|
Carole Adam, & Eric Andonoff. (2019). Vigi Flood: a serious game for understanding the challenges of crisis communication. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Emergency managers receive communication training about the importance of being ?first, right and credible?,
which is not easy. For instance, in October 2018, the Aude department in the South-West of France was hit by
intense rain. Flash floods were hard to forecast and only the ?orange? level of vigilance could be raised initially, but
the population dismissed this very usual warning in that season. The ?red? level was then raised too late, leading
to high criticism. The main problem here is the loss of trust induced by too many ?false alarms?. In this paper
we propose a serious game called VigiFlood for raising awareness in the population about the difficulty of crisis
communication and their own responsibility for reacting to the alerts. The implemented game still has limited
functionality but already shows interesting results in helping the user to visualise and understand the trust dynamics
|
|
|
Bjørn Erik Munkvold, Jaziar Radianti, Jan Ketil Rød, Tomasz Opach, Mikael Snaprud, Sofie Pilemalm, et al. (2019). Sharing Incident and Threat Information for Common Situational Understanding. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: This paper presents the INSITU research project initiated to provide a systematic approach for effective sharing, integration and use of information from different sources, to establish a common operational picture (COP) and shared situational understanding among multiple actors in emergency response. The solution developed will provide an interactive map display, integrating harmonisation of terminology and collaboration support for information sharing and synthesis. The enhanced COP will also support evaluation and learning from exercises and incidents. The project involves close collaboration with emergency management stakeholders in Norway, for requirements analysis, participatory design, and validation of project deliverables. The research will improve information sharing and decision support in emergency operations centres, which will contribute to improve societal resilience through more effective response capability.
|
|
|
Basanta Chaulagain, Aman Shakya, Bhuwan Bhatt, Dip Kiran Pradhan Newar, Sanjeeb Prasad Panday, & Rom Kant Pandey. (2019). Casualty Information Extraction and Analysis from News. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: During unforeseen situations of crisis such as disasters and accidents we usually have to rely on local news reports for the latest updates on casualties. The information in such feeds is in unstructured text format, however, structured data is required for analysis and visualization. This paper presents a system for automatic extraction and visualization of casualty information from news articles. A prototype online system has been implemented and tested with local news feed of road accidents. The system extracts information regarding number of deaths, injuries, date, location, and vehicles involved using techniques like Named Entity Recognition, Semantic Role Labeling and Regular expressions. The entities were manually annotated and compared with the results obtained from the system. Initial results are promising with good accuracy overall. Moreover, the system maintains an online database of casualties and provides information visualization and filtering interfaces for analysis.
|
|
|
Bas Lijnse. (2019). Robust Private Web Maps with Open Tools and Open Data. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Crisis management information often has a geospatial dimension that allows it to be visualized on a map. As
more and more systems are developed as web-based applications, maps have also become a common sight in such
applications. The de-facto solution to add maps to web-based applications is to integrate a third-party service.
For web-based crisis management information systems, this approach has two disadvantages. First, the third-party
service must be available and reachable. Second, by using third-party services you implicitly share what you are
viewing, with the risk of unintentionally exposing sensitive location information. In this Tool Talks paper, we show
how to create a robust and private alternative for web-based maps using open source tools and open data.
|
|
|
Axel Dierich, Katerina Tzavella, Neysa Jacqueline Setiadi, Alexander Fekete, & Florian Neisser. (2019). Enhanced Crisis-Preparation of Critical Infrastructures through a Participatory Qualitative-Quantitative Interdependency Analysis Approach. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Critical Infrastructure (CI) failures are aggravated by cascading effects due to interdependencies between
different infrastructure systems and with emergency management. Findings of the German, BMBF-funded
research project ?CIRMin? highlight needs for concrete assessments of such interdependencies. Driven by
challenges of limited data and knowledge accessibility, the developed approach integrates qualitative
information from expert interviews and discussions with quantitative, place-based analyses in three selected
German cities and an adjacent county.
This paper particularly discusses how the mixed methods approach has been operationalized. Based on
anonymized findings, it provides a comprehensive guidance to interdependency analysis, from survey and
categorization of system elements and interrelations, their possible mutual impacts, to zooming into selected
dependencies through GIS mapping. This facilitates reliably assessing the need for maintenance of critical
functionalities in crisis situations, available resources, auxiliary powers, and optimization of response time.
|
|
|
Aurélie Congès, Frédérick Bénaben, Olivier Pierre, Francis Savic, Olivier Chabiron, & Matthieu Lauras. (2019). On the usage of Virtual Reality for Crisis Management exercises in Critical Industrial Sites. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: EGCERSIS is a starting research program aiming at defining a virtual collaborative training space for crisis management. It should provide the users (first and second aid, firefighters, etc.) with a way to virtually perform operational and strategic tasks of crisis management in digital twins of critical infrastructures. The training system is structured according to four main components: (i) protocol and tools for digital twins generation, (ii) scenario editor dedicated to defining crisis use-cases within the modeled digital twins, (iii) integration with the technological crisis management platform (RIO-Suite), and (iv) monitoring component in charge of the continuous edition of dashboards (real-time and afterward). The main expected benefit of the EGCERSIS program is to create a breakthrough in the way training and exercises are performed in critical sites.
|
|
|
Asmelash Teka Hadgu, Sallam Abualhaija, & Claudia Niederée. (2019). Real-time Adaptive Crawler for Tracking Unfolding Events on Twitter. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: When a major event such as a crisis situation occurs, people post messages on social media sites such as Twitter, in
order to exchange information or to share emotions. These posts can provide useful information to raise situation
awareness and support decision making, e.g., by aid organizations. In this paper, we propose a novel method for
social media crawling, which exploits a Bayesian inference framework to keep track of keyword changes over time
and uses a counter-stream to gauge the inclusion of noise and irrelevant information. In addition, we present a
framework to evaluate real-time adaptive social search algorithms in a reproducible manner, which relies on a
semi-automated approach for ground-truth construction. We show that our method outperforms previous methods
for very large scale events.
|
|
|
Anying Chen, Guofeng Su, & Manchun Liang. (2019). Simulation of Crowd Response During Emergency Considering People's Rational and Irrational Thinking. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Human beings have been facing numerous emergencies which could threaten their property or even their lives in all ages. In order to learn how people respond to the emergencies like earthquakes and fire disasters, a two-stage simulation considering people?s rational thinking and irrational thinking was conducted. Results show that people?s irrational thinking, like the herd effect, could exaggerate people?s behavior of conformity, and it changes the spatial features that stronger herd effect leads to higher cohesion level. It is also worth mentioning that crowd response of condition of smaller population is harder to predict because of its instability, and the response of the very first part of people who make decisions could make great changes to the whole crowd?s response. These results could give some enlightenment on the evacuation instruction during emergencies and future research works.
|
|
|
Anna Kruspe, Jens Kersten, & Friederike Klan. (2019). Detecting event-related tweets by example using few-shot models. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Social media sources can be helpful in crisis situations, but discovering relevant messages is not trivial. Methods
have so far focused on universal detection models for all kinds of crises or for certain crisis types (e.g. floods).
Event-specific models could implement a more focused search area, but collecting data and training new models for
a crisis that is already in progress is costly and may take too much time for a prompt response. As a compromise,
manually collecting a small amount of example messages is feasible. Few-shot models can generalize to unseen
classes with such a small handful of examples, and do not need be trained anew for each event. We show how
these models can be used to detect crisis-relevant tweets during new events with just 10 to 100 examples and
counterexamples. We also propose a new type of few-shot model that does not require counterexamples.
|
|
|
Ana Rodríguez-Hoyos, José Estrada-Jiménez, David Rebollo-Monedero, Jordi Forné, Rubén Trapero Burgos, Antonio Álvarez Romero, et al. (2019). Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern
computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold.
To improve these capabilities, logs are usually shared with external entities. However, since cybersecurity logs
might contain sensitive data, serious privacy concerns arise, even more when critical infrastructures (CI), handling
strategic data, are involved.
We propose a tool to protect privacy by anonymizing sensitive data included in cybersecurity logs. We implement
anonymization mechanisms grouped through the definition of a privacy policy. We adapt said approach to the
context of the EU project CIPSEC that builds a unified security framework to orchestrate security products, thus
offering better protection to a group of CIs. Since this framework collects and processes security-related data from
multiple devices of CIs, our work is devoted to protecting privacy by integrating our anonymization approach.
|
|
|
Ana Gabriela Núñez Avila, & Mª Carmen Penadés Gramage. (2019). Towards an organization certified in emergency plans management. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: QuEP is a framework that guides organizations in assessing and improving their emergency plan management by
following a set of principles, practices, and techniques at the different maturity levels established in the QuEP model.
Its main objective is to be applied to real cases to discover the state of an organization?s emergency plan management
and recommend techniques for improvement. In this paper, we describe the first application of QuEP as a prior step
to its implementation and possible use in official certifications for emergency plans with a guarantee of quality. So,
we have applied a real case in a UPV building towards the certification of the emergency plan management.
|
|
|
Amanda Langer, Marc-André Kaufhold, Elena Maria Runft, Christian Reuter, Margarita Grinko, & Volkmar Pipek. (2019). Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: With the increase of terrorist attacks and spreading extremism worldwide, countermeasures advance as well. Often
social media is used for recruitment and radicalization of susceptible target groups. Counter narratives are trying
to disclose the illusion created by radical and extremist groups through a purposive and educational counter
statement, and to initiate a rethinking in the affected individuals via thought-provoking impulses and advice. This
exploratory study investigates counter narrative campaigns with regard to their fight and prevention against
terrorism in social media. Posts with strong emotions and a personal reference to affected individuals achieved
the highest impact and most reactions from the target group. Furthermore, our results illustrate that the impact of
a counter narrative campaign cannot be measured solely according to the reaction rate to their postings and that
further analysis steps are therefore necessary for the final evaluation of the campaigns.
|
|
|
Amanda Jaber, Björn Johan Erik Johansson, Linnea Bergsten, Joeri Laere van, & Peter Berggren. (2019). Evaluating the observation protocol of the Team Resilience Assessment Method for Simulation (TRAMS). In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: This work in progress paper presents an initial evaluation of the observation protocol of the Team Resilience Assessment Method for Simulation (TRAMS) conducted in a crisis response simulation project. TRAMS is designed to assess the resilience of crisis response teams. The TRAMS observation protocol uses six core resilience functions from the Systemic Resilience Model as its theoretical foundation. Three independent observers used the protocol during a pilot study and six actual simulation games. Strategies relating to three out of six core resilience functions could be identified. The observations made were distributed similarly among the observers, indicating that the components of the TRAMS protocol are stable enough to continue developing the protocol. This study describes changes made to the protocol since the original design, and describes how the strategies relating to the six core resilience functions can be identified in the simulation games.
|
|
|
Ahmed Abdeltawab Abdelgawad, & Tina Comes. (2019). Evaluation Framework for the iTRACK Integrated System. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Evaluation and testing are major steps in the development of any information system, particularly if it is to be used in high-risk contexts such as conflicts. While thus far there are various approaches for testing against technology requirements; usability or usefulness, there is a lack of a comprehensive evaluation framework that combines the three elements. The lack of such a framework and commonly agreed standards constitutes a barrier for innovation, and at the same time imposes risks to responders if the technology is introduced without proper testing. This paper aims to close this gap. Based on a reviewing of evaluation methods and measurement metrics, we design a comprehensive evaluation framework including common code quality testing metrics, usability testing methods, subjective usefulness questionnaires, and performance indicators. We demonstrate our approach by using the example of an integrated system for the safety and security of humanitarian missions, and we highlight how our approach allows measuring the system?s quality and usefulness.
|
|
|
Ahmed Abdeltawab Abdelgawad. (2019). Reliability of expert estimates of cascading failures in Critical Infrastructure. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Owing to the complexity of Critical Infrastructures and the richness of issues to analyze, numerous approaches are used to model the behavior of CIs. Organizations having homeland security as mission often conduct desktop-based simulations using judgmental assessment of CI interdependencies and cascading failures. Expert estimates concern direct effects between the originally disrupted CI sector and other sectors. To better understand the magnitude of aggregate cascading effects, we developed a system dynamics model that uses expert estimates of cascading failures to compare the aggregate effect of cascading failures with the primary direct cascading failures. We find that the aggregate effect of compounded cascading failures becomes significantly greater than the primary cascading failures the longer the duration of the original disruption becomes. Our conceptually simple system dynamics model could be used to improve desktop-based exercises, since it illustrates consequences that go beyond judgmental assessment.
|
|
|
Abbas Ganji, Tom Wilson, Sonia Saveli, Dharma Dailey, & Mark Haselkorn. (2019). Cause and Effect: A Qualitative Analysis of Obstacles to Information Sharing During a Regional Disaster Exercise. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: After large-scale disasters, diverse partner agencies rely heavily on an information-sharing environment that supports collaborative work. In the U.S., this occurs under the Incident Command System (ICS), a structured organizational framework for coordinated action. We explore obstacles to information sharing and coordinationobserved at a county-level Emergency Operations Center (EOC) operating under ICS during the response phase of a large-scale regional disaster exercise. Textual observations collected in situ are analyzed for both the effect/manifestation and cause/source of barriers to information sharing. Two-thirds of barriers that manifest as computational issues are not caused by technology breakdowns, and a third caused by unclear processes manifest as computational issues. Overall, obstacles to collaborative work that appear to be related to computational issues are generally attributable to non-technical causes. This indicates that resources directed at improving collaborative management of disasters by enhancing technological capabilities are likely to be misdirected.
|
|
|
Abbas Ganji, Negin Alimohammadi, & Scott Miles. (2019). Challenges in Community Resilience Planning and Opportunities with Simulation Modeling. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: The importance of community resilience has become increasingly recognized in emergency management and
post-disaster community well-being. To this end, three seismic resilience planning initiatives have been
conducted in the U.S. in the last decade to envision the current state of community resilience. Experts who
participated in these initiatives confronted challenges that must be addressed for future planning initiatives.
We interviewed eighteen participants to learn about the community resilience planning process, its
characteristics, and challenges. Conducting qualitative content analysis, we identify six main challenges to
community resilience planning: complex network systems; interdependencies among built environment systems;
inter-organizational collaboration; connections between the built environment and social systems;
communications between built environment and social institutions? experts; and communication among
decision-makers, social stakeholders, and community members. To overcome the identified challenges, we
discuss the capability of human-centered simulation modeling as a combination of simulation modeling and
human-centered design to facilitate community resilience planning.
|
|