Details

Technology and Emergency Management


Technology and Emergency Management


2. Aufl.

von: John C. Pine

64,99 €

Verlag: Wiley
Format: PDF
Veröffentl.: 18.08.2017
ISBN/EAN: 9781119234227
Sprache: englisch
Anzahl Seiten: 288

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p><b>The first book devoted to a critically important aspect of disaster planning, management, and mitigation</b></p> <p><i>Technology and Emergency Management, Second Edition</i> describes best practices for technology use in emergency planning, response, recovery, and mitigation. It also describes the key elements that must be in place for technology to enhance the emergency management process. The tools, resources, and strategies discussed have been applied by organizations worldwide tasked with planning for and managing every variety of natural and man-made hazard and disaster. Illustrative case studies based on their experiences appear throughout the book. </p> <p>This new addition of the critically acclaimed guide has been fully updated and expanded to reflect significant developments occurring in the field over the past decade. It features in-depth coverage of major advances in GIS technologies, including the development of mapping tools and high-resolution remote sensing imaging. Also covered is the increase in computer processing power and mobility and enhanced analytical capabilities for assessing the present conditions of natural systems and extrapolating from them to create accurate models of potential crisis conditions. This second edition also features a new section on cybersecurity and a new chapter on social media and disaster preparedness, response, and recovery has been added.</p> <ul> <li>Explores the role of technology in emergency planning, response, recovery, and mitigation efforts</li> <li>Explores applications of the Internet, telecommunications, and networks to emergency management, as well as geospatial technologies and their applications</li> <li>Reviews the elements of hazard models and the relative strengths and weaknesses of modeling programs</li> <li>Describes techniques for developing hazard prediction models using direct and remote sensing data</li> <li>Includes test questions for each chapter, and a solutions manual and PowerPoint slides are available on a companion website</li> </ul> <p><i>Technology and Emergency Management, Second Edition</i> is a valuable working resource for practicing emergency managers and an excellent supplementary text for undergraduate and graduate students in emergency management and disaster management programs, urban and regional planning, and related fields.</p>
<p>Concept xiii</p> <p>About the Author xiv</p> <p>List of Contributors xv</p> <p>About the Companion Website xvi</p> <p><b>1 The Need for Technology in Emergency Management 1</b></p> <p>Introduction 2</p> <p>1.1 Technology and Disaster Management 2</p> <p>1.1.1 Focus on Current and Emerging Technology 3</p> <p>1.2 Technology as a Management Tool 4</p> <p>1.2.1 Response to Complex Disaster Events 5</p> <p>1.2.2 Ease of Use of Technology 5</p> <p>1.3 Using Technologies 6</p> <p>1.3.1 Technology in a Changing Environment 8</p> <p>1.3.2 Examples of Technology 8</p> <p>1.3.3 Communicate Quickly 8</p> <p>1.3.4 Develop a Better Understanding of Hazards 9</p> <p>1.3.5 Improve Response 9</p> <p>1.3.6 Increase Coordination 9</p> <p>1.3.7 Improve Efficiency 9</p> <p>1.3.8 Training 9</p> <p>1.4 Completing a Needs Assessment 10</p> <p>1.4.1 Nature of a Needs Assessment 10</p> <p>1.4.2 Steps to Complete a Needs Assessment 11</p> <p>1.4.3 Implementing the Needs Assessment 12</p> <p>1.4.4 Impacts of Implementing Innovation 12</p> <p>Summary 14</p> <p>Key Terms 14</p> <p>Assess Your Understanding 14</p> <p>References 15</p> <p><b>2 Computer Networks and Emergency Management 17</b></p> <p>Introduction 18</p> <p>2.1 What Is a Network? 19</p> <p>2.2 Types of Networks 19</p> <p>2.2.1 Local Area Network 19</p> <p>2.2.2 Metropolitan Area Network 20</p> <p>2.2.3 Wide Area Network 20</p> <p>2.2.4 Personal Area Network 21</p> <p>2.3 The Internet 21</p> <p>2.4 Communication Technologies 24</p> <p>2.4.1 Wired Network Technologies 24</p> <p>2.4.2 Long‐Range Wireless Network Technologies 27</p> <p>2.4.3 Short‐Range Wireless Network Technologies 30</p> <p>2.5 The Internet and Emergency Management 32</p> <p>2.6 IoT and Emergency Management 35</p> <p>Summary 38</p> <p>Key Terms 38</p> <p>Assess Your Understanding 40</p> <p>References 40</p> <p><b>3 Cyber Security.42</b></p> <p>Introduction 43</p> <p>3.1 Sources of Attacks 45</p> <p>3.2 Attack Vectors 46</p> <p>3.2.1 Vulnerabilities 46</p> <p>3.2.2 Phishing 46</p> <p>3.2.3 Stolen Credentials 47</p> <p>3.2.4 Web Applications 47</p> <p>3.2.5 Point of Sale Intrusions 48</p> <p>3.2.6 Payment Card Skimmers 49</p> <p>3.2.7 Insider and Privilege Misuse 49</p> <p>3.2.8 Physical Theft and Loss 49</p> <p>3.2.9 Denial of Service Attacks 49</p> <p>3.3 Overview of Malware 49</p> <p>3.3.1 Malware Propagation 50</p> <p>3.3.2 Malware Payload 51</p> <p>3.4 Securing Cyber Systems 52</p> <p>3.5 Securing Data 54</p> <p>3.6 Cyber Security Attack Recovery 56</p> <p>Summary 57</p> <p>Key Terms 57</p> <p>Assess Your Understanding 59</p> <p>References 59</p> <p><b>4 Social Media and Emergency Management 61</b></p> <p>Introduction 62</p> <p>4.1 Situational Awareness, Emergency Communications, and the Public Realm 62</p> <p>4.2 What Is Social Media? 64</p> <p>4.2.1 The Birth of Web 2.0 64</p> <p>4.3 Types of Social Media Used in Disasters 65</p> <p>4.4 Mass Alert Systems 67</p> <p>4.5 Mass Media and Social Media Use in Virginia Tech Shooting  Response 67</p> <p>4.5.1 Information Communication Technologies 69</p> <p>4.6 What Is a Disaster? 69</p> <p>4.7 Usage Patterns of Social Media Over Time 70</p> <p>4.8 Social Media’s Growth and the Role of Traditional Sources 73</p> <p>4.8.1 Role of Social Media in Disasters 74</p> <p>4.8.2 Use of Social Media by People Affected by Crisis 74</p> <p>4.9 Use of Social Media for Preparedness and Planning 74</p> <p>4.9.1 Expansion of Communication Networks 75</p> <p>4.10 Use of Social Media Before and During Mass Emergencies 75</p> <p>4.10.1 Emergency Managers’ Use of Social Media in Response 76</p> <p>4.10.2 Emergency Managers in Listening Mode 76</p> <p>4.10.3 Managing the Use of Twitter or Facebook 76</p> <p>4.10.4 Information‐Vetting Dynamics 76</p> <p>4.10.5 Building Resiliency 77</p> <p>4.10.6 Changing Nature of Social Behaviors 78</p> <p>4.11 Issues Arising from the Use of Social Media by Emergency Managers During Events 81</p> <p>4.11.1 Changing Role of PIO 81</p> <p>4.12 Using Social Media to Establish Information on Damages and Recovery 81</p> <p>4.12.1 Evolving Networks 82</p> <p>4.12.2 Expanding Information Relevant to a Specific Event 82</p> <p>4.12.3 Expanded Communication Benefits 83</p> <p>4.13 The Advantages and Fall backs of Geo targeting 83</p> <p>4.14 Social Media Companies’ Contribution to Emergency Response 84</p> <p>4.14.1 Information Dissemination and Feedback 84</p> <p>4.15 Concerns About and Limitations of Social Media Usage in Disasters 85</p> <p>4.15.1 Misleading Information 85</p> <p>4.15.2 Dependable Networks 85</p> <p>4.15.3 Reliable Information Sources 86</p> <p>4.15.4 Communicating with a Broad Audience 86</p> <p>4.15.5 Managing a Large Quantity of Data 86</p> <p>4.16 The Future of Social Media in Disasters 87</p> <p>4.16.1 New Role for the Public in a Crisis 87</p> <p>4.16.2 Dynamic Nature of Social Media 87</p> <p>4.16.3 Social Media as a Valuable Resource 88</p> <p>4.16.4 Self‐correcting Nature of Social Media 88</p> <p>4.16.5 Accuracy of Information 88</p> <p>4.16.6 Threats of Technology Failure 88</p> <p>4.16.7 Case Example: Crowd funding and Remote Emergency Response: 2010 Haitian Earthquake as a Case Study 89</p> <p>4.16.8 Examining the Use of Social Media in Haiti 90</p> <p>4.17 Looking Forward 91</p> <p>Key Terms 91</p> <p>Assess Your Understanding 93</p> <p>References 94</p> <p><b>5 Geospatial Technologies and Emergency Management 97</b></p> <p>Introduction 98</p> <p>5.1 Geospatial Technologies and Emergency Management  99</p> <p>5.1.1 Elements of GT 99</p> <p>5.1.2 Use of GT to Answer Questions in Emergency Management  100</p> <p>5.2 GT Across the Human–Hazard Interface 100</p> <p>5.2.1 Our People 100</p> <p>5.2.2 Limitations of Census Data 101</p> <p>5.3 Our Resources 104</p> <p>5.3.1 Understanding Critical Infrastructure 104</p> <p>5.3.2 Understanding Critical Social Infrastructure  105</p> <p>5.3.3 Resources of Social Importance 106</p> <p>5.3.4 Spatial Video Geo narrative 107</p> <p>5.4 Understanding Our Hazards 108</p> <p>5.4.1 Natural Hazards Casualties in the United States  108</p> <p>5.4.2 Hazard Zonation 109</p> <p>5.4.3 Our Human–Hazard Interface 110</p> <p>5.4.4 Understanding Overlays and Buffers 110</p> <p>5.5 Dissemination and Hazard Communication 112</p> <p>5.5.1 Contribution of Google Earth 113</p> <p>5.6 Summary 113</p> <p>5.7 Conclusions 115</p> <p>Key Terms 116</p> <p>Assess Your Understanding 117</p> <p>References 117</p> <p><b>6 Direct and Remote Sensing Systems: Describing and Detecting Hazards 120</b></p> <p>Introduction 121</p> <p>6.1 Data Collection 121</p> <p>6.2 Weather Stations 124</p> <p>6.2.1 Weather Station Data 125</p> <p>6.2.2 Weather Station Networks 126</p> <p>6.2.3 Geospatial Multi‐agency Coordination Wildfire Application 127</p> <p>6.3 Water Data Sensors 128</p> <p>6.3.1 Flood Warning Systems for Local Communities 128</p> <p>6.3.2 Rain and Stream Gauges 130</p> <p>6.3.3 How a USGS Stream Gauge Works 130</p> <p>6.3.4 The USGS Stream Gaging Program 131</p> <p>6.3.5 Using USGS Stream‐flow Data for Emergency Management 131</p> <p>6.4 Air Sensors 132</p> <p>6.4.1 Outdoor Air Quality Sensors 132</p> <p>6.4.2 Chemical Sensors 133</p> <p>6.5 Evaluating the Technology133</p> <p>6.6 Remote Sensing 134</p> <p>6.6.1 An Overview of Remote Sensing 135</p> <p>6.6.2 Optical Satellite Remote Sensing 136</p> <p>6.6.3 Satellite Remote Sensing of Weather 145</p> <p>6.6.4 Radar Imaging 147</p> <p>6.6.5 Manned and Unmanned Airborne Remote Sensing  147</p> <p>6.7 Using and Assessing Data 150</p> <p>6.8 Trends in Remote and Direct Sensing Technology  151</p> <p>Summary 151</p> <p>Key Terms 152</p> <p>Online Resources 154</p> <p>Assess Your Understanding 155</p> <p>References155</p> <p><b>7 Emergency Management Decision Support Systems: Using Data to Manage Disasters 157</b></p> <p>Introduction 158</p> <p>7.1 Emergency Management Information Systems and Networks 158</p> <p>7.2 Evaluating Information Systems 161</p> <p>7.2.1 Quality 161</p> <p>7.2.2 Timeliness 161</p> <p>7.2.3 Completeness 162</p> <p>7.2.4 Performance 162</p> <p>7.3 Federal, State, and Local Information Systems 163</p> <p>7.3.1 Management Information Systems 163</p> <p>7.3.2 The National Emergency Management Information System  163</p> <p>7.3.3 Computer Aided Management of Emergency Operations 164</p> <p>7.4 Using Data 165</p> <p>7.4.1 Databases 166</p> <p>7.4.2 Data Dictionary (Meta‐data) 166</p> <p>7.5 Evaluating Databases 168</p> <p>7.6 Using Emergency Management Databases 169</p> <p>7.6.1 HAZUS‐MH Datasets 171</p> <p>7.7 Management Roles in Decision Support Systems 171</p> <p>7.8 Obtaining Data from Public Federal Data Sources 172</p> <p>7.9 The Future of Decision Support Systems: The Intelligent Community   173</p> <p>Summary 174</p> <p>Key Terms 174</p> <p>Assess Your Understanding 174</p> <p>References 175</p> <p><b>8 Warning Systems: Alerting the Public to Danger 177</b></p> <p>Introduction 178</p> <p>8.1 Warning Systems 178</p> <p>8.1.1 Key Information 178</p> <p>8.1.2 Key Components of Warning Systems 178</p> <p>8.1.3 Warning Subsystems 179</p> <p>8.2 Detection and Management 180</p> <p>8.2.1 Case Study: Detection at aLocal Level 180</p> <p>8.2.2 National Weather Service 182</p> <p>8.2.3 Case Study: Detection at a National Level 184</p> <p>8.3 Issuing Warnings 185</p> <p>8.3.1 Technical Issues 185</p> <p>8.3.2 Organizational Issues 185</p> <p>8.3.3 Societal Issues 187</p> <p>8.4 Types of Warning Systems 187</p> <p>8.4.1 Sirens 188</p> <p>8.4.2 The Emergency Alert System 188</p> <p>8.4.3 Phone Alert Systems: Reverse 911 190</p> <p>8.4.4 Disadvantages of Phone Notification Systems 190</p> <p>8.4.5 Communicating with Those with Disabilities 190</p> <p>8.4.6 Barriers to Warnings 191</p> <p>8.4.7 Case Example: A Nuclear Disaster 191</p> <p>8.5 Response 193</p> <p>8.5.1 Case Study: Response to Hurricane Katrina 194</p> <p>Summary 194</p> <p>Key Terms 195</p> <p>AssessYourUnderstanding195</p> <p>References195</p> <p><b>9 Hazards Analysis and Modeling: Predicting the Impact of Disasters 197</b></p> <p>Introduction 198</p> <p>9.1 Modeling and Emergency Management 198</p> <p>9.1.1 The Technology behind Modeling 199</p> <p>9.1.2 Mathematical Models 201</p> <p>9.1.3 Understanding the Results of Modeling 202</p> <p>9.1.4 Fast Exchange of Model Results to Users 203</p> <p>9.2 Using a Hurricane Model (SLOSH) 203</p> <p>9.2.1 SLOSH for Planning, Response, Recovery, and Mitigation 205</p> <p>9.2.2 SLOSH Display Program 206</p> <p>9.2.3 Strengths of SLOSH2 06</p> <p>9.2.4 Limitations of SLOSH 206</p> <p>9.2.5 Saffir–Simps on Scale 208</p> <p>9.3 Using the ALOHA Chemical Dispersion Model 209</p> <p>9.3.1 How ALOHA Works 210</p> <p>9.3.2 Model Outputs 210</p> <p>9.3.3 Threat Zone Estimates and Threat at a Point 210</p> <p>9.3.4 Strengths of ALOHA 211</p> <p>9.3.5 Limitations of ALOHA212</p> <p>9.3.6 Terms Used in ALOHA 213</p> <p>9.3.7 Concentration Patchiness, Particularly Near the Source215</p> <p>9.4 Hazards United States—Multi Hazard Model 216</p> <p>9.4.1 Strengths of HAZUS‐MH 219</p> <p>9.4.2 Limitations of HAZUS‐MH 220</p> <p>9.4.3 Multi risk Assessment 220</p> <p>9.5 Evacuation Modeling 220</p> <p>9.6 Centralized Hazard Modeling Initiatives 221</p> <p>9.6.1 Fire Potential Modeling 221</p> <p>9.6.2 Drought Modeling 223</p> <p>9.7 Evaluating Hazard Models 224</p> <p>Summary 225</p> <p>Key Terms 225</p> <p>Assess Your Understanding 226</p> <p>References 226</p> <p><b>10 Operational Problems and Technology: Making Technology Work for You 228</b></p> <p>Introduction 229</p> <p>10.1 Barriers in Implementing Technology in Emergency Management 229</p> <p>10.2 The Role of the Emergency Manager in Using Technology 231</p> <p>10.2.1 Managing an Organization 233</p> <p>10.3 Using Technology to Overcome Organizational Boundaries 234</p> <p>10.4 Pitfalls of Technology 235</p> <p>10.4.1 Reliance on Technology 235</p> <p>10.4.2 Obsolescence 236</p> <p>10.4.3 Information Overload 236</p> <p>10.4.4 Data Integration 236</p> <p>10.4.5 Real‐Time Response Data 237</p> <p>10.4.6 Security 237</p> <p>10.5 Managing the Technology 237</p> <p>Summary 240</p> <p>Key Terms 240</p> <p>Assess Your Understanding 240</p> <p>References 240</p> <p><b>11 Trends in Technology: New Tools for Challenges to Emergency Management 242</b></p> <p>Introduction 243</p> <p>11.1 Using Technology for Information Exchange 243</p> <p>11.1.1 Emergency Preparedness Information Exchange 244</p> <p>11.1.2 Television and Internet Information 244</p> <p>11.1.3 Digital Libraries and Publications 244</p> <p>11.2 Distance Learning 246</p> <p>11.2.1 Using Remote Technology 246</p> <p>11.2.2 Disaster Situational Maps 247</p> <p>11.2.3 Federal Agency Situational Mapping Programs249</p> <p>11.2.4 Innovative Visualization Efforts 252</p> <p>11.2.5 Updating Outputs 252</p> <p>11.3 Managing the Technology 253</p> <p>11.3.1 Organizational Coordination and Collaboration Strategies 254</p> <p>11.3.2 Technology Life Cycles 254</p> <p>11.3.3 Engaging Stakeholders 255</p> <p>11.3.4 Information Exchange 255</p> <p>11.3.5 Dealing with Information Overload 256</p> <p>Summary 257</p> <p>Key Terms 257</p> <p>Assess Your Understanding 257</p> <p>References 257</p> <p>Figure Credits 260</p> <p>Index 261</p>
<p><strong>John C. Pine, Ed.D,</strong> is a professor in the Department of Geography and Planning at Appalachian State University, and formerly Director of the Research Institute for Environment, Energy & Economics at Appalachian. He joined the Appalachian faculty in 2009 after serving thirty years at Louisiana State University in Baton Rouge where he directed a graduate and undergraduate Disaster Science and Management Program and served as a Professor with the Department of Environmental Science in the School of the Coast and Environment.
<p><strong>The first book devoted to a critically important aspect of disaster planning, management, and mitigation</strong> <p> <em>Technology and Emergency Management, Second Edition</em> describes best practices for technology use in emergency planning, response, recovery, and mitigation. It also describes the key elements that must be in place for technology to enhance the emergency management process. The tools, resources, and strategies discussed have been applied by organizations worldwide tasked with planning for and managing every variety of natural and man-made hazard and disaster. Illustrative case studies based on their experiences appear throughout the book. <p>This new addition of the critically acclaimed guide has been fully updated and expanded to reflect significant developments occurring in the field over the past decade. It features in-depth coverage of major advances in GIS technologies, including the development of mapping tools and high-resolution remote sensing imaging. Also covered is the increase in computer processing power and mobility and enhanced analytical capabilities for assessing the present conditions of natural systems and extrapolating from them to create accurate models of potential crisis conditions. This second edition also features a new section on cybersecurity and a new chapter on social media and disaster preparedness, response, and recovery has been added. <ul> <li>Explores the role of technology in emergency planning, response, recovery, and mitigation efforts</li> <li>Explores applications of the Internet, telecommunications, and networks to emergency management, as well as geospatial technologies and their applications</li> <li>Reviews the elements of hazard models and the relative strengths and weaknesses of modeling programs</li> <li>Describes techniques for developing hazard prediction models using direct and remote sensing data</li> <li>Includes test questions for each chapter, and a solutions manual and PowerPoint slides are available on a companion website</li> </ul> <br> <p> <em>Technology and Emergency Management, Second Edition</em> is a valuable working resource for practicing emergency managers and an excellent supplementary text for undergraduate and graduate students in emergency management and disaster management programs, urban and regional planning, and related fields.

Diese Produkte könnten Sie auch interessieren:

Projektmanagement und Prozessmessung
Projektmanagement und Prozessmessung
von: Ernst Jankulik, Peter Kuhlang, Roland Piff
PDF ebook
51,99 €
Project Management
Project Management
von: Harold Kerzner
PDF ebook
71,99 €