Arthur H. Hendela, Murray Turoff, & Starr Roxanne Hiltz. (2010). Cross impact security analysis using the HACKING Game. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Security of network assets is a high priority with little traditional return on investment. Increasingly, cyber attacks are being used by both terrorist and unfriendly government organizations. The HACKING Game, a Cross Impact Analysis planning tool, can be used to plan security resource allocation in computer networks. Cross Impact Analysis provides a mathematical basis to determine the interrelationships of one event with a set of other events. Output from the HACKING Game's Cross Impact Analysis model can be used to help justify security expenditures, with an added benefit of being a training tool for employees learning to protect networks. This paper presents details of the Hacking Game's design and its capabilities. Cross impact modeling can be used to develop games for any situation characterized by a set of offense and defense events to produce an individual or collaborative model for such things as natural and man-made disasters.
|
Saloni JD Vaghela, & Patrick C. Shih. (2018). WalkSafe: College Campus Safety App. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 983–993). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: WalkSafe is a location-based app that notifies users of emergencies around them. The app is compared to The Pennsylvania State University's emergency notification system – PSUAlert, which provides time-based alerts. We identify weakness of the existing PSUAlert system and address them by introducing a location-based emergency notification system with the records of past incidents along with the type of emergency with respect to the user's location. We gathered user perception from 43 survey respondents that informed the design of the WalkSafe app. We use mixed-methods approach to evaluate WalkSafe with PSUAlert system as a baseline. We assess both systems with 22 participants by notifying them of the fake emergencies and asking them to use both systems to understand details regarding the emergency and its location. The pre- and post-surveys are evaluated using content analysis and paired t-test. Participant reported higher perceived convenience, perceived security, willingness to use, and willingness to share when using WalkSafe.
|
Murray Turoff, Michael J. Chumer, Xiang Yao, Joseph Konopka, & Bartel A. Van De Walle. (2005). Crisis planning via scenario development gaming. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 207–212). Brussels: Royal Flemish Academy of Belgium.
Abstract: This paper introduces a particular approach to improving the planning process in emergency preparedness. This involves the specification of a competitive game to have opposing defense and offense teams develop and improve their respective plans for defense and offense.
|
Michael Tyworth, & Steve Sawyer. (2006). Integrated criminal justice system design: Designing an appropriate governance structure. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 444–449). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: In this paper we discuss interim findings from an ongoing comparative case study of the Automated Regional Justice Information System (ARJIS) in San Diego, CA. Significant attention had been given to the need to integrate information systems across organizational boundaries in the criminal justice domain. We employ a social informatics lens in this research that views the technological artifact as embedded in cultural and institutional context. In our examination of ARJIS we have found that the adoption of a Joint Powers Agreement (JPA) as a governance structure has impacted system design and organizational practices significantly. Specifically, the JPA facilitates participation by member agencies and, allows the ARJIS management team autonomy and flexibility in developing and managing the ARJIS information system.
|