Skip to main content

A Maturity Model for IT Dependability in Emergency Management

  • Conference paper
Product-Focused Software Process Improvement (PROFES 2010)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6156))

Abstract

In many organisations a gap exists between IT management and emergency managemement. This paper illustrates how process improvement based on a maturity model can be used to help organisations to evaluate and improve the way they include IT dependability information in their emergency management. This paper presents the IDEM3 (IT Dependability in Emergency Management Maturity Model) process improvement framework which focuses especially on the cooperation between IT personnel, emergency managers, and users, to proactively prevent IT dependability problems when the IT systems are most critical in emergency situations. This paper describes the details of the framework, how the framework was developed and its relation to other maturity models in related fields.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Santos, R.S., Borges, M.R.S., Gomes, J.O., Canós, J.H.: Maturity levels of information technologies in emergency response organizations. In: Briggs, R.O., Antunes, P., de Vreede, G.-J., Read, A.S. (eds.) CRIWG 2008. LNCS, vol. 5411, pp. 135–150. Springer, Heidelberg (2008)

    Chapter  Google Scholar 

  2. Fleming, M.: Safety culture maturity model. Offshore Technology Report, 2000/049, HSE Books, Norwich, UK (2001)

    Google Scholar 

  3. Zimmerman, R., Restrepo, C.: Information technology (IT) and critical infrastructure interdependencies for emergency response. In: Proceedings of the 3rd International Information Systems for Crisis Response and Management (ISCRAM) Conference (2006)

    Google Scholar 

  4. SEMA: Basic Level for IT Security. SEMA recommends 2003:2. Swedish Emergency Management Agency (2003)

    Google Scholar 

  5. Weyns, K., Höst, M.: Dependability of IT systems in municipal emergency management. In: Proceedings of the 2009 Information Systems for Crisis Response and Management (ISCRAM) Conference (2009)

    Google Scholar 

  6. Office of Government Commerce: Information Technology Infrastructure Library, Version 3 (2007)

    Google Scholar 

  7. ISACA: Control objectives for information and related technologies (COBIT) (3rd edn.) (2000)

    Google Scholar 

  8. International Organization for Standardization: ISO-IEC 27002: Information technology - Security techniques - Code of practice for information security management (2005)

    Google Scholar 

  9. Frühwirth, C.: On business-driven IT security management and mismatches between security requirements in firms, industry standards and research work. In: Bomarius, F., Oivo, M., Jaring, P., Abrahamsson, P. (eds.) PROFES. Lecture Notes in Business Information Processing, vol. 32, pp. 375–385. Springer, Heidelberg (2009)

    Google Scholar 

  10. Konrad, M., Chrissis, M.B., Ferguson, J., Garcia, S., Hefley, B., Kitson, D., Paulk, M.: Capability maturity modeling at the SEI. Software Process: Improvement and Practice 2, 21–34 (1996)

    Article  Google Scholar 

  11. Caralli, R.A.: Introducing the CERT resiliency engineering framework improving the security and sustainability processes. Carnegie Mellon University, Software Engineering Institute, Pittsburgh, PA (2007)

    Google Scholar 

  12. Luftman, J.: Managing the Information Technology Resource: Leadership in the Information Age. Prentice-Hall, Englewood Cliffs (2003)

    Google Scholar 

  13. Strutt, J., Sharp, J., Terry, E., Miles, R.: Capability maturity models for offshore organisational management. Environment International 32, 1094–1105 (2006)

    Article  Google Scholar 

  14. Bhamidipaty, A., Lotlikar, R., Banavar, G.: RMI: a framework for modeling and evaluating the resiliency maturity of IT service organizations. In: IEEE International Conference on Services Computing (SCC 2007), pp. 300–307 (2007)

    Google Scholar 

  15. SEI: Capability Maturity Model Integration, Version 1.2. Volume CMU/SEI-2006-TR-008(2008). Carnegie Mellon Software Engineering Institute (2008)

    Google Scholar 

  16. Ågerfalk, P.J.: Grounding through operationalization - constructing tangible theory in IS research. In: Proceedings European Conference on Information Systems (ECIS 2004) (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2010 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Weyns, K., Höst, M., Helgesson, Y.L. (2010). A Maturity Model for IT Dependability in Emergency Management. In: Ali Babar, M., Vierimaa, M., Oivo, M. (eds) Product-Focused Software Process Improvement. PROFES 2010. Lecture Notes in Computer Science, vol 6156. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-13792-1_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-13792-1_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-13791-4

  • Online ISBN: 978-3-642-13792-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics