Bas Lijnse. (2022). Modeling Real World Crisis Management Plans with C2Sketch. In Rob Grace, & Hossein Baharmand (Eds.), ISCRAM 2022 Conference Proceedings – 19th International Conference on Information Systems for Crisis Response and Management (pp. 404–413). Tarbes, France.
Abstract: When crisis management plans are described in natural language documents, they may contain logical inconsistencies or ambiguities that are not immediately apparent. To allow automated early detection of such errors, they need to be described in a well defined formalism. C2Sketch is a tool for modeling command and control systems that provides such a structure for formalizing (crisis management) plans. However, C2Sketch is in active development and to what extent real-world crisis management plans can be expressed in it is unknown. In this exploratory study the unstructured text of a small sample of publicly available regional-level crisis management plans was translated systematically into structured C2Sketch mission-plans to uncover limitations and opportunities for further development of the tool. The plans contained enough information to largely capture the networks of actors and their tasks therein, but did contain enough operational information to develop complete C2Sketch models from.
|
|
Sandra König, & Stefan Schauer. (2019). Cascading Threats in Critical Infrastructures with Control Systems. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Critical infrastructures (CIs) increase in complexity due to numerous dependencies on other CIs but also due to the ongoing digitalization in the industry sector. This yields an increased risk of failure of a single CI as the overall systems gets very fragile and sensitive to errors Failure of a single component may affect large parts of an infrastructure due to cascading effects. One way to support functionality of a CI is the use of Industrial Control Systems (ICS) that allow monitoring remote sites and controlling processes. However, this is an additional source for threats as recent cyber-attacks have shown. Further, the additional information for such cyber systems is often not efficiently combined with existing information on the physical infrastructure. We here propose a method to combine these two sources of information in order to estimate the impact of a security incident on CIs, taking into account cascading effects of threats. An implementation of the model allows simulation of the dynamics inside a CI and yields a record of the status of each asset of the CI. The way the assets change their states illustrates the consequences of an incident on the entire CI. Visualization of the results provides an overview on the situation of the entire CI at a certain point of time and a sequence of such visualization over an entire period of time illustrates the changes over time. The results from this analysis may be used to support security officers in analyzing the current (hybrid) state of their CI in case of an incident and thus increase the hybrid situational awareness.
|
|
Duco N. Ferro, Jeroen M. Valk, & Alfons H. Salden. (2007). A robust coalition formation framework for mobile surveillance incident management. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 479–488). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Given unexpected incidents on routes of guards that check security objects, like banks, one of the most challenging problems is still how to support improvisation by security personnel in taking decisions to prevent or resolve such incidents. Another as important associated problem is how a security company can naturally take advantage of its existing and novel knowledge about its organizational and ICT infrastructures, and the introduction of a decision support system to help leverage of improvisation by humans. To tackle all this, on the one hand we present a dynamic coalition formation framework that allows the (re)configurations of agents that are associated with joint tasks in situational contexts to be evaluated by appropriate value functions. On the other hand, we present a dynamic scale-space paradigm that allows a security company to distill ranked lists of robust context-dependent reconfigurations at critical scales. We highlight the merits of ASK-ASSIST as a solution to the problem of supporting human improvisation.
|
|
Robin E. Mays, Mark Zachry, Murat, A., & Mark P. Haselkorn. (2011). Aligning border security workflow and decision making with supporting information and communication systems. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: As part of the National Center for Border Security and Immigration (NCBSI) led by the University of Texas at El Paso (UTEP), researchers from the University of Washington, Wayne State University, and UTEP conducted a three-site study of border security operations and the role of command, control and communication (C3) systems in support of those operations. While inevitably bringing some positive capability to the environment, if C3 systems are not consciously aligned with desired practices and decision-making, the implications will not always be for the better. This is especially true of C3 systems in the border security environment because these systems are intimately intertwined with complex and critical workflow and decision-making processes, often in the context of complex and, at times, competing missions.
|
|
Magnus Ingmarsson, Henrik Eriksson, & Niklas Hallberg. (2009). Exploring development of service-oriented C2 systems for emergency response. In S. J. J. Landgren (Ed.), ISCRAM 2009 – 6th International Conference on Information Systems for Crisis Response and Management: Boundary Spanning Initiatives and New Perspectives. Gothenburg: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Local emergency-response organizations must maximize their use of existing resources. Therefore, emergencyresponse organizations need appropriate command-and-control (C2) systems to coordinate not only their own resources, but also to take advantages of other local actors. The local nature of response coordination imposes additional challenges for the development of C2 systems. In particular, the C2 systems must support coordination across organizational boundaries at the local level. Service-oriented architectures (SOA) provide new technologies for the development of C2 systems. This approach is based on a set of loosely-coupled services offered by multiple actors rather than a single monolithic system. This work reports the result of a prototype SOA implementation that builds on a previous requirements engineering study for service-oriented C2 systems for local emergency response. The results illustrate how it is possible to develop lightweight C2 systems using state-or-the art Web and SOA technologies. However, there are still remaining organizational and maintainability challenges.
|
|