toggle visibility Search & Display Options

Select All    Deselect All
 |   | 
Details
   print
  Records Links
Author Aarland, M.; Radianti, J.; Gjøsæter, T. pdf  doi
isbn  openurl
  Title Using System Dynamics to Simulate Trust in Digital Supply Chains Type Conference Article
  Year 2023 Publication Proceedings of the 20th International ISCRAM Conference Abbreviated Journal Iscram 2023  
  Volume Issue Pages 516-529  
  Keywords System Dynamics; Critical Infrastructure; Digital Supply Chain; Cybersecurity, Trust  
  Abstract The power industry is outsourcing and digitalising their services to provide better, faster, and more reliable supply of electric power to the society. As a result, critical infrastructure increases in complexity and tight couplings between multiple suppliers and systems in digital supply chains. It also introduces new risks and challenges that are difficult to manage for critical infrastructure owners. To address the vulnerability in digital supply chains, we have developed a system dynamics model that represent important challenges to manage cybersecurity in digital supply chains, based on input from an expert group in the power industry. The system dynamics model illustrates how trust in suppliers as well as the need for control play important roles in outsourcing. Scenarios were developed and simulated.  
  Address Center for Integrated Emergency Research, University of Agder  
  Corporate Author Thesis  
  Publisher University of Nebraska at Omaha Place of Publication Omaha, USA Editor Jaziar Radianti; Ioannis Dokas; Nicolas Lalone; Deepak Khazanchi  
  Language English Summary Language Original Title  
  Series Editor Hosssein Baharmand Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition 1  
  ISSN 2411-3387 ISBN 979-8-218-21749-5 Medium  
  Track Analytic Modeling and Simulation Expedition Conference  
  Notes http://dx.doi.org/10.59297/CAGD9224 Approved no  
  Call Number ISCRAM @ idladmin @ Serial 2544  
Share this record to Facebook
 

 
Author Alexandre Ahmad; Olivier Balet; Arjen Boin; Julien Castet; Maureen Donnelley; Fabio Ganovelli; George Kokkinis; Giovanni Pintore pdf  isbn
openurl 
  Title Assessing the Security of Buildings: A Virtual Studio Solution Type Conference Article
  Year 2016 Publication ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2016  
  Volume Issue Pages  
  Keywords 3D Representation of Buildings; Security Assessment; Indoor Reconstruction; Collaborative Environment; Mission Planning  
  Abstract This paper presents an innovative IT solution, a virtual studio, enabling security professionals to formulate, test and adjust security measures to enhance the security of critical buildings. The concept is to virtualize the environment, enabling experts to examine and assess and improve on a building?s security in a cost-effective and risk-free way. Our virtual studio solution makes use of the latest advances in computer graphics to reconstruct accurate blueprints as well as 3D representations of entire buildings in a very short timeframe. In addition, our solution enables the creation and simulation of multiple threat situations, allowing users to assess security procedures and various responses. Furthermore, we present a novel device, tailored to support collaborative security planning needs. Security experts from various disciplines evaluated our virtual studio solution, and their analysis is presented in this paper.  
  Address  
  Corporate Author Thesis  
  Publisher Federal University of Rio de Janeiro Place of Publication Rio de Janeiro, Brasil Editor A. Tapia; P. Antunes; V.A. Bañuls; K. Moore; J. Porto  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3408 ISBN 978-84-608-7984-29 Medium  
  Track Planning, Foresight and Risk Analysis Expedition Conference 13th International Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 1348  
Share this record to Facebook
 

 
Author Ana Rodríguez-Hoyos; José Estrada-Jiménez; David Rebollo-Monedero; Jordi Forné; Rubén Trapero Burgos; Antonio Álvarez Romero; Rodrigo Diaz Rodríguez pdf  isbn
openurl 
  Title Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach Type Conference Article
  Year 2019 Publication Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management Abbreviated Journal Iscram 2019  
  Volume Issue Pages  
  Keywords privacy, critical infrastructures, data anonymization, CIPSEC, security logs  
  Abstract Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern

computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold.

To improve these capabilities, logs are usually shared with external entities. However, since cybersecurity logs

might contain sensitive data, serious privacy concerns arise, even more when critical infrastructures (CI), handling

strategic data, are involved.

We propose a tool to protect privacy by anonymizing sensitive data included in cybersecurity logs. We implement

anonymization mechanisms grouped through the definition of a privacy policy. We adapt said approach to the

context of the EU project CIPSEC that builds a unified security framework to orchestrate security products, thus

offering better protection to a group of CIs. Since this framework collects and processes security-related data from

multiple devices of CIs, our work is devoted to protecting privacy by integrating our anonymization approach.
 
  Address Universitat Politécnica de Catalunya (UPC), Barcelona, España;Escuela Politécnica Nacional (EPN), Quito, Ecuador;ATOS, Madrid, España  
  Corporate Author Thesis  
  Publisher Iscram Place of Publication Valencia, Spain Editor Franco, Z.; González, J.J.; Canós, J.H.  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 978-84-09-10498-7 Medium  
  Track T13 - Privacy Risk Management in Critical Infrastructures Expedition Conference 16th International Conference on Information Systems for Crisis Response and Management (ISCRAM 2019)  
  Notes Approved no  
  Call Number Serial 1934  
Share this record to Facebook
 

 
Author Ummul Khair Israt Ara; Fang Chen pdf  isbn
openurl 
  Title Information security in crisis management system Type Conference Article
  Year 2012 Publication ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2012  
  Volume Issue Pages  
  Keywords Disasters; Expert systems; Information systems; Interoperability; Management information systems; Security of data; Crisis management; Crisis management systems; Crisis situations; Medical emergency; Security components; Security requirements; Strong securities; Terrorist attacks; Information management  
  Abstract Information security is an important part of almost any kind of Information System. Crisis Management Systems (CMS) are a type of Information System that deals with information which needs to be secure. No matter what kind of crisis, natural disasters, man-made crisis or terrorist attacks, the CMS security should not be compromised. There are many challenges regarding exchange of qualified information and interoperability between various Expert Systems and the CMS. It is important to have strong security in terms of technology, skills, security requirements, sensitivity of information and trust-worthiness (Vural, Ciftcibasi and Inan, 2010). Depending on the type of crisis situation, different sets of security components should be triggered, since the security requirements vary between situations. For example, a terrorist attack has different security requirements in the system compared to a natural disaster or a medical emergency. In this paper, the importance of Information Security in CMS will be discussed. Methods for secure exchange of qualified information are analyzed and a secure and dynamic Crisis Management Information Security System (CMISS) design is introduced. © 2012 ISCRAM.  
  Address  
  Corporate Author Thesis  
  Publisher Simon Fraser University Place of Publication Vancouver, BC Editor L. Rothkrantz, J. Ristvej, Z.Franco  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9780864913326 Medium  
  Track Poster Session Expedition Conference 9th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 76  
Share this record to Facebook
 

 
Author Gabriel Bartl; Lars Gerhold; Matthias Wählisch pdf  isbn
openurl 
  Title Towards a theoretical framework of acceptance for surveillance systems at airports Type Conference Article
  Year 2014 Publication ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2014  
  Volume Issue Pages 299-303  
  Keywords Information systems; Acceptability; Acceptance; In contexts; Public infrastructures; Surveillance systems; Security systems  
  Abstract In this paper we illustrate (a) the background and goals of the interdisciplinary research project SAFEST and (b) first insights from the socio-scientific part within the project. Technical systems are often established without considering explicitly ethical, legal, and social implications. This frequently leads to a lack of acceptance. This paper aims at compiling an analytical scheme that tries to demonstrate the relevance of the social context for the emergence of different modes of acceptance in reference to surveillance systems at airports. It is intended to guide the technical experts to deal with and reflect acceptance issues in the process of technical development.  
  Address Freie Universität Berlin, Germany  
  Corporate Author Thesis  
  Publisher The Pennsylvania State University Place of Publication University Park, PA Editor S.R. Hiltz, M.S. Pfaff, L. Plotnick, and P.C. Shih.  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9780692211946 Medium  
  Track Ethical, Legal and Social Issues of IT Supported Emergency Response Expedition Conference 11th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 293  
Share this record to Facebook
 

 
Author Alena L. Benson; Keith Biggers; Jim Wall; Mark P. Haselkorn pdf  openurl
  Title Adaptive development of a common operating environment for crisis response and management Type Conference Article
  Year 2010 Publication ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings Abbreviated Journal ISCRAM 2010  
  Volume Issue Pages  
  Keywords Information services; Information systems; Interoperability; Network security; Service oriented architecture (SOA); Collaborative decision making; Common operating environments; Information environment; Situational awareness; System development; Response time (computer systems)  
  Abstract Complex information and communication systems present a special challenge to system designers because these are generally deployed as large, distributed systems with diverse user groups. Crisis response and management organizations in particular expect systems to be interoperable, resilient, flexible and provide lasting benefit. Currently, systems such as Virtual USA (Department of Homeland Security) and WatchKeeper (United States Coast Guard) seek to create common situational awareness for all participating agencies in security and incident response operations. We propose adaptive development as a system development model to build upon the ideas of systems such as Virtual USA and WatchKeeper in order to create sustainable and adaptable systems. Adaptive development supports ongoing improvement through user-driven design and modification in the target environment. An internet-based dashboard demonstrated during a United States Coast Guard Sector Seattle incident response exercise serves as an emergent case study for the adaptive model.  
  Address University of Washington, United States; Texas AandM University, United States  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Seattle, WA Editor S. French, B. Tomaszewski, C. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN Medium  
  Track Special Session: Puget Sound Regional Initiatives towards a Common Operating Environment Expedition Conference 7th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 305  
Share this record to Facebook
 

 
Author Peter H. Berghmans; Gerd Van Den Eede; Bartel A. Van De Walle pdf  isbn
openurl 
  Title A systems perspective on security risk identification: Methodology and illustrations from city councils Type Conference Article
  Year 2008 Publication Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2008  
  Volume Issue Pages 266-275  
  Keywords Information systems; City council; IS security; Methodological frameworks; Methodology; Risk Identification; Security risks; Systems thinking; System theory  
  Abstract In this paper we take a system theoretic perspective to the process of security risk identification in the context of city councils. Based on this approach, we construct a framework that helps to identify risks. We analyze why this methodological framework is suitable for the risk identification process. Research in fifty Flemish city councils reveals the usefulness of our approach of combining a perceived vs. objective perspective with a technical vs. organizational one. We believe such a framework offers a workable tool for dealing with IS security risks in a systems thinking way.  
  Address Memori-KHMechelen, Belgium; University College Brussels, Belgium; Tilburg University, Netherlands  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Washington, DC Editor F. Fiedrich, B. Van de Walle  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9780615206974 Medium  
  Track Trust in Emergency Planning and Response Expedition Conference 5th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 310  
Share this record to Facebook
 

 
Author Monika Büscher; Lisa Wood; Sung-Yueh Perng pdf  isbn
openurl 
  Title Privacy, security, liberty: Informing the design of EMIS Type Conference Article
  Year 2013 Publication ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2013  
  Volume Issue Pages 401-410  
  Keywords Data privacy; Design; Disasters; Interoperability; Management information systems; Risk management; Civil liberties; Emergency management; Emergency management systems; Human practices; Liberty; Material practices; Security; Smart cities; Civil defense  
  Abstract This paper explores issues of security, privacy and liberty arising in relation to ICT supported emergency management. The aim is to inform the design of emergency management information systems (EMIS) and architectures that support emergent interoperability and assembly of emergency management systems of systems. We show how transformations of social and material practices of privacy boundary management create challenges, opportunities and dangers in this context. While opportunities include development of more efficient and agile emergency management models, building on smart city concepts, dangers include surveillance, social sorting and an erosion of civil liberties. Against this backdrop, we briefly explore human practice focused 'privacy by design' as a candidate design avenue.  
  Address Mobilities.lab, Lancaster University, United Kingdom; Faculty of Health and Medicine, Lancaster University, United Kingdom  
  Corporate Author Thesis  
  Publisher Karlsruher Institut fur Technologie Place of Publication KIT; Baden-Baden Editor T. Comes, F. Fiedrich, S. Fortier, J. Geldermann and T. Müller  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9783923704804 Medium  
  Track Emergency Management Information Systems Expedition Conference 10th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 358  
Share this record to Facebook
 

 
Author Chiara Bassetti; Roberta Ferrario; Maria Luiza M. Campos pdf  isbn
openurl 
  Title Airport security checkpoints: an empirically-grounded ontological model for supporting collaborative work practices in safety critical environments Type Conference Article
  Year 2015 Publication ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2015  
  Volume Issue Pages  
  Keywords Airport security; collaboration model; ethnography; Ontology; work practices  
  Abstract Resulting from an interdisciplinary endeavor, the paper proposes an ontological model for supporting collaborative work practices in critical settings, and shows its application to a specific domain. The model is empirically-grounded, as based on ethnographic research carried out at an international airport ?clearly an example of safety-critical environment, where emergency prevention and preparedness are crucial. On the other hand, the model leverages on previous ontological work on collaboration and observation in emergency response, and revises it when necessary, thus contributing to its development. Taking hand-baggage screening as an example, the paper shows how the model can be applied, and how it could be used to run model-based simulation in order to better understand collaborative work practices and analyze the impact of different techno-organizational changes on such practices and their effectiveness. This could result in suggesting guidelines for enhancing workflow, security policies and, more generally, time- and safety-critical situations management.  
  Address  
  Corporate Author Thesis  
  Publisher University of Agder (UiA) Place of Publication Kristiansand, Norway Editor L. Palen; M. Buscher; T. Comes; A. Hughes  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9788271177881 Medium  
  Track Understanding Collaborative Work Practices Expedition Conference ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management  
  Notes Approved yes  
  Call Number Serial 1258  
Share this record to Facebook
 

 
Author Erman Coskun; Jessica Hoey pdf  isbn
openurl 
  Title Airport security complexity: Problems with the information system components Type Conference Article
  Year 2005 Publication Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2005  
  Volume Issue Pages 61-66  
  Keywords Information systems; Security systems; Complexity; Implementation process; Safety critical systems; September 11; Airport security  
  Abstract Airport security is a very relevant, diverse, and complex system in any country. September 11th made this issue an increasing concern for almost every country in the world. Prior to September 11th the media, watchdog groups, and commissions established by the United States Congress, were adamant that airport security had major flaws. Currently many countries are revamping their airport security systems. The U.S. and other governments are implementing many new systems and procedures. There are numerous potential pitfalls with this implementation process and these new systems will have impacts on the public. For example, these systems could reduce freedom, still be flawed, and affect the economy. The primary intents of this paper are to classify airport security as a complex large-scale safety-critical system, to discuss what make airports so complex, describe the information systems that are involved with such systems, and discuss the impacts on the people involved.  
  Address Sakarya University Business Department, Sakarya, Turkey; LeMoyne College Business Department, Syracuse, NY, United States  
  Corporate Author Thesis  
  Publisher Royal Flemish Academy of Belgium Place of Publication Brussels Editor B. Van de Walle, B. Carle  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9076971099 Medium  
  Track COMPLEXITY and INTEROPERABILITY Expedition Conference 2nd International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 416  
Share this record to Facebook
 

 
Author Daniel Lichte; Dustin Witte; Kai-Dietrich Wolf pdf  isbn
openurl 
  Title Comprehensive Security Hazard Analysis for Transmission Systems Type Conference Article
  Year 2020 Publication ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal Iscram 2020  
  Volume Issue Pages 1145-1153  
  Keywords Physical Security; Energy Transmission Systems; Scenario Analysis; Threat Analysis; Risk Assessment  
  Abstract Critical energy infrastructures are more and more focused upon by politics and society. Modern society depends on these structures, since they enable the steady support of electricity and other types of energy. Deliberately precipitated hazards of certain critical parts of electrical transmission systems (ETS) can lead to catastrophic consequences. Therefore, the analysis of feasible security hazards and resulting consequences for the operation of transmission systems are a concern to transmission system operators (TSO). Alas, there is no common method available that comprehensively identifies these feasible security related scenarios and classifies them according to their overall criticality for the safe operation of the ETS. To tackle this challenge, we propose a comprehensive, yet easy-to-apply method to systematically identify and assess the criticality of security threat scenarios. It is conducted in four steps and consists of a matrix based consistency check of threat scenarios in a defined solution space and a convenient semi-quantitative assessment of a risk factor for the ETS. The approach is illustrated by the simplified generic example of an EETS.  
  Address German Aerospace Center; University of Wuppertal; University of Wuppertal  
  Corporate Author Thesis  
  Publisher Virginia Tech Place of Publication Blacksburg, VA (USA) Editor Amanda Hughes; Fiona McNeill; Christopher W. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 978-1-949373-27-104 ISBN 2411-3490 Medium  
  Track Open Track Expedition Conference 17th International Conference on Information Systems for Crisis Response and Management  
  Notes daniel.lichte@dlr.de Approved no  
  Call Number Serial 2305  
Share this record to Facebook
 

 
Author Naci Dilekli; Tarek Rashed pdf  isbn
openurl 
  Title Towards a GIS data model for improving the emergency response in the Least Developing Countries: Challenges and opportunities Type Conference Article
  Year 2007 Publication Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers Abbreviated Journal ISCRAM 2007  
  Volume Issue Pages 57-62  
  Keywords Developing countries; Information systems; Risk management; Developed countries; Emergency management; Emergency response; Emergency response practices; Geodatabase data models; GIS data; Home land security; Potential benefits; Emergency services  
  Abstract Over the past few years, several standardized GIS data models have been developed to document “best practices” database designs for various application domains including the domain of emergency management. The majority of such models, however, have been developed in the context of developed countries as in the case of the Homeland Security geodatabase data model by ESRI®. These data models fail to be successful when transferred and used in the context of Least Developing Countries (LDCs) due to significant contextual differences in the domains of information systems and emergency practices. Therefore, developing GIS data models that are specifically designed for emergency response activities in LDCs are needed to improve existing emergency response practices in these countries. This paper reviews the state of development in GIS data models and the potential benefits and applications of building models that are specifically designed to support emergency response activities in LDCs. We first discusses why it is important to differentiate emergency response activities in LDCs from other contexts. We then present some theoretical considerations in developing GIS data models that can overcome contextual difficulties in LDCs in general and in the domain of information systenms. We finally attempt to provide key guidelines that may help designing a GIS Data Model, while is specifically referenced to the LDCs context.  
  Address University of Oklahoma, United States  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Delft Editor B. Van de Walle, P. Burghardt, K. Nieuwenhuis  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9789054874171; 9789090218717 Medium  
  Track LDCS Expedition Conference 4th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 449  
Share this record to Facebook
 

 
Author Magiswary Dorasamy; Murali Raman pdf  isbn
openurl 
  Title Information systems to support disaster planning and response: Problem diagnosis and research gap analysis Type Conference Article
  Year 2011 Publication 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011 Abbreviated Journal ISCRAM 2011  
  Volume Issue Pages  
  Keywords Disasters; Information systems; Knowledge acquisition; Knowledge based systems; Action research; Design and implements; Disaster planning; Institutional contexts; Knowledge management system; Knowledge process; Security council; Success; Disaster prevention  
  Abstract There is significant gap in the literature and past research on Knowledge Management Systems (KMS) in the domain of disasters. This PhD research work is an action research to design and implement a web-based knowledge management system that aims to fill this theoretical gap in KMS for disasters and to improve the disaster planning and response efforts within an institutional context. The diagnostic stage results imply that the organisation can benefit from the implementation of an information system to support its disaster planning and response efforts. Current scenario at the State Crisis and Security Council (SCSC) in Malaysia revealed some real challenges pertaining to communication, coordination and knowledge processes between SCSC and its district level officers (DO). The proposition of this research is that a well-defined knowledge management system can successfully support disaster planning and response effort in organizations.  
  Address Multimedia University Malaysia, Malaysia  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Lisbon Editor M.A. Santos, L. Sousa, E. Portela  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9789724922478 Medium  
  Track Planning and Foresight Expedition Conference 8th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 454  
Share this record to Facebook
 

 
Author Douglas A. Samuelson; Matthew Parker; Austin Zimmerman; Loren Miller; Stephen Guerin; Joshua Thorp; Owen Densmore pdf  isbn
openurl 
  Title Agent-based simulations of mass egress after Improvised Explosive Device attacks Type Conference Article
  Year 2008 Publication Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2008  
  Volume Issue Pages 59-70  
  Keywords Computer simulation; Recreation centers; Stadiums; Subway stations; Agent based simulation; Department of Homeland Security; Emergency preparedness; Event management; Improvised explosive devices; Mass egress; Real-time information systems; Science and Technology; Information systems  
  Abstract For the Science and Technology Directorate (S&T) of the U. S. Department of Homeland Security, we developed agent-based computer simulation models of mass egress from a stadium and a subway station following one or more attacks with Improvised Explosive Devices (IEDs.) Anti-IED countermeasures we modeled included improved guidance to exits, baffles to absorb shock and shrapnel, and, for the stadium, egress onto the playing field. We found improved real-time information systems that provide better guidance to exits would substantially expedite egress and could reduce secondary (trampling and crush) casualties. Our results indicate that models like these can be useful aids to selecting countermeasures, and for training, preparation and exercises. We also discuss the unusual problems such models pose for real-time event management and for validation and evaluation.  
  Address Serco, United Kingdom; ANSER, United Kingdom; Homeland Security Institute, United States; Redfish Group, United Kingdom  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Washington, DC Editor F. Fiedrich, B. Van de Walle  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9780615206974 Medium  
  Track Virtual Systems for Emergency Management Simulation & Training Expedition Conference 5th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 908  
Share this record to Facebook
 

 
Author Duco N. Ferro; Jeroen M. Valk; Alfons H. Salden pdf  isbn
openurl 
  Title A robust coalition formation framework for mobile surveillance incident management Type Conference Article
  Year 2007 Publication Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers Abbreviated Journal ISCRAM 2007  
  Volume Issue Pages 479-488  
  Keywords Artificial intelligence; Decision support systems; Knowledge management; Robustness (control systems); Security systems; Coalition formations; Coordination; Incident Management; Mobile surveillance; Reconfiguration; Scale-space; Network security  
  Abstract Given unexpected incidents on routes of guards that check security objects, like banks, one of the most challenging problems is still how to support improvisation by security personnel in taking decisions to prevent or resolve such incidents. Another as important associated problem is how a security company can naturally take advantage of its existing and novel knowledge about its organizational and ICT infrastructures, and the introduction of a decision support system to help leverage of improvisation by humans. To tackle all this, on the one hand we present a dynamic coalition formation framework that allows the (re)configurations of agents that are associated with joint tasks in situational contexts to be evaluated by appropriate value functions. On the other hand, we present a dynamic scale-space paradigm that allows a security company to distill ranked lists of robust context-dependent reconfigurations at critical scales. We highlight the merits of ASK-ASSIST as a solution to the problem of supporting human improvisation.  
  Address Almende B. V., Netherlands  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Delft Editor B. Van de Walle, P. Burghardt, K. Nieuwenhuis  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9789054874171; 9789090218717 Medium  
  Track IMPR Expedition Conference 4th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 489  
Share this record to Facebook
 

 
Author Edward J. Glantz; Frank E. Ritter pdf  openurl
  Title Integrative Risk Identification Approach for Mass-Gathering Security Type Conference Article
  Year 2017 Publication Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management Abbreviated Journal Iscram 2017  
  Volume Issue Pages 363-373  
  Keywords risk identification; risk management; resilience; agility; crisis; stadium security; mass-gathering security  
  Abstract Effective risk management begins with successful risk identification. Unfortunately, traditional approaches may lead to haphazard and incomplete results. To overcome this, we present a new integrative approach to improve risk identification that sequentially investigates protector-views and narrow scopes using literature review, ethnography, and subject matter expertise. This paper illustrates this approach by identifying man-made and natural threats to mass-gathering events in general, and stadium security as an example. Improving risk identification enhances resilience to known risks by enabling planning and development of targeted response strategies. Working from a more complete portfolio of risk resilience strategies may also improve flexibility and agility to respond to new and emerging risks.  
  Address The Pennsylvania State University  
  Corporate Author Thesis  
  Publisher Iscram Place of Publication Albi, France Editor Tina Comes, F.B., Chihab Hanachi, Matthieu Lauras, Aurélie Montarnal, eds  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN Medium  
  Track Planning, Foresight and Risk analysis Expedition Conference 14th International Conference on Information Systems for Crisis Response And Management  
  Notes Approved no  
  Call Number Serial 2025  
Share this record to Facebook
 

 
Author Emir Dervisevic; Miralem Mehic pdf  openurl
  Title Overview of Quantum Key Distribution Technique within IPsec Architecture Type Conference Article
  Year 2021 Publication ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal Iscram 2021  
  Volume Issue Pages 391-403  
  Keywords Quantum key distribution (QKD), Internet Protocol security (IPsec), Internet Key Exchange (IKE)  
  Abstract Quantum key distribution (QKD) is a method for secret key distribution which is secure against any future computational threat. In this paper we give an overview of existing solutions that integrate QKD method within the most popular architecture for establishing secure communication in modern IP (Internet Protocol) networks – IPsec (Internet Protocol security). The provided overview can be used to further design the integration of QKD within IPsec architecture striving for a standardized solution.  
  Address University of Sarajevo; University of Sarajevo  
  Corporate Author Thesis  
  Publisher Virginia Tech Place of Publication Blacksburg, VA (USA) Editor Anouck Adrot; Rob Grace; Kathleen Moore; Christopher W. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 978-1-949373-61-5 ISBN Medium  
  Track Enhancing Protection of Critical Infrastructures Expedition Conference 18th International Conference on Information Systems for Crisis Response and Management  
  Notes edervisevi1@etf.unsa.ba Approved no  
  Call Number ISCRAM @ idladmin @ Serial 2341  
Share this record to Facebook
 

 
Author Kevin Fall; Gianluca Iannaccone; Jayanthkumar Kannan; Fernando Silveira; Nina Taft pdf  openurl
  Title A disruption-tolerant architecture for secure and efficient disaster response communications Type Conference Article
  Year 2010 Publication ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings Abbreviated Journal ISCRAM 2010  
  Volume Issue Pages  
  Keywords Data privacy; Information systems; Network architecture; Communications infrastructure; Disaster response; Disruption tolerant networking; Information sharing; Intermittent connectivity; Redundant content; Security and privacy; Situational awareness; Disasters  
  Abstract We consider the problem of providing situational awareness when citizens in a disaster are willing to contribute their own devices, such as laptops and smart phones, to gather data (text, images, audio or video) and to help forward data gathered by others. A situational awareness service processes all received data and creates annotated maps to visualize a disaster site (e.g., the status of the disaster, such as fires or floods, the location of people, food, or water). We discuss the challenges imposed on such an application when 1) the communications infrastructure in the disaster area can only provide intermittent connectivity, 2) anxious victims generate large amounts of redundant content congesting the network, and 3) the sharing of personal devices creates security and privacy threats. We present an architecture that addresses the requirements to support such a service.  
  Address Intel Labs, Berkeley, United States; University of California, Berkeley, United States; UPMC Paris Universitas, France  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Seattle, WA Editor S. French, B. Tomaszewski, C. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN Medium  
  Track Collaboration and Social Networking Expedition Conference 7th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 483  
Share this record to Facebook
 

 
Author Florian Brauner; Julia Maertens; Holger Bracker; Ompe Aimé Mudimu; Alex Lechleuthner pdf  isbn
openurl 
  Title Determination of the effectiveness of security measures for low probability but high consequence events: A comparison of multi-agent-simulation & process modelling by experts Type Conference Volume
  Year 2015 Publication ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2015  
  Volume Issue Pages  
  Keywords Decision Support; Efficient Strategy Planning; Modelling and Simulation; Multi-Agent-Simulation; Prioritizing security measures; Scenario-based Risk Assessment Method  
  Abstract Due to the increasing danger of terrorist attacks, it is necessary to determine the preventive effects of security measures installed in e.g. public transportation systems. Since, there is no common practice to determine the preventive effects; we developed two different methodologies to analyse those effects, both are suitable for the assessment of security measures. The first method is a semi-quantitative method based on expert-estimations combined with a modelled process of an attack.The second method models the scenarios using a multi-agent-based simulation framework. Simulating a large number of runs, it is possible to derive values for indicators of interest on statistical basis. We show the suitability of both methods by applying them on a practical example of a public transportation system. In this paper we introduce both methodologies, show an exemplary application and present the strengths and weaknesses and how they can be linked to get an increased benefit.  
  Address  
  Corporate Author Thesis  
  Publisher University of Agder (UiA) Place of Publication Kristiansand, Norway Editor L. Palen; M. Buscher; T. Comes; A. Hughes  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9788271177881 Medium  
  Track Planning, Foresight and Risk Analysis Expedition Conference ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management  
  Notes Approved yes  
  Call Number Serial 1322  
Share this record to Facebook
 

 
Author Elizabeth Avery Gomez; Katia Passerini; Karen Hare pdf  isbn
openurl 
  Title Public health crisis management: Community level roles and communication options Type Conference Article
  Year 2006 Publication Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management Abbreviated Journal ISCRAM 2006  
  Volume Issue Pages 435-443  
  Keywords Bioterrorism; Information systems; Information use; National security; Security systems; Telecommunication equipment; Community informatics; Crisis management; Epidemics; Gap analysis; Home land security; Media richness; Mobile Technology; Public health  
  Abstract Crisis management efforts in the United States public health sector aim to prepare and protect the life of an individual, family or group against a health-related event. These efforts span governmental, nongovernmental and private sectors. The need for coordination between these organizations has never been more apparent. A solution will depend heavily on standardized communication protocols using information and communication technology (ICT). Numerous initiatives are currently addressing the needs of our nation with respect to homeland security and public health, yet remain in the early stages for the nongovernmental sector. The emphasis of our research is at the local level where the governmental sector extends to the nongovernmental sector (NGO), particularly community outreach. Our analysis of the local community suggests focusing on the management of communication during public health crises to better understand the complexities and variations presented in these communities. Leveraging experiences from media-technology literature findings and emergency-response efforts, we seek to identify a framework and tools to enable effective communication for those public health practitioners who serve as front-line responders to public health crises. The major contributions of this research will be to extend the use of information systems and mobile technology to the local United States public health communities to increase effective communication between organizations, while providing a state of readiness for homeland security related events.  
  Address New Jersey Institute of Technology, United States  
  Corporate Author Thesis  
  Publisher Royal Flemish Academy of Belgium Place of Publication Newark, NJ Editor B. Van de Walle, M. Turoff  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9090206019; 9789090206011 Medium  
  Track COMMUNITIES IN EMERGENCY MANAGEMENT Expedition Conference 3rd International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 531  
Share this record to Facebook
 

 
Author Tim J. Grant; Gijs Van Den Heuvel pdf  openurl
  Title Modelling the information sharing process in military coalitions: A work in progress Type Conference Article
  Year 2010 Publication ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings Abbreviated Journal ISCRAM 2010  
  Volume Issue Pages  
  Keywords Commerce; Communication; Information systems; Security systems; Coalition; Information seeking; Information sharing; Process Modeling; Security regulations; Information analysis  
  Abstract Coalition partners must share information to work together. Models of information sharing assume that it is a linear, one-way process. As part of a larger project, we studied information sharing in military coalitions. Interviews of 47 officers in NATO R&D organizations showed that one piece of information was often traded for another. This is characteristic of an information market. Security regulations make information a scarce resource, although trust may allow the regulations to be waived. Our observations have consequences for the military Network Enabled Capabilities community in their desire to migrate to a “need to share” security principle. Failing to find a suitable process model in the literature, we outline requirements and identify two possible starting points for modelling the information sharing process in military coalitions.  
  Address Netherlands Defence Academy, Netherlands  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Seattle, WA Editor S. French, B. Tomaszewski, C. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN Medium  
  Track Special Session: Studies of Command and Control Systems Expedition Conference 7th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 548  
Share this record to Facebook
 

 
Author Harrasi, A.A.; Grispos, G.; Gandhi, R. pdf  doi
openurl 
  Title Using Cybersecurity Testbeds to Evaluate (In)Secure Structural Health Monitoring Systems Type Conference Article
  Year 2023 Publication Proceedings of the 20th International ISCRAM Conference Abbreviated Journal Iscram 2023  
  Volume Issue Pages 902-908  
  Keywords Cybersecurity; Structural Health Monitoring Systems; Incident Response; Testbed  
  Abstract An increasing amount of technology is being integrated into bridges and other structures, such as dams and buildings, to proactively look for signs of deterioration or damage. These technologies are collectively known as structural health monitoring systems. While the benefits of integrating this technology are attractive, this integration is also creating an environment that is conducive to security vulnerabilities. While previous research has focused on the broader cybersecurity challenges associated with structural health monitoring systems, limited guidance is available for identifying specific security vulnerabilities in these systems and their implications for responding to security incidents. Hence, this paper presents CYBRBridge, a cybersecurity testbed that provides a sacrificial environment to assist in identifying and exploring vulnerabilities associated with structural health monitoring systems. This paper reports ongoing research efforts to develop the CYBRBridge testbed and initial results identifying vulnerabilities within the wireless components of a commercial structural health monitoring system  
  Address University of Nebraska at Omaha; University of Nebraska at Omaha; University of Nebraska at Omaha  
  Corporate Author Thesis  
  Publisher University of Nebraska at Omaha Place of Publication Omaha, USA Editor Jaziar Radianti; Ioannis Dokas; Nicolas Lalone; Deepak Khazanchi  
  Language English Summary Language Original Title  
  Series Editor Hosssein Baharmand Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition 1  
  ISSN ISBN Medium  
  Track Cybersecurity and Emergency Management Expedition Conference  
  Notes http://dx.doi.org/10.59297/CPXU9228 Approved no  
  Call Number ISCRAM @ idladmin @ Serial 2574  
Share this record to Facebook
 

 
Author Arthur H. Hendela; Murray Turoff; Starr Roxanne Hiltz pdf  openurl
  Title Cross impact security analysis using the HACKING Game Type Conference Article
  Year 2010 Publication ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings Abbreviated Journal ISCRAM 2010  
  Volume Issue Pages  
  Keywords Crime; Information systems; Models; Personnel training; Collaborative model; Cross-impact analysis; Gaming; Government organizations; Mathematical basis; Natural and man-made disasters; Planning tools; Security expenditures; Personal computing  
  Abstract Security of network assets is a high priority with little traditional return on investment. Increasingly, cyber attacks are being used by both terrorist and unfriendly government organizations. The HACKING Game, a Cross Impact Analysis planning tool, can be used to plan security resource allocation in computer networks. Cross Impact Analysis provides a mathematical basis to determine the interrelationships of one event with a set of other events. Output from the HACKING Game's Cross Impact Analysis model can be used to help justify security expenditures, with an added benefit of being a training tool for employees learning to protect networks. This paper presents details of the Hacking Game's design and its capabilities. Cross impact modeling can be used to develop games for any situation characterized by a set of offense and defense events to produce an individual or collaborative model for such things as natural and man-made disasters.  
  Address New Jersey Institute of Technology, United States  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Seattle, WA Editor S. French, B. Tomaszewski, C. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN Medium  
  Track Planning, Foresight and/or Risk Analysis Expedition Conference 7th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 569  
Share this record to Facebook
 

 
Author Jutta Hild; Jonathan Ott; Yvonne Fischer; Christian Glökler pdf  openurl
  Title Markov based decision support for cost-optimal response in security management Type Conference Article
  Year 2010 Publication ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings Abbreviated Journal ISCRAM 2010  
  Volume Issue Pages  
  Keywords Continuous time systems; Costs; Decision making; Decision support systems; Industrial management; Information systems; Markov processes; User interfaces; Continuous-time markov decision process; Cost-optimal response; Decision support tools; Security management; Situation awareness; Optimization  
  Abstract In this contribution, we introduce a prototype of a decision support tool for cost-optimal response in security management. The threat situation of a closed infrastructure, exposed to multiple threats, and the corresponding response actions are modeled by a continuous-time Markov decision process (CMDP). Since the CMDP cannot be solved exactly for large infrastructures, the response actions are determined from a heuristic, based on an index rule. The decision support tool's user interface displays the infrastructure's current threat state and proposes the heuristic response actions to the decision maker. In this way, global situation awareness can be enhanced and the decision maker is able to initiate an almost cost-optimal response action in short time.  
  Address Fraunhofer IOSB, Germany; Karlsruhe Institute of Technology (KIT), Germany  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Seattle, WA Editor S. French, B. Tomaszewski, C. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN Medium  
  Track Poster Session Expedition Conference 7th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 580  
Share this record to Facebook
 

 
Author Ivar Svare Holand; Peter Mozelius; Trond Olav Skevik pdf  openurl
  Title A structured and dynamic model for emergency management exercises Type Conference Article
  Year 2021 Publication ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management Abbreviated Journal Iscram 2021  
  Volume Issue Pages 186-197  
  Keywords Emergency exercises, Vulnerability assessment, Non-linear emergency exercise model, Norwegian-Swedish cross-border collaboration, Gaining Security Symbiosis (GSS) projects  
  Abstract Emergencies are management challenges, and emergency exercises that involve multiple collaborating parties is a means towards mastering them. Such exercises are often conducted in a virtual training environment based on complex disaster scenarios. The reported study was carried out using a requirement-focused design approach. The aim was to describe and discuss a relevant design for lean, dynamic, and cost-efficient emergency management exercise systems. Data were gathered from a literature study and analyses of earlier emergency management projects in which the authors had participated. Despite the complexity of many current emergency management exercises, the scenarios usually involve only the response phases and have a linear structure that hinders both didactic aspects and the software structure. The conclusion drawn from the study is that an emergency management exercise model should focus on managing the activities that correspond to alternatives that unfold from a dynamic scenario. Finally, the authors recommend the principles of alternate reality games as a way towards more dynamic and cost-efficient emergency exercise systems.  
  Address Nord University; Mid Sweden University; Nord University  
  Corporate Author Thesis  
  Publisher Virginia Tech Place of Publication Blacksburg, VA (USA) Editor Anouck Adrot; Rob Grace; Kathleen Moore; Christopher W. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 978-1-949373-61-5 ISBN Medium  
  Track Analytical Modeling and Simulation Expedition Conference 18th International Conference on Information Systems for Crisis Response and Management  
  Notes ivar.s.holand@nord.no Approved no  
  Call Number ISCRAM @ idladmin @ Serial 2324  
Share this record to Facebook
Select All    Deselect All
 |   | 
Details
   print

Save Citations:
Export Records: