|Total results: 244||
|Crisis Management: Concepts, Methodologies, Tools and Applications
Information Resources Management Association.
Whether natural or man-made, disasters will inevitably occur, which is why organizations must be constantly alert and ready to meet any such challenges head-on.
Crisis Management: Concepts, Methodologies, Tools, and Applications explores the latest empirical research and best real-world practices for...
Computer System Attacks
The study of computer system attacks is an important part RFID security and privacy. This chapter provides a general overview of computer system attacks organized by target. Attacks on EPC entities - tags, readers, middleware, and back-end systems - are categorized and discussed, as well as wired link...
Wireless Sensor Network Security Attacks: A Survey
Dennis P. Mirante, Habib M. Ammari.
Wireless Sensor Networks (WSNs) are a rapidly growing area for research and commercial development. Originally used in military applications, their commercialization offers potential low cost solutions for real-world monitoring and process control. Since they may be deployed in hostile, unattended...
Cybersecurity: The New Challenge of the Information Society
Claudia Canongia, Raphael Mandarino.
This chapter introduces the theme of cybersecurity, its importance in the actual scenario, and the challenges of the new Information Society, whose critical development factors are the technological revolution and innovation. The revolution that the information and communications technologies (ICTs)...
Securing Wireless Ad Hoc Networks: State of the Art and Challenges
The wireless technologies are bringing significant changes to data networking and telecommunication services, making integrated networks a reality. By removing the wires, personal networks, local area networks, mobile radio networks, and cellular systems, offer an entirely distributed mobile computing...
An Overview of Cryptography
Ehsan Vahedi, Vincent W.S. Wong, Ian F. Blake.
As Radio Frequency Identification (RFID) devices become ever more ubiquitous it is very likely that demands on them to provide certain types of security such as authentication, confidentiality, and privacy and encryption for security, depending on the application, will increase. This chapter gives a...
Security of Dependable Systems
Naveed Ahmed, Christian Damsgaard Jensen.
Security and dependability are crucial for designing trustworthy systems. The approach “security as an add-on” is not satisfactory, yet the integration of security in the development process is still an open problem. Especially, a common framework for specifying dependability and security is very much...
Mobile Agents Security Protocols
Raja Al-Jaljouli, Jemal H. Abawajy.
Mobile agents are expected to run in partially unknown and untrustworthy environments. They transport from one host to another host through insecure channels and may execute on non-trusted hosts. Thus, they are vulnerable to direct security attacks of intruders and non-trusted hosts. The security of...
Engineering Secure Web Services
Douglas Rodrigues, Julio Cezar Estrella, Francisco José Monaco, Kalinka Regina Lucas Jaquie Castelo Branco, Nuno Antunes, Marco Vieira.
Web services are key components in the implementation of Service Oriented Architectures (SOA), which must satisfy proper security requirements in order to be able to support critical business processes. Research works show that a large number of web services are deployed with significant security...
The Economic Crisis: The Result of Reducing the Systemic Links
Daniel Belingher, Cantemir Adrian Calin.
The current chapter shows the gap between the real economy and the financial markets in the United States during the pre-crisis period at the end of 2007, as well as during the subsequent crisis period. The current research chapter also emphasizes the catastrophic effect that financial markets had...
Lessons from Major Incidents Influencing and Influenced by Telecoms Failures
Chris W. Johnson.
Previous studies have proposed new methodologies for the protection of national critical infrastructures without grounding their proposals in a detailed analysis of previous contingencies. This chapter provides the background for subsequent parts of this book by summarising previous telecom-related...
Examining the Implications of Process and Choice for Strategic Decision Making Effectiveness
Paul L. Drnevich, Thomas H. Brush, Alok Chaturvedi.
Most strategic decision-making (SDM) approaches advocate the importance of decision-making processes and response choices for obtaining effective outcomes. Modern decision-making support system (DMSS) technology is often also needed for complex SDM, with recent research calling for more integrative...
Relief Distribution Networks: Design and Operations
Logistics area is often recognized as one of the key elements in achieving effective disaster preparedness and response efforts. This chapter presents modeling and solution approaches for both the problem of prepositioning emergency supplies prior to a disaster as well as the problem of their...
Public Safety Networks
Giuliana Iapichino, Daniel Câmara, Christian Bonnet, Fethi Filali.
Disaster can be defined as the onset of an extreme event causing profound damage or loss as perceived by the afflicted people. The networks built in order to detect and handle these events are called Public safety networks (PSNs). These networks have the fundamental role of providing communication and...
Paradise to Peril: Humanistic Uncertainty during Hurricanes Isaac and Katrina
This is a brief personal account of the human failures and social impacts from hurricane Katrina as contrasted with the improved risk management planning in advance of Hurricane Isaac. This paper is a unique first person account of a disaster. It presents the authors personal experiences during the...
Challenges of Civil Military Cooperation/Coordination in Humanitarian Relief
The term civil military coordination (CIMIC) suggests the seamless division of labor between aid workers and international military forces. The images of humanitarian organizations distributing food and medicines under the protection of military forces, or aid workers and military working together to...
Information Seeking and Retrieval Service for Crisis Response
Nong Chen, Ajantha Dahanayake.
Crisis response involves handling information intensive processes, and coordination of large quantities of information from and for different relief-response organizations. The information needs and responses of such organizations are closely related to the situations and roles these organizations are...
Volunteered Geographic Information for Disaster Management
Doris Dransch, Kathrin Poser, Joachim Fohringer, Christian Lucas.
The amount of information generated and provided by citizens via the World Wide Web is constantly growing. Citizens share information, thoughts, and experiences in blogs and contribute information to web-based content sharing platforms, collaboratively created data bases that are freely usable by...
Exploring Socio-Technical Design of Crisis Management Information Systems
Dan Harnesk, John Lindström.
In this chapter, we explore design foundations and conceptualize a design approach to examine the socio-technical knowledge that crisis organizations have about crisis management Information Systems. We use findings from a case study across four crisis organizations to illustrate how the network of...
Sociotechnical Uses of Social Web Tools during Disasters
Social web tools are being leveraged by participants to communicate throughout their workday as well as during times of crisis. Using the London Bombings of 7 July 2005 as a case study, this chapter illustrates the need for sociotechnical interventions in systems design. By employing Actor Network...