|
Amro Al-Akkad, Christian Raffelsberger, Alexander Boden, Leonardo Ramirez, & Zimmermann, A. (2014). Tweeting 'when online is off'? Opportunistically creating mobile ad-hoc networks in response to disrupted infrastructure. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 662–671). University Park, PA: The Pennsylvania State University.
Abstract: In this paper, we present a system that enables people to post and receive tweets despite disruptions of existing network infrastructure. Our system opportunistically deploys mobile ad hoc networks (MANETs) based on Wi-Fi in which people can communicate with each other in a peer-to-peer fashion. A MANET per se constitutes an isolated island, but as people carry devices around that can join other MANETs, eventually people can transport previously collected data to the online world. Compared to other systems that aim to enable communication in crisis, our system differs in two ways: it does not rely on existing network infrastructure, and it exploits established protocols and standards allowing it to run on off-the-shelf, commercially available smartphones. We evaluated our prototype with a group of students and practitioners. Overall, we received positive feedback on the potential of our technology, but also were pointed to limitations requiring future work.
|
|
|
Raffaele Bruno, Marco Conti, & Andrea Passarella. (2008). Opportunistic networking overlays for ICT services in crisis management. In B. V. de W. F. Fiedrich (Ed.), Proceedings of ISCRAM 2008 – 5th International Conference on Information Systems for Crisis Response and Management (pp. 689–701). Washington, DC: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: ICT infrastructures are a critical asset in today's Information society. Legacy telecommunication systems easily collapse in the face of disruptions due to security incidents or natural disasters. Hence, there is an urgent demand for new architectures and technologies ensuring a more efficient and dependable support for various security missions, such as disaster relief initiatives, first responder operations, critical infrastructure protection, etc. In this paper we advocate the opportunistic networking paradigm to build a self-organizing overlay ICT infrastructure for supporting dependable crisis management services. Our opportunistic framework to “glues together” surviving parts of the pre-existing infrastructure with networks deployed on-demand and users devices, and supports dependable distribution of coherent, updated, and non-contradictory information distribution. Finally, to show the potential advantages of our solution, we present initial results on the performance of different types of opportunistic infrastructures, by particularly highlighting the gains of context-aware systems.
|
|
|
Gary Bennett, Lili Yang, & Boyka Simeonova. (2017). A Heuristic Approach to Flood Evacuation Planning. In eds Aurélie Montarnal Matthieu Lauras Chihab Hanachi F. B. Tina Comes (Ed.), Proceedings of the 14th International Conference on Information Systems for Crisis Response And Management (pp. 380–388). Albi, France: Iscram.
Abstract: Flood evacuation planning models are an important tool used in preparation for flooding events. Authorities use the plans generated by flood evacuation models to evacuate the population as quickly as possible. Contemporary models consider the whole solution space and use a stochastic search to explore and produce solutions. The one issue with stochastic approaches is that they cannot guarantee the optimality of the solution and it is important that the plans be of a high quality. We present a heuristically driven flood evacuation planning model; the proposed heuristic is deterministic, which allows the model to avoid this problem. The determinism of the model means that the optimality of solutions found can be readily verified.
|
|
|
Janine S. Hiller, & Roberta S. Russell. (2015). Modalities for Cyber Security and Privacy Resilience: The NIST Approach. In L. Palen, M. Buscher, T. Comes, & A. Hughes (Eds.), ISCRAM 2015 Conference Proceedings ? 12th International Conference on Information Systems for Crisis Response and Management. Kristiansand, Norway: University of Agder (UiA).
Abstract: Cybersecurity was a major topic of discussion at the 2015 World Economic Forum in Davos – the Sony attack; huge data breaches at Target and Adobe; a 91% increase in targeted cyber-attacks; annual losses of over $400 billion; the exposure of 904 million personal data records; cyber-attacks on a Finnish bank, a South Korean credit bureau, a German factory?s industrial controls, and the Ukrainian government; as well as increased general anxiety over critical infrastructure exposure (Tobias 2014; WEC 2015). These incidents highlight the risks inherent in a world increasingly complex, interconnected, and cyber-based. Much like thinking in other fields of disaster and crisis management, creating an impenetrable boundary or eliminating cyber risk entirely has given way to building cyber resilience. Cyber resilience is a social, economic and national security issue. This paper examines one approach, the NIST Cybersecurity Framework, in terms of building resilience in both cybersecurity and privacy.
|
|
|
Gwillim Law, & Martin Hammitzsch. (2013). Hierarchical administrative subdivision codes. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 360–364). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: The land area of the world is divided into countries. Most of the countries are, in turn, divided into smaller units. These units may be called states, provinces, regions, governorates, and so on. A phrase that describes them all is “major administrative divisions of countries”. Due to shortcomings of related de-jure standards a hierarchical set of subdivision codes, called Hierarchical Administrative Subdivision Codes (HASC), has been devised, extending in many cases to secondary administrative divisions. This is not an official standard, sanctioned by any international body. The codes are intended for internal use within a database or other computer system and not for display.
|
|
|
Murali Raman, Magiswary Dorasamy, Saravanan Muthaiyah, & Maniam Kaliannan. (2014). Web-based community disaster management and awareness system (CEMAS) in Malaysia. In and P.C. Shih. L. Plotnick M. S. P. S.R. Hiltz (Ed.), ISCRAM 2014 Conference Proceedings – 11th International Conference on Information Systems for Crisis Response and Management (pp. 384–393). University Park, PA: The Pennsylvania State University.
Abstract: Emergency situations are unavoidable. This paper presents the functions inherent in a prototype system that was developed in Malaysia for emergency management. The prototype is potentially useful in Selangor, a state in Malaysia that is prone to natural disasters such as flash floods and landslides. The paper is presented as a report of our on-going project in Malaysia and the intended future work regarding web-based emergency management systems in Malaysia. This prototype development is funded by the Ministry of Education in Malaysia and supported by the National Security Council of Malaysia (Majilis Keselamatan Negara, MKN).
|
|
|
Schönefeld, M., Schütte, P. M., Schulte, Y., & Fiedrich, F. (2023). Critical infrastructure and crisis affected actor? Investigating the double role of municipal administrations. In Jaziar Radianti, Ioannis Dokas, Nicolas Lalone, & Deepak Khazanchi (Eds.), Proceedings of the 20th International ISCRAM Conference (pp. 88–95). Omaha, USA: University of Nebraska at Omaha.
Abstract: This WiPe article presents first insights from two German research projects (one ongoing, one completed) on the double role of municipal administrations in crisis management. The ongoing project examines the municipal crisis management during COVID-19, the completed one focused on the 2015/2016 refugee situation in Germany. While crisis management has previously rather been associated with “blue-light organizations”, these two circumstances rather called for a predominantly administrative crisis management. While adapting to this new role, administrations had to maintain key public services: They had to perform as crisis managers while maintaining their function as a critical infrastructure despite being affected themselves for several reasons. Since 2015, public administration in Germany has found itself in almost constant crisis management mode, giving opportunity to learn and to adjust self-perception. Based on empirical analyses of interview data we aim to discuss the following questions: How did the two roles influence each other in the situations mentioned? Has anything changed between these situations?
|
|
|
Aladdin Shamoug, & Radmila Juric. (2011). Addressing interoperability through the semantic of Information Highway in managing responses in Humanitarian Crises. In E. Portela L. S. M.A. Santos (Ed.), 8th International Conference on Information Systems for Crisis Response and Management: From Early-Warning Systems to Preparedness and Training, ISCRAM 2011. Lisbon: Information Systems for Crisis Response and Management, ISCRAM.
Abstract: We propose an Information Highway (IH) which addresses interoperability in software systems supporting Humanitarian Crises (HC) and consequently enables efficient decision making at any level: operational, organizational and donor levels. We model our IH by (a) manipulating the semantics stored in knowledge of data repositories, which are interwoven in everyday activities of managing responses to HC and (b) understanding the meaning and the purpose of requests for data retrievals issued in such environments.
|
|
|
Victor A. Bañuls Silvera, Rafael Cantueso Burguillos, Fernando Tejedor Panchón, Miguel Ramírez de la Huerga, & Murray Turoff. (2019). A Delphi approach for the establishment of the fundamental principles of an Organizational Security System in Public Administration. In Z. Franco, J. J. González, & J. H. Canós (Eds.), Proceedings of the 16th International Conference on Information Systems for Crisis Response And Management. Valencia, Spain: Iscram.
Abstract: The aim of this work is defining fundamental principles of an Internal Security System in the presence of intentional risks in Public Administration. The relevance of this object of study has increased even more with the emergence of new terrorist groups and the proliferation of organized crime, which have been categorized as a maximum threat to Security by the government. This context has led to new regulations and legislation on Security matters at the national and international level to protect assets, people and the activity of the Administration itself. Despite the large number of regulations and relevance of this topic, there is not any study which defines in a comprehensive manner the requirements that a security system must have in the presence of intentional risks in Public Administration. The results of this work are intended to be a reference for the Public Administration, for the prevention and reaction to damage to people, property, and operation, intentionally caused by external agents, personnel themselves or users. These principles have been applied and validated through a Delphi process in the Administration of the Regional Government of Andalusia in which more than 40 security-related managers have participated.
|
|
|
Shengcheng Yuan, Ma Ma, H. Zhang, & Yi Liu. (2013). An urban traffic evacuation model with decision-making capability. In J. Geldermann and T. Müller S. Fortier F. F. T. Comes (Ed.), ISCRAM 2013 Conference Proceedings – 10th International Conference on Information Systems for Crisis Response and Management (pp. 317–321). KIT; Baden-Baden: Karlsruher Institut fur Technologie.
Abstract: Traffic evacuation is one of the most challenging problems in a mega city due to crowded road conditions. This study focuses on developing a traffic evacuation model with decision-making capability. The model basically consists of two modules. The first one is a decision-making support module which runs very fast and provides short-forecast. The second one is a simulation module, which is used for simulating real evacuation process and for overall performance evaluation with vehicle tracking model. The first module can be considered as a “local” module as only partial information, such as traffic information in certain junctions is available. The second module can be considered as a global module which provides traffic directions for junction, and effective using of road-nets. With integration of two modules, overall system optimization may be achieved. Simulation cases are given for model validation and results are satisfied.
|
|