Technology and Emergency Management
John Wiley & Sons Inc (Verlag)
978-1-119-23408-1 (ISBN)
The first book devoted to a critically important aspect of disaster planning, management, and mitigation
Technology and Emergency Management, Second Edition describes best practices for technology use in emergency planning, response, recovery, and mitigation. It also describes the key elements that must be in place for technology to enhance the emergency management process. The tools, resources, and strategies discussed have been applied by organizations worldwide tasked with planning for and managing every variety of natural and man-made hazard and disaster. Illustrative case studies based on their experiences appear throughout the book.
This new addition of the critically acclaimed guide has been fully updated and expanded to reflect significant developments occurring in the field over the past decade. It features in-depth coverage of major advances in GIS technologies, including the development of mapping tools and high-resolution remote sensing imaging. Also covered is the increase in computer processing power and mobility and enhanced analytical capabilities for assessing the present conditions of natural systems and extrapolating from them to create accurate models of potential crisis conditions. This second edition also features a new section on cybersecurity and a new chapter on social media and disaster preparedness, response, and recovery has been added.
Explores the role of technology in emergency planning, response, recovery, and mitigation efforts
Explores applications of the Internet, telecommunications, and networks to emergency management, as well as geospatial technologies and their applications
Reviews the elements of hazard models and the relative strengths and weaknesses of modeling programs
Describes techniques for developing hazard prediction models using direct and remote sensing data
Includes test questions for each chapter, and a solutions manual and PowerPoint slides are available on a companion website
Technology and Emergency Management, Second Edition is a valuable working resource for practicing emergency managers and an excellent supplementary text for undergraduate and graduate students in emergency management and disaster management programs, urban and regional planning, and related fields.
John C. Pine, Ed.D, is a professor in the Department of Geography and Planning at Appalachian State University, and formerly Director of the Research Institute for Environment, Energy & Economics at Appalachian. He joined the Appalachian faculty in 2009 after serving thirty years at Louisiana State University in Baton Rouge where he directed a graduate and undergraduate Disaster Science and Management Program and served as a Professor with the Department of Environmental Science in the School of the Coast and Environment.
Concept xiii
About the Author xiv
List of Contributors xv
About the Companion Website xvi
1 The Need for Technology in Emergency Management 1
Introduction 2
1.1 Technology and Disaster Management 2
1.1.1 Focus on Current and Emerging Technology 3
1.2 Technology as a Management Tool 4
1.2.1 Response to Complex Disaster Events 5
1.2.2 Ease of Use of Technology 5
1.3 Using Technologies 6
1.3.1 Technology in a Changing Environment 8
1.3.2 Examples of Technology 8
1.3.3 Communicate Quickly 8
1.3.4 Develop a Better Understanding of Hazards 9
1.3.5 Improve Response 9
1.3.6 Increase Coordination 9
1.3.7 Improve Efficiency 9
1.3.8 Training 9
1.4 Completing a Needs Assessment 10
1.4.1 Nature of a Needs Assessment 10
1.4.2 Steps to Complete a Needs Assessment 11
1.4.3 Implementing the Needs Assessment 12
1.4.4 Impacts of Implementing Innovation 12
Summary 14
Key Terms 14
Assess Your Understanding 14
References 15
2 Computer Networks and Emergency Management 17
Introduction 18
2.1 What Is a Network? 19
2.2 Types of Networks 19
2.2.1 Local Area Network 19
2.2.2 Metropolitan Area Network 20
2.2.3 Wide Area Network 20
2.2.4 Personal Area Network 21
2.3 The Internet 21
2.4 Communication Technologies 24
2.4.1 Wired Network Technologies 24
2.4.2 Long‐Range Wireless Network Technologies 27
2.4.3 Short‐Range Wireless Network Technologies 30
2.5 The Internet and Emergency Management 32
2.6 IoT and Emergency Management 35
Summary 38
Key Terms 38
Assess Your Understanding 40
References 40
3 Cyber Security.42
Introduction 43
3.1 Sources of Attacks 45
3.2 Attack Vectors 46
3.2.1 Vulnerabilities 46
3.2.2 Phishing 46
3.2.3 Stolen Credentials 47
3.2.4 Web Applications 47
3.2.5 Point of Sale Intrusions 48
3.2.6 Payment Card Skimmers 49
3.2.7 Insider and Privilege Misuse 49
3.2.8 Physical Theft and Loss 49
3.2.9 Denial of Service Attacks 49
3.3 Overview of Malware 49
3.3.1 Malware Propagation 50
3.3.2 Malware Payload 51
3.4 Securing Cyber Systems 52
3.5 Securing Data 54
3.6 Cyber Security Attack Recovery 56
Summary 57
Key Terms 57
Assess Your Understanding 59
References 59
4 Social Media and Emergency Management 61
Introduction 62
4.1 Situational Awareness, Emergency Communications, and the Public Realm 62
4.2 What Is Social Media? 64
4.2.1 The Birth of Web 2.0 64
4.3 Types of Social Media Used in Disasters 65
4.4 Mass Alert Systems 67
4.5 Mass Media and Social Media Use in Virginia Tech Shooting Response 67
4.5.1 Information Communication Technologies 69
4.6 What Is a Disaster? 69
4.7 Usage Patterns of Social Media Over Time 70
4.8 Social Media’s Growth and the Role of Traditional Sources 73
4.8.1 Role of Social Media in Disasters 74
4.8.2 Use of Social Media by People Affected by Crisis 74
4.9 Use of Social Media for Preparedness and Planning 74
4.9.1 Expansion of Communication Networks 75
4.10 Use of Social Media Before and During Mass Emergencies 75
4.10.1 Emergency Managers’ Use of Social Media in Response 76
4.10.2 Emergency Managers in Listening Mode 76
4.10.3 Managing the Use of Twitter or Facebook 76
4.10.4 Information‐Vetting Dynamics 76
4.10.5 Building Resiliency 77
4.10.6 Changing Nature of Social Behaviors 78
4.11 Issues Arising from the Use of Social Media by Emergency Managers During Events 81
4.11.1 Changing Role of PIO 81
4.12 Using Social Media to Establish Information on Damages and Recovery 81
4.12.1 Evolving Networks 82
4.12.2 Expanding Information Relevant to a Specific Event 82
4.12.3 Expanded Communication Benefits 83
4.13 The Advantages and Fall backs of Geo targeting 83
4.14 Social Media Companies’ Contribution to Emergency Response 84
4.14.1 Information Dissemination and Feedback 84
4.15 Concerns About and Limitations of Social Media Usage in Disasters 85
4.15.1 Misleading Information 85
4.15.2 Dependable Networks 85
4.15.3 Reliable Information Sources 86
4.15.4 Communicating with a Broad Audience 86
4.15.5 Managing a Large Quantity of Data 86
4.16 The Future of Social Media in Disasters 87
4.16.1 New Role for the Public in a Crisis 87
4.16.2 Dynamic Nature of Social Media 87
4.16.3 Social Media as a Valuable Resource 88
4.16.4 Self‐correcting Nature of Social Media 88
4.16.5 Accuracy of Information 88
4.16.6 Threats of Technology Failure 88
4.16.7 Case Example: Crowd funding and Remote Emergency Response: 2010 Haitian Earthquake as a Case Study 89
4.16.8 Examining the Use of Social Media in Haiti 90
4.17 Looking Forward 91
Key Terms 91
Assess Your Understanding 93
References 94
5 Geospatial Technologies and Emergency Management 97
Introduction 98
5.1 Geospatial Technologies and Emergency Management 99
5.1.1 Elements of GT 99
5.1.2 Use of GT to Answer Questions in Emergency Management 100
5.2 GT Across the Human–Hazard Interface 100
5.2.1 Our People 100
5.2.2 Limitations of Census Data 101
5.3 Our Resources 104
5.3.1 Understanding Critical Infrastructure 104
5.3.2 Understanding Critical Social Infrastructure 105
5.3.3 Resources of Social Importance 106
5.3.4 Spatial Video Geo narrative 107
5.4 Understanding Our Hazards 108
5.4.1 Natural Hazards Casualties in the United States 108
5.4.2 Hazard Zonation 109
5.4.3 Our Human–Hazard Interface 110
5.4.4 Understanding Overlays and Buffers 110
5.5 Dissemination and Hazard Communication 112
5.5.1 Contribution of Google Earth 113
5.6 Summary 113
5.7 Conclusions 115
Key Terms 116
Assess Your Understanding 117
References 117
6 Direct and Remote Sensing Systems: Describing and Detecting Hazards 120
Introduction 121
6.1 Data Collection 121
6.2 Weather Stations 124
6.2.1 Weather Station Data 125
6.2.2 Weather Station Networks 126
6.2.3 Geospatial Multi‐agency Coordination Wildfire Application 127
6.3 Water Data Sensors 128
6.3.1 Flood Warning Systems for Local Communities 128
6.3.2 Rain and Stream Gauges 130
6.3.3 How a USGS Stream Gauge Works 130
6.3.4 The USGS Stream Gaging Program 131
6.3.5 Using USGS Stream‐flow Data for Emergency Management 131
6.4 Air Sensors 132
6.4.1 Outdoor Air Quality Sensors 132
6.4.2 Chemical Sensors 133
6.5 Evaluating the Technology133
6.6 Remote Sensing 134
6.6.1 An Overview of Remote Sensing 135
6.6.2 Optical Satellite Remote Sensing 136
6.6.3 Satellite Remote Sensing of Weather 145
6.6.4 Radar Imaging 147
6.6.5 Manned and Unmanned Airborne Remote Sensing 147
6.7 Using and Assessing Data 150
6.8 Trends in Remote and Direct Sensing Technology 151
Summary 151
Key Terms 152
Online Resources 154
Assess Your Understanding 155
References155
7 Emergency Management Decision Support Systems: Using Data to Manage Disasters 157
Introduction 158
7.1 Emergency Management Information Systems and Networks 158
7.2 Evaluating Information Systems 161
7.2.1 Quality 161
7.2.2 Timeliness 161
7.2.3 Completeness 162
7.2.4 Performance 162
7.3 Federal, State, and Local Information Systems 163
7.3.1 Management Information Systems 163
7.3.2 The National Emergency Management Information System 163
7.3.3 Computer Aided Management of Emergency Operations 164
7.4 Using Data 165
7.4.1 Databases 166
7.4.2 Data Dictionary (Meta‐data) 166
7.5 Evaluating Databases 168
7.6 Using Emergency Management Databases 169
7.6.1 HAZUS‐MH Datasets 171
7.7 Management Roles in Decision Support Systems 171
7.8 Obtaining Data from Public Federal Data Sources 172
7.9 The Future of Decision Support Systems: The Intelligent Community 173
Summary 174
Key Terms 174
Assess Your Understanding 174
References 175
8 Warning Systems: Alerting the Public to Danger 177
Introduction 178
8.1 Warning Systems 178
8.1.1 Key Information 178
8.1.2 Key Components of Warning Systems 178
8.1.3 Warning Subsystems 179
8.2 Detection and Management 180
8.2.1 Case Study: Detection at aLocal Level 180
8.2.2 National Weather Service 182
8.2.3 Case Study: Detection at a National Level 184
8.3 Issuing Warnings 185
8.3.1 Technical Issues 185
8.3.2 Organizational Issues 185
8.3.3 Societal Issues 187
8.4 Types of Warning Systems 187
8.4.1 Sirens 188
8.4.2 The Emergency Alert System 188
8.4.3 Phone Alert Systems: Reverse 911 190
8.4.4 Disadvantages of Phone Notification Systems 190
8.4.5 Communicating with Those with Disabilities 190
8.4.6 Barriers to Warnings 191
8.4.7 Case Example: A Nuclear Disaster 191
8.5 Response 193
8.5.1 Case Study: Response to Hurricane Katrina 194
Summary 194
Key Terms 195
AssessYourUnderstanding195
References195
9 Hazards Analysis and Modeling: Predicting the Impact of Disasters 197
Introduction 198
9.1 Modeling and Emergency Management 198
9.1.1 The Technology behind Modeling 199
9.1.2 Mathematical Models 201
9.1.3 Understanding the Results of Modeling 202
9.1.4 Fast Exchange of Model Results to Users 203
9.2 Using a Hurricane Model (SLOSH) 203
9.2.1 SLOSH for Planning, Response, Recovery, and Mitigation 205
9.2.2 SLOSH Display Program 206
9.2.3 Strengths of SLOSH2 06
9.2.4 Limitations of SLOSH 206
9.2.5 Saffir–Simps on Scale 208
9.3 Using the ALOHA Chemical Dispersion Model 209
9.3.1 How ALOHA Works 210
9.3.2 Model Outputs 210
9.3.3 Threat Zone Estimates and Threat at a Point 210
9.3.4 Strengths of ALOHA 211
9.3.5 Limitations of ALOHA212
9.3.6 Terms Used in ALOHA 213
9.3.7 Concentration Patchiness, Particularly Near the Source215
9.4 Hazards United States—Multi Hazard Model 216
9.4.1 Strengths of HAZUS‐MH 219
9.4.2 Limitations of HAZUS‐MH 220
9.4.3 Multi risk Assessment 220
9.5 Evacuation Modeling 220
9.6 Centralized Hazard Modeling Initiatives 221
9.6.1 Fire Potential Modeling 221
9.6.2 Drought Modeling 223
9.7 Evaluating Hazard Models 224
Summary 225
Key Terms 225
Assess Your Understanding 226
References 226
10 Operational Problems and Technology: Making Technology Work for You 228
Introduction 229
10.1 Barriers in Implementing Technology in Emergency Management 229
10.2 The Role of the Emergency Manager in Using Technology 231
10.2.1 Managing an Organization 233
10.3 Using Technology to Overcome Organizational Boundaries 234
10.4 Pitfalls of Technology 235
10.4.1 Reliance on Technology 235
10.4.2 Obsolescence 236
10.4.3 Information Overload 236
10.4.4 Data Integration 236
10.4.5 Real‐Time Response Data 237
10.4.6 Security 237
10.5 Managing the Technology 237
Summary 240
Key Terms 240
Assess Your Understanding 240
References 240
11 Trends in Technology: New Tools for Challenges to Emergency Management 242
Introduction 243
11.1 Using Technology for Information Exchange 243
11.1.1 Emergency Preparedness Information Exchange 244
11.1.2 Television and Internet Information 244
11.1.3 Digital Libraries and Publications 244
11.2 Distance Learning 246
11.2.1 Using Remote Technology 246
11.2.2 Disaster Situational Maps 247
11.2.3 Federal Agency Situational Mapping Programs249
11.2.4 Innovative Visualization Efforts 252
11.2.5 Updating Outputs 252
11.3 Managing the Technology 253
11.3.1 Organizational Coordination and Collaboration Strategies 254
11.3.2 Technology Life Cycles 254
11.3.3 Engaging Stakeholders 255
11.3.4 Information Exchange 255
11.3.5 Dealing with Information Overload 256
Summary 257
Key Terms 257
Assess Your Understanding 257
References 257
Figure Credits 260
Index 261
Erscheinungsdatum | 10.10.2017 |
---|---|
Verlagsort | New York |
Sprache | englisch |
Maße | 175 x 252 mm |
Gewicht | 499 g |
Themenwelt | Sachbuch/Ratgeber ► Sport |
Mathematik / Informatik ► Mathematik ► Finanz- / Wirtschaftsmathematik | |
Naturwissenschaften ► Chemie | |
Recht / Steuern ► Strafrecht ► Kriminologie | |
Technik | |
Wirtschaft ► Betriebswirtschaft / Management ► Unternehmensführung / Management | |
ISBN-10 | 1-119-23408-5 / 1119234085 |
ISBN-13 | 978-1-119-23408-1 / 9781119234081 |
Zustand | Neuware |
Haben Sie eine Frage zum Produkt? |
aus dem Bereich