Carole Adam, & Cédric Lauradoux. (2022). A Serious Game for Debating about the Use of Artificial Intelligence during the COVID-19 Pandemic. In Rob Grace, & Hossein Baharmand (Eds.), ISCRAM 2022 Conference Proceedings – 19th International Conference on Information Systems for Crisis Response and Management (pp. 554–563). Tarbes, France.
Abstract: Crises always impose a difficult compromise between safety and liberty, and the COVID-19 pandemic is no different. Governments have enforced various sanitary restrictions to reduce virus spread. With the help of Artificial Intelligence (AI), the scale of surveillance has risen to unprecedented levels. However, these technologies entail many risks, from potential errors or biases, to their extended enforcement beyond the duration of the initial crisis. Citizens should be aware that these technologies are not infallible, and measure the consequences of errors, so as to make informed decisions about what they want to accept, and for how long. To this aim, we have designed a serious game in the form of a municipal debate between citizens of a virtual town. Some first test sessions helped us improve the game design, and provided proof of the interest of this game to trigger debates and raise awareness.
|
|
Linda Plotnick, Murray Turoff, Starr Roxanne Hiltz, & Julie Dugdale. (2017). Thumbs up? Attitudes of Emergency Managers to Proposed Masters Programs in EM With an IS Focus. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 1030–1042). Albi, France: Iscram.
Abstract: Information Systems (IS) increasingly are used in Emergency Management (EM), so it is prudent to include IS study in EM education. This paper presents the results of analyzing the responses to a survey that proposed potential courses for programs at the master's level. The survey was completed by 373 practitioners, academics and/or researchers with EM experience. All proposed courses were rated above 4 on a 7-point scale for how essential they are to the curriculum. However, there were disagreements. Qualitative analysis of volunteered comments indicate that some low ratings were due to disagreement with the content of the course as described, or with the need for an entire course to cover the topic. An unexpected finding was that a substantial number of respondents spontaneously expressed opposition to the use of IS for EM in general. The findings are discussed and a preliminary curriculum is proposed.
|
|
Jozef Ristvej., Tomas Lovecek, & Katarína Kampová. (2010). eSEC – Competency based e-portal of security and safety engineering. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The main focus of the preparing electronic portal “eSEC – Competency Based e-portal of Security and Safety Engineering” – eSEC-portal, is to establish web system, which would be new tool in process of learning for students and professionals in fields focusing on security studies, safety studies and crisis management. eSEC-portal aims on preparing connections among students, teachers, professionals and experts. This interface will bring qualitative improvement for learning process of students and we suppose more activities from them in professional and scientific work. Students will have possibility to compare actual questions and problems on other institutions, in scientific and professional environment. Teachers will be able to get feedback from professionals, colleagues and students. Through the e-portal will increase the employability of the e-portal users by directly linking competencies required by employers with competencies which are available for students on the e-portal and which are not a part of the educational system.
|
|
Elizabeth Losh. (2007). The birth of the Virtual Clinic: Game spaces in the Virtual Practicum and the Virtual Terrorism Response Academy. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 551–556). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The Interactive Media Laboratory at Dartmouth Medical School produces computer games and multimedia programs for public health preparedness. With Department of Homeland Security funding, the IML is developing the Virtual Terrorism Response Academy, which uses game technology to prepare first responders for rescue efforts in which hazardous materials may be involved. This paper looks at the history of the “Virtual Clinic” concept and the original rationale for creating what Max Boisot calls “epistemology space.” It also offers an account of the VRTA designers' responses to potential criticism from learning specialists in game studies who object that the game is too didactic and discourages trial-and-error by restraining the learner in the narrative conceit of a “simulation of a simulation.”.
|
|
Eric F. T. Buiël, & Jan Lubbers. (2007). Educational agents for the training of tunnel operators. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 545–550). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The tunnel operator monitors and regulates the flow of traffic inside a tunnel, and takes actions in case an incident occurs. TNO has developed a training simulator that enables the operator to train incident situations. We are currently improving the simulator by developing intelligent agents that support a qualified operator, who trains himself, without the presence of a human instructor. This paper provides an overview of research activities in this project. In particular, it describes two types of educational agents, the authoritative instructor agent and the non-authoritative companion agent.
|
|