysis; Risk Assessment |
|
|
Abstract |
Critical energy infrastructures are more and more focused upon by politics and society. Modern society depends on these structures, since they enable the steady support of electricity and other types of energy. Deliberately precipitated hazards of certain critical parts of electrical transmission systems (ETS) can lead to catastrophic consequences. Therefore, the analysis of feasible security hazards and resulting consequences for the operation of transmission systems are a concern to transmission system operators (TSO). Alas, there is no common method available that comprehensively identifies these feasible security related scenarios and classifies them according to their overall criticality for the safe operation of the ETS. To tackle this challenge, we propose a comprehensive, yet easy-to-apply method to systematically identify and assess the criticality of security threat scenarios. It is conducted in four steps and consists of a matrix based consistency check of threat scenarios in a defined solution space and a convenient semi-quantitative assessment of a risk factor for the ETS. The approach is illustrated by the simplified generic example of an EETS. |
|
|
Address |
German Aerospace Center; University of Wuppertal; University of Wuppertal |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Virginia Tech |
Place of Publication |
Blacksburg, VA (USA) |
Editor |
Amanda Hughes; Fiona McNeill; Christopher W. Zobel |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
978-1-949373-27-104 |
ISBN |
2411-3490 |
Medium |
|
|
|
Track |
Open Track |
Expedition |
|
Conference |
17th International Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
daniel.lichte@dlr.de |
Approved |
no |
|
|
Call Number |
|
Serial |
2305 |
|
Share this record to Facebook |
|
|
|
|
Author |
Douglas A. Samuelson; Matthew Parker; Austin Zimmerman; Loren Miller; Stephen Guerin; Joshua Thorp; Owen Densmore |
|
|
Title |
Agent-based simulations of mass egress after Improvised Explosive Device attacks |
Type |
Conference Article |
|
Year |
2008 |
Publication |
Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
ISCRAM 2008 |
|
|
Volume |
|
Issue |
|
Pages |
59-70 |
|
|
Keywords |
Computer simulation; Recreation centers; Stadiums; Subway stations; Agent based simulation; Department of Homeland Security; Emergency preparedness; Event management; Improvised explosive devices; Mass egress; Real-time information systems; Science and Technology; Information systems |
|
|
Abstract |
For the Science and Technology Directorate (S&T) of the U. S. Department of Homeland Security, we developed agent-based computer simulation models of mass egress from a stadium and a subway station following one or more attacks with Improvised Explosive Devices (IEDs.) Anti-IED countermeasures we modeled included improved guidance to exits, baffles to absorb shock and shrapnel, and, for the stadium, egress onto the playing field. We found improved real-time information systems that provide better guidance to exits would substantially expedite egress and could reduce secondary (trampling and crush) casualties. Our results indicate that models like these can be useful aids to selecting countermeasures, and for training, preparation and exercises. We also discuss the unusual problems such models pose for real-time event management and for validation and evaluation. |
|
|
Address |
Serco, United Kingdom; ANSER, United Kingdom; Homeland Security Institute, United States; Redfish Group, United Kingdom |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Information Systems for Crisis Response and Management, ISCRAM |
Place of Publication |
Washington, DC |
Editor |
F. Fiedrich, B. Van de Walle |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
9780615206974 |
Medium |
|
|
|
Track |
Virtual Systems for Emergency Management Simulation & Training |
Expedition |
|
Conference |
5th International ISCRAM Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
908 |
|
Share this record to Facebook |
|
|
|
|
Author |
Duco N. Ferro; Jeroen M. Valk; Alfons H. Salden |
|
|
Title |
A robust coalition formation framework for mobile surveillance incident management |
Type |
Conference Article |
|
Year |
2007 |
Publication |
Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers |
Abbreviated Journal |
ISCRAM 2007 |
|
|
Volume |
|
Issue |
|
Pages |
479-488 |
|
|
Keywords |
Artificial intelligence; Decision support systems; Knowledge management; Robustness (control systems); Security systems; Coalition formations; Coordination; Incident Management; Mobile surveillance; Reconfiguration; Scale-space; Network security |
|
|
Abstract |
Given unexpected incidents on routes of guards that check security objects, like banks, one of the most challenging problems is still how to support improvisation by security personnel in taking decisions to prevent or resolve such incidents. Another as important associated problem is how a security company can naturally take advantage of its existing and novel knowledge about its organizational and ICT infrastructures, and the introduction of a decision support system to help leverage of improvisation by humans. To tackle all this, on the one hand we present a dynamic coalition formation framework that allows the (re)configurations of agents that are associated with joint tasks in situational contexts to be evaluated by appropriate value functions. On the other hand, we present a dynamic scale-space paradigm that allows a security company to distill ranked lists of robust context-dependent reconfigurations at critical scales. We highlight the merits of ASK-ASSIST as a solution to the problem of supporting human improvisation. |
|
|
Address |
Almende B. V., Netherlands |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Information Systems for Crisis Response and Management, ISCRAM |
Place of Publication |
Delft |
Editor |
B. Van de Walle, P. Burghardt, K. Nieuwenhuis |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
9789054874171; 9789090218717 |
Medium |
|
|
|
Track |
IMPR |
Expedition |
|
Conference |
4th International ISCRAM Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
489 |
|
Share this record to Facebook |
|
|
|
|
Author |
Edward J. Glantz; Frank E. Ritter |
|
|
Title |
Integrative Risk Identification Approach for Mass-Gathering Security |
Type |
Conference Article |
|
Year |
2017 |
Publication |
Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management |
Abbreviated Journal |
Iscram 2017 |
|
|
Volume |
|
Issue |
|
Pages |
363-373 |
|
|
Keywords |
risk identification; risk management; resilience; agility; crisis; stadium security; mass-gathering security |
|
|
Abstract |
Effective risk management begins with successful risk identification. Unfortunately, traditional approaches may lead to haphazard and incomplete results. To overcome this, we present a new integrative approach to improve risk identification that sequentially investigates protector-views and narrow scopes using literature review, ethnography, and subject matter expertise. This paper illustrates this approach by identifying man-made and natural threats to mass-gathering events in general, and stadium security as an example. Improving risk identification enhances resilience to known risks by enabling planning and development of targeted response strategies. Working from a more complete portfolio of risk resilience strategies may also improve flexibility and agility to respond to new and emerging risks. |
|
|
Address |
The Pennsylvania State University |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Iscram |
Place of Publication |
Albi, France |
Editor |
Tina Comes, F.B., Chihab Hanachi, Matthieu Lauras, Aurélie Montarnal, eds |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
|
Medium |
|
|
|
Track |
Planning, Foresight and Risk analysis |
Expedition |
|
Conference |
14th International Conference on Information Systems for Crisis Response And Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
2025 |
|
Share this record to Facebook |
|
|
|
|
Author |
Elizabeth Avery Gomez; Katia Passerini; Karen Hare |
|
|
Title |
Public health crisis management: Community level roles and communication options |
Type |
Conference Article |
|
Year |
2006 |
Publication |
Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
ISCRAM 2006 |
|
|
Volume |
|
Issue |
|
Pages |
435-443 |
|
|
Keywords |
Bioterrorism; Information systems; Information use; National security; Security systems; Telecommunication equipment; Community informatics; Crisis management; Epidemics; Gap analysis; Home land security; Media richness; Mobile Technology; Public health |
|
|
Abstract |
Crisis management efforts in the United States public health sector aim to prepare and protect the life of an individual, family or group against a health-related event. These efforts span governmental, nongovernmental and private sectors. The need for coordination between these organizations has never been more apparent. A solution will depend heavily on standardized communication protocols using information and communication technology (ICT). Numerous initiatives are currently addressing the needs of our nation with respect to homeland security and public health, yet remain in the early stages for the nongovernmental sector. The emphasis of our research is at the local level where the governmental sector extends to the nongovernmental sector (NGO), particularly community outreach. Our analysis of the local community suggests focusing on the management of communication during public health crises to better understand the complexities and variations presented in these communities. Leveraging experiences from media-technology literature findings and emergency-response efforts, we seek to identify a framework and tools to enable effective communication for those public health practitioners who serve as front-line responders to public health crises. The major contributions of this research will be to extend the use of information systems and mobile technology to the local United States public health communities to increase effective communication between organizations, while providing a state of readiness for homeland security related events. |
|
|
Address |
New Jersey Institute of Technology, United States |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Royal Flemish Academy of Belgium |
Place of Publication |
Newark, NJ |
Editor |
B. Van de Walle, M. Turoff |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
9090206019; 9789090206011 |
Medium |
|
|
|
Track |
COMMUNITIES IN EMERGENCY MANAGEMENT |
Expedition |
|
Conference |
3rd International ISCRAM Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
531 |
|
Share this record to Facebook |
|
|
|
|
Author |
Elizabeth Losh |
|
|
Title |
The birth of the Virtual Clinic: Game spaces in the Virtual Practicum and the Virtual Terrorism Response Academy |
Type |
Conference Article |
|
Year |
2007 |
Publication |
Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers |
Abbreviated Journal |
ISCRAM 2007 |
|
|
Volume |
|
Issue |
|
Pages |
551-556 |
|
|
Keywords |
Computer games; Education; Multimedia systems; Department of Homeland Security; Digital experience; First responders; Game technologies; Interactive media; Multimedia programs; Public health preparedness; Risk communication; Terrorism |
|
|
Abstract |
The Interactive Media Laboratory at Dartmouth Medical School produces computer games and multimedia programs for public health preparedness. With Department of Homeland Security funding, the IML is developing the Virtual Terrorism Response Academy, which uses game technology to prepare first responders for rescue efforts in which hazardous materials may be involved. This paper looks at the history of the “Virtual Clinic” concept and the original rationale for creating what Max Boisot calls “epistemology space.” It also offers an account of the VRTA designers' responses to potential criticism from learning specialists in game studies who object that the game is too didactic and discourages trial-and-error by restraining the learner in the narrative conceit of a “simulation of a simulation.”. |
|
|
Address |
University of California, Irvine, United States |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Information Systems for Crisis Response and Management, ISCRAM |
Place of Publication |
Delft |
Editor |
B. Van de Walle, P. Burghardt, K. Nieuwenhuis |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
9789054874171; 9789090218717 |
Medium |
|
|
|
Track |
GAME |
Expedition |
|
Conference |
4th International ISCRAM Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
724 |
|
Share this record to Facebook |
|
|
|
|
Author |
Emir Dervisevic; Miralem Mehic |
|
|
Title |
Overview of Quantum Key Distribution Technique within IPsec Architecture |
Type |
Conference Article |
|
Year |
2021 |
Publication |
ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
Iscram 2021 |
|
|
Volume |
|
Issue |
|
Pages |
391-403 |
|
|
Keywords |
Quantum key distribution (QKD), Internet Protocol security (IPsec), Internet Key Exchange (IKE) |
|
|
Abstract |
Quantum key distribution (QKD) is a method for secret key distribution which is secure against any future computational threat. In this paper we give an overview of existing solutions that integrate QKD method within the most popular architecture for establishing secure communication in modern IP (Internet Protocol) networks – IPsec (Internet Protocol security). The provided overview can be used to further design the integration of QKD within IPsec architecture striving for a standardized solution. |
|
|
Address |
University of Sarajevo; University of Sarajevo |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Virginia Tech |
Place of Publication |
Blacksburg, VA (USA) |
Editor |
Anouck Adrot; Rob Grace; Kathleen Moore; Christopher W. Zobel |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
978-1-949373-61-5 |
ISBN |
|
Medium |
|
|
|
Track |
Enhancing Protection of Critical Infrastructures |
Expedition |
|
Conference |
18th International Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
edervisevi1@etf.unsa.ba |
Approved |
no |
|
|
Call Number |
ISCRAM @ idladmin @ |
Serial |
2341 |
|
Share this record to Facebook |
|
|
|
|
Author |
Erman Coskun; Jessica Hoey |
|
|
Title |
Airport security complexity: Problems with the information system components |
Type |
Conference Article |
|
Year |
2005 |
Publication |
Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
ISCRAM 2005 |
|
|
Volume |
|
Issue |
|
Pages |
61-66 |
|
|
Keywords |
Information systems; Security systems; Complexity; Implementation process; Safety critical systems; September 11; Airport security |
|
|
Abstract |
Airport security is a very relevant, diverse, and complex system in any country. September 11th made this issue an increasing concern for almost every country in the world. Prior to September 11th the media, watchdog groups, and commissions established by the United States Congress, were adamant that airport security had major flaws. Currently many countries are revamping their airport security systems. The U.S. and other governments are implementing many new systems and procedures. There are numerous potential pitfalls with this implementation process and these new systems will have impacts on the public. For example, these systems could reduce freedom, still be flawed, and affect the economy. The primary intents of this paper are to classify airport security as a complex large-scale safety-critical system, to discuss what make airports so complex, describe the information systems that are involved with such systems, and discuss the impacts on the people involved. |
|
|
Address |
Sakarya University Business Department, Sakarya, Turkey; LeMoyne College Business Department, Syracuse, NY, United States |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Royal Flemish Academy of Belgium |
Place of Publication |
Brussels |
Editor |
B. Van de Walle, B. Carle |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
9076971099 |
Medium |
|
|
|
Track |
COMPLEXITY and INTEROPERABILITY |
Expedition |
|
Conference |
2nd International ISCRAM Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
416 |
|
Share this record to Facebook |
|
|
|
|
Author |
Florian Brauner; Julia Maertens; Holger Bracker; Ompe Aimé Mudimu; Alex Lechleuthner |
|
|
Title |
Determination of the effectiveness of security measures for low probability but high consequence events: A comparison of multi-agent-simulation & process modelling by experts |
Type |
Conference Volume |
|
Year |
2015 |
Publication |
ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
ISCRAM 2015 |
|
|
Volume |
|
Issue |
|
Pages |
|
|
|
Keywords |
Decision Support; Efficient Strategy Planning; Modelling and Simulation; Multi-Agent-Simulation; Prioritizing security measures; Scenario-based Risk Assessment Method |
|
|
Abstract |
Due to the increasing danger of terrorist attacks, it is necessary to determine the preventive effects of security measures installed in e.g. public transportation systems. Since, there is no common practice to determine the preventive effects; we developed two different methodologies to analyse those effects, both are suitable for the assessment of security measures. The first method is a semi-quantitative method based on expert-estimations combined with a modelled process of an attack.The second method models the scenarios using a multi-agent-based simulation framework. Simulating a large number of runs, it is possible to derive values for indicators of interest on statistical basis. We show the suitability of both methods by applying them on a practical example of a public transportation system. In this paper we introduce both methodologies, show an exemplary application and present the strengths and weaknesses and how they can be linked to get an increased benefit. |
|
|
Address |
|
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
University of Agder (UiA) |
Place of Publication |
Kristiansand, Norway |
Editor |
L. Palen; M. Buscher; T. Comes; A. Hughes |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
9788271177881 |
Medium |
|
|
|
Track |
Planning, Foresight and Risk Analysis |
Expedition |
|
Conference |
ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
yes |
|
|
Call Number |
|
Serial |
1322 |
|
Share this record to Facebook |
|
|
|
|
Author |
Gabriel Bartl; Lars Gerhold; Matthias Wählisch |
|
|
Title |
Towards a theoretical framework of acceptance for surveillance systems at airports |
Type |
Conference Article |
|
Year |
2014 |
Publication |
ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
ISCRAM 2014 |
|
|
Volume |
|
Issue |
|
Pages |
299-303 |
|
|
Keywords |
Information systems; Acceptability; Acceptance; In contexts; Public infrastructures; Surveillance systems; Security systems |
|
|
Abstract |
In this paper we illustrate (a) the background and goals of the interdisciplinary research project SAFEST and (b) first insights from the socio-scientific part within the project. Technical systems are often established without considering explicitly ethical, legal, and social implications. This frequently leads to a lack of acceptance. This paper aims at compiling an analytical scheme that tries to demonstrate the relevance of the social context for the emergence of different modes of acceptance in reference to surveillance systems at airports. It is intended to guide the technical experts to deal with and reflect acceptance issues in the process of technical development. |
|
|
Address |
Freie Universität Berlin, Germany |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
The Pennsylvania State University |
Place of Publication |
University Park, PA |
Editor |
S.R. Hiltz, M.S. Pfaff, L. Plotnick, and P.C. Shih. |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
9780692211946 |
Medium |
|
|
|
Track |
Ethical, Legal and Social Issues of IT Supported Emergency Response |
Expedition |
|
Conference |
11th International ISCRAM Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
293 |
|
Share this record to Facebook |
|
|
|
|
Author |
Harrasi, A.A.; Grispos, G.; Gandhi, R. |
|
|
Title |
Using Cybersecurity Testbeds to Evaluate (In)Secure Structural Health Monitoring Systems |
Type |
Conference Article |
|
Year |
2023 |
Publication |
Proceedings of the 20th International ISCRAM Conference |
Abbreviated Journal |
Iscram 2023 |
|
|
Volume |
|
Issue |
|
Pages |
902-908 |
|
|
Keywords |
Cybersecurity; Structural Health Monitoring Systems; Incident Response; Testbed |
|
|
Abstract |
An increasing amount of technology is being integrated into bridges and other structures, such as dams and buildings, to proactively look for signs of deterioration or damage. These technologies are collectively known as structural health monitoring systems. While the benefits of integrating this technology are attractive, this integration is also creating an environment that is conducive to security vulnerabilities. While previous research has focused on the broader cybersecurity challenges associated with structural health monitoring systems, limited guidance is available for identifying specific security vulnerabilities in these systems and their implications for responding to security incidents. Hence, this paper presents CYBRBridge, a cybersecurity testbed that provides a sacrificial environment to assist in identifying and exploring vulnerabilities associated with structural health monitoring systems. This paper reports ongoing research efforts to develop the CYBRBridge testbed and initial results identifying vulnerabilities within the wireless components of a commercial structural health monitoring system |
|
|
Address |
University of Nebraska at Omaha; University of Nebraska at Omaha; University of Nebraska at Omaha |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
University of Nebraska at Omaha |
Place of Publication |
Omaha, USA |
Editor |
Jaziar Radianti; Ioannis Dokas; Nicolas Lalone; Deepak Khazanchi |
|
|
Language |
English |
Summary Language |
|
Original Title |
|
|
|
Series Editor |
Hosssein Baharmand |
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
1 |
|
|
ISSN |
|
ISBN |
|
Medium |
|
|
|
Track |
Cybersecurity and Emergency Management |
Expedition |
|
Conference |
|
|
|
Notes |
http://dx.doi.org/10.59297/CPXU9228 |
Approved |
no |
|
|
Call Number |
ISCRAM @ idladmin @ |
Serial |
2574 |
|
Share this record to Facebook |
|
|
|
|
Author |
Hayley Watson; Lemi Baruh; Rachel L. Finn; Salvatore Scifo |
|
|
Title |
Citizen (in)security?: Social media, citizen journalism and crisis response |
Type |
Conference Article |
|
Year |
2014 |
Publication |
ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
ISCRAM 2014 |
|
|
Volume |
|
Issue |
|
Pages |
294-298 |
|
|
Keywords |
Information dissemination; Information systems; Philosophical aspects; Citizen journalism; Crisis response; Ethics; Security; Social media; Information filtering |
|
|
Abstract |
The use of social media in a crisis has been applauded, and is witnessing an increase in uptake among those involved in crisis management activities, including citizens. Whilst some challenges have been discussed elsewhere, somewhat lacking is a discussion on the impact of sharing information on the security of those that may have been recorded. Accordingly, this working paper aims to provide preliminary results of an initial mapping task that seeks to examine the impact of the use of social media in a crisis on the social and ethical wellbeing of the security of the citizen. Authors argue that the heightened involvement of citizen journalism results in the filtering of information after its online publication which raises concerns relating to the dissemination of false information and a threat to an individual's privacy. Such issues should be adequately addressed in the encouragement and use of citizen contributions in crisis response. |
|
|
Address |
Trilateral Research and Consulting, Turkey; Koç University, Turkey; Maltepe University, Turkey |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
The Pennsylvania State University |
Place of Publication |
University Park, PA |
Editor |
S.R. Hiltz, M.S. Pfaff, L. Plotnick, and P.C. Shih. |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
9780692211946 |
Medium |
|
|
|
Track |
Ethical, Legal and Social Issues of IT Supported Emergency Response |
Expedition |
|
Conference |
11th International ISCRAM Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
1071 |
|
Share this record to Facebook |
|
|
|
|
Author |
Ivar Svare Holand; Peter Mozelius; Trond Olav Skevik |
|
|
Title |
A structured and dynamic model for emergency management exercises |
Type |
Conference Article |
|
Year |
2021 |
Publication |
ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
Iscram 2021 |
|
|
Volume |
|
Issue |
|
Pages |
186-197 |
|
|
Keywords |
Emergency exercises, Vulnerability assessment, Non-linear emergency exercise model, Norwegian-Swedish cross-border collaboration, Gaining Security Symbiosis (GSS) projects |
|
|
Abstract |
Emergencies are management challenges, and emergency exercises that involve multiple collaborating parties is a means towards mastering them. Such exercises are often conducted in a virtual training environment based on complex disaster scenarios. The reported study was carried out using a requirement-focused design approach. The aim was to describe and discuss a relevant design for lean, dynamic, and cost-efficient emergency management exercise systems. Data were gathered from a literature study and analyses of earlier emergency management projects in which the authors had participated. Despite the complexity of many current emergency management exercises, the scenarios usually involve only the response phases and have a linear structure that hinders both didactic aspects and the software structure. The conclusion drawn from the study is that an emergency management exercise model should focus on managing the activities that correspond to alternatives that unfold from a dynamic scenario. Finally, the authors recommend the principles of alternate reality games as a way towards more dynamic and cost-efficient emergency exercise systems. |
|
|
Address |
Nord University; Mid Sweden University; Nord University |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Virginia Tech |
Place of Publication |
Blacksburg, VA (USA) |
Editor |
Anouck Adrot; Rob Grace; Kathleen Moore; Christopher W. Zobel |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
978-1-949373-61-5 |
ISBN |
|
Medium |
|
|
|
Track |
Analytical Modeling and Simulation |
Expedition |
|
Conference |
18th International Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
ivar.s.holand@nord.no |
Approved |
no |
|
|
Call Number |
ISCRAM @ idladmin @ |
Serial |
2324 |
|
Share this record to Facebook |
|
|
|
|
Author |
Janine S. Hiller; Roberta S. Russell |
|
|
Title |
Modalities for Cyber Security and Privacy Resilience: The NIST Approach |
Type |
Conference Article |
|
Year |
2015 |
Publication |
ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
ISCRAM 2015 |
|
|
Volume |
|
Issue |
|
Pages |
|
|
|
Keywords |
Cybersecurity; framework; NIST; Privacy; resilience; risk |
|
|
Abstract |
Cybersecurity was a major topic of discussion at the 2015 World Economic Forum in Davos – the Sony attack; huge data breaches at Target and Adobe; a 91% increase in targeted cyber-attacks; annual losses of over $400 billion; the exposure of 904 million personal data records; cyber-attacks on a Finnish bank, a South Korean credit bureau, a German factory?s industrial controls, and the Ukrainian government; as well as increased general anxiety over critical infrastructure exposure (Tobias 2014; WEC 2015). These incidents highlight the risks inherent in a world increasingly complex, interconnected, and cyber-based. Much like thinking in other fields of disaster and crisis management, creating an impenetrable boundary or eliminating cyber risk entirely has given way to building cyber resilience. Cyber resilience is a social, economic and national security issue. This paper examines one approach, the NIST Cybersecurity Framework, in terms of building resilience in both cybersecurity and privacy. |
|
|
Address |
|
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
University of Agder (UiA) |
Place of Publication |
Kristiansand, Norway |
Editor |
L. Palen; M. Buscher; T. Comes; A. Hughes |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
9788271177881 |
Medium |
|
|
|
Track |
Ethical, Legal and Social Issues |
Expedition |
|
Conference |
ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
1203 |
|
Share this record to Facebook |
|
|
|
|
Author |
Johannes Sautter; Sebastian Kurowski; Heiko Roßnagel; Wolf Engelbach; Jan Zibuschka |
|
|
Title |
Interoperability for information systems in public urban transport security: The SECUR-ED interoperability notation |
Type |
Conference Article |
|
Year |
2012 |
Publication |
ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management |
Abbreviated Journal |
ISCRAM 2012 |
|
|
Volume |
|
Issue |
|
Pages |
|
|
|
Keywords |
Information systems; Mass transportation; Unified Modeling Language; Urban transportation; Notation; Public transport; Secur-Ed; Security; Uml; Interoperability |
|
|
Abstract |
In public transport and at large urban hubs, such as metro or train stations, transport operators and first responders collaborate in the prevention of and reaction to security issues. Within the EU demonstration project SECUR-ED a specific notation for interoperability of information systems in the domain of public transport security was developed. (In this context, the interoperability of actual operating systems is not the focus.) Based on UML (Unified Modelling Language), the notation language offers the possibility for structured modelling of system-of-systems architectures. Four interoperability object templates and their interdependencies form the underlying basis. Domain-specific annotation rules and guidelines for interoperability objects and their sub-component structures allow collaboration and interpretation of this model on various granularities and stages during a systems engineering process. © 2012 ISCRAM. |
|
|
Address |
Fraunhofer IAO, Germany |
|
|
Corporate Author |
|
Thesis |
|
|
|
Publisher |
Simon Fraser University |
Place of Publication |
Vancouver, BC |
Editor |
L. Rothkrantz, J. Ristvej, Z.Franco |
|
|
Language |
English |
Summary Language |
English |
Original Title |
|
|
|
Series Editor |
|
Series Title |
|
Abbreviated Series Title |
|
|
|
Series Volume |
|
Series Issue |
|
Edition |
|
|
|
ISSN |
2411-3387 |
ISBN |
9780864913326 |
Medium |
|
|
|
Track |
Open Track |
Expedition |
|
Conference |
9th International ISCRAM Conference on Information Systems for Crisis Response and Management |
|
|
Notes |
|
Approved |
no |
|
|
Call Number |
|
Serial |
200 |
|
Share this record to Facebook |