Franclin Foping, & Ioannis M. Dokas. (2013). A saas-based early warning information fusion system for critical infrastructure safety. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 156–165). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: Maintaining the critical infrastructures, such as Drinking Water Treatment Plants (DWTP), transportation, power generation and communications systems, in a safe state is a complex problem. The effective collaboration, as well as the collection aggregation and dissemination of early warning information among the stakeholders of the Safety Management System (SMS) responsible for the safety of these critical infrastructures are some of the challenges that need to be addressed. This paper argues that the Software as a Service (SaaS) deployment model can offer new ways of enhancing the fusion of early warning information during the operation phase of critical infrastructures. It presents the requirements, the architecture and a number of features of a working prototype SaaS-based early warning information fusion system for DWTP safety issues in the Republic of Ireland. It is the first time that a SaaSbased working prototype system is reported of providing early warning information fusion services in the literature.
|
Kimmo Laakso. (2012). On improving emergency preparedness and management with Delphi. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: An emergency brings together a group of individuals who often represent different organizations, resources, and roles. In order to be able to make the right decisions, individuals need to understand each other although they may be from different lines of business. In our research the target is to stress the importance of a common language in emergency management. Our plan is to gather a group representing the authorities, i.e. public sector actors, and a group representing companies, i.e. private sector actors, to communicate with the Delphi method on possible differences in the language used in different lines of business. The aim of this paper is to discuss the possibilities of using the Delphi method to make improvements to emergency management and to evaluate which kinds of organizations should be represented in our Delphi panel. This paper forms a part of a larger research study, the results of which will be useful, for example when improving the interoperability of management and communications systems. © 2012 ISCRAM.
|
Peter L. O'Dell. (2008). Communities of trust. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (265). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Effective response to emergency, security and operational continuity events generally requires cooperation across political, physical and technical boundaries. It's necessary, therefore, to use a communications system that enables people in heterogeneous organization to communicate effectively. Since 2002, Swan Island Networks has been developing an Internet-based information sharing system that links responsible people with the information necessary to make better decisions, and to each other. The system allows people to form “Communities of Trust”, in which all community members are known and authenticated. Each community is formed by a responsible Champion, who determines who can participate and what information will be shared within the community. In order for people to be willing to share, and to accept the information they receive as genuine, the community must operate in an environment of trust. This presentation outlines the fundamental concepts, methodologies and features for access and information control that create a trusted environment, particularly Authorization, Authentication and Audit (AAA). In the system discussed, AAA elements function together to create a comprehensive trust framework, and provide a contextually appropriate level of information assurance, data protection and dissemination control.
|