|
Abbas Ganji, Tom Wilson, Sonia Saveli, Dharma Dailey, & Mark Haselkorn. (2019). Cause and Effect: A Qualitative Analysis of Obstacles to Information Sharing During a Regional Disaster Exercise. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: After large-scale disasters, diverse partner agencies rely heavily on an information-sharing environment that supports collaborative work. In the U.S., this occurs under the Incident Command System (ICS), a structured organizational framework for coordinated action. We explore obstacles to information sharing and coordinationobserved at a county-level Emergency Operations Center (EOC) operating under ICS during the response phase of a large-scale regional disaster exercise. Textual observations collected in situ are analyzed for both the effect/manifestation and cause/source of barriers to information sharing. Two-thirds of barriers that manifest as computational issues are not caused by technology breakdowns, and a third caused by unclear processes manifest as computational issues. Overall, obstacles to collaborative work that appear to be related to computational issues are generally attributable to non-technical causes. This indicates that resources directed at improving collaborative management of disasters by enhancing technological capabilities are likely to be misdirected.
|
|
|
Ignacio Aedo, Daniel Sanz, Paloma Díaz, & Jorge De Castro. (2006). Modelling emergency response communities using RBAC principles. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 426–434). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: One of the main design challenges of any Emergency Management System (EMS) is the diversity of users and responsibilities that must be considered. Modelling the access capabilities of different communities of users is a relevant concern for which the RBAC (Role-Based Access Control) paradigm provides flexible and powerful constructs. In this paper we describe how we used an RBAC meta-model to specify at different levels of abstraction the access policy of a specific EMS called ARCE (Aplicación en Red para Casos de Emergencia). This approach has made it possible to face access modelling at earlier development stages, so that stakeholders got involved in analytical and empirical evaluations to test the correctness and effectiveness of the access policy. Moreover, since the RBAC meta-model is embedded into a web engineering method, we put into practice a holistic process which addresses different design perspectives (structure, navigation, presentation, interaction and access) in an integrated way.
|
|
|
Ahmed S. Khalaf, Poom Pianpak, Sultan A. Alharthi, Zahra NaminiMianji, Ruth Torres, Son Tran, et al. (2018). An Architecture for Simulating Drones in Mixed Reality Games to Explore Future Search and Rescue Scenarios. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 971–982). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: The proliferation of unmanned aerial systems (i.e., drones) can provide great value to the future of search and rescue. However, with the increase adoption of such systems, issues around hybrid human-drone team coordination and planning will arise. To address these early challenges, we provide insights into the development of testbeds in the form of mixed reality games with simulated drones. This research presents an architecture to address challenges and opportunities in using drones for search and rescue. On this architecture, we develop a mixed reality game in which human players engage with the physical world and with gameplay that is purely virtual. We expect the architecture to be useful to a range of researchers an practitioners, forming the basis for investigating and training within this unique, new domain.
|
|
|
Aibek Musaev, Kimberly Stowers, & Jonghun Kam. (2018). Harnessing Data to Create an Effective Drought Management System. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 544–552). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: Drought is a complex climate phenomenon with slow emergence and quick vanish, which makes it hard for stakeholders to respond to drought timely. To reduce the vulnerability of our society to future drought, a better understanding of how society responds to drought is critical. Here, we propose a pilot study about social response to a recent California drought through social media. In this study, we identify the most important users using an extension of PageRank algorithm. We investigate the key drivers of the public activity in February, 2014 during the California drought. We also create a word cloud visualization from the most retweeted tweets. Lastly, we specify the information sources from those tweets. The findings of this study inform us that big data can help us to improve the current drought response plans through fundamental understanding of social response to drought, which is applicable to other natural hazards.
|
|
|
Aladdin Shamoug, Stephen Cranefield, & Grant Dick. (2018). Information Retrieval for Humanitarian Crises via a Semantically Classified Word Embedding. In Kristin Stock, & Deborah Bunker (Eds.), Proceedings of ISCRAM Asia Pacific 2018: Innovating for Resilience – 1st International Conference on Information Systems for Crisis Response and Management Asia Pacific. (pp. 132–144). Albany, Auckland, New Zealand: Massey Univeristy.
Abstract: Decision-makers in humanitarian crisis need information to guide them in making critical decisions. Finding information in such environments is a challenging task. Therefore, decision-makers rely on domain experts who possess experience and knowledge from previous humanitarian crises to provide them with the information they need. In this paper, we explore the ability of the existing computing technologies to augment the capabilities of those experts and help decision-makers to make faster and better decisions. Among many computing technologies we have today, word embedding and the semantic web are able to support such augmentation of the domain expert. In this paper, we train a word embedding model using word2vec, transform words and terms from news archive to entities in domain ontology, annotate those entities with their equivalent concepts from upper ontologies, and reason about them using semantic similarity and semantic matching, to represent and retrieve knowledge, and answer questions of interest to decision-makers in humanitarian crises. The approach was evaluated by comparing the use of word embeddings with and without semantic classification for the retrieval of information about the current humanitarian crisis in Syria.
|
|
|
Alan Aipe, Asif Ekbal, Mukuntha NS, & Sadao Kurohashi. (2018). Linguistic Feature Assisted Deep Learning Approach towards Multi-label Classification of Crisis Related Tweets. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 705–717). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: Micro-blogging site like Twitter, over the last decade, has evolved into a proactive communication channel during mass convergence and emergency events, especially in crisis stricken scenarios. Extracting multiple levels of information associated with the overwhelming amount of social media data generated during such situations remains a great challenge to disaster-affected communities and professional emergency responders. These valuable data, segregated into different informative categories, can be leveraged by the government agencies, humanitarian communities as well as citizens to bring about faster response in areas of necessity. In this paper, we address the above scenario by developing a deep Convolutional Neural Network (CNN) for multi-label classification of crisis related tweets.We augment deep CNN by several linguistic features extracted from Tweet, and investigate their usage in classification. Evaluation on a benchmark dataset show that our proposed approach attains the state-of-the-art performance.
|
|
|
Alexander Staves, Harry Balderstone, Benjamin Green, Antonios Gouglidis, & David Hutchison. (2020). A Framework to Support ICS Cyber Incident Response and Recovery. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 638–651). Blacksburg, VA (USA): Virginia Tech.
Abstract: During the past decade there has been a steady increase in cyber attacks targeting Critical National Infrastructure. In order to better protect against an ever-expanding threat landscape, governments, standards bodies, and a plethora of industry experts have produced relevant guidance for operators in response to incidents. However, in a context where safety, reliability, and availability are key, combined with the industrial nature of operational systems, advice on the right practice remains a challenge. This is further compounded by the volume of available guidance, raising questions on where operators should start, which guidance set should be followed, and how confidence in the adopted approach can be established. In this paper, an analysis of existing guidance with a focus on cyber incident response and recovery is provided. From this, a work in progress framework is posited, to better support operators in the development of response and recovery operations.
|
|
|
Alkusaibati, W., & Pilemalm, S. (2023). Digitalized Co-production and Volunteerism in Emergency Response: a Literature Review. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 738–750). Omaha, USA: University of Nebraska at Omaha.
Abstract: ICT-enabled or digitalized co-production of public services has become increasingly relevant to emergency response and crisis management. This study provides a literature review on this phenomenon, exploring both large-scale crises and frequent emergencies. We found that research in the domain is scarce and focuses mainly on the phenomenon in terms of digital volunteerism. In large-scale crises, they mostly refer to spontaneous forms of volunteering, and in smaller emergencies, to more organized volunteers that collaborate with a response organization over time. Similarities to digitalized co-production in the public sector generally include financial, administrative, ICT, and demographic factors. Differences include, e.g., aspects of coordination, support, and processing by formal actors. We argue that there are benefits of adding a theoretical co-production perspective to digital volunteerism in emergency response and that our literature review can guide future research on models and (the double) use of volunteers in both kinds of emergencies.
|
|
|
Michael Alles, Alexander Kogan, Miklos Vasarhelyi, Starr Roxanne Hiltz, & Murray Turoff. (2004). Assuring homeland security: Continuous monitoring, control and assurance of Emergency Preparedness. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2004 – 1st International Workshop on Information Systems for Crisis Response and Management (pp. 1–7). Brussels: Royal Flemish Academy of Belgium.
Abstract: This paper examines the potential relationships of Auditing and Emergency Preparedness with respect to the domain of the design of Emergency Response Information Systems. It proposes normative objectives for the integration of all these areas in the design of future organizational systems. It also proposes a series of steps to evolve in this direction and create a new interdisciplinary professional community to guide research and development for this field of endeavor. © Proceedings ISCRAM 2004.
|
|
|
Shoshana Altschuller, & Raquel Benbunan-Fich. (2008). Potential antecedents to trust in ad hoc emergency response virtual teams. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 254–264). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: This research explores the potential determinants of trust in newly formed virtual teams to better inform the choice of communication media for virtual emergency response groups for which interpersonal trust is crucial. Results of a laboratory experiment indicate that the way that communicants view their teammates and themselves as part of that team is significantly correlated with the level of trust that they experience. Impression formation, public self-awareness, perceived social presence, and self-disclosure are all found to have significant correlations with trust among ad hoc teammates. It is therefore recommended that the design of emergency response communication systems include features to foster these feelings thereby promoting trust among teammates. Our results are applicable to ad hoc emergency teams who interact for a period of time to address relief and recovery efforts after a major disaster or emergency.
|
|
|
Hina Aman, Pourang Irani, & Hai-Ning Liang. (2012). A review of information communication technology applied on common tasks during times of emergency. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: Research in emergency response systems has produced significant literature in a very short span of time. We review a corpus of published works on how Information Communication Technology (ICT) is being utilized and the type of tasks ICT attempts to support in the event of a crisis due to disasters, whether natural or man-made. In our research, we have been able to distinguish eight types of tasks supported by technology during a disaster. We list some of these technologies used by the public, practitioners and researchers to illustrate the current trends of technology usage. We also identify gaps and technology needs that require our attention. Given the increasing frequency and severity of disasters, this research is timely as it (1) contributes to our understanding of the trends of development and technology use during times of crises and (2) identifies potential areas for future work to improve ICT's role during times of emergency. © 2012 ISCRAM.
|
|
|
Amanda L. Hughes, Leysia Palen, Jeannette N. Sutton, Sophia B. Liu, & Sara Vieweg. (2008). Site-seeing in disaster: An examination of on-line social convergence. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 324–333). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: On-line websites and applications are increasingly playing a role in disaster response and recovery. Yet with the wide variety of on-line grassroots activities that occur in such situations, it can be difficult to make sense of them. In this paper, we describe on-line behavior as socially convergent activity, interpreting it within existing sociological understandings of behavior in disaster events. We discuss seven types of convergent behavior and give examples of on-line activities for each type. By seeing these activities as an essential part of the disaster social arena, we can begin to think about how to support socially convergent phenomena in new and creative ways.
|
|
|
Linda Katrine Andresen, & Erik G. Nilsson. (2014). Finding the best devices for emergency responders in Norway – an empirical study. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 110–119). University Park, PA: The Pennsylvania State University.
Abstract: In this paper we present the results from four empirical studies where we investigate the most appropriate devices for high-ranking emergency leaders – termed commanders in this paper – working close to the scene of incident, usually outside. The studies apply different methods including interviews, questionnaires and usability tests to investigate the technology used by commanders in the agencies today, their motivation for using new technology, as well as their needs for new devices. Three of the studies involve commanders from the police, the ambulance service and the fire and rescue agency in Norway. Devices with different screen sizes ranging from 4,3“ to 40” were used or discussed in the studies. The main conclusion from all the studies is a very clear preference for tablets. We did however identify difference between the agencies regarding the preferred size of an “ideal” tablet, as well as wishes for using more than one device.
|
|
|
Andrew J. Hampton, Shreyansh Bhatt, Alan Smith, Jeremy Brunn, Hemant Purohit, Valerie L. Shalin, et al. (2017). Constructing Synthetic Social Media Stimuli for an Emergency Preparedness Functional Exercise. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 181–189). Albi, France: Iscram.
Abstract: This paper details the creation of a massive (over 32,000 messages) artificially constructed 'Twitter' microblog stream for a regional emergency preparedness functional exercise. By combining microblog conversion, manual production, and a control set, we created a web-based information stream providing valid, misleading, and irrelevant information to public information officers (PIOs) representing hospitals, fire departments, the local Red Cross, and city and county government officials. Addressing the challenges in constructing this corpus constitutes an important step in providing experimental evidence that complements observational study, necessary for designing effective social media tools for the emergency response setting. Preliminary results in the context of an emergency preparedness exercise suggest how social media can participate in the work practice of a PIO concerning the assessment of the disaster and the dissemination of information within the emergency response organization and to the public.
|
|
|
Anying Chen, Guofeng Su, & Manchun Liang. (2019). Simulation of Crowd Response During Emergency Considering People's Rational and Irrational Thinking. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Human beings have been facing numerous emergencies which could threaten their property or even their lives in all ages. In order to learn how people respond to the emergencies like earthquakes and fire disasters, a two-stage simulation considering people?s rational thinking and irrational thinking was conducted. Results show that people?s irrational thinking, like the herd effect, could exaggerate people?s behavior of conformity, and it changes the spatial features that stronger herd effect leads to higher cohesion level. It is also worth mentioning that crowd response of condition of smaller population is harder to predict because of its instability, and the response of the very first part of people who make decisions could make great changes to the whole crowd?s response. These results could give some enlightenment on the evacuation instruction during emergencies and future research works.
|
|
|
Arjen Schmidt, Jeroen Wolbers, Kees Boersma, Julie Ferguson, & Peter Groenwegen. (2016). Are you Ready2Help? Dilemmas in organizing citizen response to disaster. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: Over the last decade, the disaster response landscape is increasingly complemented by voluntary citizen initiatives on digital platforms. These developments have opened up opportunities for response agencies and NGOs to organize local community involvement. In this paper we focus on the question how citizen involvement can be proactively organized toward disaster relief and what kind of dilemmas may arise in this process. We studied Ready2Help, an online platform developed by the Dutch Red Cross. Bringing together 36.000 volunteers, the platform plays a significant role in addressing the current refugee crisis. In our analysis we demonstrate the platform?s potential, but also note a tension between control and cooperation. Our results indicate that, in contrast to their initial objective, during the crisis the Red Cross falls back on principles of control to organize citizen response efforts. We end by discussing our future research agenda aimed at bridging formal and emergent citizen responses.
|
|
|
Henrik Artman, Joel Brynielsson, Björn J.E. Johansson, & Jiri Trnka. (2011). Dialogical emergency management and strategic awareness in emergency communication. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: This paper introduces two concepts-dialogical emergency management and strategic awareness-as means to use and understand the content of social media for the purpose of emergency communication. Dialogical emergency management denotes that the emergency management organizations follow what people publish in various social media on emergencies and ongoing emergency response, and then adjust their information strategies in a way that matches the expectations and needs for emergency information of the public. The concept of strategic awareness suggests that it is essential to have an understanding of the receiver (public) of emergency information but also to have an understanding of the receivers' idea about the emergency and emergency response. Hence, the notion of strategic awareness incorporates structured awareness of how people interpret, value, and reacts on communication based on what they think about the sender's (emergency management organization's) actual intentions and motives.
|
|
|
Naveen Ashish, & Sharad Mehrotra. (2010). Community driven data integration for emergency response. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: This paper describes our work in progress on an approach and technology for providing integrated data access in situational awareness applications – particularly for disaster and emergency response. The key new aspect of our work is an approach where information aggregation, processing, and integration capabilities are offered as a service to any new application builder. Further, we provide a framework for possibly reusing prior information integration knowledge, the development of which demands the major fraction of time and complexity in a new application, in a customized fashion for new application. Our overall goal is to provide a framework where integrated access to critical data in an emergency response situation can be enabled very rapidly and by personnel with basic IT and data handling expertise. Our approach, while general purpose, is currently motivated by and grounded in the context of situational awareness systems for incident commander decision support in the fire response domain.
|
|
|
Zahra Ashktorab, Christopher Brown, Manojit Nandi, & Aron Culotta. (2014). Tweedr: Mining twitter to inform disaster response. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 354–358). University Park, PA: The Pennsylvania State University.
Abstract: In this paper, we introduce Tweedr, a Twitter-mining tool that extracts actionable information for disaster relief workers during natural disasters. The Tweedr pipeline consists of three main parts: classification, clustering and extraction. In the classification phase, we use a variety of classification methods (sLDA, SVM, and logistic regression) to identify tweets reporting damage or casualties. In the clustering phase, we use filters to merge tweets that are similar to one another; and finally, in the extraction phase, we extract tokens and phrases that report specific information about different classes of infrastructure damage, damage types, and casualties. We empirically validate our approach with tweets collected from 12 different crises in the United States since 2006.
|
|
|
Robert Baksa, & Murray Turoff. (2010). The current state of continuous auditing and emergency management's valuable contribution. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Continuous Auditing systems require that human judgment be formalized and automated, which can be a complex, costly and computationally intensive endeavor. However, Continuous Auditing systems have similarities with Emergency Management and Response systems, which integrate Continuous Auditing's detection and alerting functions with the tracking of decisions and decision options for the situations that could be more effectively handled by human judgment. Emergency Management and Response systems could be an effective prototype to help overcome some of the implementation obstacles that are impeding Continuous Auditing systems' implementation rate. Continuous Auditing has the potential to transform the existing audit paradigm from periodic reviews of a few accounting transactions to a continuous review of all transactions, which thereby could vastly strengthen an organization's risk management and business processes. Although Continuous Auditing implementations are occurring, their adoption is slower than expected. With the goal of providing an empirical and methodological foundation for future Continuous Auditing systems and possibly inspiring additional investigation into merging the Continuous Auditing and Emergency Management streams of research, this paper provides several definitions of Continuous Auditing, suggests possible architectures for these systems, lists some common implementation challenges and highlights a few examples of how Emergency Management research could potentially overcome them.
|
|
|
Balogh, Z., Gatial, E., Dolatabadi, S. H., Dlugolinský, Štefan, Saltarella, M., Scipioni, M. P., et al. (2023). Communication Protocol for using Nontraditional Information Sources between First Responders and Citizens during Wildfires. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 152–165). Omaha, USA: University of Nebraska at Omaha.
Abstract: One of the biggest challenges faced during the wildfires is communication. A specific case represents the need to establish communication between first responders and the public. This paper presents a proposal for a generic protocol to ensure effective communication between fire fighters and many citizens at the incident site or in the surrounding area using nontraditional information sources such as a dedicated mobile app or social media. Specific challenges, concepts and technologies relevant to such communication are described specifically customized for forest fires and wildfires. The protocol itself is provided by proposing information flows between the involved actors. Moreover, several technologies including a Citizen Engagement Mobile App, an Edge Micro Data Center for forward command centers, a Mesh in the Sky communication infrastructure or a Dashboard integrating and displaying all the data in one place is shortly introduced. The presented paper is a work in progress.
|
|
|
Anne Marie Barthe, Sébastien Truptil, & Frédérick Bénaben. (2014). Agility of crisis response: Gathering and analyzing data through an event-driven platform. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 250–254). University Park, PA: The Pennsylvania State University.
Abstract: The goal of this article is to introduce a platform (called Agility Service) that gathers and analyses data coming from both crisis response and crisis field by using the principles of Complex Event Processing. As a crisis situation is an unstable phenomenon (by nature or by effect of the applied response), the crisis response may be irrelevant after a while: lack of resources, arrival of a new stakeholder, unreached objectives, over-crisis, etc. Gathering data, analyze and aggregate it to deduce relevant information concerning the current crisis situation, and making this information available to the crisis cell to support decision making: these are the purposes of the described platform. A use case based on the Fukushima's nuclear accident is developed to illustrate the use of the developed prototype.
|
|
|
Tuncay Bayrak. (2007). Performance metrics for disaster monitoring systems. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 125–132). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Understanding the performance of disaster monitoring systems is a key to understanding their success, therefore; various qualitative and quantitative measures and metrics can be applied in the characterization and analysis of such systems. Through evaluation studies, problems that impede a disaster monitoring system performance can be identified. The results can be used for system control, design, and capacity planning. Previous studies address technical performance analysis metrics for analyzing monitoring systems leaving out human and organizational dimensions of such systems. Thus, the primary objective of this study is to identify and describe a set of disaster monitoring systems performance analysis metrics that may be employed to evaluate such systems. This study may be valuable to researchers and practitioners involved in disaster and emergency response studies in planning the transportation of vital first-aid supplies and emergency personnel to disaster-affected areas, and in improving chances of survival after a natural disaster.
|
|
|
Benjamin Barth, Govinda Chaithanya Kabbinahithilu, Alexandros Bartzas, Spyros Pantazis, & Tomaso deCola. (2020). A Content Oriented Information Sharing System for Disaster Management. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 922–927). Blacksburg, VA (USA): Virginia Tech.
Abstract: In response to natural and man-made hazards multiple organisations usually are involved in a very complex situation. On the other hand, extreme weather situations due to the climate change create hazards in areas which were considered safe before. In order to improve the capabilities of involved organisations in responding and preparing for disaster events, the availability of an efficient information sharing approach is a key enabler. To this end, we propose a communication system based on a content oriented architecture tailored to disaster management. It includes a catalogue that is offering web services for publishing and subscribing of disaster information and for further collaboration amongst agencies and first responders. Moreover, the considered approach also allows for full content access control and enables a flexible system. The paper shows the current status of the system design. Next steps will include the implementation and evaluation of the approach.
|
|
|
Imane Benkhelifa, Samira Moussaoui, & Nadia Nouali-Taboudjemat. (2013). Locating emergency responders using mobile wireless sensor networks. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 432–441). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: Emergency response in disaster management using wireless sensor networks has recently become an interest of many researchers in the world. This interest comes from the growing number of disasters and crisis (natural or man-made) affecting millions of lives and the easy-use of new and cheap technologies. This paper details another application of WSN in the post disaster scenario and comes up with an algorithm for localization of sensors attached to mobile responders (firefighters, policemen, first aid agents, emergency nurses, etc) while assisted by a mobile vehicle (fire truck, police car, or aerial vehicle like helicopters) called mobile anchor, sent to supervise the rescue operation. This solution is very efficient and rapidly deployable since no pre-installed infrastructure is needed. Also, there is no need to equip each sensor with a GPS receiver which is very costly and may increase the sensor volume. The proposed technique is based on the prediction of the rescuers velocities and directions considering previous position estimations. The evaluation of our solution shows that our technique takes benefit from prediction in a more effective manner than previous solutions. The simulation results show that our algorithm outperforms conventional Monte Carlo localization schemes by decreasing estimation errors with more than 50%.
|
|