Crisis Management: Concepts, Methodologies, Tools and Applications

Editor: Information Resources Management Association
Publication Year: 2013
Publisher: IGI Global

Single-User Purchase Price: $1845.00
Unlimited-User Purchase Price: $2767.50
ISBN: 978-1-4666-4707-7
Category: Technology & Engineering - Technology
Image Count: 369
Book Status: Available
Table of Contents

Whether natural or man-made, disasters will inevitably occur, which is why organizations must be constantly alert and ready to meet any such challenges head-on. Crisis Management: Concepts, Methodologies, Tools, and Applications explores the latest empirical research and best real-world practices for preventing, weathering, and recovering from disasters. From earthquakes and tsunamis to nuclear disasters and cyber terrorism, this extensive multi-volume compilation describes crisis management techniques for a variety of critical scenarios, providing leaders, managers, analysts, and workers with invaluable knowledge on how to recover swiftly from any crisis event.

Share this

Table of Contents

  • Editorial Advisory Board and List of Reviewers
  • Editor-in-Chief
  • Associate Editors
  • Editorial Advisory Board
  • Preface
  • Section 1: Fundamental Concepts and Theories
  • Fundamental Concepts and Theories: Preface
  • Chapter 1: Computer System Attacks
  • Chapter 2: Wireless Sensor Network Security Attacks
  • Chapter 3: Cybersecurity
  • Chapter 4: Securing Wireless Ad Hoc Networks
  • Chapter 5: An Overview of Cryptography
  • Chapter 6: Security of Dependable Systems
  • Chapter 7: Mobile Agents Security Protocols
  • Chapter 8: Engineering Secure Web Services
  • Chapter 9: Fortifying Large Scale, Geospatial Networks
  • Chapter 10: The Economic Crisis
  • Chapter 11: US Financial Crisis Critique and the Statistical Predictability of a NYSE Portfolio
  • Chapter 12: Regulatory and Policy Compliance with Regard to Identity Theft Prevention, Detection, and Response
  • Chapter 13: Lessons from Major Incidents Influencing and Influenced by Telecoms Failures
  • Chapter 14: Examining the Implications of Process and Choice for Strategic Decision Making Effectiveness
  • Chapter 15: Relief Distribution Networks
  • Chapter 16: Public Safety Networks
  • Section 2: Organizational and Social Implications
  • Organizational and Social Implications: Preface
  • Chapter 17: Paradise to Peril
  • Chapter 18: Challenges of Civil Military Cooperation/Coordination in Humanitarian Relief
  • Chapter 19: Web-Based Multi-User Distributed and Collaborative Environment Supporting Emergency and Relief Activities
  • Chapter 20: Information Seeking and Retrieval Service for Crisis Response
  • Chapter 21: Volunteered Geographic Information for Disaster Management
  • Chapter 22: A Systems Framework for Modeling Health Disparities in the Prevalence in Chronic Conditions following a Natural Disaster Event
  • Chapter 23: Exploring Socio-Technical Design of Crisis Management Information Systems
  • Chapter 24: Sociotechnical Uses of Social Web Tools during Disasters
  • Chapter 25: Information Security in Data and Storage Grids through GS3
  • Chapter 26: Cyber Security in Liquid Petroleum Pipelines
  • Chapter 27: Security of Railway Infrastructures
  • Chapter 28: Attackers
  • Chapter 29: Rethinking Ethics Education in Business Schools in the Post-Financial Crisis Epoch
  • Chapter 30: A Critical Assessment of the Oath Project
  • Chapter 31: Emergency Management Professional Development
  • Section 3: Managerial Impact
  • Managerial Impact: Preface
  • Chapter 32: Teaching Group Decision Making Skills to Emergency Managers via Digital Games
  • Chapter 33: Nonparametric Correspondence Analysis of Global Risk Management Techniques
  • Chapter 34: The Ways of Assessing the Security of Organization Information Systems through SWOT Analysis
  • Chapter 35: Addressing the U.S. Federal Government Financial Crisis
  • Chapter 36: Enterprise Information Security Policies, Standards, and Procedures
  • Chapter 37: Attack Graphs and Scenario Driven Wireless Computer Network Defense
  • Chapter 38: Multilingual Crisis Knowledge Representation
  • Chapter 39: The Effect of Crises on Leadership
  • Chapter 40: Resilient Emergency Response
  • Chapter 41: Reaching Citizen 2.0
  • Chapter 42: Incident Command Situation Assessment Utilizing Video Feeds from UAVs
  • Section 4: Tools and Technologies
  • Tools and Technologies: Preface
  • Chapter 44: Using Geospatial Web Services Holistically in Emergency Management
  • Chapter 45: The Socio-Ethical Considerations Surrounding Government Mandated Location-Based Services during Emergencies
  • Chapter 46: Spectrum Sensing in Emergency Cognitive Radio Ad Hoc Networks
  • Chapter 47: Eliciting Local Spatial Knowledge for Community-Based Disaster Risk Management
  • Chapter 48: The Blogosphere in the “Land of Smiles”
  • Chapter 49: Initial Requirements of National Crisis Decision Support System
  • Chapter 50: Supporting Domain Ontology through a Metamodel
  • Chapter 51: A Fuzzy Approach to Disaster Modeling
  • Chapter 52: Planning for Hurricane Isaac using Probability Theory in a Linear Programming Model
  • Chapter 53: Soft Computing Modeling of Wild Fire Risk Indices
  • Chapter 54: A Forest Fire Detection System
  • Chapter 55: Security Issues on Outlier Detection and Countermeasure for Distributed Hierarchical Wireless Sensor Networks
  • Chapter 56: Secure Route Discovery in DSR against Black Hole Attacks in Mobile Ad Hoc Networks
  • Chapter 57: The Use of RFID Technologies for E-Enabling Logistics Supply Chains
  • Section 5: Utilization and Application
  • Utilization and Application: Preface
  • Chapter 43: Using an Agent-Based Behavior Modeling for Finding Humanitarian Relief Center Location in an Earthquake Zone
  • Chapter 58: Malware Protection on RFID-Enabled Supply Chain Management Systems in the EPCglobal Network
  • Chapter 59: General Outlook on Financial Structure and Capital Adequacy of ISE-30 Companies during Economic Crisis (2008-2009)
  • Chapter 60: The Impact of Crises
  • Chapter 61: Economics and Practical Applications for Applied Trauma Theory
  • Chapter 62: Disaster Impact and Country Logistics Performance
  • Chapter 63: Risk Management in a Pandemic Crisis at a Global Non Profit Health Care Organization
  • Chapter 64: Media Management in Disaster Events
  • Chapter 65: Social Media, New ICTs and the Challenges Facing the Zimbabwe Democratic Process
  • Chapter 66: Developing and Maintaining Trust in Hastily Formed Relief Networks
  • Chapter 67: City Networks in Cyberspace and Time
  • Chapter 68: School Districts Stumbled on Data Privacy
  • Chapter 69: Data Mining Techniques to Improve Early Warning Systems across the Bay of Bengal
  • Chapter 70: ICT Resilience as Dynamic Process and Cumulative Aptitude
  • Section 6: Emerging Trends
  • Emerging Trends: Preface
  • Chapter 71: Safety and Security in SCADA Systems Must be Improved through Resilience Based Risk Management
  • Chapter 72: Exercise24
  • Chapter 73: Business Continuity and Disaster Recovery Considerations for Healthcare Technology
  • Chapter 74: Crisis Management in the Public Sector
  • Chapter 75: Improving Long-Term Financial Risk Forecasts using High-Frequency Data and Scaling Laws
  • Chapter 76: Role of Accounting and Audit in the Recent Financial Crisis
  • Chapter 77: Intellectual Capital Explains a Country's Resilience to Financial Crisis
  • Chapter 78: A Descriptive Approach for Power System Stability and Security Assessment
  • Chapter 79: Effective Infrastructure Protection through Virtualization
  • Chapter 80: A Proactive Defense Strategy to Enhance Situational Awareness in Computer Network Security
  • Chapter 81: Risk Assessment and Real Time Vulnerability Identification in IT Environments
  • Chapter 82: Performance Metrics and Models for Continuous Authentication Systems
  • Chapter 83: Security and Mobility Aspects of Femtocell Networks
  • Chapter 84: Security Risks/Vulnerability in a RFID System and Possible Defenses
  • Chapter 85: Identification and Authentication for RFID Systems
  • Chapter 86: Application of Cyber Security in Emerging C4ISR Systems
  • Chapter 87: Cyber Defense Competitions as Learning Tools