You are previewing Crisis Management.
O'Reilly logo
Crisis Management

Book Description

Whether natural or man-made, disasters will inevitably occur, which is why organizations must be constantly alert and ready to meet any such challenges head-on. Crisis Management: Concepts, Methodologies, Tools, and Applications explores the latest empirical research and best real-world practices for preventing, weathering, and recovering from disasters. From earthquakes and tsunamis to nuclear disasters and cyber terrorism, this extensive multi-volume compilation describes crisis management techniques for a variety of critical scenarios, providing leaders, managers, analysts, and workers with invaluable knowledge on how to recover swiftly from any crisis event.

Table of Contents

  1. Cover
  2. Title Page
  3. Copyright Page
  4. Editorial Advisory Board and List of Reviewers
    1. Editor-in-Chief
    2. Associate Editors
    3. Editorial Advisory Board
  5. Preface
  6. Section 1: Fundamental Concepts and Theories
    1. Chapter 1: Computer System Attacks
      1. ABSTRACT
      2. INTRODUCTION
      3. ATTACKS ON TAGS
      4. ATTACKS ON READERS
      5. ATTACKS ON MIDDLEWARE
      6. ATTACKS ON BACK-END SYSTEMS
      7. ATTACKS ON WIRED LINKS
      8. DOS ATTACKS
      9. CONCLUSION
      10. FUTURE RESEARCH DIRECTIONS
    2. Chapter 2: Wireless Sensor Network Security Attacks
      1. ABSTRACT
      2. INTRODUCTION
      3. CHARACTERISTICS OF WIRELESS SENSOR NETWORKS AFFECTING SECURITY
      4. SECURITY REQUIREMENTS
      5. GENERIC WSN ATTACKS
      6. CLASSIFICATION OF SPECIFIC WSN ATTACKS
      7. PASSIVE ATTACKS
      8. ACTIVE ATTACKS
      9. INTRUSION DETECTION
      10. FUTURE RESEARCH DIRECTIONS
      11. LESSONS LEARNED
      12. CONCLUSION
    3. Chapter 3: Cybersecurity
      1. ABSTRACT
      2. INTRODUCTION
      3. UNDERSTANDING CYBERSECURITY
      4. WHY CYBERSECURITY IS A HOT TOPIC: AN OVERVIEW
      5. USA AND UNITED KINGDOM NATIONAL STRATEGIES
      6. CASE OF STUDY: BRAZILIAN GOVERNMENT-FIRST STEPS ON THE PATH TOWARDS CYBERSECURITY
      7. FINAL CONSIDERATIONS
    4. Chapter 4: Securing Wireless Ad Hoc Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ATTACKS AND INTRUSIONS IN WIRELESS AD HOC NETWORKS
      5. INTRUSION DETECTION SYSTEMS FOR WIRELESS AD HOC NETWORKS
      6. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
    5. Chapter 5: An Overview of Cryptography
      1. ABSTRACT
      2. INTRODUCTION
      3. NUMBER THEORETIC PRELIMINARIES
      4. A CRYPTOGRAPHIC TOOLKIT
      5. ONE-WAY PROBLEMS FOR CRYPTOGRAPHY
      6. CRYPTOGRAPHIC PROTOCOLS
      7. LIGHTWEIGHT CRYPTOGRAPHY
      8. CONCLUSION
    6. Chapter 6: Security of Dependable Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SYSTEM SECURITY
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    7. Chapter 7: Mobile Agents Security Protocols
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MOBILE AGENT SECURITY
      5. MOBILE AGENT SECURITY PROTOCOLS
      6. RECENT PROMISING SECURITY PROTOCOLS
      7. PROTOCOL DESIGN SECURITY FRAMEWORKS
      8. CONCLUSION
    8. Chapter 8: Engineering Secure Web Services
      1. ABSTRACT
      2. INTRODUCTION
      3. SECURITY STANDARDS AND PROTOCOLS FOR WEB SERVICES
      4. ATTACKS IN WEB SERVICES
      5. ASSESSING THE SECURITY OF WEB SERVICES
      6. CONCLUSION AND FUTURE RESEARCH ISSUES
    9. Chapter 9: Fortifying Large Scale, Geospatial Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PROTECTION PLANNING
      5. APPLICATION RESULTS
      6. DISCUSSION
      7. IMPLICATIONS FOR SCADA
      8. CONCLUSION
    10. Chapter 10: The Economic Crisis
      1. ABSTRACT
      2. INTRODUCTION: HOW IT ALL BEGAN
      3. PHASE 1: CREDIT CRISIS IN THE MORTGAGE MARKETS
      4. PHASE 2: THE CRISIS SPREADS–LIQUIDITY RISK
      5. PHASE 3: THE LEHMAN FAILURE
      6. THE SYSTEMIC IMBALANCE
      7. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
    11. Chapter 11: US Financial Crisis Critique and the Statistical Predictability of a NYSE Portfolio
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. CONCLUSION
      5. APPENDIX
    12. Chapter 12: Regulatory and Policy Compliance with Regard to Identity Theft Prevention, Detection, and Response
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. REGULATORY COMPLIANCE
      5. POLICIES FOR PREVENTING IDENTITY THEFT
      6. POLICIES FOR RESPONDING TO IDENTITY THEFT
      7. POLICY COMPLIANCE
      8. AUDITING
      9. DISCUSSIONS AND FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
    13. Chapter 13: Lessons from Major Incidents Influencing and Influenced by Telecoms Failures
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE IMPACT OF BLACKOUTS ON TELECOM INFRASTRUCTURES
      5. THE IMPACT OF NATURAL DISASTERS ON TELECOM INFRASTRUCTURES
      6. THE IMPACT OF TERRORIST ATTACKS ON TELECOM INFRASTRUCTURES
      7. THE IMPACT OF ICT INFRASTRUCTURE PROBLEMS
      8. CYBER-ATTACKS ON ICT INFRASTRUCTURES
      9. FUTURE RESEARCH DIRECTIONS
      10. CONCLUSION
    14. Chapter 14: Examining the Implications of Process and Choice for Strategic Decision Making Effectiveness
      1. ABSTRACT
      2. INTRODUCTION
      3. THEORY DEVELOPMENT
      4. ANALYTICAL CONSIDERATIONS
      5. DISCUSSION OF RESULTS
      6. CONCLUSION
      7. LIMITATIONS AND FUTURE RESEARCH
      8. APPENDIX
    15. Chapter 15: Relief Distribution Networks
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. HANDLING THE PARTICULARITIES OF RELIEF DISTRIBUTION NETWORKS
      4. 3. LITERATURE REVIEW
      5. 4. METHODOLOGICAL FRAMEWORK
      6. 5. CONCLUSION
    16. Chapter 16: Public Safety Networks
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. EMERGENCY MANAGEMENT PHASES
      4. 3 IMPORTANT FACTORS FOR IN EMERGENCY SITUATIONS
      5. 4. TERRESTRIAL AND SATELLITE PUBLIC SAFETY SYSTEMS FOR EMERGENCY COMMUNICATIONS: STATE OF THE ART
      6. 5. FUTURE RESEARCH DIRECTIONS
      7. 6. CONCLUSION
  7. Section 2: Organizational and Social Implications
    1. Chapter 17: Paradise to Peril
      1. ABSTRACT
      2. INTRODUCTION
      3. DISCUSSION
      4. CONCLUSION
    2. Chapter 18: Challenges of Civil Military Cooperation/Coordination in Humanitarian Relief
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. NEW BEGINNING
      5. CHALLENGES FOR CIVIL MILITARY COOPERATION/COORDINATION IN HUMANITARIAN RELIEF
      6. SOLUTIONS AND RECOMMENDATIONS
      7. FUTURE RESEARCH DIRECTIONS
      8. CONCLUSION
    3. Chapter 19: Web-Based Multi-User Distributed and Collaborative Environment Supporting Emergency and Relief Activities
      1. ABSTRACT
      2. INTRODUCTION
      3. COOPERATION AND COORDINATION: THE NEED
      4. TELECOOPERATION AS A NEW COLLABORATIVE PARADIGM
      5. TELECOOPERATION AND THE ROLE OF THE OPEN NETWORK
      6. ICTs FOR EMERGENCY AND RELIEF ACTIVITIES
      7. THE ROLE OF ICTs IN SUPPORTING HUMANITARIAN DEMINING NEEDS
      8. TELECOOPERATIVE ENVIRONMENT FOR HUMANITARIAN DEMINING
      9. DISTRIBUTED AND COLLABORATIVE INTELLIGENT ENVIRONMENT (DCIE)
      10. WEB-BASED INTELLIGENT MULTI-USER INTERFACE
      11. ACTORS ASSOCIATED WITH HUMANITARIAN DEMINING ACTIVITIES
      12. CONCLUSION
    4. Chapter 20: Information Seeking and Retrieval Service for Crisis Response
      1. ABSTRACT
      2. INTRODUCTION
      3. CAPTURING CONCEPTS
      4. THE PROTOTYPE AND REFLECTIONS ON DESIGN DECISIONS
      5. TESTING, EVALUATION AND CONCLUSION
      6. CONCLUSION AND REFLECTION
    5. Chapter 21: Volunteered Geographic Information for Disaster Management
      1. ABSTRACT
      2. INTRODUCTION
      3. APPLICATION OF VGI IN DISASTER MANAGEMENT
      4. FUTURE RESEARCH DIRECTIONS
      5. CONCLUSION
    6. Chapter 22: A Systems Framework for Modeling Health Disparities in the Prevalence in Chronic Conditions following a Natural Disaster Event
      1. ABSTRACT
      2. INTRODUCTION
      3. TWO-LEVEL MODELING
      4. SIMULATION AND RESULTS
      5. CONCLUSION AND FUTURE WORK
    7. Chapter 23: Exploring Socio-Technical Design of Crisis Management Information Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED LITERATURE
      4. RESEARCH METHOD
      5. NETWORKS OF KNOWLEDGE
      6. INFORMATION MANAGEMENT
      7. INFORMATION INTEGRATION
      8. CRISIS MANAGEMENT INFORMATION SYSTEMS APPROACH
      9. CONCLUSION
    8. Chapter 24: Sociotechnical Uses of Social Web Tools during Disasters
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. LONDON BOMBINGS OF 7 JULY 2005
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    9. Chapter 25: Information Security in Data and Storage Grids through GS3
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKROUND
      4. GS: THE GRID SECURE STORAGE SYSTEM
      5. GS IMPLEMENTATION OVER gLite
      6. PERFORMANCE
      7. DISCUSSION
      8. CONCLUSION
    10. Chapter 26: Cyber Security in Liquid Petroleum Pipelines
      1. ABSTRACT
      2. INTRODUCTION
      3. CRITICAL INFRASTRUCTURE: WHAT IS IT?
      4. SCADA SYSTEMS
      5. CYBER SECURITY STANDARDS
      6. RESILIENT SCADA SYSTEMS ARE CYBER SECURE SYSTEMS
      7. DEFENSE IN DEPTH
      8. SCADA CYBER SECURITY ENVIRONMENTAL UNIQUENESS
      9. COMPARISON BETWEEN SCADA AND IT SYSTEMS
      10. OPERATING SYSTEM UPDATE APPROACHES
      11. MANAGEMENT INFRASTRUCTURE
      12. FUTURE RESEARCH DIRECTIONS
      13. CONCLUSION
    11. Chapter 27: Security of Railway Infrastructures
      1. ABSTRACT
      2. DEFINITIONS, MOTIVATIONS AND BIBLIOGRAPHY REVIEW ON RAILWAY SECURITY
      3. A GENERAL ARCHITECTURE FOR RISK ANALYSIS TOOLS
      4. CASE STUDY
      5. CONCLUSION
    12. Chapter 28: Attackers
      1. ABSTRACT
      2. THE INTERNAL THREAT
    13. Chapter 29: Rethinking Ethics Education in Business Schools in the Post-Financial Crisis Epoch
      1. ABSTRACT
      2. INTRODUCTION
      3. ICELAND: THE FINANCIAL COLLAPSE OF 2008 AND THE ROLE OF ETHICS
      4. MORAL CHARACTER, ETHICAL STANDARDS, AND THE ROLE OF EDUCATION
      5. BUSINESS EDUCATION IN ICELAND AND ITS FUTURE
      6. CONCLUSION AND RECOMMENDATIONS
    14. Chapter 30: A Critical Assessment of the Oath Project
      1. ABSTRACT
      2. INTRODUCTION
      3. A NOTE ON THE HISTORICAL BACKGROUND OF THE OATH
      4. HIDDEN AGENDAS AND POOR PROJECT MANAGEMENT AS THE FIRST IMPEDIMENTS TO OATH SUCCESS
      5. CONCEPTUAL COMPLEXITIES AS THE SECOND IMPEDIMENT
      6. SELF-SABOTAGE AS THE THIRD IMPEDIMENT TO PROGRESS
      7. UNREALISTIC EXPECTATIONS AS THE FOURTH IMPEDIMENT
      8. ISOLATED CHANGE EFFORTS AS THE FIFTH MAIN IMPEDIMENT TO PROGRESS
      9. HOLISTICALLY CHANGING BUSINESS SCHOOLS
      10. PROTECT THE SPIRIT OF GREAT IDEAS
      11. OUTLOOK
    15. Chapter 31: Emergency Management Professional Development
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. OPTIMIZING EMERGENCY RESPONSE: TWO FRAMEWORKS
      5. FUTURE RECOMMENDATIONS
      6. CONCLUSION: SOCIAL JUSTICE AND A SENSE OF COMMUNITY
  8. Section 3: Managerial Impact
    1. Chapter 32: Teaching Group Decision Making Skills to Emergency Managers via Digital Games
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. FORMULATING DESIGN REQUIREMENTS FOR A GAME THAT TEACHES DECISION MAKING SKILLS
      5. GAME DESIGN
      6. EVALUATION
      7. GENERAL DISCUSSION
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
    2. Chapter 33: Nonparametric Correspondence Analysis of Global Risk Management Techniques
      1. ABSTRACT
      2. INTRODUCTION
      3. STUDY APPROACH
      4. KEY BENEFITS
      5. LITERATURE REVIEW
      6. METHODOLOGY
      7. RESULTS AND DISCUSSION
      8. CONCLUSION
    3. Chapter 34: The Ways of Assessing the Security of Organization Information Systems through SWOT Analysis
      1. ABSTRACT
      2. INTRODUCTION
      3. SETTING THE SCENE
      4. RECOMMENDED METHODICAL PROCEDURE FOR THE IMPLEMENTATION OF SWOT ANALYSIS
      5. CASE DESCRIPTION
      6. ASSESSMENT OF OPPORTUNITIES WITH THE USE OF BENEFIT EVALUATION
      7. ASSESSMENT OF THREATS (OPPORTUNITIES) WITH THE USE OF MULTICRITERIAL MATRIX
      8. MULTICRITERIAL ASSESSMENT OF THREATS (OPPORTUNITIES) WITH REGARD TO THE SCALES OF CRITERIA
      9. SOLUTIONS AND RECOMMENDATIONS
    4. Chapter 35: Addressing the U.S. Federal Government Financial Crisis
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. AN EXTREME SENSE OF URGENCY TO IMPROVE U.S. FEDERAL GOVERNMENT PERFORMANCE AND REDUCE OPERATING COSTS, NATIONAL DEBT, AND NATIONAL DEFICIT
      5. ENTERPRISE ARCHITECTURE AS A STRATEGIC ORGANIZATIONAL PERFORMANCE ENABLER
      6. THE U.S. DEPARTMENT OF DEFENSE BUSINESS MISSION AREA: ENTERPRISE ARCHITECTURE
      7. FUTURE TRENDS
      8. CONCLUSION
    5. Chapter 36: Enterprise Information Security Policies, Standards, and Procedures
      1. ABSTRACT
      2. INTRODUCTION
      3. SECURITY DOCUMENTS
      4. DIFFERENTIATING BETWEEN POLICIES, STANDARDS, AND GUIDELINES
      5. ENTERPRISE INFORMATION SECURITY POLICIES
      6. SURVEY OF INTERNATIONAL STANDARDS AND GUIDELINES
      7. DISCUSSION AND ANALYSIS
      8. CONCLUSION
      9. FUTURE RESEARCH DIRECTIONS
      10. APPENDIX
    6. Chapter 37: Attack Graphs and Scenario Driven Wireless Computer Network Defense
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. THE APPLICATION OF ATTACK GRAPHS TO SYSTEM DEFENSE
      5. ILLUSTRATIVE EXAMPLE CASES OF ATTACK GRAPHS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    7. Chapter 38: Multilingual Crisis Knowledge Representation
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. CRISIS ONTOLOGY
      5. ONTOLOGY DESIGN
      6. UTILIZING THE ONTOLOGY
      7. DISCUSSION AND IMPLEMENTATION
      8. CONCLUSION
    8. Chapter 39: The Effect of Crises on Leadership
      1. ABSTRACT
      2. INTRODUCTION: CRISIS, EXTRAORDINARY TIME FOR MANAGEMENT
      3. BACKGROUND
      4. MAIN FOCUS OF THE CHAPTER
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS: REFLECTION ON THE NEW LEADERSHIP QUALITIES
      7. CONCLUSION
    9. Chapter 40: Resilient Emergency Response
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. METHOD
      5. RESULTS
      6. DISCUSSION AND CONCLUDING REMARKS
      7. CONCLUSION
    10. Chapter 41: Reaching Citizen 2.0
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. METHODOLOGY
      5. FINDINGS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    11. Chapter 42: Incident Command Situation Assessment Utilizing Video Feeds from UAVs
      1. ABSTRACT
      2. INTRODUCTION
      3. METHODOLOGY
      4. RESULTS
      5. DISCUSSION
      6. CONCLUSION
  9. Section 4: Tools and Technologies
    1. Chapter 43: Using an Agent-Based Behavior Modeling for Finding Humanitarian Relief Center Location in an Earthquake Zone
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PROPOSED MODEL DESCRIPTION
      5. MODEL DEVELOPMENT
      6. MODEL FORMULATION
      7. EVALUATION THE MODEL USING AGENT-BASED BEHAVIOR AND SIMULATION
      8. AN EXAMPLE FOR THE MODEL SOLUTION
      9. A CASE STUDY
      10. FUTURE RESEARCH DIRECTIONS
      11. CONCLUSION
    2. Chapter 44: Using Geospatial Web Services Holistically in Emergency Management
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. OGC GEOSPATIAL WEB SERVICES
      5. HOLISTICALLY USING OGC WEB SERVICES IN EMERGENCY MANAGEMENT
      6. RESPONSE
      7. RECOVERY
      8. HOLISTIC APPROACH
      9. FUTURE WORK
      10. CONCLUSION
    3. Chapter 45: The Socio-Ethical Considerations Surrounding Government Mandated Location-Based Services during Emergencies
      1. ABSTRACT
      2. INTRODUCTION
      3. EMERGENCY MANAGEMENT IN AUSTRALIA
      4. THE EMERGENCE OF LOCATION-BASED SERVICES SOLUTIONS
      5. EMERGENCY WARNING AND ALERTING METHODS IN AUSTRALIA
      6. SOCIO-ETHICAL CONSIDERATIONS
      7. CONCLUSION
    4. Chapter 46: Spectrum Sensing in Emergency Cognitive Radio Ad Hoc Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SPECTRUM SENSING IN EMERGENCY COGNITIVE RADIO AD HOC NETWORKS
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. REVIEW QUESTIONS
    5. Chapter 47: Eliciting Local Spatial Knowledge for Community-Based Disaster Risk Management
      1. ABSTRACT
      2. INTRODUCTION
      3. CYBERTRACKER PROCEDURES
      4. DATA SEQUENCES AND TRACKING SEQUENCES–EXAMPLES FROM MLETA, CAUCASUS
      5. THE MLETA–CAUCASUS CASE STUDY: FINDINGS AND RECOMMENDATIONS
    6. Chapter 48: The Blogosphere in the “Land of Smiles”
      1. ABSTRACT
      2. INTRODUCTION AND BACKGROUND
      3. MEDIA, THE MONARCHY AND POWER IN THAILAND
      4. BLOGGING BEYOND THE WEST
      5. METHOD
      6. FINDINGS
      7. DISCUSSION AND RECOMMENDATIONS
      8. CONCLUSION
      9. FUTURE RESEARCH DIRECTIONS
    7. Chapter 49: Initial Requirements of National Crisis Decision Support System
      1. ABSTRACT
      2. INTRODUCTION
      3. QUALITY FUNCTION IN DECISION CYCLE
      4. CONCEPTUAL DESIGN OF NCMIS
      5. WORKFLOW IN THE NCMIS
      6. TESTING VALIDITY OF THE CONCEPTUAL DESIGN
      7. EVALUATION OF THE CONCEPTUAL DESIGN MODULES
      8. CONCLUSION
    8. Chapter 50: Supporting Domain Ontology through a Metamodel
      1. ABSTRACT
      2. INTRODUCTION
      3. KEY CONCEPTS
      4. ONTOLOGY AND METAMODEL IN THE DISASTER MANAGEMENT DOMAIN
      5. ROLE OF THE DEVELOPMENT OF DISASTER MANAGEMENT METAMODEL AGAINST DISASTER MANAGEMENT ONTOLOGY
      6. REPRESENTING DISASTER MANAGEMENT KNOWLEDGE IN THE DISASTER MANAGEMENT METAMODEL
      7. CONCLUSION
    9. Chapter 51: A Fuzzy Approach to Disaster Modeling
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. PRELIMINARIES
      5. PROBLEM SPECIFICATION
      6. MATHEMATICAL MODEL
      7. NUMERICAL EXAMPLE
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
    10. Chapter 52: Planning for Hurricane Isaac using Probability Theory in a Linear Programming Model
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. METHODOLOGY
      5. RESULTS AND DISCUSSION
      6. CONCLUSION
      7. FUTURE RESEARCH
    11. Chapter 53: Soft Computing Modeling of Wild Fire Risk Indices
      1. ABSTRACT
      2. INTRODUCTION
      3. MATERIALS AND METHODS
      4. THE DEVELOPMENT ENVIRONMENT
      5. BUILDING THE FUZZY RULESET
      6. RESULTS AND DISCUSSION
      7. 6. THE RISK PROFILE OF PELOPONNESUS
      8. CONCLUSION
    12. Chapter 54: A Forest Fire Detection System
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. SYSTEM ARCHITECTURE
      5. EXPERIMENTAL RESULTS
      6. CONCLUSION
    13. Chapter 55: Security Issues on Outlier Detection and Countermeasure for Distributed Hierarchical Wireless Sensor Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. PROBLEM STATEMENT
      4. RELATED WORKS
      5. THE SECURITY FOUNDATION
      6. DETECTION MECHANISMS IN ODCS
      7. COUNTERMEASURES IN ODCS
      8. SECURITY ANALYSIS AND SIMULATION
      9. CONCLUSION
    14. Chapter 56: Secure Route Discovery in DSR against Black Hole Attacks in Mobile Ad Hoc Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. DEFINITIONS AND ASSUMPTIONS
      5. THE DISTRIBUTED PROBING SCHEME
      6. SIMULATION AND RESULTS
      7. CONCLUSION
    15. Chapter 57: The Use of RFID Technologies for E-Enabling Logistics Supply Chains
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. RFID IN LOGISTICS AND SUPPLY CHAINS
      5. CONCLUSION
  10. Section 5: Utilization and Application
    1. Chapter 58: Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. RFSCREEN
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
      7. APPENDIX: ADDITIONAL RESOURCES
    2. Chapter 59: General Outlook on Financial Structure and Capital Adequacy of ISE-30 Companies during Economic Crisis (2008-2009)
      1. ABSTRACT
      2. INTRODUCTION
      3. RESEARCH METHODOLOGY
      4. PERSPECTIVE OF TURKEY
      5. MAJOR OUTCOMES OF SURVEY
      6. CONCLUSION
    3. Chapter 60: The Impact of Crises
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. METHODOLOGY
      5. RESULTS
      6. CONCLUSION
    4. Chapter 61: Economics and Practical Applications for Applied Trauma Theory
      1. ABSTRACT
      2. OVERVIEW
      3. APPLIED TRAUMA THEORY: CULTURE
      4. THEORY OF CULTURAL DYNAMICS
      5. APPLIED TRAUMA THEORY: NEUROBIOLOGY
      6. APPLICATION-RURAL TOURISM AND SUSTAINABLE ENERGY
      7. NEUROBIOLOGICAL AND PSYCHOLOGICAL RATIONALE FOR THIS PROJECT
      8. DISCUSSION AND CONCLUSION
    5. Chapter 62: Disaster Impact and Country Logistics Performance
      1. ABSTRACT
      2. INTRODUCTION
      3. IS THERE A CORRELATION BETWEEN DISASTER IMPACT AND COUNTRY LOGISTICS PERFORMANCE?
      4. WHY IS LOGISTICS IMPORTANT IN DISASTER RESPONSE?
      5. THE RELATIONSHIP BETWEEN LOGISTICS PERFORMANCE AND DISASTER IMPACT
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUDING DISCUSSION
    6. Chapter 63: Risk Management in a Pandemic Crisis at a Global Non Profit Health Care Organization
      1. ABSTRACT
      2. INTRODUCTION
      3. LITERATURE REVIEW
      4. WHO CULTURE AND RISK MANAGEMENT
      5. METHODOLOGY
      6. RESULTS AND DISCUSSION
      7. CONCLUSION
    7. Chapter 64: Media Management in Disaster Events
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. MAIN FOCUS
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    8. Chapter 65: Social Media, New ICTs and the Challenges Facing the Zimbabwe Democratic Process
      1. ABSTRACT
      2. INTRODUCTION
      3. MEDIA-INDUCED SOCIAL UNREST AND PRE-EMPTIVE CENSORSHIP
      4. SOCIAL MEDIA, THE FIFTH ESTATE AND THE CONTRADICTIONS OF RE-PRESENTATION
      5. ZANU PF IDEOLOGUES AND THE APPROPRIATION OF THE ARAB SPRING REVOLUTION
      6. THEORETICAL FRAMEWORK: DEMOCRATISING THE PUBLIC SPHERE
      7. PREPAREDNESS FOR SOCIAL MEDIA INDUCED MASS ACTION
      8. CIVIL SOCIETY AND CITIZEN MONITORING OF THE DEMOCRATIC PROCESS
      9. KUBATANA AND THE MOBILE PHONE ACTIVISM
      10. LIMITATIONS OF THE NEW SOCIAL MEDIA: HIGH CALL COSTS RENDERED THE PROJECT RESTRICTIVE
      11. THE SOCIAL MEDIA AND DIPLOMATIC MONITORING OF ZIMBABWE
      12. WHY THERE CANNOT BE NORTH AFRICA OR DID IT HAPPEN IN ZIMBABWE?
      13. CONCLUSION
    9. Chapter 66: Developing and Maintaining Trust in Hastily Formed Relief Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. SWIFT TRUST IN HASTILY FORMED RELIEF NETWORKS
      5. FURTHER RESEARCH DIRECTIONS
      6. CONCLUSION
    10. Chapter 67: City Networks in Cyberspace and Time
      1. ABSTRACT
      2. INTRODUCTION
      3. WHAT FLOWS? NETWORKS, HIERARCHIES, CYBERSPACE AND CYBERPLACE
      4. A CYBERSPACE ANALYSIS OF U.S. CITIES
      5. CONCLUSION
    11. Chapter 68: School Districts Stumbled on Data Privacy
      1. ABSTRACT
      2. BACKGROUND INFORMATION
      3. THE CASE
    12. Chapter 69: Data Mining Techniques to Improve Early Warning Systems across the Bay of Bengal
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ISSUES, CONTROVERSIES, AND PROBLEMS
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE ASPECTS
      7. CONCLUSION
    13. Chapter 70: ICT Resilience as Dynamic Process and Cumulative Aptitude
      1. ABSTRACT
      2. INTRODUCTION
      3. DEFINITIONS OF RESILIENCE IN LITERATURE
      4. LEARNING FROM REAL LIFE INCIDENTS: KATRINA’S IMPACTS ON PUBLIC TELECOMMUNICATIONS
      5. 9/11’S IMPACTS ON PUBLIC TELECOMMUNICATIONS
      6. CYBER ATTACKS AND THE NEED FOR NETWORK RESILIENCE
      7. MANN GULCH: THE DYNAMICS OF RESILIENCE IN A HUMAN CONTEXT
      8. RESILIENCE IS REQUIRED AS HYBRID TELECOM SYSTEMS ARE COMPLEX
      9. THE CALL FOR A DEFINITION OF THE NOTION OF INCIDENT
      10. A GENERIC DEFINITION OF RESILIENCE
      11. RESILIENCE IS THE APTITUDE TO RESIST DESTRUCTION
      12. RESILIENCE IS THE APTITUDE TO MAINTAIN AND RESTORE GoS AND QoS
      13. THE REACTIVE CAPABILITIES REQUIRED TO SURVIVE CRISES ARE BOTH TECHNICAL AND NON-TECHNICAL
      14. RESILIENCE ENGINEERING IS AN INTEGRATED PROCESS
      15. RESILIENCE DOES NOT STEM FROM IMPROVISATION
      16. FUTURE RESEARCH DIRECTIONS
      17. CONCLUSION
  11. Section 6: Emerging Trends
    1. Chapter 71: Safety and Security in SCADA Systems Must be Improved through Resilience Based Risk Management
      1. ABSTRACT
      2. INTRODUCTION: SAFETY AND SECURITY MUST BE IMPROVED
      3. DESCRIPTION OF A FRAMEWORK TO MANAGE SAFETY AND SECURITY
      4. HOW TO EXAMINE THE PRACTICAL USE OF EXISTING GUIDELINES
      5. THE USE OF THE GUIDELINES AND IMPACT ON SAFETY AND SECURITY
      6. DISCUSSION OF THE IMPACT AND FUTURE IMPROVEMENTS
    2. Chapter 72: Exercise24
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. EXERCISE24
      5. DATA COLLECTION
      6. TOOLS AND TECHNOLOGIES
      7. EXERCISE CONTROL
      8. DATA ANALYSIS
      9. X24
      10. OBSERVATIONS OF X24 TOOLS AND TECHNOLOGIES
      11. VIDEO AND VIDEO CONFERENCING
      12. VIRTUAL CHAT
      13. MOBILE APPLICATIONS
      14. CARTOGRAPHY
      15. SOCIAL MEDIA
      16. CONCLUSION
      17. AREAS FOR FUTURE STUDY
    3. Chapter 73: Business Continuity and Disaster Recovery Considerations for Healthcare Technology
      1. ABSTRACT
      2. INTRODUCTION
      3. HEALTHCARE TECHNOLOGY CONSIDERATIONS
      4. A PROJECT APPROACH TO HEALTHCARE TECHNOLOGY BC/DR PLANNING
      5. MANAGING A DR ENVIRONMENT AND A BC CULTURE IN A HEALTHCARE SETTING
      6. CONCLUSION
    4. Chapter 74: Crisis Management in the Public Sector
      1. ABSTRACT
      2. CRISIS, NEW PUBLIC MANAGEMENT, AND THE SYSTEMS THINKING
      3. RELATIONSHIP BETWEEN “SYSTEMS THINKING” AND “NEW PUBLIC MANAGEMENT” IN THE CONTEXT OF CRISIS MANAGEMENT
      4. DISCUSSION
    5. Chapter 75: Improving Long-Term Financial Risk Forecasts using High-Frequency Data and Scaling Laws
      1. ABSTRACT
      2. INTRODUCTION
      3. HIGH-FREQUENCY DATA AND PRICE COASTLINES
      4. METHOD
      5. FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    6. Chapter 76: Role of Accounting and Audit in the Recent Financial Crisis
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. ACCOUNTING, AUDIT AND THE RECENT FINANCIAL CRISIS
      5. CONCLUSION
    7. Chapter 77: Intellectual Capital Explains a Country’s Resilience to Financial Crisis
      1. ABSTRACT
      2. INTRODUCTION
      3. INTELLECTUAL CAPITAL AS A KNOWLEDGE-BASED RESOURCE: RBV PERSPECTIVE
      4. LINKING FIRM-LEVEL INTELLECTUAL CAPITAL TO NATIONAL-LEVEL INTELLECTUAL CAPITAL
      5. VALUES OF NATIONAL INTELLECTUAL CAPITAL POLICY IMPLICATIONS
      6. COMPARING NATIONAL INTELLECTUAL CAPITAL IN TWO REGIONS DURING THE 2008 FINANCIAL CRISIS
      7. INTELLECTUAL CAPITAL EXPLAINS A COUNTRY’S RESILIENCE TO FINANCIAL CRISIS
      8. CONCLUSION
      9. APPENDIX: THE CALCULATION OF NIC SCORES
    8. Chapter 78: A Descriptive Approach for Power System Stability and Security Assessment
      1. ABSTRACT
      2. 1. INTRODUCTION
      3. 2. BACKGROUND
      4. 3. PROBLEM ILLUSTRATION AND MODELING
      5. 4. PROPOSED METHODOLOGY
      6. 5. SIMULATION RESULTS
      7. 6. FUTURE RESEARCH DIRECTIONS
      8. 7. CONCLUSION
    9. Chapter 79: Effective Infrastructure Protection through Virtualization
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. TOPICS IN VIRTUALIZATION
      5. SOLUTIONS AND RECOMMENDATIONS
      6. FUTURE RESEARCH DIRECTIONS
      7. CONCLUSION
    10. Chapter 80: A Proactive Defense Strategy to Enhance Situational Awareness in Computer Network Security
      1. ABSTRACT
      2. BACKGROUND
      3. INTRODUCTION
      4. OPTIMAL CONTROL MODEL
      5. COST FUNCTIONS
      6. SCENARIO BASED PROACTIVE DEFENSE ALGORITHM (SPD)
      7. EFFICIENT PROCEDURE
      8. BACKWARD AND FORWARD PROCESSES
      9. MAIN ALGORITHM
      10. NUMERICAL EXPERIMENT
      11. CONCLUSION AND FUTURE RESEARCH DIRECTIONS
    11. Chapter 81: Risk Assessment and Real Time Vulnerability Identification in IT Environments
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORKS
      4. MAIN FOCUS OF THE CHAPTER
      5. RISK STRUCTURES, ATTACKS AND VULNERABILITIES
      6. RISK ANALYSIS METHODS AND FRAMEWORKS
      7. MANAGEMENT OF RESOURCES
      8. FUTURE RESEARCH DIRECTIONS
      9. CONCLUSION
    12. Chapter 82: Performance Metrics and Models for Continuous Authentication Systems
      1. ABSTRACT
      2. INTRODUCTION
      3. RELATED WORK
      4. CA MODEL AND METRICS
      5. SESSION LENGTH METRICS
      6. CONCLUSION
    13. Chapter 83: Security and Mobility Aspects of Femtocell Networks
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. COMMON THREATS ON HENB/HNB
      5. SECURITY ASPECTS OF HENB/HNB MANAGEMENT
      6. HIP AS A SECURE MOBILITY PROTOCOL
      7. AN INTRODUCTION TO IKEv2
      8. IKEv2 MOBILITY AND MULTIHOMING EXTENSION (MOBIKE)
      9. AN INTRODUCTION TO PROXY MOBILE IPv6
      10. SOLUTIONS AND RECOMMENDATIONS
      11. CONCLUSION
    14. Chapter 84: Security Risks/Vulnerability in a RFID System and Possible Defenses
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. CASE STUDY TO UNDERSTAND SECURITY RISKS/VULNERABILITIES FOR A RFID SYSTEM AND POSSIBLE DEFENCES
      5. RECOMMENDATIONS AND FUTURE RESEARCH DIRECTIONS
      6. CONCLUSION
    15. Chapter 85: Identification and Authentication for RFID Systems
      1. ABSTRACT
      2. BACKGROUND
      3. IDENTIFICATION IN RFID SYSTEMS
      4. AUTHENTICATION IN RFID SYSTEMS
      5. SYMMETRIC AUTHENTICATION SCHEMES
      6. ASYMMETRIC AUTHENTICATION SCHEMES
      7. SPECIALLY-DESIGNED AUTHENTICATION SCHEMES
      8. NON-CRYPTOGRAPHIC SOLUTIONS
      9. CONCLUSION
    16. Chapter 86: Application of Cyber Security in Emerging C4ISR Systems
      1. ABSTRACT
      2. 1. INTRODUCTION TO THE C4ISR SYSTEMS
      3. 2. GENERALIZED VIEW OF A C4ISR SYSTEM
      4. 3. IMPORTANCE OF CYBER SECURITY IN C4ISR SYSTEMS
      5. 4. CASE STUDIES MANIFESTING THE IMPORTANCE OF CYBER SECURITY
      6. 5. CYBER SECURITY IN STANDARDIZED C4ISR ARCHITECTURES
      7. 6. GENERAL SECURITY OF PROTOCOLS IN TCP/IP FAMILY
      8. 7. SECURITY FEATURES IN DIFFERENT PARTS/ COMPONENTS OF C4ISR SYSTEMS
      9. 8. RECENT DEVELOPMENTS AND INITIATIVES IN CYBER SECURITY OF C4ISR SYSTEMS
      10. 9. USE OF OPEN SOURCE AND COTS IN C4ISR SYSTEMS
      11. 10. CONCLUSION
    17. Chapter 87: Cyber Defense Competitions as Learning Tools
      1. ABSTRACT
      2. INTRODUCTION
      3. BACKGROUND
      4. BASIC CYBER DEFENSE COMPETITION CONCEPTS
      5. EQUIPMENT NEEDED
      6. RUNNING THE COMPETITION
      7. AUDIENCE DIFFERENCES
      8. CYBER DEFENSE COMPETITIONS AS RECRUITMENT AND RETENTION TOOLS
      9. ASSESSING THE CYBER DEFENSE COMPETITION
      10. LESSONS LEARNED
      11. FUTURE DIRECTIONS
      12. CONCLUSION