Alexander Gabriel, Babette Tecklenburg, Yann Guillouet, & Frank Sill Torres. (2021). Threat analysis of offshore wind farms by Bayesian networks – a new modeling approach. In Anouck Adrot, Rob Grace, Kathleen Moore, & Christopher W. Zobel (Eds.), ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management (pp. 174–185). Blacksburg, VA (USA): Virginia Tech.
Abstract: As a result of the ongoing commitment to climate protection in more and more countries and the corresponding expansion of renewable energies, the importance of renewables for the security of electricity supply is also increasing. Wind energy generated in offshore wind farms already accounts for a significant share of the energy mix and will continue to grow in the future. Therefore, approaches and models for security assessment and protection against threats are also needed for these infrastructures. Due to the special characteristics and geographical location of offshore wind farms, they are confronted with particular challenges. In this context, this contribution outlines how an approach for threat analysis of offshore wind farms is to be developed within the framework of the new research project “ARROWS” of the German Aerospace Center. The authors first explain the structure of offshore wind farms and then present a possible modeling approach using Qualitative function models and Bayesian networks.
|
Alayne Da Costa Duarte, Marcos R. S. Borges, Jose Orlando Gomes, & De Paulo V. R. Carvalho. (2013). ASC model: A process model for the evaluation of simulated field exercises in the emergency domain. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 551–555). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: The undefined flow of execution of activities in an evaluation process hampers its implementation. A consistent evaluation process defines interrelated methodological steps that make it easier for the evaluator to lead the process. This article presents a process model for the evaluation of simulated field exercises in the emergency domain, including their sub processes and activities. The proposed model was derived from observations made during real situations of a simulated evacuation exercise of communities in high-risk areas in Rio de Janeiro (Brazil). The motivation came from the finding that the assessment of simulated field exercises is conducted by completing an activity report that does not follow a structural model, an evaluation program or a formal standard. The results of this research show the experts' satisfaction with the application of the model proposed for the development of an evaluation process. The same occurs when comparing to reports currently used by them for this purpose.
|
Flávio Horita, João Porto de Albuquerque, Victor Marchezini, & Eduardo M. Mendiondo,. (2016). A qualitative analysis of the early warning decision-making process in disaster management. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: Early warning systems are an important means of improving the efficiency of disaster response and preparedness. However, in its analysis of the technological aspects of the infrastructure, the literature has failed to carry out an investigation of early warning process. This paper has sought to take a step toward understanding this issue by carrying out a qualitative analysis of the early warning process in disaster management. This has involved participatory observations and conducting interviews with practitioners from the National Center for Monitoring and Early Warning of Natural Disasters (CEMADEN). The results have shown that this research area is a promising way of increasing efficiency and reducing the response time to warnings. This might be achieved by conducting a process analysis, which could provide evidence and information about bottlenecks or investigate the misuse of information systems or tasks by the players involved.
|
Tim J. Grant. (2008). Checklist for comparing emergency management information systems. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 752–763). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: This paper describes a checklist that has been developed for comparing the functionality of emergency management control centres and their information systems. The intention is to interest the ISCRAM community in using the checklist in various applications and pooling experiences. The Control Centre Visit Checklist has evolved through four iterations. It has been used to study two military C2 systems and one non-military control system, and has been applied by students for course assignments. The paper focuses on the part of the checklist that evaluates the information system from the systems viewpoint. It describes the underlying applications architecture and process model. The Royal Netherlands Army's Battlefield Management System illustrates the application of the checklist. The results show that the checklist aids in identifying where C2 systems can be developed further. The next step is to perform a set of substantial pilot studies for diverse domains, including civilian emergency management systems.
|
Tim J. Grant. (2011). Combining information sharing and seeking in networked coalitions. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Coalitions are the rule in crisis management and military operations. Although the partners do not form part of an organizational hierarchy, they need to share information to find their place in the coalition, to prepare plans collaboratively, to synchronize their actions, to evaluate their achievements, and to negotiate changes in their relationships. Interviews of experienced military officers have shown that information sharing in coalitions is more complex than one-way information transmission. It has the characteristics of an information market in which security regulations give information a scarcity value, with both sources and recipients initiating action. The emerging literature on information markets includes few process models. The purpose of this paper is to propose a theoretical, four-stage process model for information sharing between coalition partners in the context of Network Enabled Capabilities. The model combines information sharing and seeking, integrates intelligence collection, and supports a range of market mechanisms.
|
Tim J. Grant, & Gijs Van Den Heuvel. (2010). Modelling the information sharing process in military coalitions: A work in progress. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Coalition partners must share information to work together. Models of information sharing assume that it is a linear, one-way process. As part of a larger project, we studied information sharing in military coalitions. Interviews of 47 officers in NATO R&D organizations showed that one piece of information was often traded for another. This is characteristic of an information market. Security regulations make information a scarce resource, although trust may allow the regulations to be waived. Our observations have consequences for the military Network Enabled Capabilities community in their desire to migrate to a “need to share” security principle. Failing to find a suitable process model in the literature, we outline requirements and identify two possible starting points for modelling the information sharing process in military coalitions.
|
Dick Ooms, & Willem-Jan Van Den Heuvel. (2014). If every nail looks different, you need different hammers: Modeling civil-military interaction. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 349–353). University Park, PA: The Pennsylvania State University.
Abstract: In the response to emergencies and disasters, effective cooperation and information exchange between military and civil actors is essential. However, in practice, the quality of civil-military interaction (CMI) leaves much to be desired. Our research takes an engineering approach, which is complementary to most behavioral-oriented research in the CMI domain. In particular, we seek to support CMI processes with innovative Information Technology solutions. To this end, we are developing a comprehensive conceptual model of the CMI domain, which is currently lacking. This paper contributes to its development by investigating candidate technologies and defining CMI domain model requirements. Exploiting these requirements as criteria, we have evaluated three modeling methods and languages, i.e. the Unified Modeling Language (UML), the Business Process Modeling Notation (BPMN) and the Design and Engineering Methodology for Organizations (DEMO). Based on the comparative study, we conclude that a combination of these is required for modeling the CMI domain.
|
Stefan Sackmann, Marlen Hofmann, & Hans Betke. (2013). Towards the Integration of Place-related Information in Disaster Response Processes. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 78–83). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: Processes in disaster response management (DRM) and business processes are similar due to their general structure and goals. This encourages us to analyze the suitability of business process management tools and methods in the domain of DRM. One main challenge is the coverage of disaster specific aspects by existing process modeling languages. Since interdependencies between time, activities, and place are critical for process planning, we discuss the necessity for model extension. A special focus lies on the integration of place-related information as well as interdependencies resulting from stationary and mobile activities and resources. The integration of such place-related information is discussed as pre-condition for effective and efficient planning of disaster response processes and their successful management by disaster response workflow management systems.
|
Hans-Peter Thamm, Thomas Ludwig, & Christian Reuter. (2013). Design of a process model for unmanned aerial systems (UAS) in emergencies. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 478–487). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: The electricity network is one of the most important infrastructures in modern industrialized societies. In the case of power outages, the society becomes aware of their dependence on electricity and organizations responsible for recovery work need precise information about the location and the type of the damage, which are usually not available. Unmanned Aerial Systems (UAS), commonly known as drones, are aircrafts without a human pilot on board and may help to collect this information. While many technical approaches for UAS exist, a systematic process model for using UAS in emergencies based on the organizations needs is still missing. Based on the presentation of current types of UAS, approaches of using UAS and workshops with organizations responsible for recovery work (police and fire department, public administration, power supplier) this paper presents a process model for UAS in emergencies, especially power outages, which takes both theoretical findings and human experiences into consideration.
|