Alexander Gabriel, Florian Brauner, Andreas Lotter, Frank Fiedrich, & Ompe Aimé Mudimu. (2018). The determination of critical components of European Rail Traffic Management systems towards cyber-attacks. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 291–303). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: “Recent events have shown the vulnerability of IT systems of companies, organizations or even governments to hacker attacks. At the same time, information technologies are becoming increasingly established and important in various industries (digitalization). With a view to the modern development of terrorism, cyber-attacks can be used to physically damage critical infrastructures (CI). This leads to a new dimension of cyber-attacks, which are called terrorist cyber-attacks. The following research contributes to the identification of weak information technology components of railway operating systems and thus improves the safety of public transportation in the context of the European railway traffic management system (ERTMS). The core of this paper is an extended literature research on security flaws in the ERTMS. The future introduction of a methodology for evaluating the criticality of information technology system components will build on this using cyber threats and public transportation as examples.”
|
Alexander Gabriel, Simon Schleiner, Florian Brauner, Florian Steyer, Verena Gellenbeck, & Ompe Aimé Mudimu. (2017). Process modelling of physical and cyber terrorist attacks on networks of public transportation infrastructure. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 390–399). Albi, France: Iscram.
Abstract: Recent events have demonstrated the vulnerability of IT-systems of different companies, organisations or even governments to hacker attacks. Simultaneously, information technologies have become increasingly established and important for institutions of various branches. With respect to modern terrorism developments, cyber-attacks may be used to physically harm critical infrastructures. This leads to a new dimension of cyber-attacks called “terrorist cyber-attacks”. This research-in-progress paper aims to develop a process model for data acquisition and support of decision making that seeks to enhance the security of public transportation in the context of counterterrorism. Therefore, a generic process model for terrorist cyber-attacks – produced in the research project RE(H)STRAIN1 – is intro-duced as a basis for a decision support system (DSS). In the future, such models could improve the decision process by comparing the effectiveness of different security measures.
|
Cornelius Dold, Christopher Munschauer, & Ompe Aimé Mudimu. (2020). Real-Life Exercises as a Tool in Security Research and Civil Protection – Options for Data Collections. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 244–250). Blacksburg, VA (USA): Virginia Tech.
Abstract: A real-life exercise is a scientific method used by the TH Köln to generate data sets of new technologies and operational concepts derived from research projects. The Institute of Rescue Engineering and Civil Protection (German acronym: IRG) uses a real-time locating system (RTLS), video surveillance, observers and a mass casualty incident benchmark to generate motion profiles, information flows and information on the quality of care. In this practitioner paper these different methods will be discussed and the combination of different data is described. Furthermore, an outlook is given on the extent to which the method will be improved and expand-ed in the future. Concluding it can be said that the combination of all collected data is essential for the evalua-tion of a real-life exercise in security research or civil protection.
|
Florian Brauner, Julia Maertens, Holger Bracker, Ompe Aimé Mudimu, & Alex Lechleuthner. (2015). Determination of the effectiveness of security measures for low probability but high consequence events: A comparison of multi-agent-simulation & process modelling by experts (L. Palen, M. Buscher, T. Comes, & A. Hughes, Eds.). Kristiansand, Norway: University of Agder (UiA).
Abstract: Due to the increasing danger of terrorist attacks, it is necessary to determine the preventive effects of security measures installed in e.g. public transportation systems. Since, there is no common practice to determine the preventive effects; we developed two different methodologies to analyse those effects, both are suitable for the assessment of security measures. The first method is a semi-quantitative method based on expert-estimations combined with a modelled process of an attack.The second method models the scenarios using a multi-agent-based simulation framework. Simulating a large number of runs, it is possible to derive values for indicators of interest on statistical basis. We show the suitability of both methods by applying them on a practical example of a public transportation system. In this paper we introduce both methodologies, show an exemplary application and present the strengths and weaknesses and how they can be linked to get an increased benefit.
|
Lennart Landsberg, Alexandra Braun, Ompe Aimé Mudimu, & Klaus-Dieter Büttgen. (2021). Considering end user needs when developing new technologies – a new plug and play sensor technology for locating trapped victims. In Anouck Adrot, Rob Grace, Kathleen Moore, & Christopher W. Zobel (Eds.), ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management (pp. 922–928). Blacksburg, VA (USA): Virginia Tech.
Abstract: Building collapses often happen unexpectedly and suddenly. Consequently, people are often buried under the debris. What follows is a complicated search by first responders, which is characterized by time pressure and danger. In the research project SORTIE, a modular and UAV-based technical system is being developed to support the first responders in their search efforts. During the first phase of this project, an extensive requirements analysis was conducted with the involvement of end users. This ensures that the developed technology meets the requirements for later use under realistic circumstance. The project consortium has good experience with this operational approach and is in close cooperation with end users who are part of the consortium. In addition to a comprehensive understanding of building collapses and prevailing conditions, the technical partners were also able to identify requirements that they might not have discovered without the involvement of end users and the appropriate methods.
|
Lennart Landsberg, David Ganske, Christopher Munschauer, & Ompe Aimé Mudimu. (2020). Using Existing Data to Support Operational Emergency Response in Germany – Current Use Cases, Opportunities and Challenges. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 406–415). Blacksburg, VA (USA): Virginia Tech.
Abstract: The availability of resources in the fire and ambulance services in Germany is facing a radical change. Demographic and social transition is reducing the availability of volunteer personnel, and increasing traffic congestion in cities is resulting in longer travel times for emergency vehicles. This paper presents the findings of the definition phase of a research project that addresses these changes. It shows the basic idea of how resilience of fire and ambulance services can be improved by analyzing operational data from past incidents using artificial intelligence (AI). The primary objective is the development of a decision support system for control center dispatchers, which ensures optimal use of available resources. As the result of the definition phase, this paper gives an overview of existing data, current as well as future use cases and also highlights risks and challenges that have to be considered.
|
Lennart Landsberg, Jörg Schmidt, & Ompe Aimé Mudimu. (2022). Synthesising Comparisons to Develop a Generic Command and Control System. In Rob Grace, & Hossein Baharmand (Eds.), ISCRAM 2022 Conference Proceedings – 19th International Conference on Information Systems for Crisis Response and Management (pp. 392–403). Tarbes, France.
Abstract: Large and small incidents challenge emergency services around the world. Regardless of the size of the incident, command and control (C2)-systems are used to manage the situation, allowing a rapid and coordinated intervention. As all implemented actions result from the outputs of C2-systems, they are a fundamental component of the response. That is why they must be highly reliable and efficient. A research initiative is therefore addressing the approach of evaluating C2-systems on a scenario basis and using key performance indicators (KPI). To ensure that the KPIs can be applied to any form of incident control, a generic C2-system was developed by comparing and merging six German- and English-language C2-systems as well as one international standard. With this step, a comprehensive and detailed C2-system was developed, which is presented in this paper.
|
Pauline Tobergte, Alena Knispel, Lennart Landsberg, & Ompe Aimé Mudimu. (2022). Evaluation of Tabletop Exercises in Emergency Response Research and Application in the Research Project SORTIE. In Rob Grace, & Hossein Baharmand (Eds.), ISCRAM 2022 Conference Proceedings – 19th International Conference on Information Systems for Crisis Response and Management (pp. 415–427). Tarbes, France.
Abstract: This paper presents the fields of application of the tabletop exercise in emergency response by explaining the method in emergency response research. The authors illustrate the tabletop exercise of the Institute for Rescue Engineering and Civil Protection (IRG) of the TH Köln in a research project on Sensor Systems for Localization of Trapped Victims in Collapsed Infrastructure (acronym: SORTIE) as an application example. Subsequently, the quantitative and qualitative evaluation methods used generally and specifically for the tabletop exercise of the research project SORTIE are considered, and the technical implementation is explained. The evaluation method used in the tabletop exercise consists of three sub-areas (participant survey; exercise observation; photo, video and audio recordings). Further, the analysis of the evaluation using statistical tools is explained. Finally, this paper refers to possible sources of error in the evaluation of tabletop exercises, such as exercise artificiality and subjectivity of the exercise observers.
|
Sebastian Schmitz, Konrad Barth, Tim Brüstle, Tobias Gleibs, & Ompe Aimé Mudimu. (2019). Testing the implementation of a flying localization system into emergency response using a tabletop exercise. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: To optimize the search for trapped victims after building collapses, the authors participated in the development ofI a localization system based on an unmanned aerial vehicle. The objective of this study is to evaluate an approach to implement this system into the command and control structures during the emergency response after a building collapse. For this purpose, a tabletop exercise, based on a gas explosion scenario in an apartment building, was carried out with emergency response managers of the fire department and the German federal agency of technical relief. Observers have documented the exercise. Additionally, audio and video recordings were used. Thus, statements could be made about the implementation approach and the tabletop exercise method. Based on the results, the implementation approach can be considered appropriate. In addition, knowledge was gained about the appropriateness of tabletop exercises for the purpose of scientific evaluation.
|
Sebastian Schmitz, Lennart Landsberg, Tim Brüstle, Johannes Weinem, & Ompe Aimé Mudimu. (2018). Evaluation of a flying localization system for the rescue of buried victims – A scenario based training approach. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 1143–1147). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: The objective of this study was to develop various scenarios for evaluating an unmanned aerial vehicle that is developed for the localization of buried people after a building collapse. To test their concept of implementing this system into the command structure of organized first response the authors plan to carry out a tabletop exercise in laboratory scale and a large-scale exercise. Scenario based training is used as methodic approach for these exercises. To develop realistic scenarios, relevant national and international organizations and their requirements have been identified. Also, the requirements of the localization system have been taken into account. Furthermore, real incidents have been analyzed and their match with the requirements has been verified. As result one national and one international scenario, based on real incidents, are developed.
|