|
Aarland, M. (2023). Digital Supply Chain Cyber Risks in the Power Industry: A resilience framework. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (p. 1080). Omaha, USA: University of Nebraska at Omaha.
Abstract: The goal of this industrial PhD is to investigate how to include resilience into a cyber-security strategy to safeguard vital infrastructure. Critical infrastructure is increasingly susceptible since businesses are using technology more often. These infrastructures are also components of a vast, integrated, and increasing digital supply chain that transcends national boundaries, adding to the difficulties. A bigger attack surface where an attacker might use vulnerabilities contained in suppliers' and sub suppliers' chains could come from this extension of the digital supply chain. The study will add to our understanding of how to manage intricate supply chains in critical infrastructure with stringent dependability requirements. The digitalization processes in the supply chain include changes to the organizational structure, necessitating a robust strategy for continual improvement. The research question for this project is as follows: How can a resilience framework contribute to managing the complex digital supply chain for stakeholders in the power industry? The system dynamic (SD) approach will be used to generate a simulation based on the findings from each of the methods. Previous supply chain research has demonstrated that SD modelling is an effective strategy for building resilience in supply networks. To comprehend and examine the behavior of dynamic and complex systems, the notion of SD was established. The theory of system dynamics is based on the idea that actions done in systems will change the system, which will then lead to new actions. To collect primary data the qualitative method chosen as most suitable the semi-structured interview. To understand a social phenomenon, one needs to listen to people who reflect on their own experiences, knowledge, and motivation. Through interviews, it is possible to go into depth on the phenomenon and gather complex and rich data that is not available through literature review only. Contributions from this Ph.D. study are grouped into two categories: academia and organization. Further understanding regarding supply chain vulnerability and the implementation of potential techniques and ideas in novel contexts are academic contributions. The development of the resilience framework, which aims to address the difficult problem of managing stakeholders in the digital supply chain, is a contribution made by the organizations. The goal for CIs is to have resilient DSCs that can withstand and improve from high-pressure situations. Improving DSC resilience requires an understanding of the supply chain network that includes suppliers’ and their sub-suppliers’ incentives, all the way to its downstream customers’ incentives. By understanding the structure of the system, the ability to ascertain the behavior of the system increases, providing opportunities to better manage the system. If we can harness the positive incentives for collaboration and social connection the road to a more resilient CI that is available when the society require it becomes easier.
|
|
|
Amelie Grangeat, Floriane Brill, Stephane Raclot, & Emmanuel Lapebie. (2016). Mapping of Areas Presenting Specific Risks to Firefighters due to Buried Technical Networks. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: Vehicles or freight cars on fire below a bridge or inside a tunnel are exceptional events and imply difficult intervention conditions for firefighters. A buried technical network like high voltage electricity line, gas or steam pipeline around such a fire causes additional specifics risks. Vulnerability areas for firefighters are defined as zones where both factors exist: a difficult incident area – like tunnels or bridges over roads/railway lines ? together with a specific risk like buried networks. These areas require intervention teams with specific emergency response capabilities. The present paper proposes a method developed for the Paris Fire Brigade for vulnerability mapping. Results aim at being used by their decision support system dedicated to the mobilization of intervention teams. On the long term, it could improve the allocation of specific responses capabilities intervention teams as soon as the emergency call is treated. Results are debated from an operational point of view.
|
|
|
Ali Benssam, Nadia Nouali-Taboudjemat, & Omar Nouali. (2013). Towards an It-based platform for disaster risks management in Algeria. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 72–77). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: Disaster management and risk prevention in Algeria have undergone many changes in the recent years. Important efforts have been provided on the legal and organizational sides to set the right conditions for an integrated and collaborative framework for disaster management in the country. The aim is to address the lack of information sharing, coordination and collaboration among the involved organizations. However, although the enhancement of the organizational arrangements, several problems persist mainly related to the implementation of these measures. To address this issue, in this paper, we propose an IT based platform in the field of risks prevention and disaster management (DM). This platform provides decision support, enables information sharing, helps to enhance public awareness regarding risks and disasters, supports communication and dissemination of information and alerts in disaster situations and facilitates the implementation of regulation related to disaster management.
|
|
|
Peter H. Berghmans, Gerd Van Den Eede, & Bartel A. Van De Walle. (2008). A systems perspective on security risk identification: Methodology and illustrations from city councils. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 266–275). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: In this paper we take a system theoretic perspective to the process of security risk identification in the context of city councils. Based on this approach, we construct a framework that helps to identify risks. We analyze why this methodological framework is suitable for the risk identification process. Research in fifty Flemish city councils reveals the usefulness of our approach of combining a perceived vs. objective perspective with a technical vs. organizational one. We believe such a framework offers a workable tool for dealing with IS security risks in a systems thinking way.
|
|
|
Anthony Charles, Matthieu Lauras, & Rolando Tomasini. (2009). Learning from previous humanitarian operations, a business process reengineering approach. In S. J. J. Landgren (Ed.), ISCRAM 2009 – 6th International Conference on Information Systems for Crisis Response and Management: Boundary Spanning Initiatives and New Perspectives. Gothenburg: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Uncertainty and risks are part of humanitarians' daily routine. Most of the time, infrastructures are damaged or non-existent, the political climate is highly volatile, communication means are insufficient, and so on. Therefore, humanitarian organizations often have to find original methods to implement their supply chains. They may also face recurrent problems, that requires them to change the way they operate. And yet, as they lack the time and resources to reflect on the lessons learnt, most of their best practices and issues are neither captured nor communicated. The aim of the study is thus to propose a framework to capitalize humanitarians' knowledge and know-how, to analyze both gaps and best practices and learn from one operation to another. To this end, we propose a framework derived from traditional Enterprise Modelling tools, adapted to fit relief chains' specificities. Field applications are then given to illustrate our approach and its beneficial effects.
|
|
|
Lívia C. Degrossi, Guilherme G. Do Amaral, Eduardo S. M. De Vasconcelos, João Porto De Albuquerque, & Jo Ueyama. (2013). Using wireless sensor networks in the sensor web for flood monitoring in Brazil. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 458–462). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: Flood is a critical problem that will increase as a result of climate changes. The problem of flooding is particularly challenging over the rainy season in tropical countries like Brazil. In this context, wireless sensor networks that are capable of sensing and reacting to water levels hold the potential of significantly reducing the damage, health-risks and financial impact of events. In this paper, we aim to outline our experiences with developing wireless sensor network for flood monitoring in Brazil. Our approach is based on Open Geospatial Consortium's (OGC) Sensor Web Enablement (SWE) standards, so as to enable the collected data to be shared in an interoperable and flexible manner. We describe the application of our approach in a real case study in the city of São Carlos/Brazil, emphasizing the challenges involved, the results achieved, and some lessons learned along the way.
|
|
|
Elif Demir, Tahsin Yomraliolu, & Arif Ç. Aydinolu. (2011). Using Geo-Information Technologies to increase the effectiveness of fire brigade services in Turkey. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The coordinated response of fire has become a priority need for effective participation of actors. Within this scope, Geo-Information Technologies (GIT) will help to reduce of catastrophic results of disaster and protect lives and resources, with dynamic use of geo-data in fire disaster management. Interoperable geo-data is urgent need for fire disaster management. With assigned tasks, fire brigade is the most effective actor for the fire disaster management at different phases. In this study, actors that could act in a GIT based fire disaster management are defined. Activities in management phases of the possible fire disaster and geo-data needs to manage these activities were determined. According to this background, case activities such as producing fire risk map, optimizing locations of response teams, and the like were developed by using GIT. This approach can be a preliminary work to trigger effective and collaborate use of geo-data in fire brigade services.
|
|
|
Esteban Bopp, Johnny Douvinet, & Damien Serre. (2019). Sorting the good from the bad smartphone application to alert residents in case of disasters – Experiments in France. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: The number of smartphone applications to alert and inform the population in a risk situation in France is too large
and these solutions are still unknow by the population. This study proposes an evaluation protocol based on various
indicators, which take into account the capacity of the applications to send a targeted alert, their attractiveness, the
ability of individuals to emit information and number of hazards considered. The results obtained on 50
applications deployed in France show that very few of them meet the objectives of the alert, in the sense defined
by civil security, because of a single-risk approach, a unique sense of communication, and the low acceptance of
these solutions by citizens.
|
|
|
Soraia Felicio, Viviane S. R. Silva, André Dargains, Paulo Roberto Azevedo Souza, Felippe Sampaio, Paulo V. R. Carvalho, et al. (2014). Stop disasters game experiment with elementary school students in Rio de Janeiro: Building safety culture. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 585–591). University Park, PA: The Pennsylvania State University.
Abstract: Currently, the city of Rio de Janeiro is is in total evidence, hosting important events such as the Pope's Francis' visit in 2013, the World Cup in 2014 and the Olympic Games in 2016. In order to make the population aware, of some environmental problems this article was produced to analyze what factors people consider dangerous. In 2011, Rio de Janeiro went through difficult times, caused by one of the biggest floods seen in the city which ended up partly destroying cities of the state's the mountain region. Kids from aged 10 to 13 years from a high school in Rio were invited to participate in a study and they had to answer questionnaires before and after playing the game. From the results obtained, we analyzed how the game “Stop Disasters” developed by the by the UN can help create awareness and learning on how to behave in flooding situations at an accelerated rate.
|
|
|
Daniel Hahn. (2007). Non-restrictive linking in wireless sensor networks for industrial risk management. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 605–609). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The OSIRIS project addresses the disaster management workflow in the phases of risk monitoring and crisis management. Risk monitoring allows the continuous observation of endangered areas combined with sensor deployment strategies. The crisis management focuses on particular events and the support by sensor networks. Four complementary live demonstrations will validate the OSIRIS approach. These demonstrations include water contamination, air pollution, south European forest fire, and industrial risk monitoring. This paper focuses on the latter scenario: the industrial risk monitoring. This scenario offers the special opportunity to demonstrate the relevance of OSIRIS by covering all the aspects of monitoring, preparation and response phases of both environmental risk and crisis management. The approach focuses on non-restrictive linking in a wireless sensor network in order to facilitate the addition and removal of nodes providing open interaction primitives allowing the comfortable integration, exclusion, and modification. A management layer with an event-triggered and service-based middleware is proposed. A live lab with real fire is illustrated.
|
|
|
Nick Hedley. (2012). Capturing communities' perceptions of risk through the eyes of their citizens: Using mobile VGI networks to map tsunami risk awareness. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: This paper describes research in progress exploring the use of mobile device technology and citizen sensors, as tools for emergency managers and planners to quickly to gather and map citizen perceptions of risk in communities exposed to tsunami hazards. VAPoR is an agile, deployable system developed at the Spatial Interface Research Lab that does this. It is currently being field tested on the West Coast of Vancouver Island, British Columbia. This evaluation assesses these technologies and methods, and their potential to help emergency planners mitigate risk in coastal communities. © 2012 ISCRAM.
|
|
|
Flávio E. A. Horita, Maria C. Fava, Eduardo M. Mendiondo, Jairo Rotava, Vladimir C. Souza, Jo Ueyama, et al. (2014). AGORA-GeoDash: A geosensor dashboard for real-time flood risk monitoring. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 304–313). University Park, PA: The Pennsylvania State University.
Abstract: Flood management is an important approach to reduce damage caused by floods. In this context, technological architectures which work in real-time are needed. However, Brazil has faced many structural difficulties in obtaining updated information on the current state of its rivers. To address this problem, this paper outlines a geosensor dashboard called AGORA-GeoDash, which processes data streams from wireless sensor networks and makes them available in the form of a set of performance indicators that are essential to support real-time decision-making in flood risk monitoring. The dashboard was built on open-source frameworks, made use of geoservices that comply with the standards of Open Geospatial Consortium, and established a Wireless Sensor Network which monitors the rivers of São Carlos/SP in Brazil. The analysis of the indicators available in two rainfall events revealed that the dashboard can provide the key information required for the decision-making process involved in flood risk management.
|
|
|
Erik R. Janus, Susan Manente, & Sharon L. Lee. (2008). Best practices in chemical emergency risk communication: The Interstate Chemical Terrorism Workgroup. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 774–777). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The Interstate Chemical Terrorism Workgroup (ICTW) was formed in 2002 and currently includes members from nearly all states and Washington, DC, as well as representation from a number of non-governmental organizations. In addition to offering monthly conference call/presentations, the ICTW partnered with the Centers for Disease Control and Prevention (CDC) in 2003 to host a workshop to address basic elements of risk communication needs in a chemical event. The primary goal of the workshop was to develop a list of core competencies and benchmarks as well as a series of fact sheet templates destined for the general public and press, health care providers, public health department and/or officials, and first response and emergency workers (Lee et al., 2006). Key findings of the 2003 workshop, along with other work being done by CDC, academia and the states, underscore the importance of public health agencies in providing risk communication services during (and particularly after) chemical emergencies, whether intentional or not. Tools developed by the ICTW have been used and/or consulted by many groups involved in public health preparedness. This case study will examine the efforts of Michigan to implement these tools to reduce information overload in an emergency.
|
|
|
Lars Gerhold, & Nels Haake. (2015). Public Security in Germany 2030: Challenges for policy makers. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: This paper presents results from a two-round Expert-Delphi (N1=227, N2=126), realized in 2014, which focuses on the following research question: What are the most relevant developments affecting public security in Germany until 2030?
Theoretically the survey is based on a conceptual framework that includes assumptions on calculating the probable occurrence of risks, the relevance of megatrends and the implications of both on public security. Preliminary results show the relevance of the increasing dependency on Information and Communication Technologies (ICT), increasing exposure of critical infrastructures, the global mobility of men and goods and the widening gap between rich and poor as relevant for public security in Germany. Furthermore the potential impact of risks like ICT-crime, extreme weather events and pandemics are rated high, while their expected probability of occurrence differs from medium to high.
|
|
|
Elio Rich. (2006). Modeling risk dynamics in e-operations transitions. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 239–250). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: Migrations to new modes of operation are perilous times for most organizations. For firms that routinely work in high-threat, high-reward situations, the risks of innovation are particularly challenging. This paper presents a systems-based approach to understanding these risks, drawing examples from one firm migrating to e-Operations for offshore oil platforms to increase profitability. The firm recently participated in two facilitated group model building exercises to examine the effects of the migration on the organization and resources needed to safely implement multiple changes over time. Based on these exercises, a simulation model of the timing and relative levels of risk, was developed. The results of the workshop and simulation demonstrate the effect of a combined qualitative and quantitative modeling approach to understanding complex problems.
|
|
|
Svend-Jonas Schelhorn, Benjamin Herfort, Richard Leiner, Alexander Zipf, & João Porto De Albuquerque. (2014). Identifying elements at risk from OpenStreetMap: The case of flooding. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 508–512). University Park, PA: The Pennsylvania State University.
Abstract: The identification of elements at risk is an essential part in hazard risk assessment. Especially for recurring natural hazards like floods, an updated database with information about elements exposed to such hazards is fundamental to support crisis preparedness and response activities. However, acquiring and maintaining an up-to-date database with elements at risk requires both detailed local and hazard-specific knowledge, being often a challenge for local communities and risk management bodies. We present a new approach for leveraging Volunteered Geographic Information to identify elements at risk from the free and open-source mapping project OpenStreetMap. We present initial results from a case study in the city of Cologne, Germany, to validate our approach in the case of flood-hazard. Our results show that the identification of elements at flood risk from OpenStreetMap is a suitable and cost-effective alternative for supporting local governments and communities in risk assessment and emergency planning.
|
|
|
Annie Searle. (2010). A seat at the table for operational risk. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: What role should operational risk leaders have in the executive suite? This paper argues that, when nervous CEOs ask “What can go wrong? How can we get ahead of the curve?”, they should look to their operational risk leaders. Those leaders oversee corporate and information security as well as business continuity, crisis management and disaster recovery programs inside companies. That makes them ideally qualified to take the process of crisis management, including analysis of aggregate risk across all silos – To the CEO and then into the boardroom when the need arises, before the corporate crisis is full-blown.
|
|
|
Ana Rosa Trancoso, José Delgado Domingos, Maria João Telhado, & João Corte-Real. (2011). Early warning system for meteorological risk in Lisbon municipality: Description and quality evaluation. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The current work describes and evaluates an early warning system for meteorological risk in Lisbon that has been functioning in SMPC since February 2008. The system aims to integrate multiple sources of information and facilitate cross checking observations, forecasts and warnings, allowing for an efficient and timely evaluation of the alert level to issue. Currently, it comprises hourly weather and tide level forecasts and automated warnings for Lisbon city, given by MM5 and WRF models running at IST. Results show MM5 performing better than WRF except for warm weather. The overall skill of the warning system is 40% with some false alarm ratios, mainly for forecasts with more than 3 days in advance. This is a reasonable characteristic for early warning since a potentially problematic situation can be anticipated and checked avoiding unnecessary economic expenditures if the warnings do not persist.
|
|
|
Bartel A. Van De Walle, Ronald Spanjers, & Dirk De Wit. (2006). Stakeholder perceptions and standards for information security risks : A case study at a dutch health care organization. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 513–527). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: With the increased use of electronic patient files in Health Care Organizations (HCOs), addressing the risks related to the storage and use of patient information has become increasingly important to avoid intentional or unintentional disclosure, damage to or abuse of patients' personal health records. This has lead governments from various countries to introduce and impose information security standards for HCOs. The Dutch government introduced the NEN 7510 national information security standard; a standard derived from the international ISO 17799 norm. Preceding the implementation phase of NEN 7510 standard at a Dutch HCO, we conducted a field study to identify the information security risks as perceived by the main stakeholder groups in the HCO. We present the differences in the perceived information security risks and threats by end users, management and suppliers, and the degree to which these identified risks will be addressed by the implementation of the NEN 7510 standard.
|
|
|
Gerd Van Den Eede, & Bartel A. Van De Walle. (2005). Operational risk in incident management: A cross-fertilisation between ISCRAM and IT governance. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 53–60). Brussels: Royal Flemish Academy of Belgium.
Abstract: The objectives of the research reported by the authors in this paper are threefold. First, the authors want to fine-tune the rresearch methodology on risk identification based on cognitive mapping techniques and group decision support systems (GDSS) developed earlier (Rutkowski et al., 2005). Second, the authors want to determine how High Reliability Theory (HRT) – through the characteristics of High Reliability Organisations (HROs) – can be applied in the particular organisational context of an important economic sector like banking. Third, the authors want to inquire into how Information Systems for Crisis Response and Management can benefit from experiences gained in a mainstream context. More specifically, the use of the Information Technology Infrastructure Library (ITIL) methodology will be explored from the perspective of Incident Management as a sub-process of ICT management.
|
|
|
Remko Van Der Togt, Euro Beinat, & Henk J. Scholten. (2004). Location-based emergency medicine: Medical Location Services for emergency management: Information and coordination of rescue resources. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2004 – 1st International Workshop on Information Systems for Crisis Response and Management (pp. 45–50). Brussels: Royal Flemish Academy of Belgium.
Abstract: Crisis and disaster management in the Netherlands has made huge leaps forward in recent years with regard to different organisations trying to manage one or more aspects of the safety chain. This research focuses on the information structure of health care during disasters with an aim to improve disaster management and tries to answer the following question: How can location based services improve information services within health care during disasters? Through the use of literature and interviews this thesis describes how disaster management can be improved through the use of Location Based Services (LBS). The scope of this research is aimed at better understanding the organisational processes during somatic health care. By defining a case and on the basis of literature and interviews in the Province of Utrecht, it was possible to develop a three layer graph model (3LGM). This model shows an overview of information processes performed by the health care organisation during the first hour after an accident. In this context, the 3LGM model is used to obtain an overview of the quality of information processing in such a problem area. The organisational structure, which deals with disaster management, consists of a strong co-operation between the police, fire departments, the local government and the 'Medical Aid during Accidents and Disasters' (GHOR). The size of the organisation depends largely upon the scale of the disaster, however the current information structure is not suitable for storing and processing the information in an efficient and effective manner. The same applies when displaying information related to casualties and safety within an area. With the help of location based services consisting of, geographical information systems (GIS), global positioning systems (GPS) and second or third generation telecommunication technologies, the existing information structure can be optimised. Expected advantages are higher accessibility to health care, a safer environment for rescuers, more time for managing the healthcare processes and an improved interdisciplinary co-operation between the police, fire departments, the local government and the GHOR. © Proceedings ISCRAM 2004.
|
|
|
Anuradha Venkateswaran, Katrina Simon-Agolory, & Kera Z. Watkins. (2011). Risk analysis for Greene County and Wright Patterson Air Force Base, Ohio: Simulation of riverine flooding using HAZUS-MH. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Greene County in Dayton, OH houses Wright Patterson Air Force Base (WPAFB), whose estimated 2009 economic impact within its Metropolitan Statistical Area (MSA) is $5.17 million. Despite its military/strategic importance as the largest base in the U.S. Air Force, literature search did not uncover a published comprehensive risk analysis for WPAFB, or even Greene County, across the entire spectrum of hazards from natural to technological to man-made (including terrorism). This paper presents a summary report on risk determination and economic impact data for Greene County and WPAFB (within Greene County) in the context of riverine flooding, using FEMA's HAZUS-MH tool. It is hoped that the results will further the regional compilation of data and thus prove of use to the local disaster management community while generally growing the overall body of work in risk analysis. Future work aims to expand regional risk determination to other natural disasters and terrorism scenarios.
|
|
|
Victor A. Bañuls Silvera, Rafael Cantueso Burguillos, Fernando Tejedor Panchón, Miguel Ramírez de la Huerga, & Murray Turoff. (2019). A Delphi approach for the establishment of the fundamental principles of an Organizational Security System in Public Administration. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: The aim of this work is defining fundamental principles of an Internal Security System in the presence of intentional risks in Public Administration. The relevance of this object of study has increased even more with the emergence of new terrorist groups and the proliferation of organized crime, which have been categorized as a maximum threat to Security by the government. This context has led to new regulations and legislation on Security matters at the national and international level to protect assets, people and the activity of the Administration itself. Despite the large number of regulations and relevance of this topic, there is not any study which defines in a comprehensive manner the requirements that a security system must have in the presence of intentional risks in Public Administration. The results of this work are intended to be a reference for the Public Administration, for the prevention and reaction to damage to people, property, and operation, intentionally caused by external agents, personnel themselves or users. These principles have been applied and validated through a Delphi process in the Administration of the Regional Government of Andalusia in which more than 40 security-related managers have participated.
|
|
|
Yiewi Li., Yu Guo, & Naoya Ito. (2014). An exploration of a social-cognitive framework for improving the human-centric risk communication. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 394–398). University Park, PA: The Pennsylvania State University.
Abstract: With the aim of improving human-centric risk communication, this research in progress paper argues for a social-cognitive perspective focusing on the interaction between laypeople and the information environment. A model is designed to predict laypeople's environmental risk perception and information seeking behavior. Using data from a national online survey (N=1,032), our research is an effort to test the predictive power of the socialcognitive model. Practical implications are also discussed in this paper.
|
|