Technology and Emergency Management 2e
Paperback Engels 2017 9781119234081Samenvatting
The first book devoted to a critically important aspect of disaster planning, management, and mitigation
Technology and Emergency Management, Second Edition describes best practices for technology use in emergency planning, response, recovery, and mitigation. It also describes the key elements that must be in place for technology to enhance the emergency management process. The tools, resources, and strategies discussed have been applied by organizations worldwide tasked with planning for and managing every variety of natural and man–made hazard and disaster. Illustrative case studies based on their experiences appear throughout the book.
This new addition of the critically acclaimed guide has been fully updated and expanded to reflect significant developments occurring in the field over the past decade. It features in–depth coverage of major advances in GIS technologies, including the development of mapping tools and high–resolution remote sensing imaging. Also covered is the increase in computer processing power and mobility and enhanced analytical capabilities for assessing the present conditions of natural systems and extrapolating from them to create accurate models of potential crisis conditions. This second edition also features a new section on cybersecurity and a new chapter on social media and disaster preparedness, response, and recovery has been added.
Explores the role of technology in emergency planning, response, recovery, and mitigation efforts
Explores applications of the Internet, telecommunications, and networks to emergency management, as well as geospatial technologies and their applications
Reviews the elements of hazard models and the relative strengths and weaknesses of modeling programs
Describes techniques for developing hazard prediction models using direct and remote sensing data
Includes test questions for each chapter, and a solutions manual and PowerPoint slides are available on a companion website
Technology and Emergency Management, Second Edition is a valuable working resource for practicing emergency managers and an excellent supplementary text for undergraduate and graduate students in emergency management and disaster management programs, urban and regional planning, and related fields.
Specificaties
Lezersrecensies
Inhoudsopgave
<p>About the Author xiv</p>
<p>List of Contributors xv</p>
<p>About the Companion Website xvi</p>
<p>1 The Need for Technology in Emergency Management 1</p>
<p>Introduction 2</p>
<p>11 Technology and Disaster Management 2</p>
<p>111 Focus on Current and Emerging Technology 3</p>
<p>12 Technology as a Management Tool 4</p>
<p>121 Response to Complex Disaster Events 5</p>
<p>122 Ease of Use of Technology 5</p>
<p>13 Using Technologies 6</p>
<p>131 Technology in a Changing Environment 8</p>
<p>132 Examples of Technology 8</p>
<p>133 Communicate Quickly 8</p>
<p>134 Develop a Better Understanding of Hazards 9</p>
<p>135 Improve Response 9</p>
<p>136 Increase Coordination 9</p>
<p>137 Improve Efficiency 9</p>
<p>138 Training 9</p>
<p>14 Completing a Needs Assessment 10</p>
<p>141 Nature of a Needs Assessment 10</p>
<p>142 Steps to Complete a Needs Assessment 11</p>
<p>143 Implementing the Needs Assessment 12</p>
<p>144 Impacts of Implementing Innovation 12</p>
<p>Summary 14</p>
<p>Key Terms 14</p>
<p>Assess Your Understanding 14</p>
<p>References 15</p>
<p>2 Computer Networks and Emergency Management 17</p>
<p>Introduction 18</p>
<p>21 What Is a Network? 19</p>
<p>22 Types of Networks 19</p>
<p>221 Local Area Network 19</p>
<p>222 Metropolitan Area Network 20</p>
<p>223 Wide Area Network 20</p>
<p>224 Personal Area Network 21</p>
<p>23 The Internet 21</p>
<p>24 Communication Technologies 24</p>
<p>241 Wired Network Technologies 24</p>
<p>242 Long ]Range Wireless Network Technologies 27</p>
<p>243 Short ]Range Wireless Network Technologies 30</p>
<p>25 The Internet and Emergency Management 32</p>
<p>26 IoT and Emergency Management 35</p>
<p>Summary 38</p>
<p>Key Terms 38</p>
<p>Assess Your Understanding 40</p>
<p>References 40</p>
<p>3 Cyber Security 42</p>
<p>Introduction 43</p>
<p>31 Sources of Attacks 45</p>
<p>32 Attack Vectors 46</p>
<p>321 Vulnerabilities 46</p>
<p>322 Phishing 46</p>
<p>323 Stolen Credentials 47</p>
<p>324 Web Applications 47</p>
<p>325 Point of Sale Intrusions 48</p>
<p>326 Payment Card Skimmers 49</p>
<p>327 Insider and Privilege Misuse 49</p>
<p>328 Physical Theft and Loss 49</p>
<p>329 Denial of Service Attacks 49</p>
<p>33 Overview of Malware 49</p>
<p>331 Malware Propagation 50</p>
<p>332 Malware Payload 51</p>
<p>34 Securing Cyber Systems 52</p>
<p>35 Securing Data 54</p>
<p>36 Cyber Security Attack Recovery 56</p>
<p>Summary 57</p>
<p>Key Terms 57</p>
<p>Assess Your Understanding 59</p>
<p>References 59</p>
<p>4 Social Media and Emergency Management 61</p>
<p>Introduction 62</p>
<p>41 Situational Awareness, Emergency Communications, and the Public Realm 62</p>
<p>42 What Is Social Media? 64</p>
<p>421 The Birth of Web 20 64</p>
<p>43 Types of Social Media Used in Disasters 65</p>
<p>44 Mass Alert Systems 67</p>
<p>45 Mass Media and Social Media Use in Virginia Tech Shooting Response 67</p>
<p>451 Information Communication Technologies 69</p>
<p>46 What Is a Disaster? 69</p>
<p>47 Usage Patterns of Social Media Over Time 70</p>
<p>48 Social Media s Growth and the Role of Traditional Sources 73</p>
<p>481 Role of Social Media in Disasters 74</p>
<p>482 Use of Social Media by People Affected by Crisis 74</p>
<p>49 Use of Social Media for Preparedness and Planning 74</p>
<p>491 Expansion of Communication Networks 75</p>
<p>410 Use of Social Media Before and During Mass Emergencies 75</p>
<p>4101 Emergency Managers Use of Social Media in Response 76</p>
<p>4102 Emergency Managers in Listening Mode 76</p>
<p>4103 Managing the Use of Twitter or Facebook 76</p>
<p>4104 Information ]Vetting Dynamics 76</p>
<p>4105 Building Resiliency 77</p>
<p>4106 Changing Nature of Social Behaviors 78</p>
<p>411 Issues Arising from the Use of Social Media by Emergency Managers During Events 81</p>
<p>4111 Changing Role of PIO 81</p>
<p>412 Using Social Media to Establish Information on Damages and Recovery 81</p>
<p>4121 Evolving Networks 82</p>
<p>4122 Expanding Information Relevant to a Specific Event 82</p>
<p>4123 Expanded Communication Benefits 83</p>
<p>413 The Advantages and Fallbacks of Geotargeting 83</p>
<p>414 Social Media Companies Contribution to Emergency Response 84</p>
<p>4141 Information Dissemination and Feedback 84</p>
<p>415 Concerns About and Limitations of Social Media Usage in Disasters 85</p>
<p>4151 Misleading Information 85</p>
<p>4152 Dependable Networks 85</p>
<p>4153 Reliable Information Sources 86</p>
<p>4154 Communicating with a Broad Audience 86</p>
<p>4155 Managing a Large Quantity of Data 86</p>
<p>416 The Future of Social Media in Disasters 87</p>
<p>4161 New Role for the Public in a Crisis 87</p>
<p>4162 Dynamic Nature of Social Media 87</p>
<p>4163 Social Media as a Valuable Resource 88</p>
<p>4164 Self ]correcting Nature of Social Media 88</p>
<p>4165 Accuracy of Information 88</p>
<p>4166 Threats of Technology Failure 88</p>
<p>4167 Case Example: Crowdfunding and Remote Emergency Response: 2010 Haitian Earthquake as a Case Study 89</p>
<p>4168 Examining the Use of Social Media in Haiti 90</p>
<p>417 Looking Forward 91</p>
<p>Key Terms 91</p>
<p>Assess Your Understanding 93</p>
<p>References 94</p>
<p>5 Geospatial Technologies and Emergency Management 97</p>
<p>Introduction 98</p>
<p>51 Geospatial Technologies and Emergency Management 99</p>
<p>511 Elements of GT 99</p>
<p>512 Use of GT to Answer Questions in Emergency Management 100</p>
<p>52 GT Across the Human Hazard Interface 100</p>
<p>521 Our People 100</p>
<p>522 Limitations of Census Data 101</p>
<p>53 Our Resources 104</p>
<p>531 Understanding Critical Infrastructure 104</p>
<p>532 Understanding Critical Social Infrastructure 105</p>
<p>533 Resources of Social Importance 106</p>
<p>534 Spatial Video Geonarrative 107</p>
<p>54 Understanding Our Hazards 108</p>
<p>541 Natural Hazards Casualties in the United States 108</p>
<p>542 Hazard Zonation 109</p>
<p>543 Our Human Hazard Interface 110</p>
<p>544 Understanding Overlays and Buffers 110</p>
<p>55 Dissemination and Hazard Communication 112</p>
<p>551 Contribution of Google Earth 113</p>
<p>56 Summary 113</p>
<p>57 Conclusions 115</p>
<p>Key Terms 116</p>
<p>Assess Your Understanding 117</p>
<p>References 117</p>
<p>6 Direct and Remote Sensing Systems: Describing and Detecting Hazards 120</p>
<p>Introduction 121</p>
<p>61 Data Collection 121</p>
<p>62 Weather Stations 124</p>
<p>621 Weather Station Data 125</p>
<p>622 Weather Station Networks 126</p>
<p>623 Geospatial Multi ]agency Coordination Wildfire Application 127</p>
<p>63 Water Data Sensors 128</p>
<p>631 Flood Warning Systems for Local Communities 128</p>
<p>632 Rain and Stream Gauges 130</p>
<p>633 How a USGS Stream Gauge Works 130</p>
<p>634 The USGS Stream Gaging Program 131</p>
<p>635 Using USGS Stream ]flow Data for Emergency Management 131</p>
<p>64 Air Sensors 132</p>
<p>641 Outdoor Air Quality Sensors 132</p>
<p>642 Chemical Sensors 133</p>
<p>65 Evaluating the Technology 133</p>
<p>66 Remote Sensing 134</p>
<p>661 An Overview of Remote Sensing 135</p>
<p>662 Optical Satellite Remote Sensing 136</p>
<p>663 Satellite Remote Sensing of Weather 145</p>
<p>664 Radar Imaging 147</p>
<p>665 Manned and Unmanned Airborne Remote Sensing 147</p>
<p>67 Using and Assessing Data 150</p>
<p>68 Trends in Remote and Direct Sensing</p>
<p>Technology 151</p>
<p>Summary 151</p>
<p>Key Terms 152</p>
<p>Online Resources 154</p>
<p>Assess Your Understanding 155</p>
<p>References 155</p>
<p>7 Emergency Management Decision Support Systems: Using Data to Manage Disasters 157</p>
<p>Introduction 158</p>
<p>71 Emergency Management Information Systems and Networks 158</p>
<p>72 Evaluating Information Systems 161</p>
<p>721 Quality 161</p>
<p>722 Timeliness 161</p>
<p>723 Completeness 162</p>
<p>724 Performance 162</p>
<p>73 Federal, State, and Local Information Systems 163</p>
<p>731 Management Information Systems 163</p>
<p>732 The National Emergency Management Information System 163</p>
<p>733 Computer Aided Management of Emergency Operations 164</p>
<p>74 Using Data 165</p>
<p>741 Databases 166</p>
<p>742 Data Dictionary (Meta ]data) 166</p>
<p>75 Evaluating Databases 168</p>
<p>76 Using Emergency Management Databases 169</p>
<p>761 HAZUS ]MH Datasets 171</p>
<p>77 Management Roles in Decision Support Systems 171</p>
<p>78 Obtaining Data from Public Federal Data Sources 172</p>
<p>79 The Future of Decision Support Systems: The Intelligent Community 173</p>
<p>Summary 174</p>
<p>Key Terms 174</p>
<p>Assess Your Understanding 174</p>
<p>References 175</p>
<p>8 Warning Systems: Alerting the Public to Danger 177</p>
<p>Introduction 178</p>
<p>81 Warning Systems 178</p>
<p>811 Key Information 178</p>
<p>812 Key Components of Warning Systems 178</p>
<p>813 Warning Subsystems 179</p>
<p>82 Detection and Management 180</p>
<p>821 Case Study: Detection at a Local Level 180</p>
<p>822 National Weather Service 182</p>
<p>823 Case Study: Detection at a National Level 184</p>
<p>83 Issuing Warnings 185</p>
<p>831 Technical Issues 185</p>
<p>832 Organizational Issues 185</p>
<p>833 Societal Issues 187</p>
<p>84 Types of Warning Systems 187</p>
<p>841 Sirens 188</p>
<p>842 The Emergency Alert System 188</p>
<p>843 Phone Alert Systems: Reverse 911 190</p>
<p>844 Disadvantages of Phone Notification Systems 190</p>
<p>845 Communicating with Those with Disabilities 190</p>
<p>846 Barriers to Warnings 191</p>
<p>847 Case Example: A Nuclear Disaster 191</p>
<p>85 Response 193</p>
<p>851 Case Study: Response to Hurricane Katrina 194</p>
<p>Summary 194</p>
<p>Key Terms 195</p>
<p>Assess Your Understanding 195</p>
<p>References 195</p>
<p>9 Hazards Analysis and Modeling: Predicting the Impact of Disasters197</p>
<p>Introduction 198</p>
<p>91 Modeling and Emergency Management 198</p>
<p>911 The Technology behind Modeling 199</p>
<p>912 Mathematical Models 201</p>
<p>913 Understanding the Results of Modeling 202</p>
<p>914 Fast Exchange of Model Results to Users 203</p>
<p>92 Using a Hurricane Model (SLOSH) 203</p>
<p>921 SLOSH for Planning, Response, Recovery, and Mitigation 205</p>
<p>922 SLOSH Display Program 206</p>
<p>923 Strengths of SLOSH 206</p>
<p>924 Limitations of SLOSH 206</p>
<p>925 Saffir Simpson Scale 208</p>
<p>93 Using the ALOHA Chemical Dispersion Model 209</p>
<p>931 How ALOHA Works 210</p>
<p>932 Model Outputs 210</p>
<p>933 Threat Zone Estimates and Threat at a Point 210</p>
<p>934 Strengths of ALOHA 211</p>
<p>935 Limitations of ALOHA 212</p>
<p>936 Terms Used in ALOHA 213</p>
<p>937 Concentration Patchiness, Particularly Near the Source 215</p>
<p>94 Hazards United States Multi Hazard Model 216</p>
<p>941 Strengths of HAZUS ]MH 219</p>
<p>942 Limitations of HAZUS ]MH 220</p>
<p>943 Multirisk Assessment 220</p>
<p>95 Evacuation Modeling 220</p>
<p>96 Centralized Hazard Modeling Initiatives 221</p>
<p>961 Fire Potential Modeling 221</p>
<p>962 Drought Modeling 223</p>
<p>97 Evaluating Hazard Models 224</p>
<p>Summary 225</p>
<p>Key Terms 225</p>
<p>Assess Your Understanding 226</p>
<p>References 226</p>
<p>10 Operational Problems and Technology: Making Technology Work for You228</p>
<p>Introduction 229</p>
<p>101 Barriers in Implementing Technology in Emergency Management 229</p>
<p>102 The Role of the Emergency Manager in Using</p>
<p>Technology 231</p>
<p>1021 Managing an Organization 233</p>
<p>103 Using Technology to Overcome Organizational Boundaries 234</p>
<p>104 Pitfalls of Technology 235</p>
<p>1041 Reliance on Technology 235</p>
<p>1042 Obsolescence 236</p>
<p>1043 Information Overload 236</p>
<p>1044 Data Integration 236</p>
<p>1045 Real ]Time Response Data 237</p>
<p>1046 Security 237</p>
<p>105 Managing the Technology 237</p>
<p>Summary 240</p>
<p>Key Terms 240</p>
<p>Assess Your Understanding 240</p>
<p>References 240</p>
<p>11 Trends in Technology: New Tools for Challenges to Emergency Management242</p>
<p>Introduction 243</p>
<p>111 Using Technology for Information Exchange 243</p>
<p>1111 Emergency Preparedness Information</p>
<p>Exchange 244</p>
<p>1112 Television and Internet Information 244</p>
<p>1113 Digital Libraries and Publications 244</p>
<p>112 Distance Learning 246</p>
<p>1121 Using Remote Technology 246</p>
<p>1122 Disaster Situational Maps 247</p>
<p>1123 Federal Agency Situational Mapping Programs 249</p>
<p>1124 Innovative Visualization Efforts 252</p>
<p>1125 Updating Outputs 252</p>
<p>113 Managing the Technology 253</p>
<p>1131 Organizational Coordination and Collaboration Strategies 254</p>
<p>1132 Technology Life Cycles 254</p>
<p>1133 Engaging Stakeholders 255</p>
<p>1134 Information Exchange 255</p>
<p>1135 Dealing with Information Overload 256</p>
<p>Summary 257</p>
<p>Key Terms 257</p>
<p>Assess Your Understanding 257</p>
<p>References 257</p>
<p>Figure Credits260</p>
<p>Index 261</p>
<p> </p>
Rubrieken
- advisering
- algemeen management
- coaching en trainen
- communicatie en media
- economie
- financieel management
- inkoop en logistiek
- internet en social media
- it-management / ict
- juridisch
- leiderschap
- marketing
- mens en maatschappij
- non-profit
- ondernemen
- organisatiekunde
- personal finance
- personeelsmanagement
- persoonlijke effectiviteit
- projectmanagement
- psychologie
- reclame en verkoop
- strategisch management
- verandermanagement
- werk en loopbaan