Abstract
Contemporary crisis management has to deal with complex socio-technical environments involving many interdependent elements. Many dependencies in such settings result in complex cascading processes that can have adverse effects on the population, environment, and economy. Adequate situation awareness and the capability to predict the development of a crisis situation under different circumstances is a critical element of effective, and timely, crisis management and response. However, this requires rich domain knowledge as complex interdependencies between different socio-technical elements must be understood. Furthermore, substantial domain knowledge is required for (1) determination of what data is relevant in a given situation, (2) the collection of that data, and (3) its analysis; i.e. all the information should be delivered to an expert that can understand that information. Note that domain knowledge is required to “drive” the information requests. Moreover, often multiple experts from different organizations need to be involved, as a single person cannot understand all aspects of the crisis, nor can he/she process all the relevant data. This implies delegation of work in cascaded collaborative systems (distributed awareness), where each expert works on a subset of the problem. The experts must collaborate to supply the decision makers the right information such that they can manage the crisis effectively. To do this effectively all the relevant data must be supplied to the right experts on time and, at the same time, information overload must be avoided. The data is relevant with respect to the task an expert is performing at a given time.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
In DPIF context can be a simple location, or an arbitrarily complex combination of attributes, such as location, time interval, service quality, etc.
- 2.
The creation of new services will require some form of governance to ensure effective use of the defined service standards.
References
Pescaroli, G., & Alexander, D. (2015). A definition of cascading disasters and cascading effects: Going beyond the ‘toppling dominos’ metaphor. GRF Davos Planet@Risk, 3(1), 58–67.
Koraeus, M., & Stern, E. (2013). Exploring the crisis management/knowledge management nexus. In B. Akhgar, & S. Yates (Eds.), Strategic intelligence management (Chap. 12, pp. 134–149). Butterworth-Heinemann. Retrieved from http://www.sciencedirect.com/science/article/pii/B9780124071919000120.
Pavlin, G., Kamermans, M., & Scafes, M. (2010). Dynamic process integration framework: Toward efficient information processing in complex distributed systems. Informatica, 34, 477–490.
Penders, A., Pavlin, G., & Kamermans, M. (2011). A collaborative approach to construction of complex service oriented systems. Intelligent Distributed Computing IV, 315, 55–66.
Pavlin, G., de Oude, P., & Penders, A. (2015). A process integration method and framework. European Patent WO2015101473. Retrieved from http://worldwide.espacenet.com/publicationDetails/biblio?II=1&ND=3&adjacent=true&locale=en_EP&FT=D&date=20150709&CC=WO&NR=2015101473A1&KC=A1.
Bell, D. E., & Padula, L. J. L. (1976). Secure computer system: Unified exposition and MULTICS interpretation. Report ESD-TR-75-306. The MITRE Corporation.
Biba, K. J. (1976). Integrity considerations for secure computer systems. Technical Report MTR-3153 Rev 1. Report ESD-TR-76-372. Bedford, MA: MITRE Corporation.
Sandhu, R. S., Coyne, E. J., Feinstein, H. L., & Youman, C. E. (1996). Role-based access control models. IEEE Computer, 29(2), 38–47.
U. S. Department of Defense. (1983). Trusted computer system criteria. Technical Report CSC-STD-001-83, U. S. National Computer Security Center Known as “The Orange Book”.
Foley, S. N., Mulcahy, B. P., Quillinan, T. B., O’Connor, M., & Morrison, J. P. (2006). Supporting heterogeneous middleware security policies in webcom. Journal of High Speed Networks: Special Issue on Security Policy Management, 15(3), 301–313. IOS Press.
Foster, I., & Kesselman, C. (1997). Globus: A metacomputing infrastructure toolkit. The International Journal of Supercomputer Applications and High Performance Computing, 11(2), 115–128.
Kagal, L., Finin, T., & Joshi, A. (2003). A policy based approach to security for the semantic web. In Proceedings of the 2nd International Semantic Web Conference (ISWC2003), Sanibel Island, FL. Springer.
White, B. S., Walker, M., Humphrey, M., & Grimshaw, A. S. (2001). LegionFS: A secure and scalable file system supporting cross-domain high-performance applications. In SC2001: High Performance Networking and Computing, Denver, CO.
Iacob, S. M., Quillinan, T. B., & Van Veelen, J. B. (2015). A data securing system and method. European Patent WO2015101474.
Pavlin, G., Quillinan, T., Mignet, F., & de Oude, P. (2013). Exploiting intelligence for national security. In B. Akhgar, & S. Yates (Eds.), Strategic intelligence management (Chap. 15, pp. 181–198). Butterworth-Heinemann. Retrieved from http://www.sciencedirect.com/science/article/pii/B9780124071919000156.
Thales Nederlands B. V. (2015). Martello: Information security by design. Retrieved from https://www.thalesgroup.com/en/martello.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2017 Springer International Publishing AG
About this chapter
Cite this chapter
de Oude, P., Pavlin, G., Quillinan, T., Jeraj, J., Abouhafc, A. (2017). Cloud-Based Intelligence Aquisition and Processing for Crisis Management. In: Akhgar, B., Staniforth, A., Waddington, D. (eds) Application of Social Media in Crisis Management. Transactions on Computational Science and Computational Intelligence. Springer, Cham. https://doi.org/10.1007/978-3-319-52419-1_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-52419-1_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-52418-4
Online ISBN: 978-3-319-52419-1
eBook Packages: EngineeringEngineering (R0)