toggle visibility Search & Display Options

Select All    Deselect All
List View
 |   | 
   print
  Author Title Publication (down) Track Year Links
Arthur H. Hendela; Murray Turoff; Starr Roxanne Hiltz Cross impact security analysis using the HACKING Game ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings Planning, Foresight and/or Risk Analysis 2010 details   pdf openurl
Tuomas Peltonen; Michael Ammann; Juhani Lahtinen; Kaj Vesterbacka Operational experience with the Ketale web application ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings Technologies and Tools 2010 details   pdf openurl
Beth Veinott; Gary L. Klein; Sterling Wiggins Evaluating the effectiveness of the PreMortem technique on plan confidence ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings Planning, Foresight and/or Risk Analysis 2010 details   pdf openurl
Select All    Deselect All
List View
 |   | 
   print

Save Citations:
Export Records: