|
Aarland, M., Radianti, J., & Gjøsæter, T. (2023). Using System Dynamics to Simulate Trust in Digital Supply Chains. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 516–529). Omaha, USA: University of Nebraska at Omaha.
Abstract: The power industry is outsourcing and digitalising their services to provide better, faster, and more reliable supply of electric power to the society. As a result, critical infrastructure increases in complexity and tight couplings between multiple suppliers and systems in digital supply chains. It also introduces new risks and challenges that are difficult to manage for critical infrastructure owners. To address the vulnerability in digital supply chains, we have developed a system dynamics model that represent important challenges to manage cybersecurity in digital supply chains, based on input from an expert group in the power industry. The system dynamics model illustrates how trust in suppliers as well as the need for control play important roles in outsourcing. Scenarios were developed and simulated.
|
|
|
Alexandre Ahmad, Olivier Balet, Arjen Boin, Julien Castet, Maureen Donnelley, Fabio Ganovelli, et al. (2016). Assessing the Security of Buildings: A Virtual Studio Solution. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
Abstract: This paper presents an innovative IT solution, a virtual studio, enabling security professionals to formulate, test and adjust security measures to enhance the security of critical buildings. The concept is to virtualize the environment, enabling experts to examine and assess and improve on a building?s security in a cost-effective and risk-free way. Our virtual studio solution makes use of the latest advances in computer graphics to reconstruct accurate blueprints as well as 3D representations of entire buildings in a very short timeframe. In addition, our solution enables the creation and simulation of multiple threat situations, allowing users to assess security procedures and various responses. Furthermore, we present a novel device, tailored to support collaborative security planning needs. Security experts from various disciplines evaluated our virtual studio solution, and their analysis is presented in this paper.
|
|
|
Ana Rodríguez-Hoyos, José Estrada-Jiménez, David Rebollo-Monedero, Jordi Forné, Rubén Trapero Burgos, Antonio Álvarez Romero, et al. (2019). Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: Cybersecurity logs are permanently generated by network devices to describe security incidents. With modern
computing technology, such logs can be exploited to counter threats in real time or before they gain a foothold.
To improve these capabilities, logs are usually shared with external entities. However, since cybersecurity logs
might contain sensitive data, serious privacy concerns arise, even more when critical infrastructures (CI), handling
strategic data, are involved.
We propose a tool to protect privacy by anonymizing sensitive data included in cybersecurity logs. We implement
anonymization mechanisms grouped through the definition of a privacy policy. We adapt said approach to the
context of the EU project CIPSEC that builds a unified security framework to orchestrate security products, thus
offering better protection to a group of CIs. Since this framework collects and processes security-related data from
multiple devices of CIs, our work is devoted to protecting privacy by integrating our anonymization approach.
|
|
|
Ummul Khair Israt Ara, & Fang Chen. (2012). Information security in crisis management system. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: Information security is an important part of almost any kind of Information System. Crisis Management Systems (CMS) are a type of Information System that deals with information which needs to be secure. No matter what kind of crisis, natural disasters, man-made crisis or terrorist attacks, the CMS security should not be compromised. There are many challenges regarding exchange of qualified information and interoperability between various Expert Systems and the CMS. It is important to have strong security in terms of technology, skills, security requirements, sensitivity of information and trust-worthiness (Vural, Ciftcibasi and Inan, 2010). Depending on the type of crisis situation, different sets of security components should be triggered, since the security requirements vary between situations. For example, a terrorist attack has different security requirements in the system compared to a natural disaster or a medical emergency. In this paper, the importance of Information Security in CMS will be discussed. Methods for secure exchange of qualified information are analyzed and a secure and dynamic Crisis Management Information Security System (CMISS) design is introduced. © 2012 ISCRAM.
|
|
|
Gabriel Bartl, Lars Gerhold, & Matthias Wählisch. (2014). Towards a theoretical framework of acceptance for surveillance systems at airports. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 299–303). University Park, PA: The Pennsylvania State University.
Abstract: In this paper we illustrate (a) the background and goals of the interdisciplinary research project SAFEST and (b) first insights from the socio-scientific part within the project. Technical systems are often established without considering explicitly ethical, legal, and social implications. This frequently leads to a lack of acceptance. This paper aims at compiling an analytical scheme that tries to demonstrate the relevance of the social context for the emergence of different modes of acceptance in reference to surveillance systems at airports. It is intended to guide the technical experts to deal with and reflect acceptance issues in the process of technical development.
|
|
|
Alena L. Benson, Keith Biggers, Jim Wall, & Mark P. Haselkorn. (2010). Adaptive development of a common operating environment for crisis response and management. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Complex information and communication systems present a special challenge to system designers because these are generally deployed as large, distributed systems with diverse user groups. Crisis response and management organizations in particular expect systems to be interoperable, resilient, flexible and provide lasting benefit. Currently, systems such as Virtual USA (Department of Homeland Security) and WatchKeeper (United States Coast Guard) seek to create common situational awareness for all participating agencies in security and incident response operations. We propose adaptive development as a system development model to build upon the ideas of systems such as Virtual USA and WatchKeeper in order to create sustainable and adaptable systems. Adaptive development supports ongoing improvement through user-driven design and modification in the target environment. An internet-based dashboard demonstrated during a United States Coast Guard Sector Seattle incident response exercise serves as an emergent case study for the adaptive model.
|
|
|
Peter H. Berghmans, Gerd Van Den Eede, & Bartel A. Van De Walle. (2008). A systems perspective on security risk identification: Methodology and illustrations from city councils. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 266–275). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: In this paper we take a system theoretic perspective to the process of security risk identification in the context of city councils. Based on this approach, we construct a framework that helps to identify risks. We analyze why this methodological framework is suitable for the risk identification process. Research in fifty Flemish city councils reveals the usefulness of our approach of combining a perceived vs. objective perspective with a technical vs. organizational one. We believe such a framework offers a workable tool for dealing with IS security risks in a systems thinking way.
|
|
|
Monika Büscher, Lisa Wood, & Sung-Yueh Perng. (2013). Privacy, security, liberty: Informing the design of EMIS. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 401–410). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: This paper explores issues of security, privacy and liberty arising in relation to ICT supported emergency management. The aim is to inform the design of emergency management information systems (EMIS) and architectures that support emergent interoperability and assembly of emergency management systems of systems. We show how transformations of social and material practices of privacy boundary management create challenges, opportunities and dangers in this context. While opportunities include development of more efficient and agile emergency management models, building on smart city concepts, dangers include surveillance, social sorting and an erosion of civil liberties. Against this backdrop, we briefly explore human practice focused 'privacy by design' as a candidate design avenue.
|
|
|
Chiara Bassetti, Roberta Ferrario, & Maria Luiza M. Campos. (2015). Airport security checkpoints: an empirically-grounded ontological model for supporting collaborative work practices in safety critical environments. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Resulting from an interdisciplinary endeavor, the paper proposes an ontological model for supporting collaborative work practices in critical settings, and shows its application to a specific domain. The model is empirically-grounded, as based on ethnographic research carried out at an international airport ?clearly an example of safety-critical environment, where emergency prevention and preparedness are crucial. On the other hand, the model leverages on previous ontological work on collaboration and observation in emergency response, and revises it when necessary, thus contributing to its development. Taking hand-baggage screening as an example, the paper shows how the model can be applied, and how it could be used to run model-based simulation in order to better understand collaborative work practices and analyze the impact of different techno-organizational changes on such practices and their effectiveness. This could result in suggesting guidelines for enhancing workflow, security policies and, more generally, time- and safety-critical situations management.
|
|
|
Erman Coskun, & Jessica Hoey. (2005). Airport security complexity: Problems with the information system components. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 61–66). Brussels: Royal Flemish Academy of Belgium.
Abstract: Airport security is a very relevant, diverse, and complex system in any country. September 11th made this issue an increasing concern for almost every country in the world. Prior to September 11th the media, watchdog groups, and commissions established by the United States Congress, were adamant that airport security had major flaws. Currently many countries are revamping their airport security systems. The U.S. and other governments are implementing many new systems and procedures. There are numerous potential pitfalls with this implementation process and these new systems will have impacts on the public. For example, these systems could reduce freedom, still be flawed, and affect the economy. The primary intents of this paper are to classify airport security as a complex large-scale safety-critical system, to discuss what make airports so complex, describe the information systems that are involved with such systems, and discuss the impacts on the people involved.
|
|
|
Daniel Lichte, Dustin Witte, & Kai-Dietrich Wolf. (2020). Comprehensive Security Hazard Analysis for Transmission Systems. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 1145–1153). Blacksburg, VA (USA): Virginia Tech.
Abstract: Critical energy infrastructures are more and more focused upon by politics and society. Modern society depends on these structures, since they enable the steady support of electricity and other types of energy. Deliberately precipitated hazards of certain critical parts of electrical transmission systems (ETS) can lead to catastrophic consequences. Therefore, the analysis of feasible security hazards and resulting consequences for the operation of transmission systems are a concern to transmission system operators (TSO). Alas, there is no common method available that comprehensively identifies these feasible security related scenarios and classifies them according to their overall criticality for the safe operation of the ETS. To tackle this challenge, we propose a comprehensive, yet easy-to-apply method to systematically identify and assess the criticality of security threat scenarios. It is conducted in four steps and consists of a matrix based consistency check of threat scenarios in a defined solution space and a convenient semi-quantitative assessment of a risk factor for the ETS. The approach is illustrated by the simplified generic example of an EETS.
|
|
|
Naci Dilekli, & Tarek Rashed. (2007). Towards a GIS data model for improving the emergency response in the Least Developing Countries: Challenges and opportunities. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 57–62). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Over the past few years, several standardized GIS data models have been developed to document “best practices” database designs for various application domains including the domain of emergency management. The majority of such models, however, have been developed in the context of developed countries as in the case of the Homeland Security geodatabase data model by ESRI®. These data models fail to be successful when transferred and used in the context of Least Developing Countries (LDCs) due to significant contextual differences in the domains of information systems and emergency practices. Therefore, developing GIS data models that are specifically designed for emergency response activities in LDCs are needed to improve existing emergency response practices in these countries. This paper reviews the state of development in GIS data models and the potential benefits and applications of building models that are specifically designed to support emergency response activities in LDCs. We first discusses why it is important to differentiate emergency response activities in LDCs from other contexts. We then present some theoretical considerations in developing GIS data models that can overcome contextual difficulties in LDCs in general and in the domain of information systenms. We finally attempt to provide key guidelines that may help designing a GIS Data Model, while is specifically referenced to the LDCs context.
|
|
|
Magiswary Dorasamy, & Murali Raman. (2011). Information systems to support disaster planning and response: Problem diagnosis and research gap analysis. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: There is significant gap in the literature and past research on Knowledge Management Systems (KMS) in the domain of disasters. This PhD research work is an action research to design and implement a web-based knowledge management system that aims to fill this theoretical gap in KMS for disasters and to improve the disaster planning and response efforts within an institutional context. The diagnostic stage results imply that the organisation can benefit from the implementation of an information system to support its disaster planning and response efforts. Current scenario at the State Crisis and Security Council (SCSC) in Malaysia revealed some real challenges pertaining to communication, coordination and knowledge processes between SCSC and its district level officers (DO). The proposition of this research is that a well-defined knowledge management system can successfully support disaster planning and response effort in organizations.
|
|
|
Douglas A. Samuelson, Matthew Parker, Austin Zimmerman, Loren Miller, Stephen Guerin, Joshua Thorp, et al. (2008). Agent-based simulations of mass egress after Improvised Explosive Device attacks. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 59–70). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: For the Science and Technology Directorate (S&T) of the U. S. Department of Homeland Security, we developed agent-based computer simulation models of mass egress from a stadium and a subway station following one or more attacks with Improvised Explosive Devices (IEDs.) Anti-IED countermeasures we modeled included improved guidance to exits, baffles to absorb shock and shrapnel, and, for the stadium, egress onto the playing field. We found improved real-time information systems that provide better guidance to exits would substantially expedite egress and could reduce secondary (trampling and crush) casualties. Our results indicate that models like these can be useful aids to selecting countermeasures, and for training, preparation and exercises. We also discuss the unusual problems such models pose for real-time event management and for validation and evaluation.
|
|
|
Duco N. Ferro, Jeroen M. Valk, & Alfons H. Salden. (2007). A robust coalition formation framework for mobile surveillance incident management. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 479–488). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Given unexpected incidents on routes of guards that check security objects, like banks, one of the most challenging problems is still how to support improvisation by security personnel in taking decisions to prevent or resolve such incidents. Another as important associated problem is how a security company can naturally take advantage of its existing and novel knowledge about its organizational and ICT infrastructures, and the introduction of a decision support system to help leverage of improvisation by humans. To tackle all this, on the one hand we present a dynamic coalition formation framework that allows the (re)configurations of agents that are associated with joint tasks in situational contexts to be evaluated by appropriate value functions. On the other hand, we present a dynamic scale-space paradigm that allows a security company to distill ranked lists of robust context-dependent reconfigurations at critical scales. We highlight the merits of ASK-ASSIST as a solution to the problem of supporting human improvisation.
|
|
|
Edward J. Glantz, & Frank E. Ritter. (2017). Integrative Risk Identification Approach for Mass-Gathering Security. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 363–373). Albi, France: Iscram.
Abstract: Effective risk management begins with successful risk identification. Unfortunately, traditional approaches may lead to haphazard and incomplete results. To overcome this, we present a new integrative approach to improve risk identification that sequentially investigates protector-views and narrow scopes using literature review, ethnography, and subject matter expertise. This paper illustrates this approach by identifying man-made and natural threats to mass-gathering events in general, and stadium security as an example. Improving risk identification enhances resilience to known risks by enabling planning and development of targeted response strategies. Working from a more complete portfolio of risk resilience strategies may also improve flexibility and agility to respond to new and emerging risks.
|
|
|
Emir Dervisevic, & Miralem Mehic. (2021). Overview of Quantum Key Distribution Technique within IPsec Architecture. In Anouck Adrot, Rob Grace, Kathleen Moore, & Christopher W. Zobel (Eds.), ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management (pp. 391–403). Blacksburg, VA (USA): Virginia Tech.
Abstract: Quantum key distribution (QKD) is a method for secret key distribution which is secure against any future computational threat. In this paper we give an overview of existing solutions that integrate QKD method within the most popular architecture for establishing secure communication in modern IP (Internet Protocol) networks – IPsec (Internet Protocol security). The provided overview can be used to further design the integration of QKD within IPsec architecture striving for a standardized solution.
|
|
|
Kevin Fall, Gianluca Iannaccone, Jayanthkumar Kannan, Fernando Silveira, & Nina Taft. (2010). A disruption-tolerant architecture for secure and efficient disaster response communications. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: We consider the problem of providing situational awareness when citizens in a disaster are willing to contribute their own devices, such as laptops and smart phones, to gather data (text, images, audio or video) and to help forward data gathered by others. A situational awareness service processes all received data and creates annotated maps to visualize a disaster site (e.g., the status of the disaster, such as fires or floods, the location of people, food, or water). We discuss the challenges imposed on such an application when 1) the communications infrastructure in the disaster area can only provide intermittent connectivity, 2) anxious victims generate large amounts of redundant content congesting the network, and 3) the sharing of personal devices creates security and privacy threats. We present an architecture that addresses the requirements to support such a service.
|
|
|
Florian Brauner, Julia Maertens, Holger Bracker, Ompe Aimé Mudimu, & Alex Lechleuthner. (2015). Determination of the effectiveness of security measures for low probability but high consequence events: A comparison of multi-agent-simulation & process modelling by experts (L. Palen, M. Buscher, T. Comes, & A. Hughes, Eds.). Kristiansand, Norway: University of Agder (UiA).
Abstract: Due to the increasing danger of terrorist attacks, it is necessary to determine the preventive effects of security measures installed in e.g. public transportation systems. Since, there is no common practice to determine the preventive effects; we developed two different methodologies to analyse those effects, both are suitable for the assessment of security measures. The first method is a semi-quantitative method based on expert-estimations combined with a modelled process of an attack.The second method models the scenarios using a multi-agent-based simulation framework. Simulating a large number of runs, it is possible to derive values for indicators of interest on statistical basis. We show the suitability of both methods by applying them on a practical example of a public transportation system. In this paper we introduce both methodologies, show an exemplary application and present the strengths and weaknesses and how they can be linked to get an increased benefit.
|
|
|
Elizabeth Avery Gomez, Katia Passerini, & Karen Hare. (2006). Public health crisis management: Community level roles and communication options. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 435–443). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: Crisis management efforts in the United States public health sector aim to prepare and protect the life of an individual, family or group against a health-related event. These efforts span governmental, nongovernmental and private sectors. The need for coordination between these organizations has never been more apparent. A solution will depend heavily on standardized communication protocols using information and communication technology (ICT). Numerous initiatives are currently addressing the needs of our nation with respect to homeland security and public health, yet remain in the early stages for the nongovernmental sector. The emphasis of our research is at the local level where the governmental sector extends to the nongovernmental sector (NGO), particularly community outreach. Our analysis of the local community suggests focusing on the management of communication during public health crises to better understand the complexities and variations presented in these communities. Leveraging experiences from media-technology literature findings and emergency-response efforts, we seek to identify a framework and tools to enable effective communication for those public health practitioners who serve as front-line responders to public health crises. The major contributions of this research will be to extend the use of information systems and mobile technology to the local United States public health communities to increase effective communication between organizations, while providing a state of readiness for homeland security related events.
|
|
|
Tim J. Grant, & Gijs Van Den Heuvel. (2010). Modelling the information sharing process in military coalitions: A work in progress. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Coalition partners must share information to work together. Models of information sharing assume that it is a linear, one-way process. As part of a larger project, we studied information sharing in military coalitions. Interviews of 47 officers in NATO R&D organizations showed that one piece of information was often traded for another. This is characteristic of an information market. Security regulations make information a scarce resource, although trust may allow the regulations to be waived. Our observations have consequences for the military Network Enabled Capabilities community in their desire to migrate to a “need to share” security principle. Failing to find a suitable process model in the literature, we outline requirements and identify two possible starting points for modelling the information sharing process in military coalitions.
|
|
|
Harrasi, A. A., Grispos, G., & Gandhi, R. (2023). Using Cybersecurity Testbeds to Evaluate (In)Secure Structural Health Monitoring Systems. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 902–908). Omaha, USA: University of Nebraska at Omaha.
Abstract: An increasing amount of technology is being integrated into bridges and other structures, such as dams and buildings, to proactively look for signs of deterioration or damage. These technologies are collectively known as structural health monitoring systems. While the benefits of integrating this technology are attractive, this integration is also creating an environment that is conducive to security vulnerabilities. While previous research has focused on the broader cybersecurity challenges associated with structural health monitoring systems, limited guidance is available for identifying specific security vulnerabilities in these systems and their implications for responding to security incidents. Hence, this paper presents CYBRBridge, a cybersecurity testbed that provides a sacrificial environment to assist in identifying and exploring vulnerabilities associated with structural health monitoring systems. This paper reports ongoing research efforts to develop the CYBRBridge testbed and initial results identifying vulnerabilities within the wireless components of a commercial structural health monitoring system
|
|
|
Arthur H. Hendela, Murray Turoff, & Starr Roxanne Hiltz. (2010). Cross impact security analysis using the HACKING Game. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Security of network assets is a high priority with little traditional return on investment. Increasingly, cyber attacks are being used by both terrorist and unfriendly government organizations. The HACKING Game, a Cross Impact Analysis planning tool, can be used to plan security resource allocation in computer networks. Cross Impact Analysis provides a mathematical basis to determine the interrelationships of one event with a set of other events. Output from the HACKING Game's Cross Impact Analysis model can be used to help justify security expenditures, with an added benefit of being a training tool for employees learning to protect networks. This paper presents details of the Hacking Game's design and its capabilities. Cross impact modeling can be used to develop games for any situation characterized by a set of offense and defense events to produce an individual or collaborative model for such things as natural and man-made disasters.
|
|
|
Jutta Hild, Jonathan Ott, Yvonne Fischer, & Christian Glökler. (2010). Markov based decision support for cost-optimal response in security management. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: In this contribution, we introduce a prototype of a decision support tool for cost-optimal response in security management. The threat situation of a closed infrastructure, exposed to multiple threats, and the corresponding response actions are modeled by a continuous-time Markov decision process (CMDP). Since the CMDP cannot be solved exactly for large infrastructures, the response actions are determined from a heuristic, based on an index rule. The decision support tool's user interface displays the infrastructure's current threat state and proposes the heuristic response actions to the decision maker. In this way, global situation awareness can be enhanced and the decision maker is able to initiate an almost cost-optimal response action in short time.
|
|
|
Ivar Svare Holand, Peter Mozelius, & Trond Olav Skevik. (2021). A structured and dynamic model for emergency management exercises. In Anouck Adrot, Rob Grace, Kathleen Moore, & Christopher W. Zobel (Eds.), ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management (pp. 186–197). Blacksburg, VA (USA): Virginia Tech.
Abstract: Emergencies are management challenges, and emergency exercises that involve multiple collaborating parties is a means towards mastering them. Such exercises are often conducted in a virtual training environment based on complex disaster scenarios. The reported study was carried out using a requirement-focused design approach. The aim was to describe and discuss a relevant design for lean, dynamic, and cost-efficient emergency management exercise systems. Data were gathered from a literature study and analyses of earlier emergency management projects in which the authors had participated. Despite the complexity of many current emergency management exercises, the scenarios usually involve only the response phases and have a linear structure that hinders both didactic aspects and the software structure. The conclusion drawn from the study is that an emergency management exercise model should focus on managing the activities that correspond to alternatives that unfold from a dynamic scenario. Finally, the authors recommend the principles of alternate reality games as a way towards more dynamic and cost-efficient emergency exercise systems.
|
|