Alexander Gabriel, Florian Brauner, Andreas Lotter, Frank Fiedrich, & Ompe Aimé Mudimu. (2018). The determination of critical components of European Rail Traffic Management systems towards cyber-attacks. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 291–303). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: “Recent events have shown the vulnerability of IT systems of companies, organizations or even governments to hacker attacks. At the same time, information technologies are becoming increasingly established and important in various industries (digitalization). With a view to the modern development of terrorism, cyber-attacks can be used to physically damage critical infrastructures (CI). This leads to a new dimension of cyber-attacks, which are called terrorist cyber-attacks. The following research contributes to the identification of weak information technology components of railway operating systems and thus improves the safety of public transportation in the context of the European railway traffic management system (ERTMS). The core of this paper is an extended literature research on security flaws in the ERTMS. The future introduction of a methodology for evaluating the criticality of information technology system components will build on this using cyber threats and public transportation as examples.”
|
Alexander Gabriel, Simon Schleiner, Florian Brauner, Florian Steyer, Verena Gellenbeck, & Ompe Aimé Mudimu. (2017). Process modelling of physical and cyber terrorist attacks on networks of public transportation infrastructure. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 390–399). Albi, France: Iscram.
Abstract: Recent events have demonstrated the vulnerability of IT-systems of different companies, organisations or even governments to hacker attacks. Simultaneously, information technologies have become increasingly established and important for institutions of various branches. With respect to modern terrorism developments, cyber-attacks may be used to physically harm critical infrastructures. This leads to a new dimension of cyber-attacks called “terrorist cyber-attacks”. This research-in-progress paper aims to develop a process model for data acquisition and support of decision making that seeks to enhance the security of public transportation in the context of counterterrorism. Therefore, a generic process model for terrorist cyber-attacks – produced in the research project RE(H)STRAIN1 – is intro-duced as a basis for a decision support system (DSS). In the future, such models could improve the decision process by comparing the effectiveness of different security measures.
|
Amanda Langer, Marc-André Kaufhold, Elena Maria Runft, Christian Reuter, Margarita Grinko, & Volkmar Pipek. (2019). Counter Narratives in Social Media: An Empirical Study on Combat and Prevention of Terrorism. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: With the increase of terrorist attacks and spreading extremism worldwide, countermeasures advance as well. Often
social media is used for recruitment and radicalization of susceptible target groups. Counter narratives are trying
to disclose the illusion created by radical and extremist groups through a purposive and educational counter
statement, and to initiate a rethinking in the affected individuals via thought-provoking impulses and advice. This
exploratory study investigates counter narrative campaigns with regard to their fight and prevention against
terrorism in social media. Posts with strong emotions and a personal reference to affected individuals achieved
the highest impact and most reactions from the target group. Furthermore, our results illustrate that the impact of
a counter narrative campaign cannot be measured solely according to the reaction rate to their postings and that
further analysis steps are therefore necessary for the final evaluation of the campaigns.
|
Tom Duffy, Richard McMaster, Chris Baber, & Robert Houghton. (2012). Towards an ontology broker to improve cross-agency sharing in emergency response. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: Major incidents and disasters tend to be highly complex, contain high levels of uncertainty and may often force official responders to set aside their standard operating procedures and work collaboratively with a range of agencies and actors on the ground. Prior work has shown that establishing clear lines of communication and maintaining a shared understanding across organisational boundaries can be challenging to achieve, particularly in stressful and unusual circumstances. In the present paper we discuss ongoing work into specifying a meta-process for facilitating communication and collaboration based on the observation that common themes that emerge in communication within and across organisational boundaries can subsequently be tracked and built into an Ontology Broker. This work draws on experimental work in our laboratory, observations made in emergency control environments and, emphasised in this paper, lessons learned in the 2005 London bombings. © 2012 ISCRAM.
|
Gary Eifried. (2005). A model describing a response to a terrorism incident. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 125–127). Brussels: Royal Flemish Academy of Belgium.
Abstract: Understanding how the response to an incident of terrorism involving a Weapons of Mass Destruction (WMD) transpires is essential to understanding the necessary flow of information within that response. A model describing incident response functions overlaid on a realistic timeline is presented.
|
Elizabeth Avery Gomez, Katia Passerini, & Karen Hare. (2006). Public health crisis management: Community level roles and communication options. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 435–443). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: Crisis management efforts in the United States public health sector aim to prepare and protect the life of an individual, family or group against a health-related event. These efforts span governmental, nongovernmental and private sectors. The need for coordination between these organizations has never been more apparent. A solution will depend heavily on standardized communication protocols using information and communication technology (ICT). Numerous initiatives are currently addressing the needs of our nation with respect to homeland security and public health, yet remain in the early stages for the nongovernmental sector. The emphasis of our research is at the local level where the governmental sector extends to the nongovernmental sector (NGO), particularly community outreach. Our analysis of the local community suggests focusing on the management of communication during public health crises to better understand the complexities and variations presented in these communities. Leveraging experiences from media-technology literature findings and emergency-response efforts, we seek to identify a framework and tools to enable effective communication for those public health practitioners who serve as front-line responders to public health crises. The major contributions of this research will be to extend the use of information systems and mobile technology to the local United States public health communities to increase effective communication between organizations, while providing a state of readiness for homeland security related events.
|
Erik R. Janus, Susan Manente, & Sharon L. Lee. (2008). Best practices in chemical emergency risk communication: The Interstate Chemical Terrorism Workgroup. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 774–777). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The Interstate Chemical Terrorism Workgroup (ICTW) was formed in 2002 and currently includes members from nearly all states and Washington, DC, as well as representation from a number of non-governmental organizations. In addition to offering monthly conference call/presentations, the ICTW partnered with the Centers for Disease Control and Prevention (CDC) in 2003 to host a workshop to address basic elements of risk communication needs in a chemical event. The primary goal of the workshop was to develop a list of core competencies and benchmarks as well as a series of fact sheet templates destined for the general public and press, health care providers, public health department and/or officials, and first response and emergency workers (Lee et al., 2006). Key findings of the 2003 workshop, along with other work being done by CDC, academia and the states, underscore the importance of public health agencies in providing risk communication services during (and particularly after) chemical emergencies, whether intentional or not. Tools developed by the ICTW have been used and/or consulted by many groups involved in public health preparedness. This case study will examine the efforts of Michigan to implement these tools to reduce information overload in an emergency.
|
Noel Johnson, & Ann Fruhling. (2006). Development and assessment of the STATPack[TM] emergency response system. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 197–201). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: The STATPack is a telemedicine consultation and emergency response system which was developed to increase statewide laboratory responsiveness to public health emergencies. Although several emergency response management information systems have been created for diagnostic laboratories at the national level, most states in the U.S. do not have the capability to share critical public health microbiology laboratory information at local levels, especially in rural communities. This paper offers a description and preliminary assessment of the STATPack as it is being deployed by the Nebraska Public Health Laboratory and should be recognized as research in-progress. Initial experiences with this emergency response system have been encouraging.
|
Laura Petersen, Laure Fallou, Grigore Havarneanu, Paul Reilly, Elisa Serafinelli, & Rémy Bossu. (2018). November 2015 Paris Terrorist Attacks and Social Media Use: Preliminary Findings from Authorities, Critical Infrastructure Operators and Journalists. In Kees Boersma, & Brian Tomaszeski (Eds.), ISCRAM 2018 Conference Proceedings – 15th International Conference on Information Systems for Crisis Response and Management (pp. 629–638). Rochester, NY (USA): Rochester Institute of Technology.
Abstract: Crisis communication is a key component of an effective emergency response. Social media has evolved as a prominent crisis communication tool. This paper reports how social media was used by authorities, critical infrastructure operators and journalists during the terrorist attacks that hit Paris on 13th November 2015. A qualitative study was conducted between January and February 2017 employing semi-structured interviews with seven relevant stakeholders involved in this communication process. The preliminary critical thematic analysis revealed four main themes which are reported in the results section: (1) social media is used in crisis times; (2) authorities gained situational awareness via social media; (3) citizens used social media to help one another; and (4) communication procedures changed after these critical events. In conclusion, authorities, citizens and journalists all turned to social media during the attack, both for crisis communication and for increasing situational awareness.
|
Elizabeth Losh. (2007). The birth of the Virtual Clinic: Game spaces in the Virtual Practicum and the Virtual Terrorism Response Academy. In K. Nieuwenhuis P. B. B. Van de Walle (Ed.), Intelligent Human Computer Systems for Crisis Response and Management, ISCRAM 2007 Academic Proceedings Papers (pp. 551–556). Delft: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: The Interactive Media Laboratory at Dartmouth Medical School produces computer games and multimedia programs for public health preparedness. With Department of Homeland Security funding, the IML is developing the Virtual Terrorism Response Academy, which uses game technology to prepare first responders for rescue efforts in which hazardous materials may be involved. This paper looks at the history of the “Virtual Clinic” concept and the original rationale for creating what Max Boisot calls “epistemology space.” It also offers an account of the VRTA designers' responses to potential criticism from learning specialists in game studies who object that the game is too didactic and discourages trial-and-error by restraining the learner in the narrative conceit of a “simulation of a simulation.”.
|
John B. McCabe, Usha Satish, & William Grant. (2005). Training to defend: A multifaceted approach to all hazards preparedness and planning for terrorism. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2005 – 2nd International Conference on Information Systems for Crisis Response and Management (pp. 191–194). Brussels: Royal Flemish Academy of Belgium.
Abstract: In most nations, continued concern exists regarding the potential for acts of terrorism. Healthcare providers, specifically those in Emergency Medicine, will find themselves in the forefront of responding to such events. Training for Emergency Preparedness for all potential hazards is critical. Many approaches to training in individual for All Hazard Preparedness exist. The authors describe a multifaceted approach to training for All Hazards Preparedness and planning for terrorism. The approach includes classroom exercises designed specifically at understanding hazardous material threats, high fidelity patient simulation, strategic management simulation, and simulated care exercises in a non-hospital based emergency department facility. The authors believe that this multifaceted training will provide the broadest most potentially useful training and evaluation for emergency providers to ensure optimal response in times of any and all future terrorist attacks.
|
Eli Rohn, & Gil Erez. (2012). Fighting agro-terrorism in cyberspace: A framework for intention detection using overt electronic data sources. In Z.Franco J. R. L. Rothkrantz (Ed.), ISCRAM 2012 Conference Proceedings – 9th International Conference on Information Systems for Crisis Response and Management. Vancouver, BC: Simon Fraser University.
Abstract: Agro Terrorism is “a hostile attack, towards an agricultural environment, including infrastructures and processes, in order to significantly damage national and international political interests”. This special session within the early warning track is aimed at reducing agro-terrorism related risks by either means of prevention (intelligence gathering using data mining and chatter mining, for example) or means to response to such an attack by early detection of exotic/foreign pathogenic agents, early prediction of disease dispersion patterns, implementation of biosecurity measures, and the development of future methodologies and techniques related to food defense and post-event response. This paper focuses on intention detection using overt data sources on the World Wide Web as they relate to agro-terrorism threats. The paper focuses on early detection that can lead to prevention of such acts, yet a variety of the techniques presented here are also useful for helping in post-event perpetrators detection. © 2012 ISCRAM.
|
Usha Satish, & Siegfried Streufert. (2004). Training to defend: Strategic management simulations. In B. C. B. Van de Walle (Ed.), Proceedings of ISCRAM 2004 – 1st International Workshop on Information Systems for Crisis Response and Management (pp. 157–160). Brussels: Royal Flemish Academy of Belgium.
Abstract: Terrorism is defined by a philosophy of revolutionary violence and a commitment to the destruction of government power. Of course, one way to reduce vulnerability to these impacts is heightened security. However, we must be a step ahead of terrorists: we must prevent their intended actions whenever possible. Most measures of decision-making competence focus on “content,” i.e. on “what” decision makers know, on what their thought processes are, and on whether the decisions they make are correct. However complex, volatile, ambiguous task environments involving uncertainty and delayed feedback provide challenges and generate levels of stress, which interfere with appropriate decision making. A “correct” decision may not be easily available. Many well-trained individuals will be at a loss and may make errors (e.g., because they may select the most immediately evident, yet not the most appropriate options). The use of a well-validated methodology, Strategic Management Simulations (SMS) to assess and train decision makers is presented. © Proceedings ISCRAM 2004.
|
Jeannette N. Sutton, Emma S. Spiro, Sean M. Fitzhugh, Britta Johnson, Ben Gibson, & Carter T. Butts. (2014). Terse message amplification in the Boston bombing response. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 612–621). University Park, PA: The Pennsylvania State University.
Abstract: On the morning of April 15, 2013, an Improvised Explosive Device (IED) was detonated near the finish line of the Boston Marathon, resulting in a large number of casualties. This generated a week-long response under the US National Incident Management System. In this paper, we examine online, terse messages broadcast by responding organizations and their amplification by other official entities via retransmission. Content analysis of official messages shows strong similarities with posting patterns previously observed in response to natural hazards, with the primary exception of themes related to the criminal investigation, suggesting a possible revision of guidelines for public information in light of the needs arising from extended counterterrorism operations undertaken in an urban environment. Network analysis demonstrates message posting and amplification were dominated by local actors, underscoring the importance of local readiness for management of official public information activities in the context of extremely high-profile events.
|
Thomas J. Terry Jr. (2006). Electronic disease reporting & management. In M. T. B. Van de Walle (Ed.), Proceedings of ISCRAM 2006 – 3rd International Conference on Information Systems for Crisis Response and Management (pp. 569–578). Newark, NJ: Royal Flemish Academy of Belgium.
Abstract: The New Jersey Institute of Technology (NJIT) developed an Electronic Disease Reporting & Management System (EDRMS) that has the capability for the rapid collection, analysis, and dissemination of suspected outbreaks including Chemical and Bio-Terrorism events. Prior to EDRMS, agencies relied on dis-jointed phone and fax reporting and rudimentary methods for data collection, dissemination, follow-up, and remuneration. The objective of this system is to allow collaborative recognition across all the hospitals and public health offices in the state of New Jersey to detect as soon as possible an epidemic occurring of a known or unknown type.
|
Anuradha Venkateswaran, Katrina Simon-Agolory, & Kera Z. Watkins. (2011). Risk analysis for Greene County and Wright Patterson Air Force Base, Ohio: Simulation of riverine flooding using HAZUS-MH. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Greene County in Dayton, OH houses Wright Patterson Air Force Base (WPAFB), whose estimated 2009 economic impact within its Metropolitan Statistical Area (MSA) is $5.17 million. Despite its military/strategic importance as the largest base in the U.S. Air Force, literature search did not uncover a published comprehensive risk analysis for WPAFB, or even Greene County, across the entire spectrum of hazards from natural to technological to man-made (including terrorism). This paper presents a summary report on risk determination and economic impact data for Greene County and WPAFB (within Greene County) in the context of riverine flooding, using FEMA's HAZUS-MH tool. It is hoped that the results will further the regional compilation of data and thus prove of use to the local disaster management community while generally growing the overall body of work in risk analysis. Future work aims to expand regional risk determination to other natural disasters and terrorism scenarios.
|
Min-Hao Matt Wu, Annie Hsin-Wen Liu, & K. Mani Chandy. (2008). Virtual environments for developing strategies for interdicting terrorists carrying dirty bombs. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 83–87). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: Strategies for detecting terrorists carrying radioactive material can be evaluated in virtual environments more easily than they can be in the real world. Real scenarios expose personnel to radiation and concomitant dangers. The execution of multiple real-world scenarios – such as catching terrorists in factories, houses and open spaces – is expensive. This paper describes virtual environments for interdicting terrorists carrying radioactive material. The virtual environments are constructed by incorporating the physics of radiation into virtual-world platforms. We explore the relative advantages of a gaming engine (Half-Life 2), a 3D online virtual world (Second Life) and a robot simulator platform (Stage/Player) for developing strategies for interdicting dirty bombers. Preliminary results on implementations of these virtual environments are presented.
|
Gian Piero Zarri. (2008). Representing and managing 'narrative' terrorism information. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 208–218). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: In this paper, we evoke first the ubiquity and the importance of the so-called 'nonfictional narrative' information, with a particular emphasis on the terrorism- and crime-related data. We show that the usual knowledge representation and 'ontological' techniques have difficulties in finding complete solutions for representing and using this type of information. We supply then some details about NKRL, a representation and inferencing environment especially created for an 'intelligent' exploitation of narrative information. We will also supply some examples concerning a “terrorism in Southern Philippines” general context to illustrate our approach.
|