Aarland, M., Radianti, J., & Gjøsæter, T. (2023). Using System Dynamics to Simulate Trust in Digital Supply Chains. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 516–529). Omaha, USA: University of Nebraska at Omaha.
Abstract: The power industry is outsourcing and digitalising their services to provide better, faster, and more reliable supply of electric power to the society. As a result, critical infrastructure increases in complexity and tight couplings between multiple suppliers and systems in digital supply chains. It also introduces new risks and challenges that are difficult to manage for critical infrastructure owners. To address the vulnerability in digital supply chains, we have developed a system dynamics model that represent important challenges to manage cybersecurity in digital supply chains, based on input from an expert group in the power industry. The system dynamics model illustrates how trust in suppliers as well as the need for control play important roles in outsourcing. Scenarios were developed and simulated.
|
Abdelgawad, A. A. (2023). An Updated System Dynamics Model for Analysing the Cascading Effects of Critical Infrastructure Failures. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 595–608). Omaha, USA: University of Nebraska at Omaha.
Abstract: Aiming at examining the cascading effects of the failure of Critical Infrastructure (CI), this work-in-progress research introduces an improved System Dynamics model. We represent an improvement over the previous models aimed at studying CIs interdependencies and their cascading effects. Our model builds on earlier models and corrects their flaws. In addition to introducing structural enhancements, the improvements include using unpublished data, a fresh look at a previously collected dataset and employing a new data processing to address and resolve some longstanding issues. The dataset was fed to an optimisation model to produce a new dataset used in our model. The structure of our SD model, its dataset and the data processing techniques we employed to create this dataset are all described in the study. Although the model has passed the fundamental validation criteria, more validation testing and scenario exploration are yet to be conducted.
|
Christine Adler, Marion Krüsmann, Thomas Greiner-Mai, Anton Donner, Javier Mulero Chaves, & Àngels Via Estrem. (2011). IT-supported management of mass casualty incidents: The e-triage project. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Voice, analogue mobile radio, and paper have een successfully used for decades for coordination of emergencies and disasters, but although being simple and robust this approach cannot keep pace with todays requirements any more. Emerging and established digital communication standards open the door to new applications and services, but the expected benefit needs to be carefully evaluated against robustness, interoperability, and user-friendliness. This paper describes a framework for IT-supported management of mass casualty incidents, which is currently under implementation and study. The four pillars of the concept are handheld devices for use both in daily rescue operations and in disasters, autonomous satellite-based communication infrastructure, a distributed database concept for maximal availability, and psychological acceptance research.
|
Amro Al-Akkad, & Christian Raffelsberger. (2014). How do i get this app? A discourse on distributing mobile applications despite disrupted infrastructure. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 565–569). University Park, PA: The Pennsylvania State University.
Abstract: This paper aims to lead a discourse on distributing mobile applications while having no access to cloud services. While in daily life people acquire applications via application stores, the access to those stores can be severely hampered in disasters. Instead of wishful thinking, i.e. hoping that people or manufactures would pre-install an (emergency) app before a disaster, we have started to investigate into Internet-less deployment mechanisms. We discuss five potential approaches of deploying apps in an ad-hoc fashion. Each approach is assessed against six criteria, while taking a stance that the smartphone is the minimally required deployment platform. This paper concludes with the observation that current mobile operating system providers do not provide “Internet-less” deployment mechanisms, although platforms as Android allow for this. This said, we hope that this contribution can spark further interest into the discussed problematic.
|
Amro Al-Akkad, Christian Raffelsberger, Alexander Boden, Leonardo Ramirez, & Zimmermann, A. (2014). Tweeting 'when online is off'? Opportunistically creating mobile ad-hoc networks in response to disrupted infrastructure. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 662–671). University Park, PA: The Pennsylvania State University.
Abstract: In this paper, we present a system that enables people to post and receive tweets despite disruptions of existing network infrastructure. Our system opportunistically deploys mobile ad hoc networks (MANETs) based on Wi-Fi in which people can communicate with each other in a peer-to-peer fashion. A MANET per se constitutes an isolated island, but as people carry devices around that can join other MANETs, eventually people can transport previously collected data to the online world. Compared to other systems that aim to enable communication in crisis, our system differs in two ways: it does not rely on existing network infrastructure, and it exploits established protocols and standards allowing it to run on off-the-shelf, commercially available smartphones. We evaluated our prototype with a group of students and practitioners. Overall, we received positive feedback on the potential of our technology, but also were pointed to limitations requiring future work.
|
Alexander Gabriel, Florian Klein, & Frank Fiedrich. (2020). Modelling of Passenger Handling Processes in Railway Stations – A Mixed-Methods Approach. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 580–592). Blacksburg, VA (USA): Virginia Tech.
Abstract: The constantly increasing number of passengers using public transportation leads to an expansion of the ser-vices offered by public transportation companies. The existing transportation infrastructures, especially rail-way stations, can only partly cope with this rapid growth. There is already overcrowding on platforms and access routes, especially during disruptions caused by natural disasters or major public events. This crowding may result in personal injury or shutdown of operations for safety reasons. The research project CroMa aims at improving robustness, safety, security and performance of railway stations at peak loads. The paper contributes thereto by developing an approach to assess railway infrastructure in terms of the risk of overcrowding. The core of this research is to combine qualitative workshop results with quantitative database analysis. Furthermore, the paper gives an outlook on the ongoing process model development as a basis for a semi-quantitative evaluation tool for railway stations applicable by end users.
|
Alexander Gabriel, Simon Schleiner, Florian Brauner, Florian Steyer, Verena Gellenbeck, & Ompe Aimé Mudimu. (2017). Process modelling of physical and cyber terrorist attacks on networks of public transportation infrastructure. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 390–399). Albi, France: Iscram.
Abstract: Recent events have demonstrated the vulnerability of IT-systems of different companies, organisations or even governments to hacker attacks. Simultaneously, information technologies have become increasingly established and important for institutions of various branches. With respect to modern terrorism developments, cyber-attacks may be used to physically harm critical infrastructures. This leads to a new dimension of cyber-attacks called “terrorist cyber-attacks”. This research-in-progress paper aims to develop a process model for data acquisition and support of decision making that seeks to enhance the security of public transportation in the context of counterterrorism. Therefore, a generic process model for terrorist cyber-attacks – produced in the research project RE(H)STRAIN1 – is intro-duced as a basis for a decision support system (DSS). In the future, such models could improve the decision process by comparing the effectiveness of different security measures.
|
Ana Rodríguez-Hoyos, José Estrada-Jiménez, David Rebollo-Monedero, Jordi Forné, Rubén Trapero Burgos, Antonio Álvarez Romero, et al. (2019). Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern
computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold.
To improve these capabilities, logs are usually shared with external entities. However, since cybersecurity logs
might contain sensitive data, serious privacy concerns arise, even more when critical infrastructures (CI), handling
strategic data, are involved.
We propose a tool to protect privacy by anonymizing sensitive data included in cybersecurity logs. We implement
anonymization mechanisms grouped through the definition of a privacy policy. We adapt said approach to the
context of the EU project CIPSEC that builds a unified security framework to orchestrate security products, thus
offering better protection to a group of CIs. Since this framework collects and processes security-related data from
multiple devices of CIs, our work is devoted to protecting privacy by integrating our anonymization approach.
|
Axel Dierich, Katerina Tzavella, Neysa Jacqueline Setiadi, Alexander Fekete, & Florian Neisser. (2019). Enhanced Crisis-Preparation of Critical Infrastructures through a Participatory Qualitative-Quantitative Interdependency Analysis Approach. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Critical Infrastructure (CI) failures are aggravated by cascading effects due to interdependencies between
different infrastructure systems and with emergency management. Findings of the German, BMBF-funded
research project ?CIRMin? highlight needs for concrete assessments of such interdependencies. Driven by
challenges of limited data and knowledge accessibility, the developed approach integrates qualitative
information from expert interviews and discussions with quantitative, place-based analyses in three selected
German cities and an adjacent county.
This paper particularly discusses how the mixed methods approach has been operationalized. Based on
anonymized findings, it provides a comprehensive guidance to interdependency analysis, from survey and
categorization of system elements and interrelations, their possible mutual impacts, to zooming into selected
dependencies through GIS mapping. This facilitates reliably assessing the need for maintenance of critical
functionalities in crisis situations, available resources, auxiliary powers, and optimization of response time.
|
Victor A. Bañuls, Murray Turoff, & Joaquin Lopez. (2010). Clustering scenarios using cross-impact analysis. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Scenarios are frequently used in Emergency Planning and Preparedness. These scenarios are developed based on the hypothesis of occurrence or not of significant events. This is a complex process because of the interrelations between events. This fact, along with the uncertainty about the occurrence or non-occurrence of the events, makes the scenario generation process a challenging issue for emergency managers. In this work a new step-by-step model for clustering scenarios via cross-impact is proposed. The authors. proposal adds tools for detecting critical events and graphical representation to the previous scenario-generation methods based on Cross-Impact Analysis. Moreover, it allows working with large sets of events without using great computational infrastructures. These contributions are expected to be useful for supporting the analysis of critical events and risk assessment tasks in Emergency Planning and Preparedness. Operational issues and practical implications of the model are discussed by means of an example.
|
Marie Bartels. (2014). Communicating probability: A challenge for decision support systems. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 260–264). University Park, PA: The Pennsylvania State University.
Abstract: This paper presents observations made in the course of two interorganizational crisis management exercises that were conducted in order to identify requirements for a decision support system for critical infrastructure operators. It brings into focus how different actors deal with the uncertainty of information that is relevant for other stakeholders and therefore is to be shared with them. It was analyzed how the participants articulated und comprehended assessments on how probable the reliability of a given data or prognosis was. The recipients of the information had to consider it when making decisions concerning their own network. Therefore they had to evaluate its reliability. Different strategies emerged.
|
Gabriel Bartl, Lars Gerhold, & Matthias Wählisch. (2014). Towards a theoretical framework of acceptance for surveillance systems at airports. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 299–303). University Park, PA: The Pennsylvania State University.
Abstract: In this paper we illustrate (a) the background and goals of the interdisciplinary research project SAFEST and (b) first insights from the socio-scientific part within the project. Technical systems are often established without considering explicitly ethical, legal, and social implications. This frequently leads to a lack of acceptance. This paper aims at compiling an analytical scheme that tries to demonstrate the relevance of the social context for the emergence of different modes of acceptance in reference to surveillance systems at airports. It is intended to guide the technical experts to deal with and reflect acceptance issues in the process of technical development.
|
Michael R. Bartolacci, Christoph Aubrecht, & Dilek Ozceylan Aubrecht. (2014). A portable base station optimization model for wireless infrastructure deployment in disaster planning and management. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 50–54). University Park, PA: The Pennsylvania State University.
Abstract: Disaster response requires communications among all affected parties including emergency responders and the affected populace. Wireless telecommunications, if available through a fixed structure cellular mobile network, satellites, portable station mobile networks and ad hoc mobile networks, can provide this means for such communications. While the deployment of temporary mobile networks and other wireless equipment following disasters has been successfully accomplished by governmental agencies and mobile network providers following previous disasters, there appears to be little optimization effort involved with respect to maximizing key performance measures of the deployment or minimizing overall 'cost' (including time aspects) to deploy. This work-in-progress does not focus on the question of what entity will operate the portable base during a disaster, but on optimizing the placement of mobile base stations or similar network nodes for planning and real time management purposes. An optimization model is proposed for the staging and placement of portable base stations to support disaster relief efforts.
|
Benjamin Herfort, Melanie Eckle, João Porto de Albuquerque, & Alexander Zipf. (2015). Towards assessing the quality of volunteered geographic information from OpenStreetMap for identifying critical infrastructures. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Identifying the assets of a community that are part of its Critical Infrastructure (CI) is a crucial task in emergency planning. However, this task can prove very challenging due to the costs involved in defining the methodology and gathering the necessary data. Volunteered Geographic Information from collaborative maps such as OpenStreetMap (OSM) may be able to make a contribution in this context, since it contains valuable local knowledge. However, research is still due to assess the quality of OSM for the particular purpose of identifying critical assets. To fill this gap, this paper proposes a catalogue of critical asset types, based on the analysis of different reference frameworks. We thus analyze how good the emergent OSM data model is for representing these asset types, by verifying whether they can be mapped to tags used by the OSM community. Results show that critical asset types of all selected sectors and branches are well represented in OSM.
|
T. Benjamins, & Leon J.M. Rothkrantz. (2007). Interactive simulation in crisis management. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 571–580). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Experiments in crisis management are expensive and difficult to realize. There is also a lack of training facilities in real crisis environments. Serious games and simulation can provide an alternative. We developed a system which enables interactive simulation for crisis management. It is called IMACSIM (Interactive Multi Agent Crisis Simulator Interpreter and Monitor). It is composed of the following components: First a software based platform for dynamic simulating of disasters. Next an event generator which can generate different crises situations. We designed a communication infrastructure that allows agents participants in the simulation to exchange messages. Every agent is able to observe the results of crisis events, process these events and initiate appropriate actions via a waypoint system. The decision making process is distributed among autonomous agents. Some actions may have an impact on the event generator, so there is an interaction between agents and event generator. We developed a first prototype. The design and test results will be described in this paper.
|
Björn Johan Erik Johansson, Amanda Jaber, Joeri van Laere, & Peter Berggren. (2018). The lack of preparedness for payment disruptions in local community core businesses. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 904–913). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: One of the most important infrastructures for society is the payment system. If this system malfunctions, it can lead to disruptions in other critical infrastructures. By developing resilience i.e. the ability to recover or resist different disruptions in complex dynamic systems, as well as analyzing and raising awareness about it, such events can hopefully be handled better. The purpose of this study is to gain an insight into the different sectors' ways of dealing with disturbances in the payment system. Six participants from the food, fuel and bank sectors were interviewed using semi-structured questions. The interviews were conducted and data was analyzed using a thematic analysis approach. The results indicate a low level of resilience maturity among these organizations when it comes to handle long-term disruptions in the payment systems. The results provide valuable input to the project and a better understanding of payment infrastructure resilience.
|
Boris Petrenj, & Paolo Trucco. (2021). Blockchain-based Solutions to support inter-organisational Critical Infrastructure Resilience. In Anouck Adrot, Rob Grace, Kathleen Moore, & Christopher W. Zobel (Eds.), ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management (pp. 982–993). Blacksburg, VA (USA): Virginia Tech.
Abstract: This conceptual paper critically discusses opportunities for and challenges to the development and exploitation of blockchain-based solutions for resilience management at inter-organizational level of interdependent Critical Infrastructure (CI) systems. The main premise behind this idea is that trustful information-sharing and inter-institutional collaboration are the key elements of government and private sector efforts to build CI resilience (CIR). The discussion presents a vision that the adoption and adaptation of Blockchain Technology (BCT) could significantly improve the way a network of stakeholders prepares for and performs in face of inevitable CI disruptions. Even though BCT is regarded as technological innovation, the impacts go far beyond information systems. BCT application in this domain would entail significant benefits to organizational, managerial, legal and social issues, but would require adequate operational and organizational changes. We discuss how interdisciplinary approach (BCT and CIR) could address existing challenges, how it could introduce new challenges and how it could support other approaches and paradigms currently being regarded as the future of risk and resilience management. Even though the discussion in this paper is focused on Critical Infrastructure resilience, each point also applies to Crisis/Disaster management domain in general. This is a preliminary overview with the aim to stimulate further discussions and point to possible new, disruptive and interdisciplinary research avenues. To this end, a possible research agenda is eventually proposed.
|
Boris Petrenj, Mariachiara Piraina, Giada Feletti, Paolo Trucco, Valentina Urbano, & Stefano Gelmi. (2021). Cross-border Information Sharing for Critical Infrastructure Resilience: Requirements and Platform Architecture. In Anouck Adrot, Rob Grace, Kathleen Moore, & Christopher W. Zobel (Eds.), ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management (pp. 247–259). Blacksburg, VA (USA): Virginia Tech.
Abstract: Resilience of Critical Infrastructures is high on the agenda of countries' efforts. Modern CI highly interdependent and span countries, so disruptions occurring on one side of the border can significantly affect economic and social functions on the other. To build CI resilience, stakeholder organizations must collaborate and exchange information throughout the Emergency Management cycle. In this paper, we present the Critical Infrastructure Platform (PIC in Italian) which is being developed within the SICt project (Resilience of Cross-Border Critical Infrastructure). PIC is a technological piece of a broader cross-border regional resilience strategy between Lombardy Region (Italy) and Canton Ticino (Switzerland) aiming to improve the capacity to manage accidental events involving transportation CI between the two countries. The main goal of the PIC platform is to support secure and effective information-sharing, inter-organizational risk assessment, monitoring and operational coordination under critical situations. The paper presents the key requirements of such ICT system, its high-level architecture including the description of its main modules, main takeaways and future steps.
|
Raffaele Bruno, Marco Conti, & Andrea Passarella. (2008). Opportunistic networking overlays for ICT services in crisis management. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 689–701). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: ICT infrastructures are a critical asset in today's Information society. Legacy telecommunication systems easily collapse in the face of disruptions due to security incidents or natural disasters. Hence, there is an urgent demand for new architectures and technologies ensuring a more efficient and dependable support for various security missions, such as disaster relief initiatives, first responder operations, critical infrastructure protection, etc. In this paper we advocate the opportunistic networking paradigm to build a self-organizing overlay ICT infrastructure for supporting dependable crisis management services. Our opportunistic framework to “glues together” surviving parts of the pre-existing infrastructure with networks deployed on-demand and users devices, and supports dependable distribution of coherent, updated, and non-contradictory information distribution. Finally, to show the potential advantages of our solution, we present initial results on the performance of different types of opportunistic infrastructures, by particularly highlighting the gains of context-aware systems.
|
Bryan Semaan, & Jeff Hemsley. (2015). Maintaining and Creating Social Infrastructures: Towards a Theory of Resilience. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
|
Axel Bürkle, Florian Segor, Sven Müller, Igor Tchouchenkov, & Matthias Kollmann. (2012). Advantages of an integrated open framework for immediate emergency response. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: Recent disasters have shown that wireless sensors and unmanned systems are increasingly becoming a valuable aid for first responders. Depending on the kind of incident and its extent, different assets are to be used. The more diverse these assets are, the more complex their simultaneous use and coordination. Therefore, integrated solutions are needed which comprise all necessary components such as power supply, communication infrastructure, data acquisition and processing, decision support and information dissemination. In this paper, an architecture for an open framework is proposed and its advantages over dedicated solutions are discussed. The flexibility of the universal control station presented here is demonstrated using the example of integrating a smartphone as an additional mobile sensor. © 2012 ISCRAM.
|
Cornelia Caragea, Nathan McNeese, Anuj Jaiswal, Greg Traylor, Hyun-Woo Kim, Prasenjit Mitra, et al. (2011). Classifying text messages for the haiti earthquake. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: In case of emergencies (e.g., earthquakes, flooding), rapid responses are needed in order to address victims' requests for help. Social media used around crises involves self-organizing behavior that can produce accurate results, often in advance of official communications. This allows affected population to send tweets or text messages, and hence, make them heard. The ability to classify tweets and text messages automatically, together with the ability to deliver the relevant information to the appropriate personnel are essential for enabling the personnel to timely and efficiently work to address the most urgent needs, and to understand the emergency situation better. In this study, we developed a reusable information technology infrastructure, called Enhanced Messaging for the Emergency Response Sector (EMERSE), which classifies and aggregates tweets and text messages about the Haiti disaster relief so that non-governmental organizations, relief workers, people in Haiti, and their friends and families can easily access them.
|
Madhavi M. Chakrabarty, & David Mendonça. (2005). Design considerations for information systems to support critical infrastructure management. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 13–18). Brussels: Royal Flemish Academy of Belgium.
Abstract: This paper develops a set of design considerations for information systems to support the management of interdependent critical infrastructure systems. Constraints on how these systems are managed are oriented along technical, political and organizational dimensions, though objectives along these dimensions may conflict and thus be difficult to satisfy. This paper harnesses methodologies from software engineering and cognitive science in order to specify opportunities for using information systems to support human-centered management of critical infrastructure systems. The particular focus of this work is on developing information systems to support visualization and visual problem solving. Progress to date is discussed in terms of an ongoing research project which uses as a test-bed data associated with lower Manhattan (New York, USA).
|
Christopher W. Zobel, Milad Baghersad, & Yang Zhang. (2017). Calling 311: evaluating the performance of municipal services after disasters. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 164–172). Albi, France: Iscram.
Abstract: As part of a movement towards enabling smart cities, a growing number of urban areas in the USA, such as New York City, Boston, and Houston, have established 311 call centers to receive service requests from their citizens through a variety of platforms. In this paper, for the first time, we propose to leverage the large amount of data provided by these non-emergency service centers to help characterize their operational performance in the context of a natural disaster event. We subsequently develop a metric based on the number of open service requests, which can serve as the basis for comparing the relative performance of different departments across different disasters and in different geographic locations within a given urban area. We then test the applicability and usefulness of the approach using service request data collected from New York City's 311 service center.
|
Tina Comes, & Bartel A. Van De Walle. (2014). Measuring disaster resilience: The impact of hurricane sandy on critical infrastructure systems. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 195–204). University Park, PA: The Pennsylvania State University.
Abstract: Modern critical infrastructure (CI) systems are tightly coupled, resulting in unprecedented complexity and difficulty to predict, limit and control the consequences of disruptions caused by hazards. Therefore, a paradigm shift in disaster risk management is needed: instead of focusing on predicting events, resilience needs to be improved as a basis for adequate response to any event. This paper starts from a definition of CI resilience that provides a basis for quantitative and qualitative decision support. For the quantitative modelling approach, which aims at measuring the resilience of individual CIs, we focus on two CIs of fundamental importance for disaster response: transportation and power supply. The qualitative framework details relations between CIs. The results of this research are illustrated by a case study that analyses the impact of Hurricane Sandy. The findings highlight the need for a framework that combines qualitative and quantitative information from heterogeneous sources to improve disaster resilience.
|