|
Janine S. Hiller, & Roberta S. Russell. (2015). Modalities for Cyber Security and Privacy Resilience: The NIST Approach. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Cybersecurity was a major topic of discussion at the 2015 World Economic Forum in Davos – the Sony attack; huge data breaches at Target and Adobe; a 91% increase in targeted cyber-attacks; annual losses of over $400 billion; the exposure of 904 million personal data records; cyber-attacks on a Finnish bank, a South Korean credit bureau, a German factory?s industrial controls, and the Ukrainian government; as well as increased general anxiety over critical infrastructure exposure (Tobias 2014; WEC 2015). These incidents highlight the risks inherent in a world increasingly complex, interconnected, and cyber-based. Much like thinking in other fields of disaster and crisis management, creating an impenetrable boundary or eliminating cyber risk entirely has given way to building cyber resilience. Cyber resilience is a social, economic and national security issue. This paper examines one approach, the NIST Cybersecurity Framework, in terms of building resilience in both cybersecurity and privacy.
|
|
|
Kai Kamphenkel, Markus Blank, Jens Bauer, & Georg Carle. (2007). Secure transmission of pre-clinical ultrasound video data at the scene of a mass casualty incident. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 377–383). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The use of portable ultrasound devices enables a better and immediate diagnostics at the scene of a mass casualty incident. The detection of free fluid in abdomen and thorax is an important indicator for the further treatment. The gained information affects the triage of casualties, the pre-clinical medical attendance and the patient management. The presented article describes an innovative approach to transmit sonographic video streams over wireless networks to a remote hospital, where the medical data is used for diagnostics. For the secure transmission of data a new network unit is designed, which gathers information with regard to the network status and the character of transported data. This “Intelligent Network” is located in the transport layer of the OSI reference model and enables a dynamic interconnection between network and application, provides an interface for functional transparency and the disclosure of parameters and establishes the basis for an universal security system.
|
|
|
Sebastian Kurowski, Heiko Roßnagel, Jan Zibuschka, & Wolf Engelbach. (2012). A concept for interoperability of security systems in public transport. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: In the field of public transport, operators and first responders collaborate in the prevention of and reaction to security issues. In order to optimise their specific daily operational business needs in a timely manner heterogeneous information and communication systems are deployed. In case of an incident however it is crucial that the various involved parties exchange relevant information to develop a shared understanding and act in a coordinated way. Yet, heterogeneous communication and information system infrastructures often hinder this crucial flow of information. To address this shortcoming it is crucial to enable the design of interoperable system-of-systems approaches in this domain. This paper describes a conceptual model to construct system-of-systems environments in the domain of security in public transport. By building on the results of several European research projects this concept offers a starting point for modelling and documenting individual systems inside a system-of-systems architecture. © 2012 ISCRAM.
|
|
|
Larissa Aldehoff. (2019). Renouncing Privacy in Crisis Management? People's View on Social Media Monitoring and Surveillance. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Social media is used during crises and disasters by state authorities and citizens to communicate and provide, gain
and analyze information. Monitoring of platforms in such cases is both a well-established practice and a research
area. The question, whether people are willing to renounce privacy in social media during critical incidents, or
even allow surveillance in order to contribute to public security, remains unanswered. Our survey of 1,024 German
inhabitants is the first empirical study on people�s views on social media monitoring and surveillance in crisis
management. We find the willingness to share data during an imminent threat depends mostly on the type of data:
a majority (63% and 67%, respectively) would give access to addresses and telephone numbers, whereas the
willingness to share content of chats or telephone calls is significantly lower (27%). Our analysis reveals diverging
opinions among participants and some effects of sociodemographic variables on the acceptance of invasions into
privacy.
|
|
|
Lars Gerhold, & Nels Haake. (2015). Public Security in Germany 2030: Challenges for policy makers. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: This paper presents results from a two-round Expert-Delphi (N1=227, N2=126), realized in 2014, which focuses on the following research question: What are the most relevant developments affecting public security in Germany until 2030?
Theoretically the survey is based on a conceptual framework that includes assumptions on calculating the probable occurrence of risks, the relevance of megatrends and the implications of both on public security. Preliminary results show the relevance of the increasing dependency on Information and Communication Technologies (ICT), increasing exposure of critical infrastructures, the global mobility of men and goods and the widening gap between rich and poor as relevant for public security in Germany. Furthermore the potential impact of risks like ICT-crime, extreme weather events and pandemics are rated high, while their expected probability of occurrence differs from medium to high.
|
|
|
Elizabeth Losh. (2007). The birth of the Virtual Clinic: Game spaces in the Virtual Practicum and the Virtual Terrorism Response Academy. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 551–556). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The Interactive Media Laboratory at Dartmouth Medical School produces computer games and multimedia programs for public health preparedness. With Department of Homeland Security funding, the IML is developing the Virtual Terrorism Response Academy, which uses game technology to prepare first responders for rescue efforts in which hazardous materials may be involved. This paper looks at the history of the “Virtual Clinic” concept and the original rationale for creating what Max Boisot calls “epistemology space.” It also offers an account of the VRTA designers' responses to potential criticism from learning specialists in game studies who object that the game is too didactic and discourages trial-and-error by restraining the learner in the narrative conceit of a “simulation of a simulation.”.
|
|
|
Marc Schönefeld, & Malte Schönefeld. (2020). IT-Security Awareness of Emergency Alert Apps. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 396–405). Blacksburg, VA (USA): Virginia Tech.
Abstract: The article presents first research-in-progress results of an initial assessment of the IT-security awareness of five exemplary German-language emergency-alert apps. Emergency-alert mobile applications became part of many modular-oriented warning systems around the globe. Warning and intended population behavior relies on trust upon the integrity of any warning institution, be it governmental or private. IT-security is crucial in order not to undermine trust. Emergency apps do not fit into the typical entertainment purpose of mobile applications, and we show that their primarily focus on keeping the user safe from harm can cause a conflict of interest about distribution of scarce technical resources on a mobile device, which may again endanger IT-Security. We therefore promote a better integration and standardization of disaster management functionality on the operating system layer.
|
|
|
Marian Zulean, Gabriela Prelipcean, & Costinel Anuta. (2016). Retrospective Analysis of the EU Resilience to a Large-Scale Migration. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: The migration issue raises lots of questions regarding the resilience of the EU in front of such large-scale migration. This paper is the introductory part of larger research project that has in view to analyze the EU and some of the national strategic documents in order to detect when and how the migration as a security risk showed up and to clarify if it is a objective risk for EU security or it is just a tool of negotiation. The large-scale migration is a wicked problem that needs a foresight exercise not only to better understand the issue of migration but also to assess Emergency Preparedness of the EU and to prepare a long term strategy or scenarios, with regard to the way the current migration waves will impact the current European architecture. We propose to design a classical Delphi study, as basis for the above-mentioned exercise.
|
|
|
Manne Messemaker, Jeroen Wolbers, Willem Treurniet, & Kees Boersma. (2013). Shaping societal impact: Between control and cooperation. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 901–905). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: In our modem society, the impact of large-scale spfety and security incidents can be large and diverse. Yet. this societal impact is makeable and controllable to a limited extent. At best, the effect of concrete response actions is that the direct damage is somewhat reduced and that the recovery is accelerated. Proper crisis communication can make the biggest difference with respect to overall societal impact. We argue that crisis communication must strike a balance between a directive approach of chaos, command and control and a more empathic approach of continuity, coordination and cooperation. On the basis of a concrete case we analyze how crisis communication reflects the incident response approach and how societal impact is affected.
|
|
|
Miguel Ramirez de la Huerga, Victor A. Bañuls, & Murray Turoff. (2015). A Scenario-based approach for analyzing complex cascading effects in Operational Risk Management. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: This is the first paper to apply Cross Impact Analysis (CIA) and Interpretative Structural Modeling (ISM) methods for analyzing complex cascading effects in Operational Risk Management in an industrial environment. Its main objective is to improve the understanding of the overall picture of an organization?s risks. The paper summarizes the development of a CIA-ISM method of the interaction of 18 critical events of an industrial plant as a first step to improving organizational resilience based on the company?s own estimations as well as the estimates of a panel. The main benefit of using these methods is to know the relationships between different risks and consequences, direct links, indirect and cascading effects. Having the possibility of knowing a full risk map and being able to make a forecast will help to mitigate the unexpected effects and have a better response after an emergency situations is the same as being more resilient.
|
|
|
Peter L. O'Dell. (2008). Communities of trust. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (265). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Effective response to emergency, security and operational continuity events generally requires cooperation across political, physical and technical boundaries. It's necessary, therefore, to use a communications system that enables people in heterogeneous organization to communicate effectively. Since 2002, Swan Island Networks has been developing an Internet-based information sharing system that links responsible people with the information necessary to make better decisions, and to each other. The system allows people to form “Communities of Trust”, in which all community members are known and authenticated. Each community is formed by a responsible Champion, who determines who can participate and what information will be shared within the community. In order for people to be willing to share, and to accept the information they receive as genuine, the community must operate in an environment of trust. This presentation outlines the fundamental concepts, methodologies and features for access and information control that create a trusted environment, particularly Authorization, Authentication and Audit (AAA). In the system discussed, AAA elements function together to create a comprehensive trust framework, and provide a contextually appropriate level of information assurance, data protection and dissemination control.
|
|
|
Murali Raman, Magiswary Dorasamy, Saravanan Muthaiyah, & Maniam Kaliannan. (2014). Web-based community disaster management and awareness system (CEMAS) in Malaysia. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 384–393). University Park, PA: The Pennsylvania State University.
Abstract: Emergency situations are unavoidable. This paper presents the functions inherent in a prototype system that was developed in Malaysia for emergency management. The prototype is potentially useful in Selangor, a state in Malaysia that is prone to natural disasters such as flash floods and landslides. The paper is presented as a report of our on-going project in Malaysia and the intended future work regarding web-based emergency management systems in Malaysia. This prototype development is funded by the Ministry of Education in Malaysia and supported by the National Security Council of Malaysia (Majilis Keselamatan Negara, MKN).
|
|
|
Jozef Ristvej., Tomas Lovecek, & Katarína Kampová. (2010). eSEC – Competency based e-portal of security and safety engineering. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The main focus of the preparing electronic portal “eSEC – Competency Based e-portal of Security and Safety Engineering” – eSEC-portal, is to establish web system, which would be new tool in process of learning for students and professionals in fields focusing on security studies, safety studies and crisis management. eSEC-portal aims on preparing connections among students, teachers, professionals and experts. This interface will bring qualitative improvement for learning process of students and we suppose more activities from them in professional and scientific work. Students will have possibility to compare actual questions and problems on other institutions, in scientific and professional environment. Teachers will be able to get feedback from professionals, colleagues and students. Through the e-portal will increase the employability of the e-portal users by directly linking competencies required by employers with competencies which are available for students on the e-portal and which are not a part of the educational system.
|
|
|
Jozef Ristvej., Tomas Lovecek, & Katarína Kampova. (2012). ESEC portal as a tool for improvement of security focused studies. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: This article describes progress within a project approved by The Education, Audiovisual and Culture Executive Agency (EACEA) in period from 10/2009 until 10/2012. The EACEA is responsible for the management of certain parts of the EU's programmes in the fields of education, culture and audiovisual. The idea of the eSEC project originated from the social requirement to increase the quality of education in the field of Security. The fault of the current educational systems is common detachment of the taught theory form the real practical requirements. That is the reason why it is necessary to focus more on the way in which the participants of education process can be prepared for the challenges which emerges from the labor market, which competencies are required and how it would be possible to link the educational systems of various institutions most efficiently. Therefore, the aim of our project eSEC is to develop and increase the competencies of students, pedagogues and research personnel working in the field of security, but even the expert public within the EU and the world. To achieve these objectives, an electronic portal eSEC is in process of development. © 2012 ISCRAM.
|
|
|
Anthony C. Robinson, Robert E. Roth, & Alan M. MacEachren. (2010). Challenges for map symbol standardization in crisis management. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: A wide range of local, regional, and federal authorities will generate maps to help respond to and recover from a disaster. It is essential that map users in an emergency situation can readily understand what they are seeing on these maps. Standardizing map symbology is one mechanism for ensuring that geospatial information is interpretable during an emergency situation, but creating an effective map symbol standard is a complex and evolving task. Here we present preliminary results from research into the application of the ANSI 415-2006 INCITS Homeland Security Map Symbol Standard, a point symbol standard intended to support emergency management mapping for the U.S. Department of Homeland Security. This standard has so far not been widely adopted across the full range of DHS missions, and we elaborate on key issues and challenges that should be accounted for when developing future map symbol standards for crisis management.
|
|
|
Leon J.M. Rothkrantz. (2013). Crisis management using multiple camera surveillance systems. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 617–626). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: During recent disasters such as tsunami, flooding, hurricanes, nuclear disaster, earthquake people have to leave their living areas for their own safety. But it proves that some people are not informed about the evacuation, or are not willing or able to leave or don't know how to leave the hazardous areas. The topic of the paper is how to adapt current video surveillance systems along highway and streets to semi-automatic surveillance systems. When a suspicious event is detected a human operator in the control room has to be alerted to take appropriate actions. The architecture of the system and main modules are presented in the paper. Different algorithms to detect localize and track people are published by the authors elsewhere but are summarized in the current paper. The system has been tested in a real life environment and the test results are presented in the paper.
|
|
|
Johannes Sautter, Sebastian Kurowski, Heiko Roßnagel, Wolf Engelbach, & Jan Zibuschka. (2012). Interoperability for information systems in public urban transport security: The SECUR-ED interoperability notation. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: In public transport and at large urban hubs, such as metro or train stations, transport operators and first responders collaborate in the prevention of and reaction to security issues. Within the EU demonstration project SECUR-ED a specific notation for interoperability of information systems in the domain of public transport security was developed. (In this context, the interoperability of actual operating systems is not the focus.) Based on UML (Unified Modelling Language), the notation language offers the possibility for structured modelling of system-of-systems architectures. Four interoperability object templates and their interdependencies form the underlying basis. Domain-specific annotation rules and guidelines for interoperability objects and their sub-component structures allow collaboration and interpretation of this model on various granularities and stages during a systems engineering process. © 2012 ISCRAM.
|
|
|
Annie Searle. (2010). A seat at the table for operational risk. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: What role should operational risk leaders have in the executive suite? This paper argues that, when nervous CEOs ask “What can go wrong? How can we get ahead of the curve?”, they should look to their operational risk leaders. Those leaders oversee corporate and information security as well as business continuity, crisis management and disaster recovery programs inside companies. That makes them ideally qualified to take the process of crisis management, including analysis of aggregate risk across all silos – To the CEO and then into the boardroom when the need arises, before the corporate crisis is full-blown.
|
|
|
Shada Alsalamah, Hessah Alsalamah, Jaziar Radianti, Sakher Alqahtani, Thamer Adnan Nouh, Mohamed Abomhara, et al. (2018). Information Requirements for Disaster Victim Identification and Emergency Medical Services:Hajj Crowd Disaster Case Study. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 861–873). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: Disturbing crowd disaster incidents have been witnessed in every corner of the planet, which often lead to extensive difficulties, especially when they involve mass multi-nation casualties. When conducting Disaster Victim Identification (DVI) tasks, starting from finding the missing, curing the injured, and identifying the deceased, the challenge in such disasters is the lack of information to provide Emergency Medical Services (EMS) and conduct DVI in a timely manner. The literature presents fragmented solutions that can equip either post-mortem DVI or EMS with solutions to facilitate data collection and dissemination, but they do not consider a holistic solution that allows access to the victims' right information when needed. In this paper, we analyze information needs across multi-disciplines, as well as the requirements for technical support that can help manage the identification process. Recommendations should lay a sound foundation for future multi-disciplinary research in the areas of DVI, EMS, crowd disaster, health informatics, information security and software engineering in the health sphere.
|
|
|
Willem Treurniet, Rozemarijn Logtenberg, & Peter Groenewegen. (2014). Governance of occasional multi-sector networks. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 120–124). University Park, PA: The Pennsylvania State University.
Abstract: Large-scale safety and security incidents typically require the coordinated effort of multiple organisations. A networked organisation is generally seen as the most appropriate structure for coordination within safety and security collaborations. Such networks generally are mixed-sector networks in the sense that the strategic orientations of the contributing organisations differ. Our research focuses on how to prevent, overcome and cope with the tensions resulting from this mixed-sector nature. We studied cases of three major Dutch events and our preliminarily findings were that an active network governance approach contributes to a more decisive and more purposive organisation. The flexibility and decisiveness of the networked organisation can be enhanced if in addition informal network governance measures are applied. Moreover, a purposive information infrastructure, directed towards a limited number of clear priority issues, is a key enabler of the functioning of the network.
|
|
|
Bartel A. Van De Walle, Ronald Spanjers, & Dirk De Wit. (2006). Stakeholder perceptions and standards for information security risks : A case study at a dutch health care organization. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 513–527). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: With the increased use of electronic patient files in Health Care Organizations (HCOs), addressing the risks related to the storage and use of patient information has become increasingly important to avoid intentional or unintentional disclosure, damage to or abuse of patients' personal health records. This has lead governments from various countries to introduce and impose information security standards for HCOs. The Dutch government introduced the NEN 7510 national information security standard; a standard derived from the international ISO 17799 norm. Preceding the implementation phase of NEN 7510 standard at a Dutch HCO, we conducted a field study to identify the information security risks as perceived by the main stakeholder groups in the HCO. We present the differences in the perceived information security risks and threats by end users, management and suppliers, and the degree to which these identified risks will be addressed by the implementation of the NEN 7510 standard.
|
|
|
Victor A. Bañuls Silvera, Rafael Cantueso Burguillos, Fernando Tejedor Panchón, Miguel Ramírez de la Huerga, & Murray Turoff. (2019). A Delphi approach for the establishment of the fundamental principles of an Organizational Security System in Public Administration. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: The aim of this work is defining fundamental principles of an Internal Security System in the presence of intentional risks in Public Administration. The relevance of this object of study has increased even more with the emergence of new terrorist groups and the proliferation of organized crime, which have been categorized as a maximum threat to Security by the government. This context has led to new regulations and legislation on Security matters at the national and international level to protect assets, people and the activity of the Administration itself. Despite the large number of regulations and relevance of this topic, there is not any study which defines in a comprehensive manner the requirements that a security system must have in the presence of intentional risks in Public Administration. The results of this work are intended to be a reference for the Public Administration, for the prevention and reaction to damage to people, property, and operation, intentionally caused by external agents, personnel themselves or users. These principles have been applied and validated through a Delphi process in the Administration of the Regional Government of Andalusia in which more than 40 security-related managers have participated.
|
|
|
Vitaveska Lanfranchi, Nadia Noori, & Tudor Sirbu. (2018). GPS-based solution for tracking and protecting humanitarians in conflict zones. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 334–349). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: The operational environment in which humanitarians operate is unstable and high-risk; when operating in such environments, time becomes a critical factor. Thus, real-time location systems (RTLS) are often deployed in the operational environment to provide awareness of the location of personnel and assets in real-time that would support an informed decision making in the event of responding to emergency. Whilst standard RTLS are very precise, they are not suitable to outdoor spaces; GPS position technology can be used to identify the location of objects and people and to track them. In this paper, first, we present a description of threat scenarios identified based on information from existing security incidents datasets and from interviews with aid workers and security professionals operating in high-risk regions. Second, we describe the implementation of a GPS-based real-time location tracking and alert system for humanitarians operating in conflict zones that supports the identified scenarios.
|
|
|
Vladimir Oleshchuk. (2016). A Novel Framework for Security Enforcement in Networks for Disaster and Crisis Management. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: The paper proposes a framework that provides security in networks deployed in disaster areas. Traditional networks are not well suitable to use in such setting due to many unusual constraints such as long delays, high packet drop rates, unavailability of central trusted entity etc. Under such constraints existing security protocols do not work. Proposed here approach provides solutions for some of these problems often listed as challenges in the literature. We consider delay-tolerant wireless networks as a most suitable for such setting, and propose a trust based approach that provides flexible and efficient solutions that can be used in disaster arears.
|
|
|
Hayley Watson, Lemi Baruh, Rachel L. Finn, & Salvatore Scifo. (2014). Citizen (in)security?: Social media, citizen journalism and crisis response. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 294–298). University Park, PA: The Pennsylvania State University.
Abstract: The use of social media in a crisis has been applauded, and is witnessing an increase in uptake among those involved in crisis management activities, including citizens. Whilst some challenges have been discussed elsewhere, somewhat lacking is a discussion on the impact of sharing information on the security of those that may have been recorded. Accordingly, this working paper aims to provide preliminary results of an initial mapping task that seeks to examine the impact of the use of social media in a crisis on the social and ethical wellbeing of the security of the citizen. Authors argue that the heightened involvement of citizen journalism results in the filtering of information after its online publication which raises concerns relating to the dissemination of false information and a threat to an individual's privacy. Such issues should be adequately addressed in the encouragement and use of citizen contributions in crisis response.
|
|