Crisis Management: Concepts, Methodologies, Tools, and Applications: Concepts, Methodologies, Tools, and Applications

Front Cover
Management Association, Information Resources
IGI Global, Nov 30, 2013 - Technology & Engineering - 1862 pages
1 Review
Reviews aren't verified, but Google checks for and removes fake content when it's identified

Whether natural or man-made, disasters will inevitably occur, which is why organizations must be constantly alert and ready to meet any such challenges head-on.

Crisis Management: Concepts, Methodologies, Tools, and Applications explores the latest empirical research and best real-world practices for preventing, weathering, and recovering from disasters. From earthquakes and tsunamis to nuclear disasters and cyber terrorism, this extensive multi-volume compilation describes crisis management techniques for a variety of critical scenarios, providing leaders, managers, analysts, and workers with invaluable knowledge on how to recover swiftly from any crisis event.

 

What people are saying - Write a review

Reviews aren't verified, but Google checks for and removes fake content when it's identified
User Review - Flag as inappropriate

A word and a thought on our present course and transition.
We seem to be in a self perpetuating Crisis Driven Policy in our country. It has been exepted by those in power in
Washington as the new economic mechanisms of choice. It is being implemented in one form or another in on a daily basis. Most of the targets in this country are not even aware of injuries they have received by methodologies such as the ones in this $1500 book. stealth We are in a permanent state of Media indused stress.
Climate Chaos is playing its hand with help from science and NASA, NOAA and The US Air Force Weather Wing . TV Meteorologists along with The National Whether Service drive it home with there miraculous predictions 5 days out, with nonexistent fronts that appear on cue from a single point of origin. 300 year floods 4 times in the last 6 months is incredible weathermen skills.
Their are those men in office who know nothing, and there are those who know a great deal, and pretend to not know. These small men, who we have elected to office, that have made clear to us all , we have no say so anymore in this augmented reality 22nd Century active drills and risk assement processes. Its a matter that needs held in high regard as it relates to my future.
Control has been obtained over all local and national Media and some alternative media sources. Media matters when it relates to everyone's world view. At this point, most everyone is in a blind stupor and is unaware of how serious the lie has gotten
I laugh at The morning news now . It's almost predictable. The hosts are choosing to remain absolutely silent about the war on free thought and the total transformation of this nation . When the rest of my kind wake up, it will be of no consequence to the perpetrators.,
I love my country and I believe in our system of government with exception to some misguided laws in there present form. No matter the source, it is assured, that myself and those who care deeply of our nation's fait, will in good time be labeled as traitors, anti-government, or domestic terrorists.
The Truth, . . . I would never and have never, let a thought of violence enter into my minds eye. Words can hold a more lasting and powerful effect on the populous . Maybe not my words, But it is a fact, great words with conviction will withstand the test of time on a people that prove a hunger for its message.
 

Contents

Computer System Attacks
1
Wireless Sensor Network Security Attacks
25
Cybersecurity
60
Securing Wireless Ad Hoc Networks
81
An Overview of Cryptography
102
Security of Dependable Systems
131
Mobile Agents Security Protocols
166
Engineering Secure Web Services
203
The SocioEthical Considerations Surrounding Government Mandated LocationBased Services during Emergencies
918
Spectrum Sensing in Emergency Cognitive Radio Ad Hoc Networks
944
Eliciting Local Spatial Knowledge for CommunityBased Disaster Risk Management
961
The Blogosphere in the Land of Smiles
976
Initial Requirements of National Crisis Decision Support System
993
Supporting Domain Ontology through a Metamodel
1019
A Fuzzy Approach to Disaster Modeling
1038
Planning for Hurricane Isaac using Probability Theory in a Linear Programming Model
1056

Fortifying Large Scale Geospatial Networks
224
The Economic Crisis
247
US Financial Crisis Critique and the Statistical Predictability of a NYSE Portfolio
259
Regulatory and Policy Compliance with Regard to Identity Theft Prevention Detection and Response
280
Lessons from Major Incidents Influencing and Influenced by Telecoms Failures
311
Examining the Implications of Process and Choice for Strategic Decision Making Effectiveness
344
Relief Distribution Networks
360
Public Safety Networks
376
Organizational and Social Implications
394
Paradise to Peril
395
Challenges of Civil Military CooperationCoordination in Humanitarian Relief
399
WebBased MultiUser Distributed and Collaborative Environment Supporting Emergency and Relief Activities
425
Information Seeking and Retrieval Service for Crisis Response
446
Volunteered Geographic Information for Disaster Management
477
A Systems Framework for Modeling Health Disparities in the Prevalence in Chronic Conditions following a Natural Disaster Event
497
Exploring SocioTechnical Design of Crisis Management Information Systems
514
Sociotechnical Uses of Social Web Tools during Disasters
531
Information Security in Data and Storage Grids through GS3
542
Cyber Security in Liquid Petroleum Pipelines
559
Security of Railway Infrastructures
582
Attackers
606
Rethinking Ethics Education in Business Schools in the PostFinancial Crisis Epoch
624
A Critical Assessment of the Oath Project
639
Emergency Management Professional Development
651
Managerial Impact
666
Teaching Group Decision Making Skills to Emergency Managers via Digital Games
667
Nonparametric Correspondence Analysis of Global Risk Management Techniques
687
The Ways of Assessing the Security of Organization Information Systems through SWOT Analysis
712
Addressing the US Federal Government Financial Crisis
729
Enterprise Information Security Policies Standards and Procedures
750
Attack Graphs and Scenario Driven Wireless Computer Network Defense
774
Multilingual Crisis Knowledge Representation
792
The Effect of Crises on Leadership
804
Resilient Emergency Response
813
Reaching Citizen 20
839
Incident Command Situation Assessment Utilizing Video Feeds from UAVs
858
Tools and Technologies
875
Using an AgentBased Behavior Modeling for Finding Humanitarian Relief Center Location in an Earthquake Zone
876
Using Geospatial Web Services Holistically in Emergency Management
892
Soft Computing Modeling of Wild Fire Risk Indices
1073
A Forest Fire Detection System
1088
Security Issues on Outlier Detection and Countermeasure for Distributed Hierarchical Wireless Sensor Networks
1099
Secure Route Discovery in DSR against Black Hole Attacks in Mobile Ad Hoc Networks
1127
The Use of RFID Technologies for EEnabling Logistics Supply Chains
1145
Utilization and Application
1165
Malware Protection on RFIDEnabled Supply Chain Management Systems in the EPCglobal Network
1166
General Outlook on Financial Structure and Capital Adequacy of ISE30 Companies during Economic Crisis 20082009
1189
The Impact of Crises
1206
Economics and Practical Applications for Applied Trauma Theory
1222
Disaster Impact and Country Logistics Performance
1237
Risk Management in a Pandemic Crisis at a Global Non Profit Health Care Organization
1253
Media Management in Disaster Events
1271
Social Media New ICTs and the Challenges Facing the Zimbabwe Democratic Process
1281
Developing and Maintaining Trust in Hastily Formed Relief Networks
1302
City Networks in Cyberspace and Time
1325
School Districts Stumbled on Data Privacy
1346
Data Mining Techniques to Improve Early Warning Systems across the Bay of Bengal
1349
ICT Resilience as Dynamic Process and Cumulative Aptitude
1384
Emerging Trends
1421
Safety and Security in SCADA Systems Must be Improved through Resilience Based Risk Management
1422
Exercise24
1437
Business Continuity and Disaster Recovery Considerations for Healthcare Technology
1455
Crisis Management in the Public Sector
1463
Improving LongTerm Financial Risk Forecasts using HighFrequency Data and Scaling Laws
1473
Role of Accounting and Audit in the Recent Financial Crisis
1496
Intellectual Capital Explains a Countrys Resilience to Financial Crisis
1504
A Descriptive Approach for Power System Stability and Security Assessment
1527
Effective Infrastructure Protection through Virtualization
1546
A Proactive Defense Strategy to Enhance Situational Awareness in Computer Network Security
1569
Risk Assessment and Real Time Vulnerability Identification in IT Environments
1592
Performance Metrics and Models for Continuous Authentication Systems
1617
Security and Mobility Aspects of Femtocell Networks
1634
Security RisksVulnerability in a RFID System and Possible Defenses
1667
Identification and Authentication for RFID Systems
1682
Application of Cyber Security in Emerging C4ISR Systems
1705
Cyber Defense Competitions as Learning Tools
1739
Index
xxv
Copyright

Other editions - View all

Common terms and phrases

About the author (2013)

Information Resources Management Association (IRMA) is a research-based professional organization dedicated to advancing the concepts and practices of information resources management in modern organizations. IRMA's primary purpose is to promote the understanding, development and practice of managing information resources as key enterprise assets among IRM/IT professionals. IRMA brings together researchers, practitioners, academicians, and policy makers in information technology management from over 50 countries. [Editor]

Bibliographic information