toggle visibility Search & Display Options

Select All    Deselect All
 | 
Citations
 | 
   print
Aarland, M., Radianti, J., & Gjøsæter, T. (2023). Using System Dynamics to Simulate Trust in Digital Supply Chains. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 516–529). Omaha, USA: University of Nebraska at Omaha.
toggle visibility
Alexandre Ahmad, Olivier Balet, Arjen Boin, Julien Castet, Maureen Donnelley, Fabio Ganovelli, et al. (2016). Assessing the Security of Buildings: A Virtual Studio Solution. In A. Tapia, P. Antunes, V.A. Bañuls, K. Moore, & J. Porto (Eds.), ISCRAM 2016 Conference Proceedings ? 13th International Conference on Information Systems for Crisis Response and Management. Rio de Janeiro, Brasil: Federal University of Rio de Janeiro.
toggle visibility
Ana Rodríguez-Hoyos, José Estrada-Jiménez, David Rebollo-Monedero, Jordi Forné, Rubén Trapero Burgos, Antonio Álvarez Romero, et al. (2019). Anonymizing Cybersecurity Data in Critical Infrastructures: The CIPSEC Approach. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
toggle visibility
Ummul Khair Israt Ara, & Fang Chen. (2012). Information security in crisis management system. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
toggle visibility
Gabriel Bartl, Lars Gerhold, & Matthias Wählisch. (2014). Towards a theoretical framework of acceptance for surveillance systems at airports. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 299–303). University Park, PA: The Pennsylvania State University.
toggle visibility
Alena L. Benson, Keith Biggers, Jim Wall, & Mark P. Haselkorn. (2010). Adaptive development of a common operating environment for crisis response and management. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Peter H. Berghmans, Gerd Van Den Eede, & Bartel A. Van De Walle. (2008). A systems perspective on security risk identification: Methodology and illustrations from city councils. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 266–275). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Monika Büscher, Lisa Wood, & Sung-Yueh Perng. (2013). Privacy, security, liberty: Informing the design of EMIS. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 401–410). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
toggle visibility
Chiara Bassetti, Roberta Ferrario, & Maria Luiza M. Campos. (2015). Airport security checkpoints: an empirically-grounded ontological model for supporting collaborative work practices in safety critical environments. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
toggle visibility
Erman Coskun, & Jessica Hoey. (2005). Airport security complexity: Problems with the information system components. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 61–66). Brussels: Royal Flemish Academy of Belgium.
toggle visibility
Daniel Lichte, Dustin Witte, & Kai-Dietrich Wolf. (2020). Comprehensive Security Hazard Analysis for Transmission Systems. In Amanda Hughes, Fiona McNeill, & Christopher W. Zobel (Eds.), ISCRAM 2020 Conference Proceedings – 17th International Conference on Information Systems for Crisis Response and Management (pp. 1145–1153). Blacksburg, VA (USA): Virginia Tech.
toggle visibility
Naci Dilekli, & Tarek Rashed. (2007). Towards a GIS data model for improving the emergency response in the Least Developing Countries: Challenges and opportunities. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 57–62). Delft: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Magiswary Dorasamy, & Murali Raman. (2011). Information systems to support disaster planning and response: Problem diagnosis and research gap analysis. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Douglas A. Samuelson, Matthew Parker, Austin Zimmerman, Loren Miller, Stephen Guerin, Joshua Thorp, et al. (2008). Agent-based simulations of mass egress after Improvised Explosive Device attacks. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 59–70). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Duco N. Ferro, Jeroen M. Valk, & Alfons H. Salden. (2007). A robust coalition formation framework for mobile surveillance incident management. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 479–488). Delft: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Edward J. Glantz, & Frank E. Ritter. (2017). Integrative Risk Identification Approach for Mass-Gathering Security. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 363–373). Albi, France: Iscram.
toggle visibility
Emir Dervisevic, & Miralem Mehic. (2021). Overview of Quantum Key Distribution Technique within IPsec Architecture. In Anouck Adrot, Rob Grace, Kathleen Moore, & Christopher W. Zobel (Eds.), ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management (pp. 391–403). Blacksburg, VA (USA): Virginia Tech.
toggle visibility
Kevin Fall, Gianluca Iannaccone, Jayanthkumar Kannan, Fernando Silveira, & Nina Taft. (2010). A disruption-tolerant architecture for secure and efficient disaster response communications. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Florian Brauner, Julia Maertens, Holger Bracker, Ompe Aimé Mudimu, & Alex Lechleuthner. (2015). Determination of the effectiveness of security measures for low probability but high consequence events: A comparison of multi-agent-simulation & process modelling by experts (L. Palen, M. Buscher, T. Comes, & A. Hughes, Eds.). Kristiansand, Norway: University of Agder (UiA).
toggle visibility
Elizabeth Avery Gomez, Katia Passerini, & Karen Hare. (2006). Public health crisis management: Community level roles and communication options. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 435–443). Newark, NJ: Royal Flemish Academy of Belgium.
toggle visibility
Tim J. Grant, & Gijs Van Den Heuvel. (2010). Modelling the information sharing process in military coalitions: A work in progress. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Harrasi, A. A., Grispos, G., & Gandhi, R. (2023). Using Cybersecurity Testbeds to Evaluate (In)Secure Structural Health Monitoring Systems. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 902–908). Omaha, USA: University of Nebraska at Omaha.
toggle visibility
Arthur H. Hendela, Murray Turoff, & Starr Roxanne Hiltz. (2010). Cross impact security analysis using the HACKING Game. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Jutta Hild, Jonathan Ott, Yvonne Fischer, & Christian Glökler. (2010). Markov based decision support for cost-optimal response in security management. In C. Zobel B. T. S. French (Ed.), ISCRAM 2010 – 7th International Conference on Information Systems for Crisis Response and Management: Defining Crisis Management 3.0, Proceedings. Seattle, WA: Information Systems for Crisis Response and Management, ISCRAM.
toggle visibility
Ivar Svare Holand, Peter Mozelius, & Trond Olav Skevik. (2021). A structured and dynamic model for emergency management exercises. In Anouck Adrot, Rob Grace, Kathleen Moore, & Christopher W. Zobel (Eds.), ISCRAM 2021 Conference Proceedings – 18th International Conference on Information Systems for Crisis Response and Management (pp. 186–197). Blacksburg, VA (USA): Virginia Tech.
toggle visibility
Select All    Deselect All
 | 
Citations
 | 
   print