Skip to main content

Cloud-Based Intelligence Aquisition and Processing for Crisis Management

  • Chapter
  • First Online:
Application of Social Media in Crisis Management

Abstract

Contemporary crisis management has to deal with complex socio-technical environments involving many interdependent elements. Many dependencies in such settings result in complex cascading processes that can have adverse effects on the population, environment, and economy. Adequate situation awareness and the capability to predict the development of a crisis situation under different circumstances is a critical element of effective, and timely, crisis management and response. However, this requires rich domain knowledge as complex interdependencies between different socio-technical elements must be understood. Furthermore, substantial domain knowledge is required for (1) determination of what data is relevant in a given situation, (2) the collection of that data, and (3) its analysis; i.e. all the information should be delivered to an expert that can understand that information. Note that domain knowledge is required to “drive” the information requests. Moreover, often multiple experts from different organizations need to be involved, as a single person cannot understand all aspects of the crisis, nor can he/she process all the relevant data. This implies delegation of work in cascaded collaborative systems (distributed awareness), where each expert works on a subset of the problem. The experts must collaborate to supply the decision makers the right information such that they can manage the crisis effectively. To do this effectively all the relevant data must be supplied to the right experts on time and, at the same time, information overload must be avoided. The data is relevant with respect to the task an expert is performing at a given time.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 79.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 99.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 139.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    In DPIF context can be a simple location, or an arbitrarily complex combination of attributes, such as location, time interval, service quality, etc.

  2. 2.

    The creation of new services will require some form of governance to ensure effective use of the defined service standards.

References

  1. Pescaroli, G., & Alexander, D. (2015). A definition of cascading disasters and cascading effects: Going beyond the ‘toppling dominos’ metaphor. GRF Davos Planet@Risk, 3(1), 58–67.

    Google Scholar 

  2. Koraeus, M., & Stern, E. (2013). Exploring the crisis management/knowledge management nexus. In B. Akhgar, & S. Yates (Eds.), Strategic intelligence management (Chap. 12, pp. 134–149). Butterworth-Heinemann. Retrieved from http://www.sciencedirect.com/science/article/pii/B9780124071919000120.

  3. Pavlin, G., Kamermans, M., & Scafes, M. (2010). Dynamic process integration framework: Toward efficient information processing in complex distributed systems. Informatica, 34, 477–490.

    Google Scholar 

  4. Penders, A., Pavlin, G., & Kamermans, M. (2011). A collaborative approach to construction of complex service oriented systems. Intelligent Distributed Computing IV, 315, 55–66.

    Google Scholar 

  5. Pavlin, G., de Oude, P., & Penders, A. (2015). A process integration method and framework. European Patent WO2015101473. Retrieved from http://worldwide.espacenet.com/publicationDetails/biblio?II=1&ND=3&adjacent=true&locale=en_EP&FT=D&date=20150709&CC=WO&NR=2015101473A1&KC=A1.

  6. Bell, D. E., & Padula, L. J. L. (1976). Secure computer system: Unified exposition and MULTICS interpretation. Report ESD-TR-75-306. The MITRE Corporation.

    Google Scholar 

  7. Biba, K. J. (1976). Integrity considerations for secure computer systems. Technical Report MTR-3153 Rev 1. Report ESD-TR-76-372. Bedford, MA: MITRE Corporation.

    Google Scholar 

  8. Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996). Role-based access control models. IEEE Computer, 29(2), 38–47.

    Article  Google Scholar 

  9. U. S. Department of Defense. (1983). Trusted computer system criteria. Technical Report CSC-STD-001-83, U. S. National Computer Security Center Known as “The Orange Book”.

    Google Scholar 

  10. Foley, S. N., Mulcahy, B. P., Quillinan, T. B., O’Connor, M., & Morrison, J. P. (2006). Supporting heterogeneous middleware security policies in webcom. Journal of High Speed Networks: Special Issue on Security Policy Management, 15(3), 301–313. IOS Press.

    Google Scholar 

  11. Foster, I., & Kesselman, C. (1997). Globus: A metacomputing infrastructure toolkit. The International Journal of Supercomputer Applications and High Performance Computing, 11(2), 115–128.

    Article  Google Scholar 

  12. Kagal, L., Finin, T., & Joshi, A. (2003). A policy based approach to security for the semantic web. In Proceedings of the 2nd International Semantic Web Conference (ISWC2003), Sanibel Island, FL. Springer.

    Google Scholar 

  13. White, B. S., Walker, M., Humphrey, M., & Grimshaw, A. S. (2001). LegionFS: A secure and scalable file system supporting cross-domain high-performance applications. In SC2001: High Performance Networking and Computing, Denver, CO.

    Google Scholar 

  14. Iacob, S. M., Quillinan, T. B., & Van Veelen, J. B. (2015). A data securing system and method. European Patent WO2015101474.

    Google Scholar 

  15. Pavlin, G., Quillinan, T., Mignet, F., & de Oude, P. (2013). Exploiting intelligence for national security. In B. Akhgar, & S. Yates (Eds.), Strategic intelligence management (Chap. 15, pp. 181–198). Butterworth-Heinemann. Retrieved from http://www.sciencedirect.com/science/article/pii/B9780124071919000156.

  16. Thales Nederlands B. V. (2015). Martello: Information security by design. Retrieved from https://www.thalesgroup.com/en/martello.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Patrick de Oude .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2017 Springer International Publishing AG

About this chapter

Cite this chapter

de Oude, P., Pavlin, G., Quillinan, T., Jeraj, J., Abouhafc, A. (2017). Cloud-Based Intelligence Aquisition and Processing for Crisis Management. In: Akhgar, B., Staniforth, A., Waddington, D. (eds) Application of Social Media in Crisis Management. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-319-52419-1_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-52419-1_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-52418-4

  • Online ISBN: 978-3-319-52419-1

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics