|
Thomas Münzberg, Marcus Wiens, & Frank Schultmann. (2014). A strategy evaluation framework based on dynamic vulnerability assessments. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 45–54). University Park, PA: The Pennsylvania State University.
Abstract: Assessing a system's vulnerability is a widely used method to estimate the effects of risks. In the past years, increasingly dynamic vulnerability assessments were developed to display changes in vulnerability over time (e.g. in climate change, coastal vulnerability, and flood management). This implies that the dynamic influences of management strategies on vulnerability need to be considered in the selection and implementation of strategies. For this purpose, we present a strategy evaluation framework which is based on dynamic vulnerability assessments. The key contribution reported in this paper is an evaluation framework that considers how well strategies achieve a predefined target level of protection over time. Protection Target Levels are predefined objectives. The framework proposed is inspired by Goal Programming methods and allows distinguishing the relevance of time-dependent achievements by weights. This enables decision-makers to evaluate the overall performance of strategies, to test strategies, and to compare the outcome of strategies.
|
|
|
Nawel Amokrane, & Nicolas Daclin. (2017). Deducing Complex Scenarios for Resilience Analysis: Application to the Franco-German High Speed Train Network. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 464–474). Albi, France: Iscram.
Abstract: The present work is part of the project RE(H)STRAIN1 which investigates security and its impact on the resilience of the Franco-German high-speed train network in case of terrorist attacks. To improve the capacity of this network to recover a normal functioning after a terrorist attack, appropriate security measures must be determined. To do so, the project investigates, in a scenario-driven holistic approach the entire terrorist sphere of possible actions. Terrorism threat is first defined as a set of single attacks called vignette attacks represented by the triplet actor – weapon – target, then complex attack scenarios are built considering combination rules detailed in this article. In this regard, this work aims at providing end-users with an approach to automatically deduce a set of formalized, consistent and plausible complex attack scenarios to allow in further steps to analyze and improve the resilience level of the high-speed train transportation infrastructure.
|
|
|
Nicky van Oorschot, & Bart van Leeuwen. (2017). Intelligent fire risk monitor based on Linked Open Data. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 294–306). Albi, France: Iscram.
Abstract: Every day the Fire department of the Netherlands work hard to save people's lives. Therefore, they have been investing in Business Intelligence approaches for several years, to get more information for accident prevention and accident fighting. In this paper, Linked Open Data has been used as a business intelligence approach for the creation of dwelling fire risk profiles based on demographic data. During the research a Proof of Concept showed the appliance of Linked Open Data for this purpose. However the data have some quality mismatches, such as: outdated, accuracy issues and not 100% complete. Evaluation session proofed that the outcomes show similarities with a fire incident map and the gut feeling of several firefighters.
|
|
|
Paola Pagliara, Angela Corina, Alessandro Burastero, Paolo Campanella, Luca Ferraris, Marina Morando, et al. (2011). Dewetra, coping with emergencies. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Dealing with multi-risk assessment needs reliable forecasting and warning systems able both to rapidly make available observational data and to make accessible forecast tools to the Decision Makers. In this paper we present Dewetra, a real-time integrated system for risk forecasting, monitoring and prevention. We provide a description of its features and examples of its operational use at the Italian Prime Minister Office – National Department for Civil Protection- Centro Funzionale Centrale. In particular is presented its application to flood risk management and to wild fire risk management.
|
|
|
Tom Ritchey. (2006). Modeling multi-hazard disaster reduction strategies with computer-Aided morphological analysis. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 339–346). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: Disaster Risk Management (DRM) is a multi-dimensional problem complex requiring knowledge and experience from a wide range of disciplines. It also requires a methodology which can collate and organize this knowledge in an effective, transparent manner. Towards this end, seven specialists from the social, natural and engineering sciences collaborated in a facilitated workshop in order to develop a prototype multi-hazard disaster reduction model. The model, developed with computer-Aided morphological analysis (MA), makes it possible to identify and compare risk reduction strategies, and preparedness and mitigation measures, for different types of hazards. Due to time constraints, the model is neither complete nor accurate-but only represents a proof-of-principle. The workshop was sponsored by the Earthquake Disaster Mitigation Research Center (EDM) in Kobe, in January, 2005.
|
|
|
Robin E. Mays. (2010). A planning approach to humanitarian logistics. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: In humanitarian events, logistics is traditionally considered at time of crisis, and at the tail-end of a project design with little to no strategical, logistical forethought applied. Introducing risk assessment and integrating logistics planning with program plans and training to these plans prior to disaster striking offers a more impactful response at time of disaster. This can be introduced in high risk countries through one on one training, simple templates, spreadsheets and standardized processes.a low to no technological, and highly relational method of building capacity and increasing the impact of an organization.s response to beneficiaries.
|
|
|
Eli Rohn, & Gil Erez. (2012). Fighting agro-terrorism in cyberspace: A framework for intention detection using overt electronic data sources. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: Agro Terrorism is “a hostile attack, towards an agricultural environment, including infrastructures and processes, in order to significantly damage national and international political interests”. This special session within the early warning track is aimed at reducing agro-terrorism related risks by either means of prevention (intelligence gathering using data mining and chatter mining, for example) or means to response to such an attack by early detection of exotic/foreign pathogenic agents, early prediction of disease dispersion patterns, implementation of biosecurity measures, and the development of future methodologies and techniques related to food defense and post-event response. This paper focuses on intention detection using overt data sources on the World Wide Web as they relate to agro-terrorism threats. The paper focuses on early detection that can lead to prevention of such acts, yet a variety of the techniques presented here are also useful for helping in post-event perpetrators detection. © 2012 ISCRAM.
|
|
|
Svend-Jonas Schelhorn, Benjamin Herfort, Richard Leiner, Alexander Zipf, & João Porto De Albuquerque. (2014). Identifying elements at risk from OpenStreetMap: The case of flooding. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 508–512). University Park, PA: The Pennsylvania State University.
Abstract: The identification of elements at risk is an essential part in hazard risk assessment. Especially for recurring natural hazards like floods, an updated database with information about elements exposed to such hazards is fundamental to support crisis preparedness and response activities. However, acquiring and maintaining an up-to-date database with elements at risk requires both detailed local and hazard-specific knowledge, being often a challenge for local communities and risk management bodies. We present a new approach for leveraging Volunteered Geographic Information to identify elements at risk from the free and open-source mapping project OpenStreetMap. We present initial results from a case study in the city of Cologne, Germany, to validate our approach in the case of flood-hazard. Our results show that the identification of elements at flood risk from OpenStreetMap is a suitable and cost-effective alternative for supporting local governments and communities in risk assessment and emergency planning.
|
|
|
Annie Searle. (2010). A seat at the table for operational risk. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: What role should operational risk leaders have in the executive suite? This paper argues that, when nervous CEOs ask “What can go wrong? How can we get ahead of the curve?”, they should look to their operational risk leaders. Those leaders oversee corporate and information security as well as business continuity, crisis management and disaster recovery programs inside companies. That makes them ideally qualified to take the process of crisis management, including analysis of aggregate risk across all silos – To the CEO and then into the boardroom when the need arises, before the corporate crisis is full-blown.
|
|
|
Hélène Soubaras, & Juliette Mattioli. (2007). Injury worsening risk modeling and rescue emergency analysis in a disaster. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 1–5). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: In a crisis with casualties, while there is no medical intervention, the severity of the injuries increases, and some people may die. Since the number of rescuers is limited, it is necessary to perform a planning and a deployment of this resource on the basis of a risk criterion illustrating the potential increase of the number of casualties at each point of the concerned area. Emergency planning is still a poorly developed science [3]. This paper provides a dynamical model for the number of casualties, inspired from the Verhulst model classically used for biological systems [5], to evaluate this risk criterion as a function of future time. It calculates the evolution of the number of unrescued casualties, the number of dead people, and the number of rescued people, as a function of the number of rescuers. Numerical results are shown.
|
|
|
Stefan Schauer, Stefan Rass, & Sandra König. (2021). Simulation-driven Risk Model for Interdependent Critical Infrastructures. In Anouck Adrot, Rob Grace, Kathleen Moore, & Christopher W. Zobel (Eds.), ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management (pp. 404–415). Blacksburg, VA (USA): Virginia Tech.
Abstract: Critical infrastructures (CIs) in urban areas or municipalities have evolved into strongly interdependent and highly complex networks. To assess risks in this sophisticated environment, classical risk management approaches require extensions to reflect those interdependencies and include the consequences of cascading effects into the assessment. In this paper, we present a concept for a risk model specifically tailored to those requirements of interdependent CIs. We will show how the interdependencies can be reflected in the risk model in a generic way such that the dependencies among CIs on different levels of abstraction can be described. Furthermore, we will highlight how the simulation of cascading effects can be directly integrated to consistently represent the assessment of those effects in the risk model. In this way, the model supports municipalities' decision makers in improving their risk and resilience management of the CIs under their administration.
|
|
|
Mark F. Taylor, & Russell J. Graves. (2005). Adaptive risk-readiness decision support for infrastructure protection. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 161–169). Brussels: Royal Flemish Academy of Belgium.
Abstract: This paper presents a system concept for integrating the mass of information critical to infrastructure protection operations. Our main focus and contribution lies in (1) coupling risk assessments into a dynamic decision support process, and (2) providing a collaboration and visualization decision support interface for representing complex and changing infrastructure protection information. The system concept supports adaptive decision making based upon dynamic risk and readiness assessments. Users benefit from having a more comprehensive and up-to-date risk picture on which to base their judgments.
|
|
|
Sara Tena, Ignacio Aedo, David Díez, & Paloma Díaz. (2014). TIPExtop: An exploratory design tool for emergency planning. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 454–462). University Park, PA: The Pennsylvania State University.
Abstract: Emergency planning is an ongoing activity in which a multidisciplinary group of experts intermittently collaborate to define the most appropriate response to risks. One of the most important tasks of emergency planning is risk reduction. Such a task compiles the analysis of capabilities to face an emergency, the prioritizing of activities, and the definition of procedures and strategies. It is therefore a reflection process based on exchanging information between planners and exploring alternatives. Despite the exploration of alternatives is an especially relevant activity to design better plans, recent research on computer-mediated collaborative tools for planning do not usually offer support for this activity. Thus, with the purpose of supporting reflection during the development of risk reduction tasks, this paper presents an exploratory design tool that allow planners to assess the space of alternatives and the underlying information related those alternatives. This planning tool will help planners to examine and contextualize information, allowing them to define more suitable response strategies.
|
|
|
Eelco Vriezekolk, Roel Wieringa, & Sandro Etalle. (2011). A new method to assess telecom service availability risks. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Protection of society against natural and man-made disasters is high on the societal and political agenda. Effective crisis management is more important than ever. Nowadays, crisis organisations depend crucially on reliable telecom services, and unexpected failure of telecommunication may have serious consequences. In order not to be caught unprepared, crisis organisations should therefore perform a risk assessment on telecom availability. Unfortunately, assessment of availability risks of modern, multi-operator telecom services is difficult; information sources are unreliable, and the relevant information is uncertain and difficult to obtain. This paper describes some of these difficulties, as well as the requirements of availability risk assessment methods for crisis telecommunication services. The paper outlines a new method that can be applied without requiring full knowledge of the physical layout of the telecom infrastructure. This new method relies on telecom service diagrams as a tool for risk analysis and to facilitate dialogue among the analysts.
|
|
|
Eelco Vriezekolk, Roel Wieringa, & Sandro Etalle. (2012). Design and initial validation ofthe Rastermethod for telecom service availability risk assessment. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: Crisis organisations depend on telecommunication services; unavailability of these services reduces the effectiveness of crisis response. Crisis organisations should therefore be aware of availability risks, and need a suitable risk assessment method. Such a method needs to be aware of the exceptional circumstances in which crisis organisations operate, and of the commercial structure of modern telecom services. We found that existing risk assessment methods are unsuitable for this problem domain. Hence, crisis organisations do not perform any risk assessment, trust their supplier, or rely on service level agreements, which are not meaningful during crisis situations. We have therefore developed a new risk assessment method, which we call RASTER. We have tested RASTER using a case study at the crisis organisation of a government agency, and improved the method based on the analysis of case results. Our initial validation suggests that the method can yield practical results. © 2012 ISCRAM.
|
|
|
Kera Z. Watkins, Katrina Simon-Agolory, Anuradha Venkateswaran, & Deok Nam. (2011). Get a plan! Automatically generating disaster preparedness plans using WILBER. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: It is common knowledge that having a relevant disaster preparedness plan is helpful for saving lives and money during an actual crisis. However, few individuals and families have a plan in the United States. Less than 10% of US states provide online resources for individuals and families to develop customized basic disaster plans. Those states sometimes offer additional information particular to their areas. However, existing online resources could be extended nationally by automatically providing additional plan information based on localized threats (e.g. climate, terrorism, etc.) within a geographical area. Wilberforce University has designed a solution called Wilberforce's Information Library Boosting Emergency Response (WILBER) which utilizes an interdisciplinary approach to automatically generate information based on localized threats within a geographical area to extend a basic disaster preparedness plan for individuals and families. WILBER combines current and historical information from Geographical Information Systems (GIS), risk assessment, wireless sensors, and computing.
|
|
|
Kim Weyns, & Martin Höst. (2009). Dependability of IT systems in municipal emergency management. In S. J. J. Landgren (Ed.), ISCRAM 2009 – 6th International Conference on Information Systems for Crisis Response and Management: Boundary Spanning Initiatives and New Perspectives. Gothenburg: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: In recent years governmental actors have become more and more dependent on IT systems for their responsibilities in a crisis situation. To avoid unexpected problems with the dependability of IT systems in the aftermath of a crisis it is important that such risks are identified and that measures can be taken to reduce the dependence on systems that could be unreliable. This paper describes two case studies exploring how Swedish municipalities incorporate IT systems in their emergency planning. The study focuses especially on how different actors within a municipality cooperate to analyse the risks of depending on IT systems in critical situations. The study shows that today there is much room for improvement, especially in the communication between IT personnel and emergency managers. Finally, this paper describes the requirements for a process improvement framework that can assist governmental actors in analysing and improving their dependency on IT systems in emergency management.
|
|
|
Kim Weyns, & Martin Höst. (2012). Risk analysis for critical systems with reliability block diagrams. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: Governmental organisations are becoming more critically dependant on IT systems such as communication systems or patient data systems, both for their everyday tasks and their role in crisis relief activities. Therefore it is important for the organisation to analyse the reliability of these systems as part of the organisation's risk and vulnerability analysis process. This paper presents a practical risk analysis method for critical, large-scale IT systems in an organisation. The method is based on reliability block diagram modelling and was adapted to fit the requirements of governmental organisations and to reduce the effort required to capture complex failure behaviour. The paper first explicitly lists the requirements that such a risk analysis method must fulfil, then presents the proposed risk analysis method and finally outlines the planned evaluation of this method. © 2012 ISCRAM.
|
|
|
Kim Weyns, & Martin Höst. (2013). Case study on risk analysis for critical systems with reliability block diagrams. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 693–702). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: This paper presents a practical risk analysis method for critical, large-scale IT systems in an organisation. The method is based on reliability block diagram modelling and was adapted to fit the requirements of governmental organisations and to reduce the effort required to capture complex failure behaviour. Through the use of different failure categories the risk analysis can be simplified, the input data becomes easier to estimate and the results are easier to use in an organisational risk and vulnerability analysis. The paper first explicitly describes the different steps of the method and then presents a case study in which the method was applied and evaluated in a real-life setting. The method is meant to help an organisation to communicate internally about the reliability of their critical IT systems and to prioritise proposed improvements to this reliability.
|
|
|
Max Wyss. (2005). Earthquake loss estimates applied in real time and to megacity risk assessment. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 297–299). Brussels: Royal Flemish Academy of Belgium.
Abstract: Real time loss estimates within one to two hours after major earthquakes are becoming useful for disaster managers and rescue teams to respond rapidly and at an optimal level. Tests show that the accuracy is low, but major disasters can be reliably distinguished from inconsequential earthquakes. Many technical and organizational aspects of these estimates can and should be improved. An analysis of what magnitude of disaster is likely to occur, if a major earthquake should occur near a megacity in a developing country shows that much work needs to be done to mitigate the risk, and that the global community is ill prepared to deal with such large disasters.
|
|
|
Yuanyuan Li, Wenguo Weng, Tao Chen, & Hongyong Yuan. (2014). A Chinese earthquake database for casualty modelling. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 493–497). University Park, PA: The Pennsylvania State University.
Abstract: In order to conduct empirical casualty modelling in China, Chinese historical earthquake events is the essential basis. However, commonly used casualty databases that focus on Chinese earthquakes and provide comprehensive information rarely exist. Regarding this situation, we derived an earthquake casualty database of Mainland China from authorized Chinese published data sources. The casualty database records 520 earthquake events with magnitude 5.0 and greater where at least one casualty is recorded in the time span from 186 BC through December 2011. Each earthquake case contains information on seismic parameters, deaths tolls, number of heavy injuries and light injuries, as well as areas and population of affected regions from intensity VI to intensity IV. Compared with PAGER-CAT, this casualty database provides 146 unique earthquake events and provides more detailed information on heavy injuries and light injures, as well as areas and exposure population of affected regions. This casualty database is an essential supplement for global casualty databases and provides a basis for earthquake casualty modelling on post-earthquake risk estimation in China.
|
|
|
Dimitris Zisiadis, Spyros Kopsidas, Vassilis Grizis, George Thanos, George Leventakis, & Leandros Tassiulas. (2012). STAR-TRANS Modeling Language (STML) modeling risk in the STAR-TRANS risk assessment framework for interconnected transportation systems. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: The present paper introduces a high level modeling language, capable of expressing the concepts and processes of the Strategic Risk Assessment and Contingency Planning in Interconnected Transportation Networks (STAR-TRANS) framework. STAR-TRANS is a comprehensive transportation security risk assessment framework for assessing related risks that provides cohered contingency management procedures for interconnected, interdependent and heterogeneous transport networks. STAR-TRANS modeling Language (STML) is a domain specific language combining language simplicity with a very clear syntax, providing all the necessary elements (assets, threats, incidents, consequences etc.) to model the STAR-TRANS risk assessment framework. © 2012 ISCRAM.
|
|