toggle visibility Search & Display Options

Select All    Deselect All
 | 
Citations
 | 
   print
Monika Büscher, Lisa Wood, & Sung-Yueh Perng. (2013). Privacy, security, liberty: Informing the design of EMIS. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 401–410). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
toggle visibility
Monika Büscher, Catherine Easton, Maike Kuhnert, Christian Wietfeld, Matts Ahlsén, Jens Pottebaum, et al. (2014). Cloud ethics for disaster response. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 284–288). University Park, PA: The Pennsylvania State University.
toggle visibility
Kevin Fall, Gianluca Iannaccone, Jayanthkumar Kannan, Fernando Silveira, & Nina Taft. (2010). A disruption-tolerant architecture for secure and efficient disaster response communications. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Hayley Watson, & Rachel L. Finn. (2013). Privacy and ethical implications of the use of social media during a volcanic eruption: Some initial thoughts. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 416–420). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
toggle visibility
Select All    Deselect All
 | 
Citations
 | 
   print