Kuntke, F., Bektas, M., Buhleier, L., Pohl, E., Schiller, R., & Reuter, C. (2023). How Would Emergency Communication Based On LoRaWAN Perform? Empirical Findings of Signal Propagation in Rural Areas. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 1042–1050). Omaha, USA: University of Nebraska at Omaha.
Abstract: Low Power Wide Area Network (LPWAN) technologies are typically promoted for Internet-of-Things (IoT) applications, but are also of interest for emergency communications systems when regular fixed and mobile networks break down. Although LoRaWAN is a frequently used representative here, there are sometimes large differences between the proposed range and the results of some practical evaluations. Since previous work has focused on urban environments or has conducted simulations, this work aims to gather concrete knowledge on the transmission characteristics in rural environments. Extensive field studies with varying geographic conditions and comparative tests in urban environments were performed using two different hardware implementations. Overall, it was found that the collected values in rural areas are significantly lower than the theoretical values. Nevertheless, the results certify that LoRaWAN technology has a high range that cannot be achieved with other common technologies for emergency communications.
|
Jaana Kuula, Pauli Kettunen, Vili Auvinen, Santtu Viitanen, Olli Kauppinen, & Tuomo Korhonen. (2013). Smartphones as an alerting, command and control system for the preparedness groups and civilians: Results of preliminary tests with the finnish police. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 42–51). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: Traditional mobile phones have been used for alerting purposes by utilizing their SMS and cell broadcasting features. They do however not suit for demanding alerting and command purposes, for the observation of special forces, rescue officers and civilians, or for the post-evaluation of the operation. Current 3G and 4G/LTE smartphones can do all this, but the empirical evidence is missing. This article reports of the preliminary tests which the University of Jyväskylä has made with the Finnish Police for alerting civilians and for commanding two special groups of the police with smartphones. Smartphones were also used for observing police officers' position and status and for post-evaluating action during and after the operation. The study supports using smartphones for alerting, command and control purposes. Because of external distractions alerts are noticed better at night than in the daytime. In active hours personal alerts should be given not only by a voice alarm but by stimulating 2-3 senses at the same time. Noticing of smartphone alerts might be improved also by using some additional reception device with the handset.
|
Landsberg, L., Gleibs, T., & Mudimu, O. A. (2023). Design of a Systems Theory Approach for the Evaluation of C2-Systems. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 692–700). Omaha, USA: University of Nebraska at Omaha.
Abstract: The course of large-scale incidents as well as disasters can reveal weaknesses in command and control (C2) systems, which make adjustments necessary. Also, new technologies may require C2-systems to be adapted to achieve their full potential for improving incident command. This paper deals with an approach to enable the comparison and evaluation of different C2-systems or their adaptations in order to find the best possible customizations for C2-systems. To this purpose, systems theory is used to unify the approaches of different research disciplines. Within the C2-system boundaries, distinctions were made to represent three different levels of evaluation: “Physical Characteristics”, “Structures and Processes” as well as “C2-system-effectiveness”. During the implementation of the evaluation methods from the different research disciplines into the systems theory approach, it became apparent that the comprehensive approach is desirable, but that broad knowledge and expertise is necessary, especially at the highest evaluation level “C2-system-effectiveness”.
|
Vitaveska Lanfranchi, Suvodeep Mazumdar, & Fabio Ciravegna. (2013). Evaluating the real usability of a C2 system – Short and controlled vs long and real. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 62–66). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: Command and Control systems (C2) need to be highly usable to efficiently support communication during crisis situations. Short-term usability evaluations are typically carried out because of the cost and time advantage. However, even the most realistic evaluations (simulations) do not reflect the real issues encountered “in the wild”, such as the operators' stress or the multiple foci of attention. In this paper we carry out an experiment to measure the changes in usability of a C2 system between a short-term simulation and a long-term “in the wild” evaluation. We demonstrate that short-term usability measurements can differ significantly from long-term “in the wild” ones. Our results indicate that a different approach to usability assessment is needed when dealing with critical systems, that takes into account the temporal horizon and assesses the system in real-life conditions.
|
Ana Laugé, Josune Hernantes, & Jose Mari Sarriegi. (2013). Disaster impact assessment:A holistic framework. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 730–734). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: One of the important aspects of the crisis management consists in a comprehensive analysis of the impacts generated and their associated cost. The capacity to carry out an efficient holistic management, through the development of preventive measures and response programs relies on a proper estimation of impacts which helps to mitigate the harshness or can even avoid impacts in face of future crises. The aim of this paper is to analyse existing methodologies for natural disasters' impact evaluation, the identification of the different impact categories as well as the explanation of a natural disasters impact framework, which includes a list of indicators for a correct impact assessment. The framework also analyses the evolution of impacts, that is, how immediate impacts can also generate delayed impacts.
|
Lennart Landsberg, Jörg Schmidt, & Ompe Aimé Mudimu. (2022). Synthesising Comparisons to Develop a Generic Command and Control System. In Rob Grace, & Hossein Baharmand (Eds.), ISCRAM 2022 Conference Proceedings – 19th International Conference on Information Systems for Crisis Response and Management (pp. 392–403). Tarbes, France.
Abstract: Large and small incidents challenge emergency services around the world. Regardless of the size of the incident, command and control (C2)-systems are used to manage the situation, allowing a rapid and coordinated intervention. As all implemented actions result from the outputs of C2-systems, they are a fundamental component of the response. That is why they must be highly reliable and efficient. A research initiative is therefore addressing the approach of evaluating C2-systems on a scenario basis and using key performance indicators (KPI). To ensure that the KPIs can be applied to any form of incident control, a generic C2-system was developed by comparing and merging six German- and English-language C2-systems as well as one international standard. With this step, a comprehensive and detailed C2-system was developed, which is presented in this paper.
|
P. Lin, & S.M. Lo. (2005). The application of quickest flow problem in urban evacuation planning. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 129–130). Brussels: Royal Flemish Academy of Belgium.
Abstract: The provision of evacuation plan for people living in populated urban area is necessary to reduce the possible casualties under disasters. Time-varying quickest flow problem (TVQFP), which can simultaneously optimize the evacuation schedule, evacuation locations and evacuation routes, is adopted to optimize the evacuation planning of a city to minimize the clearance time of residents in danger. The integration of optimization model with GIS environment enables emergency managers to easily identify possible bottlenecks and to observe evacuation patterns in vivid pictures for further analysis and evaluation.
|
Daniel Link, Kenny Meesters, Bernd Hellingrath, & Bartel A. Van De Walle. (2014). Reference task-based design of crisis management games. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 592–596). University Park, PA: The Pennsylvania State University.
Abstract: Serious games are an effective tool for giving players a hands-on, immersive experience of crisis situations. To simplify the design of such games while ensuring their relevance, we propose a design method that is based on reference tasks. The feasibility of this approach is demonstrated by the improved design of the serious game “Disaster in my Backyard” that has been played during ISCRAM Summer school 2013. The design incorporates humanitarian logistics, search-and-rescue and coordination tasks. We also present the lessons learned from this instantiation of the game and give an outlook towards future research, such as the evaluation of tools for crisis response and management through the use of serious games and reference tasks.
|
Edward Mahinda, & Brian Whitworth. (2004). Evaluating flexibility and reliability in emergency response information systems. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2004 – 1st International Workshop on Information Systems for Crisis Response and Management (pp. 93–98). Brussels: Royal Flemish Academy of Belgium.
Abstract: Flexibility, variously known as adaptability, tailorability, and customizability, has long been recognized as important in information system (IS) success. Reliability has known value in IS for the resulting predictability it bestows on a system. However increasing flexibility can increase possible paths for system breakdown, and so contribute to failure, i.e. increasing flexibility can reduce reliability. Reliability and flexibility seem in design “tension”, as one creates change and the other resists it. The combination of reliability and flexibility has been called “ robustness”, and it seems a desirable integration particularly for emergency response systems. However typically these two areas are studied separately. Our approach to evaluating the combination of reliability and flexibility is to define two distinct requirements that neither overlap nor contradict, and can be assessed by system users. A questionnaire instrument for users is proposed for measurement of the flexibility and reliability of a system. © Proceedings ISCRAM 2004.
|
Marc van den Homberg, Lydia Cumiskey, Esther Oprins, Pablo Suarez, & Anja van der Hulst. (2015). Are you Ready! to take early action? Embedding serious gaming into community managed DRR in Bangladesh. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: This paper applies a Game-based Learning Evaluation Model (GEM) to assess whether the early warning ? early action serious game ?Ready!? is an effective component to add to existing Disaster Risk Reduction (DRR) training curricula, facilitated by NGO staff and applied at the community level. We developed a paper-based survey with 17 five-level Likert items and 15 open questions addressing the different GEM indicators to question 16 NGO staff, and used a simplified set of five questions with emoticons for 58 community people. The results showed that the staff saw great potential in embedding Ready! in DRR processes and that the community highly appreciated the game. The GEM was found to be a useful methodology to evaluate the effectiveness of this serious game. However, in the context of a lower educated and partly illiterate community, the importance of designing an individual, largely visual assessment instrument instead of a paper-based survey was acknowledged.
|
Matti Wiegmann, Jens Kersten, Friederike Klan, Martin Potthast, & Benno Stein. (2020). Analysis of Detection Models for Disaster-Related Tweets. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 872–880). Blacksburg, VA (USA): Virginia Tech.
Abstract: Social media is perceived as a rich resource for disaster management and relief efforts, but the high class imbalance between disaster-related and non-disaster-related messages challenges a reliable detection. We analyze and compare the effectiveness of three state-of-the-art machine learning models for detecting disaster-related tweets. In this regard we introduce the Disaster Tweet Corpus~2020, an extended compilation of existing resources, which comprises a total of 123,166 tweets from 46~disasters covering 9~disaster types. Our findings from a large experiments series include: detection models work equally well over a broad range of disaster types when being trained for the respective type, a domain transfer across disaster types leads to unacceptable performance drops, or, similarly, type-agnostic classification models behave more robust at a lower effectiveness level. Altogether, the average misclassification rate of~3,8\% on performance-optimized detection models indicates effective classification knowledge but comes at the price of insufficient generalizability.
|
Kenny Meesters, & Bartel A. Van De Walle. (2013). Towards an impact evaluation framework for the collaborative information supply chain in humanitarian crisis response. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 536–545). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: Emerging technologies provide opportunities for the humanitarian responders' community to enhance the effectiveness of their response to crisis situations. A part of this development can be contributed to a new type of information supply chains -driven by collaboration with digital, online communities- enabling organizations to make better informed decisions. However, how exactly and to what extend this collaboration impacts the decision making process is unknown. To improve these new information exchanges and the corresponding systems, an evaluation method is needed to assess the performance of these processes and systems. This paper builds on existing evaluation methods for information systems and design principles to propose such an impact evaluation framework. The proposed framework has been applied in a case study to demonstrate its potential to identify areas for further improvement in the (online) collaboration between information suppliers and users.
|
Ulrich Meissen, & Agnès Voisard. (2008). Increasing the effectiveness of early warning via context-aware alerting. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 431–440). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The effective implementation of early warning is one of the best investments for disaster prevention and mitigation. In the last decade, we have witnessed strong efforts and progress towards better risk detection, monitoring and prediction. However, the best warnings are ineffective if they cannot be distributed in a timely way and targeted to people at risk. With the evolvement of new Information and Communication Technologies, we have new opportunities and face new challenges for improving classical warning processes. Based on our experience and research results from two user-centered hydro-meteorological Early Warning Systems (EWS) we present an approach for context-aware alerting that can increase considerably the effectiveness of warning. Furthermore, we introduce an applied evaluation model for the effectiveness of an EWS.
|
Thomas Münzberg, Marcus Wiens, & Frank Schultmann. (2014). A strategy evaluation framework based on dynamic vulnerability assessments. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 45–54). University Park, PA: The Pennsylvania State University.
Abstract: Assessing a system's vulnerability is a widely used method to estimate the effects of risks. In the past years, increasingly dynamic vulnerability assessments were developed to display changes in vulnerability over time (e.g. in climate change, coastal vulnerability, and flood management). This implies that the dynamic influences of management strategies on vulnerability need to be considered in the selection and implementation of strategies. For this purpose, we present a strategy evaluation framework which is based on dynamic vulnerability assessments. The key contribution reported in this paper is an evaluation framework that considers how well strategies achieve a predefined target level of protection over time. Protection Target Levels are predefined objectives. The framework proposed is inspired by Goal Programming methods and allows distinguishing the relevance of time-dependent achievements by weights. This enables decision-makers to evaluate the overall performance of strategies, to test strategies, and to compare the outcome of strategies.
|
Ahmed Nagy, Lusine Mkrtchyan, & Klaas Van Der Meer. (2013). A CBRN detection framework using fuzzy logic. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 266–271). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: Identifying a chemical, biological, radiological, and nuclear incident (CBRN) is a challenge. Evidence and health symptoms resulting from CBRN malevolent incident overlap with other normal non malevolent human activities. However, proper fusion of symptoms and evidence can aid in drawing conclusions with a certain degree of credibility about the existence of an incident. There are two types of incidents directly observable, overt, or indirectly observable, covert, which can be detected from the symptoms and consequences. This paper describes a framework for identifying a CBRN incident from available evidence using a fuzzy belief degree distributed approach. We present two approaches for evidence fusion and aggregation; the first, two level cumulative belief degree (CBD) while the second is ordered weighted aggregation of belief degrees (OWA). The evaluation approach undertaken shows the potential value of the two techniques.
|
Nasik Muhammad Nafi, Avishek Bose, Sarthak Khanal, Doina Caragea, & William H. Hsu. (2020). Abstractive Text Summarization of Disaster-Related Documents. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 881–892). Blacksburg, VA (USA): Virginia Tech.
Abstract: Abstractive summarization is intended to capture key information from the full text of documents. In the application domain of disaster and crisis event reporting, key information includes disaster effects, cause, and severity. While some researches regarding information extraction in the disaster domain have focused on keyphrase extraction from short disaster-related texts like tweets, there is hardly any work that attempts abstractive summarization of long disaster-related documents. Following the recent success of Reinforcement Learning (RL) in other domains, we leverage an RL-based state-of-the-art approach in abstractive summarization to summarize disaster-related documents. RL enables an agent to find an optimal policy by maximizing some reward. We design a novel hybrid reward metric for the disaster domain by combining \underline{Vec}tor Similarity and \underline{Lex}icon Matching (\textit{VecLex}) to maximize the relevance of the abstract to the source document while focusing on disaster-related keywords. We evaluate the model on a disaster-related subset of a CNN/Daily Mail dataset consisting of 104,913 documents. The results show that our approach produces more informative summaries and achieves higher \textit{VecLex} scores compared to the baseline.
|
Nicoletta Baroutsi. (2018). A Practitioners Guide for C2 Evaluations: Quantitative Measurements of Performance and Effectiveness. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 170–189). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: Quantitative evaluations are valuable in the strive for improvements and asserting quality. However, the field of Command & Control (C2) evaluations are hard to navigate, and it is difficult to find the correct measurement for a specific situation. A comprehensive Scoping Study was made concerning measurements of C2 performance and effectiveness. A lack of an existing appropriate framework for discussing C2 evaluations led to the development of the Crisis Response Management (CRM) Matrix. This is an analysis tool that assigns measurements into categories, and each category display unique strengths, weaknesses and trends. The analysis yielded results proving to be too rich for a single article, thusly, this is the first of two articles covering the results. In this article, the Practitioners Guide focus on results valuable for someone interested in evaluating C2. Each evaluation has specific requirements that, for best result, ought to be reflected in the chosen measurement.
|
Jason R.C. Nurse, Sadie Creese, Michael Goldsmith, Rachel Craddock, & Glyn Jones. (2012). An initial usability evaluation of the secure situation awareness system. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: The importance of situation awareness systems in crisis-management scenarios cannot be emphasised enough. These systems enable entire disaster situations to be mapped out in a real-time fashion thereby aiding significantly in human decision-making and the necessary positioning, management and deployment of resources. As a result of the core role these systems play in responding to crises, it is vital that they are highly usable and optimized for human cognition and experience. In this paper we consider this reality in the context of an initial evaluation of the visualisation interface of a situation-awareness tool called Secure Situation Awareness (SSA). Our evaluation seeks to gather useful feedback from potential end-users on the usability of the tool's interface to feed into the design and development of interfaces for similar systems. © 2012 ISCRAM.
|
Oscar Durán, Edward Ruiz, & Catalina Esquivel. (2016). Towards a Monitoring and Follow Up System for the Costa Rican Risk Management System. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: The institutions that make up the Costa Rican Risk Management System are in charge of implementing the National Policy on Risk Management. It is necessary to highlight the scope of each institution regarding such implementation. This paper presents the proposal for a monitoring and follow up model. The monitoring to be implemented must process and provide precise information for decision making. This work presents the conceptual and methodological aspects for the aforementioned monitoring system.
|
Peter Otto, & Salvatore Belardo. (2006). A theoretical evaluation of information processing resources during organizational crisis. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 262–271). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: The purpose of this paper is to present a model for testing different organizational learning characteristics and their effects on performance rate in times of an unexpected temporary increase in workload. Drawing on the theoretical frameworks of Yerkes-Dodson law, the stress-buffering effect of coping resources, and established crisis management models, the authors examine the hypotheses of curvilinear and interactional influence of single and double-loop learning on stress levels during crises. Using a simulation model, we identify thresholds in single and double-loop learning environments, where increases in workload lead to dysfunctional effects of stress. The findings indicate support for the hypothesis that an organization that employs double-loop learning is less susceptible to negative stress in times of a crisis. Overall, the study highlights the characteristics of different learning types and its effects on stress. It is suggested that experiments with a simulation model lead to a better understanding of how information processing resources that people have access to in stress events, buffers or protects them from negative effects.
|
Pauline Tobergte, Alena Knispel, Lennart Landsberg, & Ompe Aimé Mudimu. (2022). Evaluation of Tabletop Exercises in Emergency Response Research and Application in the Research Project SORTIE. In Rob Grace, & Hossein Baharmand (Eds.), ISCRAM 2022 Conference Proceedings – 19th International Conference on Information Systems for Crisis Response and Management (pp. 415–427). Tarbes, France.
Abstract: This paper presents the fields of application of the tabletop exercise in emergency response by explaining the method in emergency response research. The authors illustrate the tabletop exercise of the Institute for Rescue Engineering and Civil Protection (IRG) of the TH Köln in a research project on Sensor Systems for Localization of Trapped Victims in Collapsed Infrastructure (acronym: SORTIE) as an application example. Subsequently, the quantitative and qualitative evaluation methods used generally and specifically for the tabletop exercise of the research project SORTIE are considered, and the technical implementation is explained. The evaluation method used in the tabletop exercise consists of three sub-areas (participant survey; exercise observation; photo, video and audio recordings). Further, the analysis of the evaluation using statistical tools is explained. Finally, this paper refers to possible sources of error in the evaluation of tabletop exercises, such as exercise artificiality and subjectivity of the exercise observers.
|
Sofie Pilemalm, & Niklas Hallberg. (2008). Exploring service-oriented C2 support for emergency response for local communities. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 159–166). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The increased impact of natural disasters and terror attacks on our society has augmented the awareness of needs for advances in emergency response. For local communities it is vital to make use of existing resources. Service-oriented technology provides new possibilities for the enhancement of command and control (C2) systems. However, to gain full use of the technology, it must harmonize with the supported organizations and their work procedures. This paper explores the possibilities and usefulness of service oriented C2-systems for emergency response at the local community level. The study was performed in five steps: (1) literature study, (2) interviews, (3) scenario design, (4) prototyping service-oriented C2 systems, and (5) a scenario based evaluation. The results show that service-oriented C2 systems would support and enhance emergency response at the local community level. Still, several issues that need to be further considered remain, not the least the ability of quality assurance of services.
|
Radianti, J., Pilemalm, S., Steen-Tveit, K., & Rustenberg, K. (2023). Enhancing Learning from Incidents by Reconstruction of Events: Using the SQUARE Tool for Evaluation. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 663–675). Omaha, USA: University of Nebraska at Omaha.
Abstract: Evaluation after exercise and incidents—often called After Action Review or AAR—are important to enhance the emergency management (EM) response capability. However, evaluation supporttools for event reconstruction after incidents and exercises are not yet fully available. We engaged EM stakeholders in a tabletop exercise based on snow chaos and car accidents scenarios to evaluate a fully functional prototype. The tool assists information sharing in real-time and enhances debriefing process of any EM response and exercise. Analysis of reflective discussions and an open question survey shows that the EM participants consider the features of the prototype to facilitate better learning from incidents. However, they have different attitudes concerning the adoption, management, and application of the tool in organizations. For instance, more security features are required to comply with regulations. We argue that the tool is an important first step to fill the gap on the need for “event reconstruction-based evaluation.”
|
Wolfgang Raskob, Valentin Bertsch, Jutta Geldermann., Sandra Baig, & Florian Gering. (2005). Demands to and experience with the decision support system rodos for off-site emergency management in the decision making process in Germany. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 269–278). Brussels: Royal Flemish Academy of Belgium.
Abstract: Emergency situations, man-made as well as natural, can differ considerably. However, they share the characteristic of sudden onset, involve complex decisions and necessitate a coherent and effective emergency management. In the event of a nuclear or radiological accident in Europe, the real-time on-line decision support system RODOS provides support from the early phase through to the medium and long-term phases. This paper describes the demands to a Decision Support System from a user-centred view as well as experiences gained from conducting moderated decision making workshops based on a hypothetical accident scenario focusing on the evaluation of long-term countermeasures using the simulation capabilities of the RODOS system and its recently integrated evaluation component Web-HIPRE, a tool for multi-criteria decision analysis (MCDA).
|
Anthony C. Robinson, Alexander Savelyev, Scott Pezanowski, & Alan M. MacEachren. (2013). Understanding the utility of geospatial information in social media. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 918–922). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: Crisis situations generate tens of millions of social media reports, many of which contain references to geographic features and locations. Contemporary systems are now capable of mining and visualizing these location references in social media reports, but we have yet to develop a deep understanding of what end-users will expect to do with this information when attempting to achieve situational awareness. To explore this problem, we have conducted a utility and usability analysis of SensePlace2, a geovisual analytics tool designed to explore geospatial information found in Tweets. Eight users completed a task analysis and survey study using SensePlace2. Our findings reveal user expectations and key paths for solving usability and utility issues to inform the design of future visual analytics systems that incorporate geographic information from social media.
|