Tim J. Grant. (2008). Checklist for comparing emergency management information systems. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 752–763). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: This paper describes a checklist that has been developed for comparing the functionality of emergency management control centres and their information systems. The intention is to interest the ISCRAM community in using the checklist in various applications and pooling experiences. The Control Centre Visit Checklist has evolved through four iterations. It has been used to study two military C2 systems and one non-military control system, and has been applied by students for course assignments. The paper focuses on the part of the checklist that evaluates the information system from the systems viewpoint. It describes the underlying applications architecture and process model. The Royal Netherlands Army's Battlefield Management System illustrates the application of the checklist. The results show that the checklist aids in identifying where C2 systems can be developed further. The next step is to perform a set of substantial pilot studies for diverse domains, including civilian emergency management systems.
|
Tim J. Grant, & Gijs Van Den Heuvel. (2010). Modelling the information sharing process in military coalitions: A work in progress. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Coalition partners must share information to work together. Models of information sharing assume that it is a linear, one-way process. As part of a larger project, we studied information sharing in military coalitions. Interviews of 47 officers in NATO R&D organizations showed that one piece of information was often traded for another. This is characteristic of an information market. Security regulations make information a scarce resource, although trust may allow the regulations to be waived. Our observations have consequences for the military Network Enabled Capabilities community in their desire to migrate to a “need to share” security principle. Failing to find a suitable process model in the literature, we outline requirements and identify two possible starting points for modelling the information sharing process in military coalitions.
|
Christine Owen, Jan Douglas, & Gregory Hickey. (2008). Information flow and teamwork in Incident Control Centers. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 742–751). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: This paper reports research in progress into a study of information flow and teamwork in Incident Management Teams (IMTs) in Australia. The research project, funded by the Bushfire Co-operative Research Centre. The overall research design includes interviews with experienced personnel, observations of real-time incidents and training simulations and a national questionnaire of incident management practices. Data reported in this conference session will focus on a sample of observation data conducted in two training simulations of a wildfire incident. Observations were video recorded and key IMT members wore lapel microphones. Video data has been coded for use of artifacts (e.g., maps, status boards) and room movement. Audio data has been coded for by the quantity and quality of interactions within and between IMT functions. The presentation aims to contribute to an understanding of what enables and constrains effective teamwork and information flow within Incident Control Centers (ICCs) in Australia.
|
Josine Van De Ven, Richelle Van Rijk, Peter Essens, & Erik Frinking. (2008). Network centric operations in crisis management. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 764–773). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: This paper describes the approach to implement network centric operations (NCO) in the Dutch crisis management domain. NCO resolves a number of important shortcomings related to the supply and flow of information experienced in current verbal communication-based crisis management. First, we provide a description of the crisis management organization in the Netherlands and the nature of information supply problems. Second, we explain how a network centric approach would be implemented in this domain. Next, we describe how between 2005 and 2008 several regions in the Netherlands have made efforts to implement a network-approach, and we evaluate their experiences. The NCO approach reduces the need for reliability checks of verbal communication. Consequently procedures can be optimized with NCO. This paper concludes with next steps, such as continuing to explore the effects of NCO on the current way of working and train people to work in a network centric environment.
|