toggle visibility Search & Display Options

Select All    Deselect All
 |   | 
Details
   print
  Records Links
Author Alena L. Benson; Keith Biggers; Jim Wall; Mark P. Haselkorn pdf  openurl
  Title Adaptive development of a common operating environment for crisis response and management Type Conference Article
  Year 2010 Publication ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings Abbreviated Journal ISCRAM 2010  
  Volume Issue Pages  
  Keywords Information services; Information systems; Interoperability; Network security; Service oriented architecture (SOA); Collaborative decision making; Common operating environments; Information environment; Situational awareness; System development; Response time (computer systems)  
  Abstract Complex information and communication systems present a special challenge to system designers because these are generally deployed as large, distributed systems with diverse user groups. Crisis response and management organizations in particular expect systems to be interoperable, resilient, flexible and provide lasting benefit. Currently, systems such as Virtual USA (Department of Homeland Security) and WatchKeeper (United States Coast Guard) seek to create common situational awareness for all participating agencies in security and incident response operations. We propose adaptive development as a system development model to build upon the ideas of systems such as Virtual USA and WatchKeeper in order to create sustainable and adaptable systems. Adaptive development supports ongoing improvement through user-driven design and modification in the target environment. An internet-based dashboard demonstrated during a United States Coast Guard Sector Seattle incident response exercise serves as an emergent case study for the adaptive model.  
  Address University of Washington, United States; Texas AandM University, United States  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Seattle, WA Editor S. French, B. Tomaszewski, C. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN Medium  
  Track Special Session: Puget Sound Regional Initiatives towards a Common Operating Environment Expedition Conference 7th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 305  
Share this record to Facebook
 

 
Author Duco N. Ferro; Jeroen M. Valk; Alfons H. Salden pdf  isbn
openurl 
  Title A robust coalition formation framework for mobile surveillance incident management Type Conference Article
  Year 2007 Publication Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers Abbreviated Journal ISCRAM 2007  
  Volume Issue Pages 479-488  
  Keywords Artificial intelligence; Decision support systems; Knowledge management; Robustness (control systems); Security systems; Coalition formations; Coordination; Incident Management; Mobile surveillance; Reconfiguration; Scale-space; Network security  
  Abstract Given unexpected incidents on routes of guards that check security objects, like banks, one of the most challenging problems is still how to support improvisation by security personnel in taking decisions to prevent or resolve such incidents. Another as important associated problem is how a security company can naturally take advantage of its existing and novel knowledge about its organizational and ICT infrastructures, and the introduction of a decision support system to help leverage of improvisation by humans. To tackle all this, on the one hand we present a dynamic coalition formation framework that allows the (re)configurations of agents that are associated with joint tasks in situational contexts to be evaluated by appropriate value functions. On the other hand, we present a dynamic scale-space paradigm that allows a security company to distill ranked lists of robust context-dependent reconfigurations at critical scales. We highlight the merits of ASK-ASSIST as a solution to the problem of supporting human improvisation.  
  Address Almende B. V., Netherlands  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Delft Editor B. Van de Walle, P. Burghardt, K. Nieuwenhuis  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9789054874171; 9789090218717 Medium  
  Track IMPR Expedition Conference 4th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 489  
Share this record to Facebook
 

 
Author Kai Kamphenkel; Markus Blank; Jens Bauer; Georg Carle pdf  isbn
openurl 
  Title Secure transmission of pre-clinical ultrasound video data at the scene of a mass casualty incident Type Conference Article
  Year 2007 Publication Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers Abbreviated Journal ISCRAM 2007  
  Volume Issue Pages 377-383  
  Keywords Intelligent networks; Network management; Network security; Ultrasonic applications; Video streaming; Further treatments; Innovative approaches; Mass casualty incidents; Portable ultrasound; Pre-clinical; Reference modeling; Sctp; Secure transmission; Network layers  
  Abstract The use of portable ultrasound devices enables a better and immediate diagnostics at the scene of a mass casualty incident. The detection of free fluid in abdomen and thorax is an important indicator for the further treatment. The gained information affects the triage of casualties, the pre-clinical medical attendance and the patient management. The presented article describes an innovative approach to transmit sonographic video streams over wireless networks to a remote hospital, where the medical data is used for diagnostics. For the secure transmission of data a new network unit is designed, which gathers information with regard to the network status and the character of transported data. This “Intelligent Network” is located in the transport layer of the OSI reference model and enables a dynamic interconnection between network and application, provides an interface for functional transparency and the disclosure of parameters and establishes the basis for an universal security system.  
  Address Siemens AG, Medical Solutions, University of Tübingen, Germany; University Hospital Tübingen, Germany  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Delft Editor B. Van de Walle, P. Burghardt, K. Nieuwenhuis  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9789054874171; 9789090218717 Medium  
  Track ISEC Expedition Conference 4th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 644  
Share this record to Facebook
 

 
Author Matt Wolff pdf  openurl
  Title Unsupervised methods for detecting a malicious insider Type Conference Article
  Year 2010 Publication ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings Abbreviated Journal ISCRAM 2010  
  Volume Issue Pages  
  Keywords Information systems; Natural language processing systems; Network security; Unsupervised learning; Insider Threat; Malicious insiders; Masquerade attacks; Supervised algorithm; Unsupervised algorithms; Unsupervised method; User masquerades; Algorithms  
  Abstract One way a malicious insider can attack a network is by masquerading as a different user. Various algorithms have been proposed in an effort to detect when a user masquerade attack has occurred. In this paper, two unsupervised algorithms are proposed with the intended goal of detecting user masquerade attacks. The effectiveness of these two unsupervised algorithms are then compared against supervised algorithms.  
  Address University of Hawaii, United States  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Seattle, WA Editor S. French, B. Tomaszewski, C. Zobel  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN Medium  
  Track Special Session: Information Credibility, Trust, Privacy and Security in Information Systems for Emergency Management Expedition Conference 7th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 1097  
Share this record to Facebook
 

 
Author Zeno Franco; Nina Zumel; Larry E. Beutler pdf  isbn
openurl 
  Title A ghost in the system: Integrating conceptual and methodology considerations from the behavioral sciences into disaster technology research Type Conference Article
  Year 2007 Publication Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers Abbreviated Journal ISCRAM 2007  
  Volume Issue Pages 115-124  
  Keywords Disaster prevention; Information science; Network security; Social sciences; Civil security; Comparative methods; Conceptual frameworks; Disaster management; Disaster technologies; Federal governments; Performance assessment; Scientific inquiry; Disasters  
  Abstract As the complexity of disasters increases, a transdisciplinary conceptual framework designed to address three key variables-technology, disaster severity, and human characteristics-must be developed and elaborated. Current research at the nexus of disaster management and information science typically addresses one or two of these factors, but rarely accounts for all three adequately-thus rendering formal inquiry open to a variety of threats to validity. Within this tripartite model, several theories of human behavior in disaster are explored using the response of the Federal Government and the general public during Hurricane Katrina as an illustrative background. Lessons learned from practice-based scientific inquiry in the social sciences are discussed to address concerns revolving around measurement and statistical power in disaster studies. Finally, theory building within the transdisciplinary arena of disaster management and information science is encouraged as a way to improve the quality of future research.  
  Address Pacific Graduate School of Psychology, United States; Quimba Software, United States  
  Corporate Author Thesis  
  Publisher Information Systems for Crisis Response and Management, ISCRAM Place of Publication Delft Editor B. Van de Walle, P. Burghardt, K. Nieuwenhuis  
  Language English Summary Language English Original Title  
  Series Editor Series Title Abbreviated Series Title  
  Series Volume Series Issue Edition  
  ISSN 2411-3387 ISBN 9789054874171; 9789090218717 Medium  
  Track METH Expedition Conference 4th International ISCRAM Conference on Information Systems for Crisis Response and Management  
  Notes Approved no  
  Call Number Serial 505  
Share this record to Facebook
Select All    Deselect All
 |   | 
Details
   print

Save Citations:
Export Records: