toggle visibility Search & Display Options

Select All    Deselect All
 | 
Citations
 | 
   print
Ana Rodríguez-Hoyos, José Estrada-Jiménez, David Rebollo-Monedero, Jordi Forné, Rubén Trapero Burgos, Antonio Álvarez Romero, et al. (2019). Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
toggle visibility
Monika Büscher, Lisa Wood, & Sung-Yueh Perng. (2013). Privacy, security, liberty: Informing the design of EMIS. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 401–410). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
toggle visibility
Monika Büscher, Catherine Easton, Maike Kuhnert, Christian Wietfeld, Matts Ahlsén, Jens Pottebaum, et al. (2014). Cloud ethics for disaster response. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 284–288). University Park, PA: The Pennsylvania State University.
toggle visibility
Catherine Easton. (2016). Information Systems for Crisis Response and Management: The EU Data Protection Regulation, Privacy by Design and Certification. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings – 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
toggle visibility
Catherine Easton, & Monika Büscher. (2015). The role of the privacy impact assessment in IT Innovation in Crises: An Example. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings – 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
toggle visibility
Kevin Fall, Gianluca Iannaccone, Jayanthkumar Kannan, Fernando Silveira, & Nina Taft. (2010). A disruption-tolerant architecture for secure and efficient disaster response communications. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Inga Kroener, Hayley Watson, & Julia Muraszkiewicz. (2017). Agility in crisis management information systems requires an iterative and flexible approach to assessing ethical, legal and social issues. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 247–255). Albi, France: Iscram.
toggle visibility
Janine S. Hiller, & Roberta S. Russell. (2015). Modalities for Cyber Security and Privacy Resilience: The NIST Approach. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings – 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
toggle visibility
Larissa Aldehoff. (2019). Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
toggle visibility
Vitaveska Lanfranchi. (2017). Machine Learning and Social Media in Crisis Management: Agility vs Ethics. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 256–265). Albi, France: Iscram.
toggle visibility
Vladimir Oleshchuk. (2016). A Novel Framework for Security Enforcement in Networks for Disaster and Crisis Management. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings – 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
toggle visibility
Hayley Watson, & Rachel L. Finn. (2013). Privacy and ethical implications of the use of social media during a volcanic eruption: Some initial thoughts. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 416–420). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
toggle visibility
Select All    Deselect All
 | 
Citations
 | 
   print