|
Victor A. Bañuls, Murray Turoff, & Joaquin Lopez. (2010). Clustering scenarios using cross-impact analysis. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Scenarios are frequently used in Emergency Planning and Preparedness. These scenarios are developed based on the hypothesis of occurrence or not of significant events. This is a complex process because of the interrelations between events. This fact, along with the uncertainty about the occurrence or non-occurrence of the events, makes the scenario generation process a challenging issue for emergency managers. In this work a new step-by-step model for clustering scenarios via cross-impact is proposed. The authors. proposal adds tools for detecting critical events and graphical representation to the previous scenario-generation methods based on Cross-Impact Analysis. Moreover, it allows working with large sets of events without using great computational infrastructures. These contributions are expected to be useful for supporting the analysis of critical events and risk assessment tasks in Emergency Planning and Preparedness. Operational issues and practical implications of the model are discussed by means of an example.
|
|
|
Arthur H. Hendela, Murray Turoff, & Starr Roxanne Hiltz. (2010). Cross impact security analysis using the HACKING Game. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Security of network assets is a high priority with little traditional return on investment. Increasingly, cyber attacks are being used by both terrorist and unfriendly government organizations. The HACKING Game, a Cross Impact Analysis planning tool, can be used to plan security resource allocation in computer networks. Cross Impact Analysis provides a mathematical basis to determine the interrelationships of one event with a set of other events. Output from the HACKING Game's Cross Impact Analysis model can be used to help justify security expenditures, with an added benefit of being a training tool for employees learning to protect networks. This paper presents details of the Hacking Game's design and its capabilities. Cross impact modeling can be used to develop games for any situation characterized by a set of offense and defense events to produce an individual or collaborative model for such things as natural and man-made disasters.
|
|
|
Murray Turoff, & Victor A. Bañuls. (2011). Major extensions to Cross-Impact Analysis. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: In recent years Cross-Impact Analysis (CIA) has resurged as a powerful tool for forecasting the occurrence or not of a set of interrelated events in complex situations, such as emergencies. In this sense, CIA can be used for creating working models out of significant events and crisis scenarios. CIA has been combined with other methodological approaches in order to increase its functionality and improve its final outcome. This is the case of the merger of CIA and the technique called Interpretive Structural Modeling (ISM). The CIA-ISM approach aims at contributing to CIA with tools for detecting critical events and supporting graphical representation of scenarios. In this paper, major extensions to CIA-ISM are presented. These extensions are based on the inclusion of initial condition events and outcome events as two new event types that make CIA-ISM much richer in its potential span of application areas. The practical implications of these major extensions to CIA-ISM are illustrated with an example. The usefulness of this contribution to researchers and practitioners concerned with emergency planning and preparedness is also discussed.
|
|
|
Murray Turoff, Victor A. Bañuls, Linda Plotnick, & Starr Roxanne Hiltz. (2014). Development of a dynamic scenario model for the interaction of critical infrastructures. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 414–423). University Park, PA: The Pennsylvania State University.
Abstract: This paper summarizes the development of a Cross Impact and Interpretive Structural Model of the interactions of 16 critical infrastructures during disasters. It is based on the estimates of seven professionals in Emergency Management areas and was conducted as an online survey and Delphi Process. We describe the process used and the current results, indicating some of the disagreements in the estimates. The initial results indicate some very interesting impacts of events on one another, resulting in the clustering of events into mini-scenarios.
|
|
|
Victor A. Bañuls, Cristina López-Vargas, Fernando Tejedor, Murray Turoff, & Miguel Ramirez de la Huerga. (2016). Validating Cross-Impact Analysis in Project Risk Management. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: Companies work increasingly more on projects as a means of executing organizational decisions. However, too many enterprise projects result in failure. Hence, firms should follow a risk management method that drives their projects toward success. Nevertheless, project managers often deal with risks intuitively. This is partly because they lack the proper means to correctly manage the underlying risks which affect the entire cycle of their projects. Therefore, one purpose is to identify the critical events that managers may encounter before the beginning of the project and during its development. In addition, we propose CIA-ISM to represent existing relationships between the unforeseen events in the project?s lifetime and their key performance indicators. This also predicts the influence of risks on project performance over time by means of scenarios. The tool proposed would thus help practitioners to manage enterprise projects risks in a more effective and proactive way. We have validated the predictive capability of the CIA-ISM model with 22 real projects. The results show a high level of predictive capability in terms of risk analysis and key performance indicators.
|
|
|
Telmo Zarraonandia, Victor A. Bañuls, Ignacio Aedo, Paloma Díaz, & Murray Turoff. (2014). A scenario-based virtual environment for supporting emergency training. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 597–601). University Park, PA: The Pennsylvania State University.
Abstract: Simulation exercises are particularly popular for training in emergency situations. Exercises can vary in their degree of realism, complexity and level of stress, but they all try to reproduce a scenario of a real emergency so that each participant simulates the actions carried out for the role they should play. They not only support effective and situated learning, but they can also serve to improve the plan by allowing the identification of weak points and potential drawbacks in it. To facilitate the design and implementation of 3D virtual environments in which training exercises can be conducted, in this paper we propose to use the Cross-Impact Analysis technique in combination with an educational game platform called GRE. We also present a Simulation Authoring Tool that allows the designer to carry out the integration of the knowledge captured by means of Cross-Impact into the game designs that GRE can interpret.
|
|