Theo Dirk Meijler, & Frank Nietzold. (2011). Light-weight model-based realization of a B2B protocol and a SOA integration engine. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: In emergency management, communication between the emergency management team and the outer world is essential. When using an emergency management system, such communication is often IT-based. To disburden the emergency management team, structured “B2B” messages may be used that correspond to the (foreseen) lifecycle of relevant entities in the emergency, such as threats and measures. The paper introduces an approach for the realization of a B2B messaging protocol and the corresponding integration engine, which maps message content to service calls, in the context of an emergency management system. The approach is light-weight and model-based, as protocols and integration engine are based on merely modeling the states and state transitions of objects in the system representing essential entities in the emergency. As the model is described in non-technical terms, this can be done by a non-IT expert.
|
Ummul Khair Israt Ara, & Fang Chen. (2012). Information security in crisis management system. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: Information security is an important part of almost any kind of Information System. Crisis Management Systems (CMS) are a type of Information System that deals with information which needs to be secure. No matter what kind of crisis, natural disasters, man-made crisis or terrorist attacks, the CMS security should not be compromised. There are many challenges regarding exchange of qualified information and interoperability between various Expert Systems and the CMS. It is important to have strong security in terms of technology, skills, security requirements, sensitivity of information and trust-worthiness (Vural, Ciftcibasi and Inan, 2010). Depending on the type of crisis situation, different sets of security components should be triggered, since the security requirements vary between situations. For example, a terrorist attack has different security requirements in the system compared to a natural disaster or a medical emergency. In this paper, the importance of Information Security in CMS will be discussed. Methods for secure exchange of qualified information are analyzed and a secure and dynamic Crisis Management Information Security System (CMISS) design is introduced. © 2012 ISCRAM.
|
Zoltán Balogh, Emil Gatial, & Ladislav Hluchý. (2016). Poll Sourcing for Crisis Response. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: During large scale crisis response operations there is an acute and continuous need to efficiently and quickly allocate a dynamically changing supply of resources. In this paper we are proposing a system, which uses polls to seamlessly discover, request, collect and aggregate information from engaged resource providers using the web or mobile devices. At the same time we aim to integrate information from sources such as sensors deployed on incident sites, publicly available open data, corporate legacy systems or documents stored on remote locations. The overall process of such Poll Sourcing also encompasses reservation and order of suitable resources. We provide a validation scenario concerning reservation of hospital beds during a mass casualty incident.
|