Muutke küpsiste eelistusi

E-raamat: Technology and Emergency Management

(Louisiana State University)
  • Formaat: PDF+DRM
  • Ilmumisaeg: 18-Aug-2017
  • Kirjastus: John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119234227
  • Formaat - PDF+DRM
  • Hind: 86,39 €*
  • * hind on lõplik, st. muud allahindlused enam ei rakendu
  • Lisa ostukorvi
  • Lisa soovinimekirja
  • See e-raamat on mõeldud ainult isiklikuks kasutamiseks. E-raamatuid ei saa tagastada.
  • Formaat: PDF+DRM
  • Ilmumisaeg: 18-Aug-2017
  • Kirjastus: John Wiley & Sons Inc
  • Keel: eng
  • ISBN-13: 9781119234227

DRM piirangud

  • Kopeerimine (copy/paste):

    ei ole lubatud

  • Printimine:

    ei ole lubatud

  • Kasutamine:

    Digitaalõiguste kaitse (DRM)
    Kirjastus on väljastanud selle e-raamatu krüpteeritud kujul, mis tähendab, et selle lugemiseks peate installeerima spetsiaalse tarkvara. Samuti peate looma endale  Adobe ID Rohkem infot siin. E-raamatut saab lugeda 1 kasutaja ning alla laadida kuni 6'de seadmesse (kõik autoriseeritud sama Adobe ID-ga).

    Vajalik tarkvara
    Mobiilsetes seadmetes (telefon või tahvelarvuti) lugemiseks peate installeerima selle tasuta rakenduse: PocketBook Reader (iOS / Android)

    PC või Mac seadmes lugemiseks peate installima Adobe Digital Editionsi (Seeon tasuta rakendus spetsiaalselt e-raamatute lugemiseks. Seda ei tohi segamini ajada Adober Reader'iga, mis tõenäoliselt on juba teie arvutisse installeeritud )

    Seda e-raamatut ei saa lugeda Amazon Kindle's. 

The first book devoted to a critically important aspect of disaster planning, management, and mitigation

Technology and Emergency Management, Second Edition describes best practices for technology use in emergency planning, response, recovery, and mitigation. It also describes the key elements that must be in place for technology to enhance the emergency management process. The tools, resources, and strategies discussed have been applied by organizations worldwide tasked with planning for and managing every variety of natural and man-made hazard and disaster. Illustrative case studies based on their experiences appear throughout the book. 

This new addition of the critically acclaimed guide has been fully updated and expanded to reflect significant developments occurring in the field over the past decade. It features in-depth coverage of major advances in GIS technologies, including the development of mapping tools and high-resolution remote sensing imaging. Also covered is the increase in computer processing power and mobility and enhanced analytical capabilities for assessing the present conditions of natural systems and extrapolating from them to create accurate models of potential crisis conditions. This second edition also features a new section on cybersecurity and a new chapter on social media and disaster preparedness, response, and recovery has been added.

  • Explores the role of technology in emergency planning, response, recovery, and mitigation efforts
  • Explores applications of the Internet, telecommunications, and networks to emergency management, as well as geospatial technologies and their applications
  • Reviews the elements of hazard models and the relative strengths and weaknesses of modeling programs
  • Describes techniques for developing hazard prediction models using direct and remote sensing data
  • Includes test questions for each chapter, and a solutions manual and PowerPoint slides are available on a companion website

Technology and Emergency Management, Second Edition is a valuable working resource for practicing emergency managers and an excellent supplementary text for undergraduate and graduate students in emergency management and disaster management programs, urban and regional planning, and related fields.

Concept xiii
About the Author xiv
List of Contributors xv
About the Companion Website xvi
1 The Need for Technology in Emergency Management 1(16)
Introduction
2(1)
1.1 Technology and Disaster Management
2(2)
1.1.1 Focus on Current and Emerging Technology
3(1)
1.2 Technology as a Management Tool
4(2)
1.2.1 Response to Complex Disaster Events
5(1)
1.2.2 Ease of Use of Technology
5(1)
1.3 Using Technologies
6(4)
1.3.1 Technology in a Changing Environment
8(1)
1.3.2 Examples of Technology
8(1)
1.3.3 Communicate Quickly
8(1)
1.3.4 Develop a Better Understanding of Hazards
9(1)
1.3.5 Improve Response
9(1)
1.3.6 Increase Coordination
9(1)
1.3.7 Improve Efficiency
9(1)
1.3.8 Training
9(1)
1.4 Completing a Needs Assessment
10(4)
1.4.1 Nature of a Needs Assessment
10(1)
1.4.2 Steps to Complete a Needs Assessment
11(1)
1.4.3 Implementing the Needs Assessment
12(1)
1.4.4 Impacts of Implementing Innovation
12(2)
Summary
14(1)
Key Terms
14(1)
Assess Your Understanding
14(1)
References
15(2)
2 Computer Networks and Emergency Management 17(25)
Introduction
18(1)
2.1 What Is a Network?
19(1)
2.2 Types of Networks
19(2)
2.2.1 Local Area Network
19(1)
2.2.2 Metropolitan Area Network
20(1)
2.2.3 Wide Area Network
20(1)
2.2.4 Personal Area Network
21(1)
2.3 The Internet
21(3)
2.4 Communication Technologies
24(8)
2.4.1 Wired Network Technologies
24(3)
2.4.2 Long-Range Wireless Network Technologies
27(3)
2.4.3 Short-Range Wireless Network Technologies
30(2)
2.5 The Internet and Emergency Management
32(3)
2.6 IoT and Emergency Management
35(3)
Summary
38(1)
Key Terms
38(2)
Assess Your Understanding
40(1)
References
40(2)
3 Cyber Security 42(19)
Introduction
43(2)
3.1 Sources of Attacks
45(1)
3.2 Attack Vectors
46(3)
3.2.1 Vulnerabilities
46(1)
3.2.2 Phishing
46(1)
3.2.3 Stolen Credentials
47(1)
3.2.4 Web Applications
47(1)
3.2.5 Point of Sale Intrusions
48(1)
3.2.6 Payment Card Skimmers
49(1)
3.2.7 Insider and Privilege Misuse
49(1)
3.2.8 Physical Theft and Loss
49(1)
3.2.9 Denial of Service Attacks
49(1)
3.3 Overview of Malware
49(3)
3.3.1 Malware Propagation
50(1)
3.3.2 Malware Payload
51(1)
3.4 Securing Cyber Systems
52(2)
3.5 Securing Data
54(2)
3.6 Cyber Security Attack Recovery
56(1)
Summary
57(1)
Key Terms
57(2)
Assess Your Understanding
59(1)
References
59(2)
4 Social Media and Emergency Management 61(36)
Introduction
62(1)
4.1 Situational Awareness, Emergency Communications, and the Public Realm
62(2)
4.2 What Is Social Media?
64(1)
4.2.1 The Birth of Web 2.0
64(1)
4.3 Types of Social Media Used in Disasters
65(2)
4.4 Mass Alert Systems
67(1)
4.5 Mass Media and Social Media Use in Virginia Tech Shooting Response
67(2)
4.5.1 Information Communication Technologies
69(1)
4.6 What Is a Disaster?
69(1)
4.7 Usage Patterns of Social Media Over Time
70(3)
4.8 Social Media's Growth and the Role of Traditional Sources
73(1)
4.8.1 Role of Social Media in Disasters
74(1)
4.8.2 Use of Social Media by People Affected by Crisis
74(1)
4.9 Use of Social Media for Preparedness and Planning
74(1)
4.9.1 Expansion of Communication Networks
75(1)
4.10 Use of Social Media Before and During Mass Emergencies
75(6)
4.10.1 Emergency Managers' Use of Social Media in Response
76(1)
4.10.2 Emergency Managers in Listening Mode
76(1)
4.10.3 Managing the Use of Twitter or Facebook
76(1)
4.10.4 Information-Vetting Dynamics
76(1)
4.10.5 Building Resiliency
77(1)
4.10.6 Changing Nature of Social Behaviors
78(3)
4.11 Issues Arising from the Use of Social Media by Emergency Managers During Events
81(1)
4.11.1 Changing Role of PIO
81(1)
4.12 Using Social Media to Establish Information on Damages and Recovery
81(2)
4.12.1 Evolving Networks
82(1)
4.12.2 Expanding Information Relevant to a Specific Event
82(1)
4.12.3 Expanded Communication Benefits
83(1)
4.13 The Advantages and Fallbacks of Geotargeting
83(1)
4.14 Social Media Companies' Contribution to Emergency Response
84(1)
4.14.1 Information Dissemination and Feedback
84(1)
4.15 Concerns About and Limitations of Social Media Usage in Disasters
85(2)
4.15.1 Misleading Information
85(1)
4.15.2 Dependable Networks
85(1)
4.15.3 Reliable Information Sources
86(1)
4.15.4 Communicating with a Broad Audience
86(1)
4.15.5 Managing a Large Quantity of Data
86(1)
4.16 The Future of Social Media in Disasters
87(4)
4.16.1 New Role for the Public in a Crisis
87(1)
4.16.2 Dynamic Nature of Social Media
87(1)
4.16.3 Social Media as a Valuable Resource
88(1)
4.16.4 Self-correcting Nature of Social Media
88(1)
4.16.5 Accuracy of Information
88(1)
4.16.6 Threats of Technology Failure
88(1)
4.16.7 Case Example: Crowdfunding and Remote Emergency Response: 2010 Haitian Earthquake as a Case Study
89(1)
4.16.8 Examining the Use of Social Media in Haiti
90(1)
4.17 Looking Forward
91(1)
Key Terms
91(2)
Assess Your Understanding
93(1)
References
94(3)
5 Geospatial Technologies and Emergency Management 97(23)
Introduction
98(1)
5.1 Geospatial Technologies and Emergency Management
99(1)
5.1.1 Elements of GT
99(1)
5.1.2 Use of GT to Answer Questions in Emergency Management
100(1)
5.2 GT Across the Human-Hazard Interface
100(4)
5.2.1 Our People
100(1)
5.2.2 Limitations of Census Data
101(3)
5.3 Our Resources
104(4)
5.3.1 Understanding Critical Infrastructure
104(1)
5.3.2 Understanding Critical Social Infrastructure
105(1)
5.3.3 Resources of Social Importance
106(1)
5.3.4 Spatial Video Geonarrative
107(1)
5.4 Understanding Our Hazards
108(4)
5.4.1 Natural Hazards Casualties in the United States
108(1)
5.4.2 Hazard Zonation
109(1)
5.4.3 Our Human-Hazard Interface
110(1)
5.4.4 Understanding Overlays and Buffers
110(2)
5.5 Dissemination and Hazard Communication
112(1)
5.5.1 Contribution of Google Earth
113(1)
5.6 Summary
113(2)
5.7 Conclusions
115(1)
Key Terms
116(1)
Assess Your Understanding
117(1)
References
117(3)
6 Direct and Remote Sensing Systems: Describing and Detecting Hazards 120(37)
Introduction
121(1)
6.1 Data Collection
121(3)
6.2 Weather Stations
124(4)
6.2.1 Weather Station Data
125(1)
6.2.2 Weather Station Networks
126(1)
6.2.3 Geospatial Multi-agency Coordination Wildfire Application
127(1)
6.3 Water Data Sensors
128(4)
6.3.1 Flood Warning Systems for Local Communities
128(2)
6.3.2 Rain and Stream Gauges
130(1)
6.3.3 How a USGS Stream Gauge Works
130(1)
6.3.4 The USGS Stream Gaging Program
131(1)
6.3.5 Using USGS Stream-flow Data for Emergency Management
131(1)
6.4 Air Sensors
132(1)
6.4.1 Outdoor Air Quality Sensors
132(1)
6.4.2 Chemical Sensors
133(1)
6.5 Evaluating the Technology
133(1)
6.6 Remote Sensing
134(16)
6.6.1 An Overview of Remote Sensing
135(1)
6.6.2 Optical Satellite Remote Sensing
136(9)
6.6.3 Satellite Remote Sensing of Weather
145(2)
6.6.4 Radar Imaging
147(1)
6.6.5 Manned and Unmanned Airborne Remote Sensing
147(3)
6.7 Using and Assessing Data
150(1)
6.8 Trends in Remote and Direct Sensing Technology
151(1)
Summary
151(1)
Key Terms
152(2)
Online Resources
154(1)
Assess Your Understanding
155(1)
References
155(2)
7 Emergency Management Decision Support Systems: Using Data to Manage Disasters 157(20)
Introduction
158(1)
7.1 Emergency Management Information Systems and Networks
158(3)
7.2 Evaluating Information Systems
161(2)
7.2.1 Quality
161(1)
7.2.2 Timeliness
161(1)
7.2.3 Completeness
162(1)
7.2.4 Performance
162(1)
7.3 Federal, State, and Local Information Systems
163(2)
7.3.1 Management Information Systems
163(1)
7.3.2 The National Emergency Management Information System
163(1)
7.3.3 Computer Aided Management of Emergency Operations
164(1)
7.4 Using Data
165(3)
7.4.1 Databases
166(1)
7.4.2 Data Dictionary (Meta-data)
166(2)
7.5 Evaluating Databases
168(1)
7.6 Using Emergency Management Databases
169(2)
7.6.1 HAZUS-MH Datasets
171(1)
7.7 Management Roles in Decision Support Systems
171(1)
7.8 Obtaining Data from Public Federal Data Sources
172(1)
7.9 The Future of Decision Support Systems: The Intelligent Community
173(1)
Summary
174(1)
Key Terms
174(1)
Assess Your Understanding
174(1)
References
175(2)
8 Warning Systems: Alerting the Public to Danger 177(20)
Introduction
178(1)
8.1 Warning Systems
178(2)
8.1.1 Key Information
178(1)
8.1.2 Key Components of Warning Systems
178(1)
8.1.3 Warning Subsystems
179(1)
8.2 Detection and Management
180(5)
8.2.1 Case Study: Detection at a Local Level
180(2)
8.2.2 National Weather Service
182(2)
8.2.3 Case Study: Detection at a National Level
184(1)
8.3 Issuing Warnings
185(2)
8.3.1 Technical Issues
185(1)
8.3.2 Organizational Issues
185(2)
8.3.3 Societal Issues
187(1)
8.4 Types of Warning Systems
187(6)
8.4.1 Sirens
188(1)
8.4.2 The Emergency Alert System
188(2)
8.4.3 Phone Alert Systems: Reverse 911
190(1)
8.4.4 Disadvantages of Phone Notification Systems
190(1)
8.4.5 Communicating with Those with Disabilities
190(1)
8.4.6 Barriers to Warnings
191(1)
8.4.7 Case Example: A Nuclear Disaster
191(2)
8.5 Response
193(1)
8.5.1 Case Study: Response to Hurricane Katrina
194(1)
Summary
194(1)
Key Terms
195(1)
Assess Your Understanding
195(1)
References
195(2)
9 Hazards Analysis and Modeling: Predicting the Impact of Disasters 197(31)
Introduction
198(1)
9.1 Modeling and Emergency Management
198(5)
9.1.1 The Technology behind Modeling
199(2)
9.1.2 Mathematical Models
201(1)
9.1.3 Understanding the Results of Modeling
202(1)
9.1.4 Fast Exchange of Model Results to Users
203(1)
9.2 Using a Hurricane Model (SLOSH)
203(6)
9.2.1 SLOSH for Planning, Response, Recovery, and Mitigation
205(1)
9.2.2 SLOSH Display Program
206(1)
9.2.3 Strengths of SLOSH
206(1)
9.2.4 Limitations of SLOSH
206(2)
9.2.5 Saffir-Simpson Scale
208(1)
9.3 Using the ALOHA Chemical Dispersion Model
209(7)
9.3.1 How ALOHA Works
210(1)
9.3.2 Model Outputs
210(1)
9.3.3 Threat Zone Estimates and Threat at a Point
210(1)
9.3.4 Strengths of ALOHA
211(1)
9.3.5 Limitations of ALOHA
212(1)
9.3.6 Terms Used in ALOHA
213(2)
9.3.7 Concentration Patchiness, Particularly Near the Source
215(1)
9.4 Hazards United States-Multi Hazard Model
216(4)
9.4.1 Strengths of HAZUS-MH
219(1)
9.4.2 Limitations of HAZUS-MH
220(1)
9.4.3 Multirisk Assessment
220(1)
9.5 Evacuation Modeling
220(1)
9.6 Centralized Hazard Modeling Initiatives
221(3)
9.6.1 Fire Potential Modeling
221(2)
9.6.2 Drought Modeling
223(1)
9.7 Evaluating Hazard Models
224(1)
Summary
225(1)
Key Terms
225(1)
Assess Your Understanding
226(1)
References
226(2)
10 Operational Problems and Technology: Making Technology Work for You 228(14)
Introduction
229(1)
10.1 Barriers in Implementing Technology in Emergency Management
229(2)
10.2 The Role of the Emergency Manager in Using Technology
231(3)
10.2.1 Managing an Organization
233(1)
10.3 Using Technology to Overcome Organizational Boundaries
234(1)
10.4 Pitfalls of Technology
235(2)
10.4.1 Reliance on Technology
235(1)
10.4.2 Obsolescence
236(1)
10.4.3 Information Overload
236(1)
10.4.4 Data Integration
236(1)
10.4.5 Real-Time Response Data
237(1)
10.4.6 Security
237(1)
10.5 Managing the Technology
237(3)
Summary
240(1)
Key Terms
240(1)
Assess Your Understanding
240(1)
References
240(2)
11 Trends in Technology: New Tools for Challenges to Emergency Management 242(18)
Introduction
243(1)
11.1 Using Technology for Information Exchange
243(3)
11.1.1 Emergency Preparedness Information Exchange
244(1)
11.1.2 Television and Internet Information
244(1)
11.1.3 Digital Libraries and Publications
244(2)
11.2 Distance Learning
246(7)
11.2.1 Using Remote Technology
246(1)
11.2.2 Disaster Situational Maps
247(2)
11.2.3 Federal Agency Situational Mapping Programs
249(3)
11.2.4 Innovative Visualization Efforts
252(1)
11.2.5 Updating Outputs
252(1)
11.3 Managing the Technology
253(4)
11.3.1 Organizational Coordination and Collaboration Strategies
254(1)
11.3.2 Technology Life Cycles
254(1)
11.3.3 Engaging Stakeholders
255(1)
11.3.4 Information Exchange
255(1)
11.3.5 Dealing with Information Overload
256(1)
Summary
257(1)
Key Terms
257(1)
Assess Your Understanding
257(1)
References
257(3)
Figure Credits 260(1)
Index 261
John C. Pine, Ed.D, is a professor in the Department of Geography and Planning at Appalachian State University, and formerly Director of the Research Institute for Environment, Energy & Economics at Appalachian. He joined the Appalachian faculty in 2009 after serving thirty years at Louisiana State University in Baton Rouge where he directed a graduate and undergraduate Disaster Science and Management Program and served as a Professor with the Department of Environmental Science in the School of the Coast and Environment.