Laura Petersen, Laure Fallou, Grigore Havarneanu, Paul Reilly, Elisa Serafinelli, & Rémy Bossu. (2018). November 2015 Paris Terrorist Attacks and Social Media Use: Preliminary Findings from Authorities, Critical Infrastructure Operators and Journalists. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 629–638). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: Crisis communication is a key component of an effective emergency response. Social media has evolved as a prominent crisis communication tool. This paper reports how social media was used by authorities, critical infrastructure operators and journalists during the terrorist attacks that hit Paris on 13th November 2015. A qualitative study was conducted between January and February 2017 employing semi-structured interviews with seven relevant stakeholders involved in this communication process. The preliminary critical thematic analysis revealed four main themes which are reported in the results section: (1) social media is used in crisis times; (2) authorities gained situational awareness via social media; (3) citizens used social media to help one another; and (4) communication procedures changed after these critical events. In conclusion, authorities, citizens and journalists all turned to social media during the attack, both for crisis communication and for increasing situational awareness.
|
|
Alexander Gabriel, Florian Brauner, Andreas Lotter, Frank Fiedrich, & Ompe Aimé Mudimu. (2018). The determination of critical components of European Rail Traffic Management systems towards cyber-attacks. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 291–303). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: “Recent events have shown the vulnerability of IT systems of companies, organizations or even governments to hacker attacks. At the same time, information technologies are becoming increasingly established and important in various industries (digitalization). With a view to the modern development of terrorism, cyber-attacks can be used to physically damage critical infrastructures (CI). This leads to a new dimension of cyber-attacks, which are called terrorist cyber-attacks. The following research contributes to the identification of weak information technology components of railway operating systems and thus improves the safety of public transportation in the context of the European railway traffic management system (ERTMS). The core of this paper is an extended literature research on security flaws in the ERTMS. The future introduction of a methodology for evaluating the criticality of information technology system components will build on this using cyber threats and public transportation as examples.”
|
|
Alexander Gabriel, Simon Schleiner, Florian Brauner, Florian Steyer, Verena Gellenbeck, & Ompe Aimé Mudimu. (2017). Process modelling of physical and cyber terrorist attacks on networks of public transportation infrastructure. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 390–399). Albi, France: Iscram.
Abstract: Recent events have demonstrated the vulnerability of IT-systems of different companies, organisations or even governments to hacker attacks. Simultaneously, information technologies have become increasingly established and important for institutions of various branches. With respect to modern terrorism developments, cyber-attacks may be used to physically harm critical infrastructures. This leads to a new dimension of cyber-attacks called “terrorist cyber-attacks”. This research-in-progress paper aims to develop a process model for data acquisition and support of decision making that seeks to enhance the security of public transportation in the context of counterterrorism. Therefore, a generic process model for terrorist cyber-attacks – produced in the research project RE(H)STRAIN1 – is intro-duced as a basis for a decision support system (DSS). In the future, such models could improve the decision process by comparing the effectiveness of different security measures.
|
|
Amanda Langer, Marc-André Kaufhold, Elena Maria Runft, Christian Reuter, Margarita Grinko, & Volkmar Pipek. (2019). Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: With the increase of terrorist attacks and spreading extremism worldwide, countermeasures advance as well. Often
social media is used for recruitment and radicalization of susceptible target groups. Counter narratives are trying
to disclose the illusion created by radical and extremist groups through a purposive and educational counter
statement, and to initiate a rethinking in the affected individuals via thought-provoking impulses and advice. This
exploratory study investigates counter narrative campaigns with regard to their fight and prevention against
terrorism in social media. Posts with strong emotions and a personal reference to affected individuals achieved
the highest impact and most reactions from the target group. Furthermore, our results illustrate that the impact of
a counter narrative campaign cannot be measured solely according to the reaction rate to their postings and that
further analysis steps are therefore necessary for the final evaluation of the campaigns.
|
|
Jeannette N. Sutton, Emma S. Spiro, Sean M. Fitzhugh, Britta Johnson, Ben Gibson, & Carter T. Butts. (2014). Terse message amplification in the Boston bombing response. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 612–621). University Park, PA: The Pennsylvania State University.
Abstract: On the morning of April 15, 2013, an Improvised Explosive Device (IED) was detonated near the finish line of the Boston Marathon, resulting in a large number of casualties. This generated a week-long response under the US National Incident Management System. In this paper, we examine online, terse messages broadcast by responding organizations and their amplification by other official entities via retransmission. Content analysis of official messages shows strong similarities with posting patterns previously observed in response to natural hazards, with the primary exception of themes related to the criminal investigation, suggesting a possible revision of guidelines for public information in light of the needs arising from extended counterterrorism operations undertaken in an urban environment. Network analysis demonstrates message posting and amplification were dominated by local actors, underscoring the importance of local readiness for management of official public information activities in the context of extremely high-profile events.
|
|