Alexander Gabriel, Babette Tecklenburg, Yann Guillouet, & Frank Sill Torres. (2021). Threat analysis of offshore wind farms by Bayesian networks – a new modeling approach. In Anouck Adrot, Rob Grace, Kathleen Moore, & Christopher W. Zobel (Eds.), ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management (pp. 174–185). Blacksburg, VA (USA): Virginia Tech.
Abstract: As a result of the ongoing commitment to climate protection in more and more countries and the corresponding expansion of renewable energies, the importance of renewables for the security of electricity supply is also increasing. Wind energy generated in offshore wind farms already accounts for a significant share of the energy mix and will continue to grow in the future. Therefore, approaches and models for security assessment and protection against threats are also needed for these infrastructures. Due to the special characteristics and geographical location of offshore wind farms, they are confronted with particular challenges. In this context, this contribution outlines how an approach for threat analysis of offshore wind farms is to be developed within the framework of the new research project “ARROWS” of the German Aerospace Center. The authors first explain the structure of offshore wind farms and then present a possible modeling approach using Qualitative function models and Bayesian networks.
|
Alexander Gabriel, Florian Klein, & Frank Fiedrich. (2020). Modelling of Passenger Handling Processes in Railway Stations – A Mixed-Methods Approach. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 580–592). Blacksburg, VA (USA): Virginia Tech.
Abstract: The constantly increasing number of passengers using public transportation leads to an expansion of the ser-vices offered by public transportation companies. The existing transportation infrastructures, especially rail-way stations, can only partly cope with this rapid growth. There is already overcrowding on platforms and access routes, especially during disruptions caused by natural disasters or major public events. This crowding may result in personal injury or shutdown of operations for safety reasons. The research project CroMa aims at improving robustness, safety, security and performance of railway stations at peak loads. The paper contributes thereto by developing an approach to assess railway infrastructure in terms of the risk of overcrowding. The core of this research is to combine qualitative workshop results with quantitative database analysis. Furthermore, the paper gives an outlook on the ongoing process model development as a basis for a semi-quantitative evaluation tool for railway stations applicable by end users.
|
Alexander Gabriel, Simon Schleiner, Florian Brauner, Florian Steyer, Verena Gellenbeck, & Ompe Aimé Mudimu. (2017). Process modelling of physical and cyber terrorist attacks on networks of public transportation infrastructure. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 390–399). Albi, France: Iscram.
Abstract: Recent events have demonstrated the vulnerability of IT-systems of different companies, organisations or even governments to hacker attacks. Simultaneously, information technologies have become increasingly established and important for institutions of various branches. With respect to modern terrorism developments, cyber-attacks may be used to physically harm critical infrastructures. This leads to a new dimension of cyber-attacks called “terrorist cyber-attacks”. This research-in-progress paper aims to develop a process model for data acquisition and support of decision making that seeks to enhance the security of public transportation in the context of counterterrorism. Therefore, a generic process model for terrorist cyber-attacks – produced in the research project RE(H)STRAIN1 – is intro-duced as a basis for a decision support system (DSS). In the future, such models could improve the decision process by comparing the effectiveness of different security measures.
|
Emma Carter, & Simon French. (2005). Nuclear emergency management in Europe: A review of approaches to decision making. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 247–259). Brussels: Royal Flemish Academy of Belgium.
Abstract: The need for transparent and consistent decision making in nuclear emergency management across local, regional, national and international levels is well recognised. Several decision support systems have been developed to help achieve this; but, by and large, with little consultation with potential DMs and with limited understanding of the emergency management procedures across Europe and how they differ. This work, part of a European Fifth Framework project EVATECH, considers the application of process modelling to document and compare the emergency management process in four countries. We have observed that the four process models are substantially different in their organizational structure and identified differences in where decisions are made, the management of advice and the communication network style. This papers focus is on the results of the comparison and the implications for the design and use of decision support systems.
|
Alayne Da Costa Duarte, Marcos R. S. Borges, Jose Orlando Gomes, & De Paulo V. R. Carvalho. (2013). ASC model: A process model for the evaluation of simulated field exercises in the emergency domain. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 551–555). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: The undefined flow of execution of activities in an evaluation process hampers its implementation. A consistent evaluation process defines interrelated methodological steps that make it easier for the evaluator to lead the process. This article presents a process model for the evaluation of simulated field exercises in the emergency domain, including their sub processes and activities. The proposed model was derived from observations made during real situations of a simulated evacuation exercise of communities in high-risk areas in Rio de Janeiro (Brazil). The motivation came from the finding that the assessment of simulated field exercises is conducted by completing an activity report that does not follow a structural model, an evaluation program or a formal standard. The results of this research show the experts' satisfaction with the application of the model proposed for the development of an evaluation process. The same occurs when comparing to reports currently used by them for this purpose.
|
Dick Ooms, Willem-Jan van den Heuvel, & Bartel Van de Walle. (2018). A Conceptual Framework for Civil-Military Interaction in Peace Support Operations. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 1003–1015). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: In complex emergencies, civil and military organizations often find themselves being partners in an international effort aimed at peace keeping, humanitarian relief, and development support. Civil and military partners need to exchange information and to cooperate as required. This assumes effective and efficient Civil-Military Interaction (CMI). However, CMI research literature shows that, in practice, this is far from a reality. In particular, our research indicates that deficiencies in knowledge processes and knowledge management within international civil and military organizations contribute to the causes of ineffective and inefficient CMI. Our research aims to investigate the feasibility of developing technical solutions exploiting knowledge engineering, to support fieldworkers in overcoming these CMI problems. As a first step, this paper introduces a Conceptual Framework (CF) that captures reference models of the CMI domain. The CF has been developed to analyze CMI problems and underlying KM deficiencies. It is being illustrated, explored and validated using real-world case studies.
|
Flávio Horita, João Porto de Albuquerque, Victor Marchezini, & Eduardo M. Mendiondo,. (2016). A qualitative analysis of the early warning decision-making process in disaster management. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: Early warning systems are an important means of improving the efficiency of disaster response and preparedness. However, in its analysis of the technological aspects of the infrastructure, the literature has failed to carry out an investigation of early warning process. This paper has sought to take a step toward understanding this issue by carrying out a qualitative analysis of the early warning process in disaster management. This has involved participatory observations and conducting interviews with practitioners from the National Center for Monitoring and Early Warning of Natural Disasters (CEMADEN). The results have shown that this research area is a promising way of increasing efficiency and reducing the response time to warnings. This might be achieved by conducting a process analysis, which could provide evidence and information about bottlenecks or investigate the misuse of information systems or tasks by the players involved.
|
Stephen C. Fortier. (2013). Developing an incident response process model for chemical facilities. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 941–950). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: This research project investigated the incident response mechanism used by the chemical industry for handling extremely hazardous chemicals. The mechanism was described as the policies, procedures, practices, tools, and methods used to conduct incident response. The results from the study determined what technologies, specifically software and information systems, could be utilized to improve the chemical facility incident response mechanism. The chemical industry is responsible for process safety management at all of its facilities, especially those that have off-site consequences in the event of an unplanned release. The processes and procedures of local, regional and national emergency responders have been studied thoroughly. An area of research that is lacking is the study of incident response policies and procedures within the boundaries of a chemical site. Results of the analysis determined that the chemical industry, in general, does not take advantage of available information technology when responding to unplanned releases.
|
Tim J. Grant. (2008). Checklist for comparing emergency management information systems. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 752–763). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: This paper describes a checklist that has been developed for comparing the functionality of emergency management control centres and their information systems. The intention is to interest the ISCRAM community in using the checklist in various applications and pooling experiences. The Control Centre Visit Checklist has evolved through four iterations. It has been used to study two military C2 systems and one non-military control system, and has been applied by students for course assignments. The paper focuses on the part of the checklist that evaluates the information system from the systems viewpoint. It describes the underlying applications architecture and process model. The Royal Netherlands Army's Battlefield Management System illustrates the application of the checklist. The results show that the checklist aids in identifying where C2 systems can be developed further. The next step is to perform a set of substantial pilot studies for diverse domains, including civilian emergency management systems.
|
Tim J. Grant. (2011). Combining information sharing and seeking in networked coalitions. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Coalitions are the rule in crisis management and military operations. Although the partners do not form part of an organizational hierarchy, they need to share information to find their place in the coalition, to prepare plans collaboratively, to synchronize their actions, to evaluate their achievements, and to negotiate changes in their relationships. Interviews of experienced military officers have shown that information sharing in coalitions is more complex than one-way information transmission. It has the characteristics of an information market in which security regulations give information a scarcity value, with both sources and recipients initiating action. The emerging literature on information markets includes few process models. The purpose of this paper is to propose a theoretical, four-stage process model for information sharing between coalition partners in the context of Network Enabled Capabilities. The model combines information sharing and seeking, integrates intelligence collection, and supports a range of market mechanisms.
|
Tim J. Grant, & Gijs Van Den Heuvel. (2010). Modelling the information sharing process in military coalitions: A work in progress. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Coalition partners must share information to work together. Models of information sharing assume that it is a linear, one-way process. As part of a larger project, we studied information sharing in military coalitions. Interviews of 47 officers in NATO R&D organizations showed that one piece of information was often traded for another. This is characteristic of an information market. Security regulations make information a scarce resource, although trust may allow the regulations to be waived. Our observations have consequences for the military Network Enabled Capabilities community in their desire to migrate to a “need to share” security principle. Failing to find a suitable process model in the literature, we outline requirements and identify two possible starting points for modelling the information sharing process in military coalitions.
|
Fabiana Santos Lima, Bernd Hellingrath, Adam Widera, & Mirian Buss Gonçalves. (2013). A systemic process model for procurement decisions in humanitarian logistics. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 688–692). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: The relief organizations work in volatile environments involving a variety of actors with different skills and knowledge. The service of emergency for victims of natural disasters requires a rapid decision-making. The objective of the approach presented in this paper is to develop a Systemic Process Model (SPM) for procurement decisions in humanitarian logistics. The SPM aims to support procurement tasks of humanitarian organizations during the response phase in disaster relief. The approach provides a decision support tool using an appropriate quantitative model reflecting the specific area of humanitarian logistics processes.
|
Marco Polo Ruiz Herrera, & Juan Sánchez Díaz. (2019). Improving Emergency Response through Business Process, Case Management, and Decision Models. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: The emergency procedures contain a set of actions responsible for providing the necessary corrective measures to address an emergency. The relevance of contextual knowledge during emergency responses is of utmost importance since many decisions are made from the information gathered in real time that sometimes conflicts with the formal knowledge specified in the emergency plan. Consequently, tools that support the emergency plan mentioned must be sensitive to context and allow decision making at the time an emergency takes place. We demonstrate how Case Management Modeling Notation (CMMN) along with Decision Model and Notation (DMN) are very suitable approaches to obtain a flexible model adapted to the context-driven response processes.
|
Dick Ooms, & Willem-Jan Van Den Heuvel. (2014). If every nail looks different, you need different hammers: Modeling civil-military interaction. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 349–353). University Park, PA: The Pennsylvania State University.
Abstract: In the response to emergencies and disasters, effective cooperation and information exchange between military and civil actors is essential. However, in practice, the quality of civil-military interaction (CMI) leaves much to be desired. Our research takes an engineering approach, which is complementary to most behavioral-oriented research in the CMI domain. In particular, we seek to support CMI processes with innovative Information Technology solutions. To this end, we are developing a comprehensive conceptual model of the CMI domain, which is currently lacking. This paper contributes to its development by investigating candidate technologies and defining CMI domain model requirements. Exploiting these requirements as criteria, we have evaluated three modeling methods and languages, i.e. the Unified Modeling Language (UML), the Business Process Modeling Notation (BPMN) and the Design and Engineering Methodology for Organizations (DEMO). Based on the comparative study, we conclude that a combination of these is required for modeling the CMI domain.
|
Gertraud Peinel, Thomas Rose, & Alexander Wollert. (2012). The myth of business process modelling for emergency management planning. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: Over the last two decades a significant number of projects tried to convey the concept of business process man-agement to the domain of emergency management. Most of these approaches sought a partial automation for the execution of standard operating procedures in the sense of workflow support, while others strived for the sup-port and integration of information management and data streams in command centres during a crisis. This pa-per focuses on the planning of disaster response for reasons of better preparedness. It discusses whether emer-gency management organisations can capitalize on off-the-shelf business process modelling tools to prepare for disasters more effectively, and whether the concepts of process modelling can be applied to standard operating procedures and vice versa. Moreover, it investigates whether such tools can efficiently support a collaborative preparation of police, fire departments, and rescue organizations. This paper will demonstrate why conventional business process means are inapplicable as planning tool in this domain. And it will also give an outlook to so called smart checklists that might be better suited both for the planning and response phase of emergency epi-sodes. © 2012 ISCRAM.
|
Stefan Sackmann, Marlen Hofmann, & Hans Betke. (2013). Towards the Integration of Place-related Information in Disaster Response Processes. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 78–83). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: Processes in disaster response management (DRM) and business processes are similar due to their general structure and goals. This encourages us to analyze the suitability of business process management tools and methods in the domain of DRM. One main challenge is the coverage of disaster specific aspects by existing process modeling languages. Since interdependencies between time, activities, and place are critical for process planning, we discuss the necessity for model extension. A special focus lies on the integration of place-related information as well as interdependencies resulting from stationary and mobile activities and resources. The integration of such place-related information is discussed as pre-condition for effective and efficient planning of disaster response processes and their successful management by disaster response workflow management systems.
|
Stella Polikarpus, Tobias Ley, Hans Hazebroek, Graham Edgar, Geoffrey Sallis, Steven Baker, et al. (2022). Authoring Virtual Simulations to Measure Situation Awareness and Understanding. In Rob Grace, & Hossein Baharmand (Eds.), ISCRAM 2022 Conference Proceedings – 19th International Conference on Information Systems for Crisis Response and Management (pp. 428–433). Tarbes, France.
Abstract: Measuring situation awareness (SA) and situation understanding (SU) is an important topic for Command & Control research. Virtual simulations (VS) have been proposed as a suitable method for measuring SA/U, but, there is little research into how to build scenarios for VS so that SA/U can be measured reliably. In this study, we used two different VS scenarios and the Quantitative Analysis of Situation Awareness (QASA) method to measure, and provide feedback on, actual and perceived SA/U. Two VS scenarios were tested in Estonia with 36 trainees. The results of the different scenarios were compared to establish whether the scenario storylines and authoring process resulted in differences in SA or SU. We conclude that reliable assessment results were produced with both authoring processes, and further suggest that the Collaborative Authoring Process Model for Virtual Simulations (CAPM) be used for VS creation.
|
Stella Polikarpus, Tobias Ley, & Katrin Poom-Valickis. (2021). Collaborative Authoring of Virtual Simulation Scenarios for Assessing Situational Awareness. In Anouck Adrot, Rob Grace, Kathleen Moore, & Christopher W. Zobel (Eds.), ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management (pp. 229–237). Blacksburg, VA (USA): Virginia Tech.
Abstract: Situational awareness (SA), the ability to perceive, comprehend and predict situation around you and it is a key in attending any incident as critical foundation for successful decision-making. Because incidents are solitary events, development and assessment of SA presents a significant challenge. In this article we analyze the authoring process of twenty-two scenarios implemented in the XVR on-scene virtual simulation software used to assess rescue incident commanders' (ICs) SA. To allow the scenarios to be used by different assessors, the Collaborative Authoring Process Model for Virtual Simulation Scenarios (CAPM) was developed. In Estonia, 473 assessments were recorded in Effective Command database and analysed by all three levels of SA as recommended by Endsley (2000). Introduction of CAPM resulted in scenarios being re-used by different assessors for authentic SA measuring. In the last sections of this article, we introduce our suggestions to improve virtual scenario design and SA research.
|
Terje Gjøsæter, Jaziar Radianti, & Weiqin Chen. (2020). Towards Situational Disability-aware Universally Designed Information Support Systems for Enhanced Situational Awareness. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 1038–1047). Blacksburg, VA (USA): Virginia Tech.
Abstract: This paper takes on the challenge of designing situational awareness information systems that take into account not only the prevalence of so-called demons of situational awareness, but also situational disabilities that will typically occur in a disaster situation, both in the control room and in the field among the general public as well as first responders. It further outlines how a situational awareness information system process model can be adapted and used as a basis for designing situational awareness information support systems that address these issues with the help of Universal Design principles.
|
Hans-Peter Thamm, Thomas Ludwig, & Christian Reuter. (2013). Design of a process model for unmanned aerial systems (UAS) in emergencies. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 478–487). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: The electricity network is one of the most important infrastructures in modern industrialized societies. In the case of power outages, the society becomes aware of their dependence on electricity and organizations responsible for recovery work need precise information about the location and the type of the damage, which are usually not available. Unmanned Aerial Systems (UAS), commonly known as drones, are aircrafts without a human pilot on board and may help to collect this information. While many technical approaches for UAS exist, a systematic process model for using UAS in emergencies based on the organizations needs is still missing. Based on the presentation of current types of UAS, approaches of using UAS and workshops with organizations responsible for recovery work (police and fire department, public administration, power supplier) this paper presents a process model for UAS in emergencies, especially power outages, which takes both theoretical findings and human experiences into consideration.
|