Information Sharing: A Study of Information Attributes and their Relative Significance During Catastrophic Events

Information Sharing: A Study of Information Attributes and their Relative Significance During Catastrophic Events

Preeti Singh (University at Buffalo-The State University of New York, USA), Pranav Singh (University at Buffalo-The State University of New York, USA), Insu Park (University at Buffalo-The State University of New York, USA) and JinKyu Lee (Oklahoma State University, USA)
DOI: 10.4018/978-1-60566-326-5.ch014
OnDemand PDF Download:
$37.50

Abstract

We live in a digital era where the global community relies on Information Systems to conduct all kinds of operations, including averting or responding to unanticipated risks and disasters. This can only happen when there is a robust information exchange facilitation mechanism in place, which can help in taking quick and legitimate steps in dealing with any kind of emergent situation. Prior literature in the field of information assurance has focused on building defense mechanisms to protect assets and reduce vulnerability to foreign attacks. Nevertheless, information assurance does not simply mean building an impermeable membrane and safeguarding information, but also implies letting information be securely shared, if required, among a set of related groups or organizations that serve a common purpose. This chapter will revolve around the central pivot of Information Sharing. Further, to study the relative significance of various information dimensions in different disaster situations, content analyses are conducted. The results hence obtained can be used to develop a prioritization framework for different disaster response activities, thus to increase the mitigation efficiency. We will also explore roles played by few existing organizations and technologies across the globe that are actively involved in Information Sharing to mitigate the impact of disasters and extreme events.
Chapter Preview
Top

Introduction

Information assurance is the process of ensuring that the right people get the right information at the right time. This term is sometimes used interchangeably with information security but in a broader connotation, it is a superset of information security and also comprise of managing relevance, integrity, accuracy, authentication, confidentiality and other similar attributes of information (Thomas, Ang, Parbati Ray, & Nof, 2001). The main thrust of this chapter is on Information Sharing, which plays a crucial role in mitigating dire consequences of any disaster or threat to our social/business infrastructure. Here we will be analyzing different attributes of information which will also be referred to as information quality dimensions in the sections ahead and will draw some inference on deciding about their priorities during different kinds of disaster. So we will be studying information assurance through the spectrum of Information Sharing during disasters. It is important to note here that the terms disasters, emergency, crisis, calamity and catastrophe, all may have different meanings in their respective fields. However, as a part of this chapter, all these terms refer to the same context and may appear interchangeably. Similarly, information attributes and information quality dimension are both assumed to mean the same.

Information Sharing is a fundamental component of a successful security program. With the high-level of inter-dependent business operations among business partners and automated control systems, organizations can derive value from accessing and sharing appropriate information. Nevertheless, doing the same in a secure fashion is indeed a daunting challenge, since we have to deal with information content that ranges from the simple to the complex (e.g., travel records, weather information, citizenship records, financial information, intelligence reports, military positions and logistical data, map data, etc.) in an interoperable environment that is constantly changing (Phillips, Ting, & Demurjian, 2002). Therefore, it becomes very important to understand the significance of various information attributes during any disaster management operation, because handling information in a way that can facilitate the special information needs of the particular disaster will expedite the relief operations. Our interest is to help disaster management organizations (DMO) prepare a framework for quick and secure Information Sharing that is required in response to a crisis, e.g., natural disaster (earthquake, hurricane), terrorist attacks (biological warfare or explosions), etc.

Complete Chapter List

Search this Book:
Reset
Editorial Advisory Board
Table of Contents
Foreword
Merrill Warkentin
Preface
Kenneth J. Knapp
Acknowledgment
Kenneth J. Knapp
Chapter 1
Jaziar Radianti, Jose J. Gonzalez
This chapter discusses the possible growth of black markets (BMs) for software vulnerabilities and factors affecting their spread. It is difficult... Sample PDF
Dynamic Modeling of the Cyber Security Threat Problem: The Black Market for Vulnerabilities
$37.50
Chapter 2
Somak Bhattacharya, Samresh Malhotra, S. K. Ghosh
As networks continue to grow in size and complexity, automatic assessment of the security vulnerability becomes increasingly important. The typical... Sample PDF
An Attack Graph Based Approach for Threat Identification of an Enterprise Network
$37.50
Chapter 3
Robert F. Mills, Gilbert L. Peterson, Michael R. Grimaila
The purpose of this chapter is to introduce the insider threat and discuss methods for preventing, detecting, and responding to the threat. Trusted... Sample PDF
Insider Threat Prevention, Detection and Mitigation
$37.50
Chapter 4
Richard T. Gordon, Allison S. Gehrke
This chapter describes a methodology for assessing security infrastructure effectiveness utilizing formal mathematical models. The goal of this... Sample PDF
An Autocorrelation Methodology for the Assessment of Security Assurance
$37.50
Chapter 5
Ken Webb
This chapter results from a qualitative research study finding that a heightened risk for management has emerged from a new security environment... Sample PDF
Security Implications for Management from the Onset of Information Terrorism
$37.50
Chapter 6
Yves Barlette, Vladislav V. Fomin
This chapter introduces major information security management methods and standards, and particularly ISO/IEC 27001 and 27002 standards. A... Sample PDF
The Adoption of Information Security Management Standards: A Literature Review
$37.50
Chapter 7
Peter R. Marksteiner
Information overload is an increasingly familiar phenomenon, but evolving United States military doctrine provides a new analytical approach and a... Sample PDF
Data Smog, Techno Creep and the Hobbling of the Cognitive Dimension
$37.50
Chapter 8
John W. Bagby
The public expects that technologies used in electronic commerce and government will enhance security while preserving privacy. These expectations... Sample PDF
Balancing the Public Policy Drivers in the Tension between Privacy and Security
$37.50
Chapter 9
Indira R. Guzman, Kathryn Stam, Shaveta Hans, Carole Angolano
The goal of our study is to contribute to a better understanding of role conflict, skill expectations, and the value of information technology (IT)... Sample PDF
Human Factors in Security: The Role of Information Security Professionals within Organizations
$37.50
Chapter 10
Nikolaos Bekatoros HN, Jack L. Koons III, Mark E. Nissen
The US Government is moving apace to develop doctrines and capabilities that will allow the Department of Defense (DoD) to exploit Cyberspace for... Sample PDF
Diagnosing Misfits, Inducing Requirements, and Delineating Transformations within Computer Network Operations Organizations
$37.50
Chapter 11
Rodger Jamieson, Stephen Smith, Greg Stephens, Donald Winchester
This chapter outlines components of a strategy for government and a conceptual identity fraud enterprise management framework for organizations to... Sample PDF
An Approach to Managing Identity Fraud
$37.50
Chapter 12
Alanah Davis, Gert-Jan de Vreede, Leah R. Pietron
This chapter presents a repeatable collaboration process as an approach for developing a comprehensive Incident Response Plan for an organization or... Sample PDF
A Repeatable Collaboration Process for Incident Response Planning
$37.50
Chapter 13
Dean A. Jones, Linda K Nozick, Mark A. Turnquist, William J. Sawaya
A pandemic influenza outbreak could cause serious disruption to operations of several critical infrastructures as a result of worker absenteeism.... Sample PDF
Pandemic Influenza, Worker Absenteeism and Impacts on Critical Infrastructures: Freight Transportation as an Illustration
$37.50
Chapter 14
Preeti Singh, Pranav Singh, Insu Park, JinKyu Lee
We live in a digital era where the global community relies on Information Systems to conduct all kinds of operations, including averting or... Sample PDF
Information Sharing: A Study of Information Attributes and their Relative Significance During Catastrophic Events
$37.50
Chapter 15
Gregory B. White, Mark L. Huson
The protection of cyberspace is essential to ensure that the critical infrastructures a nation relies on are not corrupted or disrupted. Government... Sample PDF
An Overview of the Community Cyber Security Maturity Model
$37.50
Chapter 16
Doug White, Alan Rea
In this chapter the authors present essential server security components and develop a set of logical steps to build hardened servers. The authors... Sample PDF
Server Hardening Model Development: A Methodology-Based Approach to Increased System Security
$37.50
Chapter 17
Jeff Teo
Computer attacks of all sorts are commonplace in today’s interconnected, globalized society. A computer worm, written and released in one part of... Sample PDF
Trusted Computing: Evolution and Direction
$37.50
Chapter 18
Miguel Jose Hernandez y Lopez, Carlos Francisco Lerma Resendez
This chapter discusses the basic aspects of Honeypots, how they are implemented in modern computer networks, as well as their practical uses and... Sample PDF
Introduction, Classification and Implementation of Honeypots
$37.50
About the Contributors