Alena L. Benson, Keith Biggers, Jim Wall, & Mark P. Haselkorn. (2010). Adaptive development of a common operating environment for crisis response and management. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Complex information and communication systems present a special challenge to system designers because these are generally deployed as large, distributed systems with diverse user groups. Crisis response and management organizations in particular expect systems to be interoperable, resilient, flexible and provide lasting benefit. Currently, systems such as Virtual USA (Department of Homeland Security) and WatchKeeper (United States Coast Guard) seek to create common situational awareness for all participating agencies in security and incident response operations. We propose adaptive development as a system development model to build upon the ideas of systems such as Virtual USA and WatchKeeper in order to create sustainable and adaptable systems. Adaptive development supports ongoing improvement through user-driven design and modification in the target environment. An internet-based dashboard demonstrated during a United States Coast Guard Sector Seattle incident response exercise serves as an emergent case study for the adaptive model.
|
Duco N. Ferro, Jeroen M. Valk, & Alfons H. Salden. (2007). A robust coalition formation framework for mobile surveillance incident management. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 479–488). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Given unexpected incidents on routes of guards that check security objects, like banks, one of the most challenging problems is still how to support improvisation by security personnel in taking decisions to prevent or resolve such incidents. Another as important associated problem is how a security company can naturally take advantage of its existing and novel knowledge about its organizational and ICT infrastructures, and the introduction of a decision support system to help leverage of improvisation by humans. To tackle all this, on the one hand we present a dynamic coalition formation framework that allows the (re)configurations of agents that are associated with joint tasks in situational contexts to be evaluated by appropriate value functions. On the other hand, we present a dynamic scale-space paradigm that allows a security company to distill ranked lists of robust context-dependent reconfigurations at critical scales. We highlight the merits of ASK-ASSIST as a solution to the problem of supporting human improvisation.
|
Kai Kamphenkel, Markus Blank, Jens Bauer, & Georg Carle. (2007). Secure transmission of pre-clinical ultrasound video data at the scene of a mass casualty incident. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 377–383). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The use of portable ultrasound devices enables a better and immediate diagnostics at the scene of a mass casualty incident. The detection of free fluid in abdomen and thorax is an important indicator for the further treatment. The gained information affects the triage of casualties, the pre-clinical medical attendance and the patient management. The presented article describes an innovative approach to transmit sonographic video streams over wireless networks to a remote hospital, where the medical data is used for diagnostics. For the secure transmission of data a new network unit is designed, which gathers information with regard to the network status and the character of transported data. This “Intelligent Network” is located in the transport layer of the OSI reference model and enables a dynamic interconnection between network and application, provides an interface for functional transparency and the disclosure of parameters and establishes the basis for an universal security system.
|
Matt Wolff. (2010). Unsupervised methods for detecting a malicious insider. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: One way a malicious insider can attack a network is by masquerading as a different user. Various algorithms have been proposed in an effort to detect when a user masquerade attack has occurred. In this paper, two unsupervised algorithms are proposed with the intended goal of detecting user masquerade attacks. The effectiveness of these two unsupervised algorithms are then compared against supervised algorithms.
|
Zeno Franco, Nina Zumel, & Larry E. Beutler. (2007). A ghost in the system: Integrating conceptual and methodology considerations from the behavioral sciences into disaster technology research. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 115–124). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: As the complexity of disasters increases, a transdisciplinary conceptual framework designed to address three key variables-technology, disaster severity, and human characteristics-must be developed and elaborated. Current research at the nexus of disaster management and information science typically addresses one or two of these factors, but rarely accounts for all three adequately-thus rendering formal inquiry open to a variety of threats to validity. Within this tripartite model, several theories of human behavior in disaster are explored using the response of the Federal Government and the general public during Hurricane Katrina as an illustrative background. Lessons learned from practice-based scientific inquiry in the social sciences are discussed to address concerns revolving around measurement and statistical power in disaster studies. Finally, theory building within the transdisciplinary arena of disaster management and information science is encouraged as a way to improve the quality of future research.
|