2015 IEEE International Conference on Computer and Information Technology; Ubiquitous Computing and Communications; Dependable, 2015
DOI: 10.1109/cit/iucc/dasc/picom.2015.141
|View full text |Cite
|
Sign up to set email alerts
|

A Reliable Crisis Information System to Share Data after the Event of a Large-Scale Disaster

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2016
2016
2020
2020

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 10 publications
0
2
0
Order By: Relevance
“…However, these SAR guidelines do not characterize the information items needed by first responders to obtain the overview of the situation (Departmentet;FEMA, 2006). Many frameworks that capture information needs were developed for disaster management, especially for situational awareness during the response phase (Cinque, Esposito, Fiorentino et al, 2015;Comes, 2011;Comes, Wijngaards, & Van de Walle, 2015;George Stephen, 2010;Han Liangxiu, 2010;Lazreg, Radianti, & Granmo, 2015;Li, Becerik-Gerber, Krishnamachari, & Soibelman, 2014;Liang & Gao, 2010;Nunavath, Radianti, Comes et al, 2015;Upadhyay Rochan, 2008;. Some of these studies focused on improving information sharing and coordination among different first responders (Bharosa, Lee, & Janssen, 2010;Bharosa, Lee, Janssen et al, 2009;Chen, Sharman, Rao et al, 2007;Ley et al, 2014;Salmon, Stanton, Jenkins et al, 2011;Schryen, Rauchecker, & Comes, 2015;Van de Walle, Brugghemans, & Comes, 2016;Wex, Schryen, & Neumann, 2011;Zhang, 2011).…”
Section: Related Workmentioning
confidence: 99%
“…However, these SAR guidelines do not characterize the information items needed by first responders to obtain the overview of the situation (Departmentet;FEMA, 2006). Many frameworks that capture information needs were developed for disaster management, especially for situational awareness during the response phase (Cinque, Esposito, Fiorentino et al, 2015;Comes, 2011;Comes, Wijngaards, & Van de Walle, 2015;George Stephen, 2010;Han Liangxiu, 2010;Lazreg, Radianti, & Granmo, 2015;Li, Becerik-Gerber, Krishnamachari, & Soibelman, 2014;Liang & Gao, 2010;Nunavath, Radianti, Comes et al, 2015;Upadhyay Rochan, 2008;. Some of these studies focused on improving information sharing and coordination among different first responders (Bharosa, Lee, & Janssen, 2010;Bharosa, Lee, Janssen et al, 2009;Chen, Sharman, Rao et al, 2007;Ley et al, 2014;Salmon, Stanton, Jenkins et al, 2011;Schryen, Rauchecker, & Comes, 2015;Van de Walle, Brugghemans, & Comes, 2016;Wex, Schryen, & Neumann, 2011;Zhang, 2011).…”
Section: Related Workmentioning
confidence: 99%
“…As another example, consider large-scale disaster recovery scenarios, such as the WannaCry worldwide ransomware attack in May 2017. In such a scenario, several crisis information systems belonged to different organizations need to share their private data in order to provide Cyber Threat Intelligence (CTI) to take timely actions [8]. It should be noted that, though in these (and other similar) scenarios, collaborative data sharing is necessary, at the same time, preserving privacy of individuals, and confidentiality of the business data is also important [16].…”
Section: Introductionmentioning
confidence: 99%