toggle visibility Search & Display Options

Select All    Deselect All
 | 
Citations
 | 
   print
Alexandre Ahmad, Olivier Balet, Arjen Boin, Julien Castet, Maureen Donnelley, Fabio Ganovelli, et al. (2016). Assessing the Security of Buildings: A Virtual Studio Solution. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings – 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
toggle visibility
Ana Rodríguez-Hoyos, José Estrada-Jiménez, David Rebollo-Monedero, Jordi Forné, Rubén Trapero Burgos, Antonio Álvarez Romero, et al. (2019). Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
toggle visibility
Ummul Khair Israt Ara, & Fang Chen. (2012). Information security in crisis management system. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
toggle visibility
Gabriel Bartl, Lars Gerhold, & Matthias Wählisch. (2014). Towards a theoretical framework of acceptance for surveillance systems at airports. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 299–303). University Park, PA: The Pennsylvania State University.
toggle visibility
Alena L. Benson, Keith Biggers, Jim Wall, & Mark P. Haselkorn. (2010). Adaptive development of a common operating environment for crisis response and management. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Peter H. Berghmans, Gerd Van Den Eede, & Bartel A. Van De Walle. (2008). A systems perspective on security risk identification: Methodology and illustrations from city councils. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 266–275). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Monika Büscher, Lisa Wood, & Sung-Yueh Perng. (2013). Privacy, security, liberty: Informing the design of EMIS. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 401–410). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
toggle visibility
Chiara Bassetti, Roberta Ferrario, & Maria Luiza M. Campos. (2015). Airport security checkpoints: an empirically-grounded ontological model for supporting collaborative work practices in safety critical environments. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings – 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
toggle visibility
Erman Coskun, & Jessica Hoey. (2005). Airport security complexity: Problems with the information system components. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 61–66). Brussels: Royal Flemish Academy of Belgium.
toggle visibility
Daniel Lichte, Dustin Witte, & Kai-Dietrich Wolf. (2020). Comprehensive Security Hazard Analysis for Transmission Systems. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 1145–1153). Blacksburg, VA (USA): Virginia Tech.
toggle visibility
Naci Dilekli, & Tarek Rashed. (2007). Towards a GIS data model for improving the emergency response in the Least Developing Countries: Challenges and opportunities. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 57–62). Delft: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Magiswary Dorasamy, & Murali Raman. (2011). Information systems to support disaster planning and response: Problem diagnosis and research gap analysis. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Douglas A. Samuelson, Matthew Parker, Austin Zimmerman, Loren Miller, Stephen Guerin, Joshua Thorp, et al. (2008). Agent-based simulations of mass egress after Improvised Explosive Device attacks. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 59–70). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Duco N. Ferro, Jeroen M. Valk, & Alfons H. Salden. (2007). A robust coalition formation framework for mobile surveillance incident management. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 479–488). Delft: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Edward J. Glantz, & Frank E. Ritter. (2017). Integrative Risk Identification Approach for Mass-Gathering Security. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 363–373). Albi, France: Iscram.
toggle visibility
Kevin Fall, Gianluca Iannaccone, Jayanthkumar Kannan, Fernando Silveira, & Nina Taft. (2010). A disruption-tolerant architecture for secure and efficient disaster response communications. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Florian Brauner, Julia Maertens, Holger Bracker, Ompe Aimé Mudimu, & Alex Lechleuthner. (2015). Determination of the effectiveness of security measures for low probability but high consequence events: A comparison of multi-agent-simulation & process modelling by experts (L. Palen, M. Buscher, T. Comes, & A. Hughes, Eds.). Kristiansand, Norway: University of Agder (UiA).
toggle visibility
Elizabeth Avery Gomez, Katia Passerini, & Karen Hare. (2006). Public health crisis management: Community level roles and communication options. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 435–443). Newark, NJ: Royal Flemish Academy of Belgium.
toggle visibility
Tim J. Grant, & Gijs Van Den Heuvel. (2010). Modelling the information sharing process in military coalitions: A work in progress. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Arthur H. Hendela, Murray Turoff, & Starr Roxanne Hiltz. (2010). Cross impact security analysis using the HACKING Game. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Jutta Hild, Jonathan Ott, Yvonne Fischer, & Christian Glökler. (2010). Markov based decision support for cost-optimal response in security management. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Janine S. Hiller, & Roberta S. Russell. (2015). Modalities for Cyber Security and Privacy Resilience: The NIST Approach. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings – 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
toggle visibility
Kai Kamphenkel, Markus Blank, Jens Bauer, & Georg Carle. (2007). Secure transmission of pre-clinical ultrasound video data at the scene of a mass casualty incident. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 377–383). Delft: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Sebastian Kurowski, Heiko Roßnagel, Jan Zibuschka, & Wolf Engelbach. (2012). A concept for interoperability of security systems in public transport. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
toggle visibility
Larissa Aldehoff. (2019). Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
toggle visibility
Select All    Deselect All
 | 
Citations
 | 
   print