Concept |
|
xiii | |
About the Author |
|
xiv | |
List of Contributors |
|
xv | |
About the Companion Website |
|
xvi | |
1 The Need for Technology in Emergency Management |
|
1 | (16) |
|
|
2 | (1) |
|
1.1 Technology and Disaster Management |
|
|
2 | (2) |
|
1.1.1 Focus on Current and Emerging Technology |
|
|
3 | (1) |
|
1.2 Technology as a Management Tool |
|
|
4 | (2) |
|
1.2.1 Response to Complex Disaster Events |
|
|
5 | (1) |
|
1.2.2 Ease of Use of Technology |
|
|
5 | (1) |
|
|
6 | (4) |
|
1.3.1 Technology in a Changing Environment |
|
|
8 | (1) |
|
1.3.2 Examples of Technology |
|
|
8 | (1) |
|
1.3.3 Communicate Quickly |
|
|
8 | (1) |
|
1.3.4 Develop a Better Understanding of Hazards |
|
|
9 | (1) |
|
|
9 | (1) |
|
1.3.6 Increase Coordination |
|
|
9 | (1) |
|
|
9 | (1) |
|
|
9 | (1) |
|
1.4 Completing a Needs Assessment |
|
|
10 | (4) |
|
1.4.1 Nature of a Needs Assessment |
|
|
10 | (1) |
|
1.4.2 Steps to Complete a Needs Assessment |
|
|
11 | (1) |
|
1.4.3 Implementing the Needs Assessment |
|
|
12 | (1) |
|
1.4.4 Impacts of Implementing Innovation |
|
|
12 | (2) |
|
|
14 | (1) |
|
|
14 | (1) |
|
Assess Your Understanding |
|
|
14 | (1) |
|
|
15 | (2) |
2 Computer Networks and Emergency Management |
|
17 | (25) |
|
|
18 | (1) |
|
|
19 | (1) |
|
|
19 | (2) |
|
|
19 | (1) |
|
2.2.2 Metropolitan Area Network |
|
|
20 | (1) |
|
|
20 | (1) |
|
2.2.4 Personal Area Network |
|
|
21 | (1) |
|
|
21 | (3) |
|
2.4 Communication Technologies |
|
|
24 | (8) |
|
2.4.1 Wired Network Technologies |
|
|
24 | (3) |
|
2.4.2 Long-Range Wireless Network Technologies |
|
|
27 | (3) |
|
2.4.3 Short-Range Wireless Network Technologies |
|
|
30 | (2) |
|
2.5 The Internet and Emergency Management |
|
|
32 | (3) |
|
2.6 IoT and Emergency Management |
|
|
35 | (3) |
|
|
38 | (1) |
|
|
38 | (2) |
|
Assess Your Understanding |
|
|
40 | (1) |
|
|
40 | (2) |
3 Cyber Security |
|
42 | (19) |
|
|
43 | (2) |
|
|
45 | (1) |
|
|
46 | (3) |
|
|
46 | (1) |
|
|
46 | (1) |
|
|
47 | (1) |
|
|
47 | (1) |
|
3.2.5 Point of Sale Intrusions |
|
|
48 | (1) |
|
3.2.6 Payment Card Skimmers |
|
|
49 | (1) |
|
3.2.7 Insider and Privilege Misuse |
|
|
49 | (1) |
|
3.2.8 Physical Theft and Loss |
|
|
49 | (1) |
|
3.2.9 Denial of Service Attacks |
|
|
49 | (1) |
|
|
49 | (3) |
|
3.3.1 Malware Propagation |
|
|
50 | (1) |
|
|
51 | (1) |
|
3.4 Securing Cyber Systems |
|
|
52 | (2) |
|
|
54 | (2) |
|
3.6 Cyber Security Attack Recovery |
|
|
56 | (1) |
|
|
57 | (1) |
|
|
57 | (2) |
|
Assess Your Understanding |
|
|
59 | (1) |
|
|
59 | (2) |
4 Social Media and Emergency Management |
|
61 | (36) |
|
|
62 | (1) |
|
4.1 Situational Awareness, Emergency Communications, and the Public Realm |
|
|
62 | (2) |
|
4.2 What Is Social Media? |
|
|
64 | (1) |
|
4.2.1 The Birth of Web 2.0 |
|
|
64 | (1) |
|
4.3 Types of Social Media Used in Disasters |
|
|
65 | (2) |
|
|
67 | (1) |
|
4.5 Mass Media and Social Media Use in Virginia Tech Shooting Response |
|
|
67 | (2) |
|
4.5.1 Information Communication Technologies |
|
|
69 | (1) |
|
|
69 | (1) |
|
4.7 Usage Patterns of Social Media Over Time |
|
|
70 | (3) |
|
4.8 Social Media's Growth and the Role of Traditional Sources |
|
|
73 | (1) |
|
4.8.1 Role of Social Media in Disasters |
|
|
74 | (1) |
|
4.8.2 Use of Social Media by People Affected by Crisis |
|
|
74 | (1) |
|
4.9 Use of Social Media for Preparedness and Planning |
|
|
74 | (1) |
|
4.9.1 Expansion of Communication Networks |
|
|
75 | (1) |
|
4.10 Use of Social Media Before and During Mass Emergencies |
|
|
75 | (6) |
|
4.10.1 Emergency Managers' Use of Social Media in Response |
|
|
76 | (1) |
|
4.10.2 Emergency Managers in Listening Mode |
|
|
76 | (1) |
|
4.10.3 Managing the Use of Twitter or Facebook |
|
|
76 | (1) |
|
4.10.4 Information-Vetting Dynamics |
|
|
76 | (1) |
|
4.10.5 Building Resiliency |
|
|
77 | (1) |
|
4.10.6 Changing Nature of Social Behaviors |
|
|
78 | (3) |
|
4.11 Issues Arising from the Use of Social Media by Emergency Managers During Events |
|
|
81 | (1) |
|
4.11.1 Changing Role of PIO |
|
|
81 | (1) |
|
4.12 Using Social Media to Establish Information on Damages and Recovery |
|
|
81 | (2) |
|
|
82 | (1) |
|
4.12.2 Expanding Information Relevant to a Specific Event |
|
|
82 | (1) |
|
4.12.3 Expanded Communication Benefits |
|
|
83 | (1) |
|
4.13 The Advantages and Fallbacks of Geotargeting |
|
|
83 | (1) |
|
4.14 Social Media Companies' Contribution to Emergency Response |
|
|
84 | (1) |
|
4.14.1 Information Dissemination and Feedback |
|
|
84 | (1) |
|
4.15 Concerns About and Limitations of Social Media Usage in Disasters |
|
|
85 | (2) |
|
4.15.1 Misleading Information |
|
|
85 | (1) |
|
4.15.2 Dependable Networks |
|
|
85 | (1) |
|
4.15.3 Reliable Information Sources |
|
|
86 | (1) |
|
4.15.4 Communicating with a Broad Audience |
|
|
86 | (1) |
|
4.15.5 Managing a Large Quantity of Data |
|
|
86 | (1) |
|
4.16 The Future of Social Media in Disasters |
|
|
87 | (4) |
|
4.16.1 New Role for the Public in a Crisis |
|
|
87 | (1) |
|
4.16.2 Dynamic Nature of Social Media |
|
|
87 | (1) |
|
4.16.3 Social Media as a Valuable Resource |
|
|
88 | (1) |
|
4.16.4 Self-correcting Nature of Social Media |
|
|
88 | (1) |
|
4.16.5 Accuracy of Information |
|
|
88 | (1) |
|
4.16.6 Threats of Technology Failure |
|
|
88 | (1) |
|
4.16.7 Case Example: Crowdfunding and Remote Emergency Response: 2010 Haitian Earthquake as a Case Study |
|
|
89 | (1) |
|
4.16.8 Examining the Use of Social Media in Haiti |
|
|
90 | (1) |
|
|
91 | (1) |
|
|
91 | (2) |
|
Assess Your Understanding |
|
|
93 | (1) |
|
|
94 | (3) |
5 Geospatial Technologies and Emergency Management |
|
97 | (23) |
|
|
98 | (1) |
|
5.1 Geospatial Technologies and Emergency Management |
|
|
99 | (1) |
|
|
99 | (1) |
|
5.1.2 Use of GT to Answer Questions in Emergency Management |
|
|
100 | (1) |
|
5.2 GT Across the Human-Hazard Interface |
|
|
100 | (4) |
|
|
100 | (1) |
|
5.2.2 Limitations of Census Data |
|
|
101 | (3) |
|
|
104 | (4) |
|
5.3.1 Understanding Critical Infrastructure |
|
|
104 | (1) |
|
5.3.2 Understanding Critical Social Infrastructure |
|
|
105 | (1) |
|
5.3.3 Resources of Social Importance |
|
|
106 | (1) |
|
5.3.4 Spatial Video Geonarrative |
|
|
107 | (1) |
|
5.4 Understanding Our Hazards |
|
|
108 | (4) |
|
5.4.1 Natural Hazards Casualties in the United States |
|
|
108 | (1) |
|
|
109 | (1) |
|
5.4.3 Our Human-Hazard Interface |
|
|
110 | (1) |
|
5.4.4 Understanding Overlays and Buffers |
|
|
110 | (2) |
|
5.5 Dissemination and Hazard Communication |
|
|
112 | (1) |
|
5.5.1 Contribution of Google Earth |
|
|
113 | (1) |
|
|
113 | (2) |
|
|
115 | (1) |
|
|
116 | (1) |
|
Assess Your Understanding |
|
|
117 | (1) |
|
|
117 | (3) |
6 Direct and Remote Sensing Systems: Describing and Detecting Hazards |
|
120 | (37) |
|
|
121 | (1) |
|
|
121 | (3) |
|
|
124 | (4) |
|
6.2.1 Weather Station Data |
|
|
125 | (1) |
|
6.2.2 Weather Station Networks |
|
|
126 | (1) |
|
6.2.3 Geospatial Multi-agency Coordination Wildfire Application |
|
|
127 | (1) |
|
|
128 | (4) |
|
6.3.1 Flood Warning Systems for Local Communities |
|
|
128 | (2) |
|
6.3.2 Rain and Stream Gauges |
|
|
130 | (1) |
|
6.3.3 How a USGS Stream Gauge Works |
|
|
130 | (1) |
|
6.3.4 The USGS Stream Gaging Program |
|
|
131 | (1) |
|
6.3.5 Using USGS Stream-flow Data for Emergency Management |
|
|
131 | (1) |
|
|
132 | (1) |
|
6.4.1 Outdoor Air Quality Sensors |
|
|
132 | (1) |
|
|
133 | (1) |
|
6.5 Evaluating the Technology |
|
|
133 | (1) |
|
|
134 | (16) |
|
6.6.1 An Overview of Remote Sensing |
|
|
135 | (1) |
|
6.6.2 Optical Satellite Remote Sensing |
|
|
136 | (9) |
|
6.6.3 Satellite Remote Sensing of Weather |
|
|
145 | (2) |
|
|
147 | (1) |
|
6.6.5 Manned and Unmanned Airborne Remote Sensing |
|
|
147 | (3) |
|
6.7 Using and Assessing Data |
|
|
150 | (1) |
|
6.8 Trends in Remote and Direct Sensing Technology |
|
|
151 | (1) |
|
|
151 | (1) |
|
|
152 | (2) |
|
|
154 | (1) |
|
Assess Your Understanding |
|
|
155 | (1) |
|
|
155 | (2) |
7 Emergency Management Decision Support Systems: Using Data to Manage Disasters |
|
157 | (20) |
|
|
158 | (1) |
|
7.1 Emergency Management Information Systems and Networks |
|
|
158 | (3) |
|
7.2 Evaluating Information Systems |
|
|
161 | (2) |
|
|
161 | (1) |
|
|
161 | (1) |
|
|
162 | (1) |
|
|
162 | (1) |
|
7.3 Federal, State, and Local Information Systems |
|
|
163 | (2) |
|
7.3.1 Management Information Systems |
|
|
163 | (1) |
|
7.3.2 The National Emergency Management Information System |
|
|
163 | (1) |
|
7.3.3 Computer Aided Management of Emergency Operations |
|
|
164 | (1) |
|
|
165 | (3) |
|
|
166 | (1) |
|
7.4.2 Data Dictionary (Meta-data) |
|
|
166 | (2) |
|
|
168 | (1) |
|
7.6 Using Emergency Management Databases |
|
|
169 | (2) |
|
|
171 | (1) |
|
7.7 Management Roles in Decision Support Systems |
|
|
171 | (1) |
|
7.8 Obtaining Data from Public Federal Data Sources |
|
|
172 | (1) |
|
7.9 The Future of Decision Support Systems: The Intelligent Community |
|
|
173 | (1) |
|
|
174 | (1) |
|
|
174 | (1) |
|
Assess Your Understanding |
|
|
174 | (1) |
|
|
175 | (2) |
8 Warning Systems: Alerting the Public to Danger |
|
177 | (20) |
|
|
178 | (1) |
|
|
178 | (2) |
|
|
178 | (1) |
|
8.1.2 Key Components of Warning Systems |
|
|
178 | (1) |
|
|
179 | (1) |
|
8.2 Detection and Management |
|
|
180 | (5) |
|
8.2.1 Case Study: Detection at a Local Level |
|
|
180 | (2) |
|
8.2.2 National Weather Service |
|
|
182 | (2) |
|
8.2.3 Case Study: Detection at a National Level |
|
|
184 | (1) |
|
|
185 | (2) |
|
|
185 | (1) |
|
8.3.2 Organizational Issues |
|
|
185 | (2) |
|
|
187 | (1) |
|
8.4 Types of Warning Systems |
|
|
187 | (6) |
|
|
188 | (1) |
|
8.4.2 The Emergency Alert System |
|
|
188 | (2) |
|
8.4.3 Phone Alert Systems: Reverse 911 |
|
|
190 | (1) |
|
8.4.4 Disadvantages of Phone Notification Systems |
|
|
190 | (1) |
|
8.4.5 Communicating with Those with Disabilities |
|
|
190 | (1) |
|
8.4.6 Barriers to Warnings |
|
|
191 | (1) |
|
8.4.7 Case Example: A Nuclear Disaster |
|
|
191 | (2) |
|
|
193 | (1) |
|
8.5.1 Case Study: Response to Hurricane Katrina |
|
|
194 | (1) |
|
|
194 | (1) |
|
|
195 | (1) |
|
Assess Your Understanding |
|
|
195 | (1) |
|
|
195 | (2) |
9 Hazards Analysis and Modeling: Predicting the Impact of Disasters |
|
197 | (31) |
|
|
198 | (1) |
|
9.1 Modeling and Emergency Management |
|
|
198 | (5) |
|
9.1.1 The Technology behind Modeling |
|
|
199 | (2) |
|
9.1.2 Mathematical Models |
|
|
201 | (1) |
|
9.1.3 Understanding the Results of Modeling |
|
|
202 | (1) |
|
9.1.4 Fast Exchange of Model Results to Users |
|
|
203 | (1) |
|
9.2 Using a Hurricane Model (SLOSH) |
|
|
203 | (6) |
|
9.2.1 SLOSH for Planning, Response, Recovery, and Mitigation |
|
|
205 | (1) |
|
9.2.2 SLOSH Display Program |
|
|
206 | (1) |
|
|
206 | (1) |
|
9.2.4 Limitations of SLOSH |
|
|
206 | (2) |
|
9.2.5 Saffir-Simpson Scale |
|
|
208 | (1) |
|
9.3 Using the ALOHA Chemical Dispersion Model |
|
|
209 | (7) |
|
|
210 | (1) |
|
|
210 | (1) |
|
9.3.3 Threat Zone Estimates and Threat at a Point |
|
|
210 | (1) |
|
|
211 | (1) |
|
9.3.5 Limitations of ALOHA |
|
|
212 | (1) |
|
9.3.6 Terms Used in ALOHA |
|
|
213 | (2) |
|
9.3.7 Concentration Patchiness, Particularly Near the Source |
|
|
215 | (1) |
|
9.4 Hazards United States-Multi Hazard Model |
|
|
216 | (4) |
|
9.4.1 Strengths of HAZUS-MH |
|
|
219 | (1) |
|
9.4.2 Limitations of HAZUS-MH |
|
|
220 | (1) |
|
9.4.3 Multirisk Assessment |
|
|
220 | (1) |
|
|
220 | (1) |
|
9.6 Centralized Hazard Modeling Initiatives |
|
|
221 | (3) |
|
9.6.1 Fire Potential Modeling |
|
|
221 | (2) |
|
|
223 | (1) |
|
9.7 Evaluating Hazard Models |
|
|
224 | (1) |
|
|
225 | (1) |
|
|
225 | (1) |
|
Assess Your Understanding |
|
|
226 | (1) |
|
|
226 | (2) |
10 Operational Problems and Technology: Making Technology Work for You |
|
228 | (14) |
|
|
229 | (1) |
|
10.1 Barriers in Implementing Technology in Emergency Management |
|
|
229 | (2) |
|
10.2 The Role of the Emergency Manager in Using Technology |
|
|
231 | (3) |
|
10.2.1 Managing an Organization |
|
|
233 | (1) |
|
10.3 Using Technology to Overcome Organizational Boundaries |
|
|
234 | (1) |
|
10.4 Pitfalls of Technology |
|
|
235 | (2) |
|
10.4.1 Reliance on Technology |
|
|
235 | (1) |
|
|
236 | (1) |
|
10.4.3 Information Overload |
|
|
236 | (1) |
|
|
236 | (1) |
|
10.4.5 Real-Time Response Data |
|
|
237 | (1) |
|
|
237 | (1) |
|
10.5 Managing the Technology |
|
|
237 | (3) |
|
|
240 | (1) |
|
|
240 | (1) |
|
Assess Your Understanding |
|
|
240 | (1) |
|
|
240 | (2) |
11 Trends in Technology: New Tools for Challenges to Emergency Management |
|
242 | (18) |
|
|
243 | (1) |
|
11.1 Using Technology for Information Exchange |
|
|
243 | (3) |
|
11.1.1 Emergency Preparedness Information Exchange |
|
|
244 | (1) |
|
11.1.2 Television and Internet Information |
|
|
244 | (1) |
|
11.1.3 Digital Libraries and Publications |
|
|
244 | (2) |
|
|
246 | (7) |
|
11.2.1 Using Remote Technology |
|
|
246 | (1) |
|
11.2.2 Disaster Situational Maps |
|
|
247 | (2) |
|
11.2.3 Federal Agency Situational Mapping Programs |
|
|
249 | (3) |
|
11.2.4 Innovative Visualization Efforts |
|
|
252 | (1) |
|
|
252 | (1) |
|
11.3 Managing the Technology |
|
|
253 | (4) |
|
11.3.1 Organizational Coordination and Collaboration Strategies |
|
|
254 | (1) |
|
11.3.2 Technology Life Cycles |
|
|
254 | (1) |
|
11.3.3 Engaging Stakeholders |
|
|
255 | (1) |
|
11.3.4 Information Exchange |
|
|
255 | (1) |
|
11.3.5 Dealing with Information Overload |
|
|
256 | (1) |
|
|
257 | (1) |
|
|
257 | (1) |
|
Assess Your Understanding |
|
|
257 | (1) |
|
|
257 | (3) |
Figure Credits |
|
260 | (1) |
Index |
|
261 | |