Skip to main content

Defining Requirements and Applying Information Modeling for Protecting Enterprise Assets

  • Chapter
  • 921 Accesses

The advent of terrorist threats has heightened local, regional, and national governments' interest in emergency response and disaster preparedness. The threat of natural disasters also challenges emergency responders to act swiftly and in a coordinated fashion. When a disaster occurs, an ad hoc coalition of pre-planned groups usually forms to respond to the incident. History has shown that these “system of systems” do not interoperate very well. Communications between fire, police and rescue components either do not work or are inefficient. Government agencies, non-governmental organizations (NGOs), and private industry use a wide array of software platforms for managing data about emergency conditions, resources and response activities. Most of these are stand-alone systems with very limited capability for data sharing with other agencies or other levels of government. Information technology advances have facilitated the movement towards an integrated and coordinated approach to emergency management. Other communication mechanisms, such as video teleconferencing, digital television and radio broadcasting, are being utilized to combat the challenges of emergency information exchange. Recent disasters, such as Hurricane Katrina and the tsunami in Indonesia, have illuminated the weaknesses in emergency response. This paper will discuss the need for defining requirements for components of ad hoc coalitions which are formed to respond to disasters. A goal of our effort was to develop a proof of concept that applying information modeling to the business processes used to protect and mitigate potential loss of an enterprise was feasible. These activities would be modeled both pre- and post-incident.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD   169.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Carsten T (2003) Systems Engineering Development Process. Airbus/Universitat Oldenburg, System Engineering Lecture 2 -v1, May 2003

    Google Scholar 

  2. http://www.weirtechna.com/weir/techna/home.nsf/page/Case\_Study\_System\ _Engineering

  3. Boehm B (2005) Teaching the Elephant to Dance: Agility Meets Systems of Systems Engineering and Acquisition. Keynote, GSAW, 3 March 2005

    Google Scholar 

  4. Barton DL, Fortier SC (1997) Using a Systems Description Language for Complete Avionics Systems. In: Proceedings of AUTOTESTCON, IEEE Computer Society Press, Anaheim, CA

    Google Scholar 

  5. http://www.ittc.ku.edu/Projects/rosetta/

  6. http://www.ittc.ke.edu/Projects/SLDG/projects/project-rosetta.htm

  7. Alexander P, Kamath R, Barton DL, Fortier SC (1999) Facets and Domains in Rosetta. Published in the Proceedings of the Forum on Design Languages, September 1999, Lyon, France

    Google Scholar 

  8. http://www.whitehouse.gov/reports/katrina-lessons-learned/

  9. Alexander P, System Specification Using Rosetta. PowerPoint Slides Provided by the author

    Google Scholar 

  10. Kong C, Kimmell G, Streb J, Alexander P (2005) Semantic Support for Model Composition. Submitted to Integrated Formal Methods

    Google Scholar 

  11. Harrald J (2006) Class Notes from EMSE 332 Course at George Washington University. 13 April 2006

    Google Scholar 

  12. DeLaurentis D, Callaway R, A System-of-Systems Perspective for Public Policy Decisions. Review for Policy Research, 4th Quarter Edition

    Google Scholar 

  13. Popper S et al. (2004) System of Systems Symposium: Report on a Summer Conversation. Potomac Institute for Policy Studies, Arlington, VA, July 2004

    Google Scholar 

  14. Morris E et al. (2004) System of Systems Interoperability (SOSI). Final Report, Technical Report, CMU/SEI-2004-TR-004, April 2004

    Google Scholar 

  15. Clark T, Jones R (1999) Organisational Interoperability Maturity Model for C2. In: Command & Control Research & Technology Symposium, U.S. Naval War College, Newport, RI, 22 June — 1 July, 1999

    Google Scholar 

  16. FIPS Publication 183 (1993) IDEFO as a Standard for Function Modeling. The National Institute of Standards and Technology (NIST), December 1993

    Google Scholar 

  17. ISO Standard 10303-1 (1994) Industrial Automation Systems and Integration - Product Data Representation and Exchange — Part 1: Overview and Fundamental Principles,http://www.iso.org/iso/en/CatalogueDetailPage.CatalogueDetail? CSNUMBER= 20579\&ICS1=25\&ICS2=40\&ICS3=40

  18. Fortier SC, Michael JB (1993) A Risk-Based Approach to Cost-Benefit Analysis of Software Safety Activities. COMPASS '93, Proceedings of the Eight Annual Conference on Computer Assurance, NIST, June 1993

    Google Scholar 

  19. Bird FE Jr, Loftus RG (1976) LO$$ Control Management. Institute Press, Canada

    Google Scholar 

  20. http://niem.gov/aboutniem.htm

  21. http://grouper.ieee.org/groups/scc32/imwg/

  22. Effective Disaster Warnings.http://www.sdr.gov/reports.html

  23. http://www.eic.org/

  24. http://it.ojp.gov/topic.jsp?topic\_id=43

  25. Risk Analysis and Management for Critical Asset Protection (RAMCAP). ASME Innovative Technologies Institute, Washington, DC, Version 1.1e, October 23, 2005

    Google Scholar 

  26. http://www.americanchemistry.com/s\_acc/sec\_mediakits.asp?CID=258&DID= 632

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2009 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Fortier, S.C., Volk, J.H. (2009). Defining Requirements and Applying Information Modeling for Protecting Enterprise Assets. In: Machado, J.A.T., Pátkai, B., Rudas, I.J. (eds) Intelligent Engineering Systems and Computational Cybernetics. Springer, Dordrecht. https://doi.org/10.1007/978-1-4020-8678-6_26

Download citation

  • DOI: https://doi.org/10.1007/978-1-4020-8678-6_26

  • Publisher Name: Springer, Dordrecht

  • Print ISBN: 978-1-4020-8677-9

  • Online ISBN: 978-1-4020-8678-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics