Home | << 1 >> |
Author | Title | Publication | Track | Year |
---|---|---|---|---|
Arthur H. Hendela; Murray Turoff; Starr Roxanne Hiltz | Cross impact security analysis using the HACKING Game | ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings | Planning, Foresight and/or Risk Analysis | 2010 |
Tuomas Peltonen; Michael Ammann; Juhani Lahtinen; Kaj Vesterbacka | Operational experience with the Ketale web application | ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings | Technologies and Tools | 2010 |
Beth Veinott; Gary L. Klein; Sterling Wiggins | Evaluating the effectiveness of the PreMortem technique on plan confidence | ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings | Planning, Foresight and/or Risk Analysis | 2010 |