Amanda L. Hughes, Leysia Palen, Jeannette N. Sutton, Sophia B. Liu, & Sara Vieweg. (2008). Site-seeing in disaster: An examination of on-line social convergence. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 324–333). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: On-line websites and applications are increasingly playing a role in disaster response and recovery. Yet with the wide variety of on-line grassroots activities that occur in such situations, it can be difficult to make sense of them. In this paper, we describe on-line behavior as socially convergent activity, interpreting it within existing sociological understandings of behavior in disaster events. We discuss seven types of convergent behavior and give examples of on-line activities for each type. By seeing these activities as an essential part of the disaster social arena, we can begin to think about how to support socially convergent phenomena in new and creative ways.
|
|
Zeno Franco, Nina Zumel, John Holman, Kathy Blau, & Larry E. Beutler. (2009). Evaluating the impact of improvisation on the incident command system: A modified single case study using the DDD simulator. In S. J. J. Landgren (Ed.), ISCRAM 2009 – 6th International Conference on Information Systems for Crisis Response and Management: Boundary Spanning Initiatives and New Perspectives. Gothenburg: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: This study attempted to evaluate the utility of the Incident Command System (ICS) in varying disaster contexts. ICS is mandated in the United States and practitioners assert that it is an effective organizing system for emergency management. However, researchers contend that the utility of ICS is conflated with inter-team familiarity gained during ICS exercises. A military team-in-the-loop simulator was customized to represent the problems, resources, and command structures found in civilian led disaster management teams. A modified single case design drawn from behavioral psychology was used to explore possible casual relationships between changes team heterogeneity and performance. The design also allowed for the evaluation of improvisation on performance. Further, psychological factors that may underpin improvisation were explored. In addition to some preliminary empirical findings, the successes and difficulties in adapting the DDD simulator are briefly discussed as part of an effort to achieved greater interdisciplinary integration.
|
|
Jaco Appelman, Elisabeth A. M. Van De Kar, Mariëlle Hengst-Bruggeling, Josine Van De Ven, & Paul Burghardt. (2006). A service elicitation process for crisis management technologies. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 352–361). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: New information technological applications, that aim to support better professional responses to incidents and crises' are being developed at an increasing rate. We observe in almost any disaster that actions by civilians also contribute substantially to alleviation of the effects of a crisis. We are largely unaware what crisis management services would be of use to civilians under these particular circumstances; just as it is difficult for users to specify requirements for services based on novel technologies. These insights guided the design of a service elicitation approach that can be repeatedly used for different user groups. In this paper we introduce a design methodology and discuss outcomes of a first test-session. We reflect in the conclusions on improvements to the design.
|
|
Delia Berrouard, Krisztina Cziner, & Adrian Boukalov. (2006). Emergency scenario user perspective in public safety communication systems. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 386–396). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: In the area of emergency response communication technologies, consideration of organization structure is critical in order to begin the understanding of user needs and optimize the development of effective technologies. User studies were carried out during the Wireless Deployable Network System European project-WIDENS. This paper discusses the information flow and spatial distribution of different European organizations involved in emergency response for various large-scale scenarios. The paper presents the operational view of emergency situation and related communication flows in several countries. Key results revealed that similarities exist in organizational roles, holding specific responsibilities in terms of location and task. Hierarchical arrangements and information flow may also be similar. However, difficulties lie in the efficient transmission of information due to slow information flow. Spatial distribution of personnel varies for scenarios. Future European studies are recommended for the advancement of our understanding of these newly addressed issues in public safety communication technologies and the needs of users in Europe.
|
|
Rae Zimmerman, & Carlos E. Restrepo. (2006). Information technology (IT) and critical infrastructure interdependencies for emergency response. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 382–385). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: Information technologies and other critical infrastructures are interconnected in ways that can lead to vulnerabilities in the ability of these infrastructures to perform during natural disasters and acts of terrorism either to reduce adverse consequences or provide needed emergency response services. This research applies and adapts a number of indicators of infrastructure interdependency based on the authors' earlier research to determine where weak points and strengths occur in the interconnections between infrastructure technology and other infrastructure support services such as electric power and transportation, and where weak points create vulnerability that can be improved for more effective response in emergencies.
|
|