Daniel Lichte, Dustin Witte, & Kai-Dietrich Wolf. (2020). Comprehensive Security Hazard Analysis for Transmission Systems. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 1145–1153). Blacksburg, VA (USA): Virginia Tech.
Abstract: Critical energy infrastructures are more and more focused upon by politics and society. Modern society depends on these structures, since they enable the steady support of electricity and other types of energy. Deliberately precipitated hazards of certain critical parts of electrical transmission systems (ETS) can lead to catastrophic consequences. Therefore, the analysis of feasible security hazards and resulting consequences for the operation of transmission systems are a concern to transmission system operators (TSO). Alas, there is no common method available that comprehensively identifies these feasible security related scenarios and classifies them according to their overall criticality for the safe operation of the ETS. To tackle this challenge, we propose a comprehensive, yet easy-to-apply method to systematically identify and assess the criticality of security threat scenarios. It is conducted in four steps and consists of a matrix based consistency check of threat scenarios in a defined solution space and a convenient semi-quantitative assessment of a risk factor for the ETS. The approach is illustrated by the simplified generic example of an EETS.
|
|
Marc Schönefeld, & Malte Schönefeld. (2020). IT-Security Awareness of Emergency Alert Apps. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 396–405). Blacksburg, VA (USA): Virginia Tech.
Abstract: The article presents first research-in-progress results of an initial assessment of the IT-security awareness of five exemplary German-language emergency-alert apps. Emergency-alert mobile applications became part of many modular-oriented warning systems around the globe. Warning and intended population behavior relies on trust upon the integrity of any warning institution, be it governmental or private. IT-security is crucial in order not to undermine trust. Emergency apps do not fit into the typical entertainment purpose of mobile applications, and we show that their primarily focus on keeping the user safe from harm can cause a conflict of interest about distribution of scarce technical resources on a mobile device, which may again endanger IT-Security. We therefore promote a better integration and standardization of disaster management functionality on the operating system layer.
|
|
Vitaveska Lanfranchi, Nadia Noori, & Tudor Sirbu. (2018). GPS-based solution for tracking and protecting humanitarians in conflict zones. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 334–349). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: The operational environment in which humanitarians operate is unstable and high-risk; when operating in such environments, time becomes a critical factor. Thus, real-time location systems (RTLS) are often deployed in the operational environment to provide awareness of the location of personnel and assets in real-time that would support an informed decision making in the event of responding to emergency. Whilst standard RTLS are very precise, they are not suitable to outdoor spaces; GPS position technology can be used to identify the location of objects and people and to track them. In this paper, first, we present a description of threat scenarios identified based on information from existing security incidents datasets and from interviews with aid workers and security professionals operating in high-risk regions. Second, we describe the implementation of a GPS-based real-time location tracking and alert system for humanitarians operating in conflict zones that supports the identified scenarios.
|
|
Shada Alsalamah, Hessah Alsalamah, Jaziar Radianti, Sakher Alqahtani, Thamer Adnan Nouh, Mohamed Abomhara, et al. (2018). Information Requirements for Disaster Victim Identification and Emergency Medical Services:Hajj Crowd Disaster Case Study. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 861–873). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: Disturbing crowd disaster incidents have been witnessed in every corner of the planet, which often lead to extensive difficulties, especially when they involve mass multi-nation casualties. When conducting Disaster Victim Identification (DVI) tasks, starting from finding the missing, curing the injured, and identifying the deceased, the challenge in such disasters is the lack of information to provide Emergency Medical Services (EMS) and conduct DVI in a timely manner. The literature presents fragmented solutions that can equip either post-mortem DVI or EMS with solutions to facilitate data collection and dissemination, but they do not consider a holistic solution that allows access to the victims' right information when needed. In this paper, we analyze information needs across multi-disciplines, as well as the requirements for technical support that can help manage the identification process. Recommendations should lay a sound foundation for future multi-disciplinary research in the areas of DVI, EMS, crowd disaster, health informatics, information security and software engineering in the health sphere.
|
|
Edward J. Glantz, & Frank E. Ritter. (2017). Integrative Risk Identification Approach for Mass-Gathering Security. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 363–373). Albi, France: Iscram.
Abstract: Effective risk management begins with successful risk identification. Unfortunately, traditional approaches may lead to haphazard and incomplete results. To overcome this, we present a new integrative approach to improve risk identification that sequentially investigates protector-views and narrow scopes using literature review, ethnography, and subject matter expertise. This paper illustrates this approach by identifying man-made and natural threats to mass-gathering events in general, and stadium security as an example. Improving risk identification enhances resilience to known risks by enabling planning and development of targeted response strategies. Working from a more complete portfolio of risk resilience strategies may also improve flexibility and agility to respond to new and emerging risks.
|
|