Gertraud Peinel, Thomas Rose, & Alexander Wollert. (2012). The myth of business process modelling for emergency management planning. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: Over the last two decades a significant number of projects tried to convey the concept of business process man-agement to the domain of emergency management. Most of these approaches sought a partial automation for the execution of standard operating procedures in the sense of workflow support, while others strived for the sup-port and integration of information management and data streams in command centres during a crisis. This pa-per focuses on the planning of disaster response for reasons of better preparedness. It discusses whether emer-gency management organisations can capitalize on off-the-shelf business process modelling tools to prepare for disasters more effectively, and whether the concepts of process modelling can be applied to standard operating procedures and vice versa. Moreover, it investigates whether such tools can efficiently support a collaborative preparation of police, fire departments, and rescue organizations. This paper will demonstrate why conventional business process means are inapplicable as planning tool in this domain. And it will also give an outlook to so called smart checklists that might be better suited both for the planning and response phase of emergency epi-sodes. © 2012 ISCRAM.
|
Ulrica Pettersson. (2009). Sharing knowledge: How to highlight proven experience in the swedish Armed Forces. In S. J. J. Landgren (Ed.), ISCRAM 2009 – 6th International Conference on Information Systems for Crisis Response and Management: Boundary Spanning Initiatives and New Perspectives. Gothenburg: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Working with the reuse of knowledge is a widespread effort in many organizations, a common approach being to collect and make use of experience. In the Swedish Armed Forces (SwAF), this activity is not handled in an organized way, as a methodological and systematic approach to handling experience, transforming experience into Proven experience and finally reusing it in the organization is lacking. This paper is concerned with practitioners' efforts to share and reuse knowledge for the purpose of improving their professional competence. The aim is to develop and provide a method for transforming experience into Proven experience. A solution to this complicated problem could reduce repetition of mistakes and facilitate for of high-quality Proven experience, not just in SwAF but also in other organizations.
|
Raj Prasanna, Lili Yang, & Malcolm King. (2009). GDIA: A cognitive task analysis protocol to capture the information requirements of emergency first responders. In S. J. J. Landgren (Ed.), ISCRAM 2009 – 6th International Conference on Information Systems for Crisis Response and Management: Boundary Spanning Initiatives and New Perspectives. Gothenburg: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: As a partial requirement of the development of an information system for the UK fire and rescue services, this paper describes the development and application of a protocol capable of capturing the information requirements of fire and rescue first responders. After evaluating the existing techniques commonly used in difficult decision-making environments, a Goal Directed Information Analysis (GDIA) protocol is proposed. The clearly defined, repeatable steps of GDIA make it a requirements-gathering protocol which can be easily administered by an investigator without any prior knowledge or experience of the tool. This makes GDIA one of the very few information requirements-gathering protocols capable of capturing the requirements of the emergency-related domains.
|
Theo Van Ruijven. (2011). Serious games as experiments for emergency management research: A review. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Serious games and virtual environments are increasingly used for emergency management training and research. The development of these technologies seems to contribute to a solution to some problems in the existing literature on emergency management which is mainly based on case study research. However, using virtual technology for research also introduces new difficulties. This paper describes the advantages and drawbacks of using serious games for research and reviews eight recently published studies that make use of virtual environments. The review focuses on the external validity of serious games as this is a challenging issues for research that involves virtual environments. The paper concludes with some recommendations to increase the external validity of future research with serious games.
|
Steven C. Way. (2011). Information requirements for context-aware multi-agency real-time coordination during crisis response. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Most information systems (IS) research into emergency management (EM) consists of case studies of prior disasters, social behavior research, and planning or preparedness research. This study fills a gap in EM and IS research as it aims to better understand the nature of coordination during crisis response; investigate the functions and capabilities of existing coordination systems; and identify the desired functions to manage multi-agency coordination response. Grounded theory is the methodology adopted for this study. Firsthand interview and observational data will be collected from agency command centers, ride-outs with police, fire, and emergency medical services (EMS) agencies, and from multi-agency training exercises. This study is expected to make a theoretical contribution to crisis response system design as it will develop a theory to better understand the information requirements for context-aware multi-agency real-time coordination responses to crises.
|
Zeno Franco, Nina Zumel, John Holman, Kathy Blau, & Larry E. Beutler. (2009). Evaluating the impact of improvisation on the incident command system: A modified single case study using the DDD simulator. In S. J. J. Landgren (Ed.), ISCRAM 2009 – 6th International Conference on Information Systems for Crisis Response and Management: Boundary Spanning Initiatives and New Perspectives. Gothenburg: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: This study attempted to evaluate the utility of the Incident Command System (ICS) in varying disaster contexts. ICS is mandated in the United States and practitioners assert that it is an effective organizing system for emergency management. However, researchers contend that the utility of ICS is conflated with inter-team familiarity gained during ICS exercises. A military team-in-the-loop simulator was customized to represent the problems, resources, and command structures found in civilian led disaster management teams. A modified single case design drawn from behavioral psychology was used to explore possible casual relationships between changes team heterogeneity and performance. The design also allowed for the evaluation of improvisation on performance. Further, psychological factors that may underpin improvisation were explored. In addition to some preliminary empirical findings, the successes and difficulties in adapting the DDD simulator are briefly discussed as part of an effort to achieved greater interdisciplinary integration.
|
Rae Zimmerman, & Carlos E. Restrepo. (2006). Information technology (IT) and critical infrastructure interdependencies for emergency response. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 382–385). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: Information technologies and other critical infrastructures are interconnected in ways that can lead to vulnerabilities in the ability of these infrastructures to perform during natural disasters and acts of terrorism either to reduce adverse consequences or provide needed emergency response services. This research applies and adapts a number of indicators of infrastructure interdependency based on the authors' earlier research to determine where weak points and strengths occur in the interconnections between infrastructure technology and other infrastructure support services such as electric power and transportation, and where weak points create vulnerability that can be improved for more effective response in emergencies.
|