Technology and Emergency Management 2e

Paperback Engels 2017 9781119234081
Verwachte levertijd ongeveer 9 werkdagen

Samenvatting

The first book devoted to a critically important aspect of disaster planning, management, and mitigation

Technology and Emergency Management, Second Edition describes best practices for technology use in emergency planning, response, recovery, and mitigation. It also describes the key elements that must be in place for technology to enhance the emergency management process. The tools, resources, and strategies discussed have been applied by organizations worldwide tasked with planning for and managing every variety of natural and man–made hazard and disaster. Illustrative case studies based on their experiences appear throughout the book. 

This new addition of the critically acclaimed guide has been fully updated and expanded to reflect significant developments occurring in the field over the past decade. It features in–depth coverage of major advances in GIS technologies, including the development of mapping tools and high–resolution remote sensing imaging. Also covered is the increase in computer processing power and mobility and enhanced analytical capabilities for assessing the present conditions of natural systems and extrapolating from them to create accurate models of potential crisis conditions. This second edition also features a new section on cybersecurity and a new chapter on social media and disaster preparedness, response, and recovery has been added.

Explores the role of technology in emergency planning, response, recovery, and mitigation efforts
Explores applications of the Internet, telecommunications, and networks to emergency management, as well as geospatial technologies and their applications
Reviews the elements of hazard models and the relative strengths and weaknesses of modeling programs
Describes techniques for developing hazard prediction models using direct and remote sensing data
Includes test questions for each chapter, and a solutions manual and PowerPoint slides are available on a companion website

Technology and Emergency Management, Second Edition is a valuable working resource for practicing emergency managers and an excellent supplementary text for undergraduate and graduate students in emergency management and disaster management programs, urban and regional planning, and related fields.

Specificaties

ISBN13:9781119234081
Taal:Engels
Bindwijze:paperback
Aantal pagina's:288

Lezersrecensies

Wees de eerste die een lezersrecensie schrijft!

Inhoudsopgave

<p>Concept xiii</p>
<p>About the Author xiv</p>
<p>List of Contributors xv</p>
<p>About the Companion Website xvi</p>
<p>1 The Need for Technology in Emergency Management 1</p>
<p>Introduction&nbsp; 2</p>
<p>11 Technology and Disaster Management&nbsp;&nbsp; 2</p>
<p>111 Focus on Current and Emerging Technology&nbsp; 3</p>
<p>12 Technology as a Management Tool&nbsp; 4</p>
<p>121 Response to Complex Disaster Events 5</p>
<p>122 Ease of Use of Technology&nbsp; 5</p>
<p>13 Using Technologies&nbsp;&nbsp; 6</p>
<p>131 Technology in a Changing Environment 8</p>
<p>132 Examples of Technology&nbsp; 8</p>
<p>133 Communicate Quickly&nbsp; 8</p>
<p>134 Develop a Better Understanding of Hazards&nbsp; 9</p>
<p>135 Improve Response&nbsp; 9</p>
<p>136 Increase Coordination&nbsp; 9</p>
<p>137 Improve Efficiency&nbsp; 9</p>
<p>138 Training&nbsp;&nbsp; 9</p>
<p>14 Completing a Needs Assessment&nbsp; 10</p>
<p>141 Nature of a Needs Assessment&nbsp; 10</p>
<p>142 Steps to Complete a Needs Assessment 11</p>
<p>143 Implementing the Needs Assessment 12</p>
<p>144 Impacts of Implementing Innovation 12</p>
<p>Summary&nbsp; 14</p>
<p>Key Terms&nbsp; 14</p>
<p>Assess Your Understanding&nbsp; 14</p>
<p>References&nbsp; 15</p>
<p>2 Computer Networks and Emergency Management 17</p>
<p>Introduction&nbsp;&nbsp; 18</p>
<p>21 What Is a Network?&nbsp;&nbsp;&nbsp; 19</p>
<p>22 Types of Networks&nbsp;&nbsp; 19</p>
<p>221 Local Area Network&nbsp;&nbsp; 19</p>
<p>222 Metropolitan Area Network&nbsp;&nbsp; 20</p>
<p>223 Wide Area Network&nbsp;&nbsp; 20</p>
<p>224 Personal Area Network&nbsp; 21</p>
<p>23 The Internet&nbsp;&nbsp; 21</p>
<p>24 Communication Technologies&nbsp; 24</p>
<p>241 Wired Network Technologies&nbsp; 24</p>
<p>242 Long ]Range Wireless Network Technologies 27</p>
<p>243 Short ]Range Wireless Network Technologies 30</p>
<p>25 The Internet and Emergency Management 32</p>
<p>26 IoT and Emergency Management&nbsp; 35</p>
<p>Summary&nbsp; 38</p>
<p>Key Terms&nbsp; 38</p>
<p>Assess Your Understanding&nbsp; 40</p>
<p>References&nbsp; 40</p>
<p>3 Cyber Security 42</p>
<p>Introduction&nbsp;&nbsp; 43</p>
<p>31 Sources of Attacks&nbsp;&nbsp; 45</p>
<p>32 Attack Vectors&nbsp;&nbsp; 46</p>
<p>321 Vulnerabilities&nbsp; 46</p>
<p>322 Phishing&nbsp;&nbsp; 46</p>
<p>323 Stolen Credentials&nbsp;&nbsp; 47</p>
<p>324 Web Applications&nbsp; 47</p>
<p>325 Point of Sale Intrusions&nbsp; 48</p>
<p>326 Payment Card Skimmers&nbsp;&nbsp; 49</p>
<p>327 Insider and Privilege Misuse&nbsp; 49</p>
<p>328 Physical Theft and Loss&nbsp; 49</p>
<p>329 Denial of Service Attacks&nbsp;&nbsp; 49</p>
<p>33 Overview of Malware&nbsp;&nbsp;&nbsp; 49</p>
<p>331 Malware Propagation&nbsp; 50</p>
<p>332 Malware Payload&nbsp; 51</p>
<p>34 Securing Cyber Systems&nbsp;&nbsp; 52</p>
<p>35 Securing Data&nbsp;&nbsp;&nbsp; 54</p>
<p>36 Cyber Security Attack Recovery&nbsp; 56</p>
<p>Summary&nbsp; 57</p>
<p>Key Terms&nbsp; 57</p>
<p>Assess Your Understanding&nbsp; 59</p>
<p>References&nbsp; 59</p>
<p>4 Social Media and Emergency Management 61</p>
<p>Introduction&nbsp;&nbsp; 62</p>
<p>41 Situational Awareness, Emergency Communications, and the Public Realm&nbsp;&nbsp;&nbsp; 62</p>
<p>42 What Is Social Media?&nbsp;&nbsp; 64</p>
<p>421 The Birth of Web 20&nbsp; 64</p>
<p>43 Types of Social Media Used in Disasters&nbsp; 65</p>
<p>44 Mass Alert Systems&nbsp;&nbsp; 67</p>
<p>45 Mass Media and Social Media Use in Virginia Tech Shooting Response&nbsp;&nbsp; 67</p>
<p>451 Information Communication Technologies&nbsp; 69</p>
<p>46 What Is a Disaster?&nbsp;&nbsp; 69</p>
<p>47 Usage Patterns of Social Media Over Time 70</p>
<p>48 Social Media s Growth and the Role of Traditional Sources&nbsp;&nbsp; 73</p>
<p>481 Role of Social Media in Disasters 74</p>
<p>482 Use of Social Media by People Affected by Crisis&nbsp;&nbsp; 74</p>
<p>49 Use of Social Media for Preparedness and Planning&nbsp;&nbsp; 74</p>
<p>491 Expansion of Communication Networks&nbsp; 75</p>
<p>410 Use of Social Media Before and During Mass Emergencies&nbsp;&nbsp; 75</p>
<p>4101 Emergency Managers Use of Social Media in Response&nbsp;&nbsp; 76</p>
<p>4102 Emergency Managers in Listening Mode 76</p>
<p>4103 Managing the Use of Twitter or Facebook&nbsp; 76</p>
<p>4104 Information ]Vetting Dynamics 76</p>
<p>4105 Building Resiliency&nbsp;&nbsp; 77</p>
<p>4106 Changing Nature of Social Behaviors 78</p>
<p>411 Issues Arising from the Use of Social Media by Emergency Managers During Events&nbsp; 81</p>
<p>4111 Changing Role of PIO&nbsp; 81</p>
<p>412 Using Social Media to Establish Information on Damages and Recovery&nbsp; 81</p>
<p>4121 Evolving Networks&nbsp;&nbsp; 82</p>
<p>4122 Expanding Information Relevant to a Specific Event&nbsp;&nbsp; 82</p>
<p>4123 Expanded Communication Benefits 83</p>
<p>413 The Advantages and Fallbacks of Geotargeting 83</p>
<p>414 Social Media Companies Contribution to Emergency Response&nbsp; 84</p>
<p>4141 Information Dissemination and Feedback&nbsp;&nbsp;&nbsp; 84</p>
<p>415 Concerns About and Limitations of Social Media Usage in Disasters&nbsp;&nbsp; 85</p>
<p>4151 Misleading Information&nbsp; 85</p>
<p>4152 Dependable Networks&nbsp; 85</p>
<p>4153 Reliable Information Sources&nbsp; 86</p>
<p>4154 Communicating with a Broad Audience 86</p>
<p>4155 Managing a Large Quantity of Data 86</p>
<p>416 The Future of Social Media in Disasters&nbsp; 87</p>
<p>4161 New Role for the Public in a Crisis&nbsp; 87</p>
<p>4162 Dynamic Nature of Social Media 87</p>
<p>4163 Social Media as a Valuable Resource 88</p>
<p>4164 Self ]correcting Nature of Social Media 88</p>
<p>4165 Accuracy of Information&nbsp; 88</p>
<p>4166 Threats of Technology Failure 88</p>
<p>4167 Case Example: Crowdfunding and Remote Emergency Response: 2010 Haitian Earthquake as a Case Study&nbsp; 89</p>
<p>4168 Examining the Use of Social Media in Haiti&nbsp;&nbsp; 90</p>
<p>417 Looking Forward&nbsp;&nbsp; 91</p>
<p>Key Terms&nbsp; 91</p>
<p>Assess Your Understanding&nbsp; 93</p>
<p>References&nbsp; 94</p>
<p>5 Geospatial Technologies and Emergency Management 97</p>
<p>Introduction&nbsp;&nbsp; 98</p>
<p>51 Geospatial Technologies and Emergency Management&nbsp;&nbsp;&nbsp; 99</p>
<p>511 Elements of GT&nbsp; 99</p>
<p>512 Use of GT to Answer Questions in Emergency Management&nbsp;&nbsp; 100</p>
<p>52 GT Across the Human Hazard Interface 100</p>
<p>521 Our People&nbsp;&nbsp; 100</p>
<p>522 Limitations of Census Data&nbsp; 101</p>
<p>53 Our Resources&nbsp;&nbsp; 104</p>
<p>531 Understanding Critical Infrastructure 104</p>
<p>532 Understanding Critical Social Infrastructure&nbsp;&nbsp; 105</p>
<p>533 Resources of Social Importance 106</p>
<p>534 Spatial Video Geonarrative&nbsp;&nbsp; 107</p>
<p>54 Understanding Our Hazards&nbsp; 108</p>
<p>541 Natural Hazards Casualties in the United States&nbsp;&nbsp; 108</p>
<p>542 Hazard Zonation&nbsp; 109</p>
<p>543 Our Human Hazard Interface 110</p>
<p>544 Understanding Overlays and Buffers 110</p>
<p>55 Dissemination and Hazard Communication&nbsp; 112</p>
<p>551 Contribution of Google Earth&nbsp; 113</p>
<p>56 Summary&nbsp; 113</p>
<p>57 Conclusions&nbsp;&nbsp;&nbsp; 115</p>
<p>Key Terms&nbsp;&nbsp; 116</p>
<p>Assess Your Understanding&nbsp;&nbsp; 117</p>
<p>References&nbsp;&nbsp; 117</p>
<p>6 Direct and Remote Sensing Systems: Describing and Detecting Hazards 120</p>
<p>Introduction&nbsp;&nbsp;&nbsp; 121</p>
<p>61 Data Collection&nbsp;&nbsp; 121</p>
<p>62 Weather Stations&nbsp;&nbsp; 124</p>
<p>621 Weather Station Data&nbsp; 125</p>
<p>622 Weather Station Networks&nbsp;&nbsp; 126</p>
<p>623 Geospatial Multi ]agency Coordination Wildfire Application&nbsp; 127</p>
<p>63 Water Data Sensors&nbsp;&nbsp;&nbsp; 128</p>
<p>631 Flood Warning Systems for Local Communities&nbsp;&nbsp; 128</p>
<p>632 Rain and Stream Gauges&nbsp; 130</p>
<p>633 How a USGS Stream Gauge Works&nbsp; 130</p>
<p>634 The USGS Stream Gaging Program&nbsp; 131</p>
<p>635 Using USGS Stream ]flow Data for Emergency Management&nbsp;&nbsp; 131</p>
<p>64 Air Sensors&nbsp;&nbsp; 132</p>
<p>641 Outdoor Air Quality Sensors&nbsp; 132</p>
<p>642 Chemical Sensors&nbsp; 133</p>
<p>65 Evaluating the Technology&nbsp; 133</p>
<p>66 Remote Sensing&nbsp;&nbsp; 134</p>
<p>661 An Overview of Remote Sensing 135</p>
<p>662 Optical Satellite Remote Sensing 136</p>
<p>663 Satellite Remote Sensing of Weather 145</p>
<p>664 Radar Imaging&nbsp; 147</p>
<p>665 Manned and Unmanned Airborne Remote Sensing&nbsp;&nbsp; 147</p>
<p>67 Using and Assessing Data&nbsp; 150</p>
<p>68 Trends in Remote and Direct Sensing</p>
<p>Technology&nbsp;&nbsp;&nbsp; 151</p>
<p>Summary&nbsp; 151</p>
<p>Key Terms&nbsp;&nbsp; 152</p>
<p>Online Resources&nbsp;&nbsp; 154</p>
<p>Assess Your Understanding&nbsp;&nbsp; 155</p>
<p>References&nbsp;&nbsp; 155</p>
<p>7 Emergency Management Decision Support Systems: Using Data to Manage Disasters 157</p>
<p>Introduction&nbsp;&nbsp;&nbsp; 158</p>
<p>71 Emergency Management Information Systems and Networks&nbsp;&nbsp; 158</p>
<p>72 Evaluating Information Systems&nbsp; 161</p>
<p>721 Quality&nbsp;&nbsp; 161</p>
<p>722 Timeliness&nbsp;&nbsp;&nbsp; 161</p>
<p>723 Completeness&nbsp;&nbsp; 162</p>
<p>724 Performance&nbsp;&nbsp; 162</p>
<p>73 Federal, State, and Local Information Systems 163</p>
<p>731 Management Information Systems&nbsp; 163</p>
<p>732 The National Emergency Management Information System&nbsp; 163</p>
<p>733 Computer Aided Management of Emergency Operations&nbsp; 164</p>
<p>74 Using Data&nbsp;&nbsp; 165</p>
<p>741 Databases&nbsp;&nbsp;&nbsp; 166</p>
<p>742 Data Dictionary (Meta ]data)&nbsp; 166</p>
<p>75 Evaluating Databases&nbsp;&nbsp; 168</p>
<p>76 Using Emergency Management Databases 169</p>
<p>761 HAZUS ]MH Datasets&nbsp; 171</p>
<p>77 Management Roles in Decision Support Systems 171</p>
<p>78 Obtaining Data from Public Federal Data Sources&nbsp; 172</p>
<p>79 The Future of Decision Support Systems: The Intelligent Community&nbsp;&nbsp; 173</p>
<p>Summary&nbsp; 174</p>
<p>Key Terms&nbsp;&nbsp; 174</p>
<p>Assess Your Understanding&nbsp;&nbsp; 174</p>
<p>References&nbsp;&nbsp; 175</p>
<p>8 Warning Systems: Alerting the Public to Danger 177</p>
<p>Introduction&nbsp;&nbsp;&nbsp; 178</p>
<p>81 Warning Systems&nbsp;&nbsp; 178</p>
<p>811 Key Information&nbsp; 178</p>
<p>812 Key Components of Warning Systems 178</p>
<p>813 Warning Subsystems&nbsp; 179</p>
<p>82 Detection and Management&nbsp;&nbsp; 180</p>
<p>821 Case Study: Detection at a Local Level 180</p>
<p>822 National Weather Service&nbsp;&nbsp; 182</p>
<p>823 Case Study: Detection at a National Level&nbsp;&nbsp; 184</p>
<p>83 Issuing Warnings&nbsp;&nbsp; 185</p>
<p>831 Technical Issues&nbsp; 185</p>
<p>832 Organizational Issues&nbsp; 185</p>
<p>833 Societal Issues&nbsp; 187</p>
<p>84 Types of Warning Systems&nbsp; 187</p>
<p>841 Sirens&nbsp;&nbsp; 188</p>
<p>842 The Emergency Alert System&nbsp; 188</p>
<p>843 Phone Alert Systems: Reverse 911&nbsp; 190</p>
<p>844 Disadvantages of Phone Notification Systems&nbsp;&nbsp; 190</p>
<p>845 Communicating with Those with Disabilities&nbsp;&nbsp;&nbsp; 190</p>
<p>846 Barriers to Warnings&nbsp; 191</p>
<p>847 Case Example: A Nuclear Disaster&nbsp; 191</p>
<p>85 Response&nbsp; 193</p>
<p>851 Case Study: Response to Hurricane Katrina&nbsp;&nbsp; 194</p>
<p>Summary&nbsp; 194</p>
<p>Key Terms&nbsp;&nbsp; 195</p>
<p>Assess Your Understanding&nbsp;&nbsp; 195</p>
<p>References&nbsp;&nbsp; 195</p>
<p>9 Hazards Analysis and Modeling: Predicting the Impact of Disasters197</p>
<p>Introduction&nbsp;&nbsp;&nbsp; 198</p>
<p>91 Modeling and Emergency Management 198</p>
<p>911 The Technology behind Modeling&nbsp; 199</p>
<p>912 Mathematical Models&nbsp; 201</p>
<p>913 Understanding the Results of Modeling 202</p>
<p>914 Fast Exchange of Model Results to Users&nbsp;&nbsp; 203</p>
<p>92 Using a Hurricane Model (SLOSH)&nbsp;&nbsp; 203</p>
<p>921 SLOSH for Planning, Response, Recovery, and Mitigation&nbsp; 205</p>
<p>922 SLOSH Display Program&nbsp;&nbsp; 206</p>
<p>923 Strengths of SLOSH&nbsp; 206</p>
<p>924 Limitations of SLOSH&nbsp; 206</p>
<p>925 Saffir Simpson Scale&nbsp; 208</p>
<p>93 Using the ALOHA Chemical Dispersion Model 209</p>
<p>931 How ALOHA Works&nbsp; 210</p>
<p>932 Model Outputs&nbsp; 210</p>
<p>933 Threat Zone Estimates and Threat at a Point&nbsp; 210</p>
<p>934 Strengths of ALOHA&nbsp; 211</p>
<p>935 Limitations of ALOHA&nbsp; 212</p>
<p>936 Terms Used in ALOHA&nbsp; 213</p>
<p>937 Concentration Patchiness, Particularly Near the Source&nbsp; 215</p>
<p>94 Hazards United States Multi Hazard Model 216</p>
<p>941 Strengths of HAZUS ]MH&nbsp;&nbsp; 219</p>
<p>942 Limitations of HAZUS ]MH&nbsp;&nbsp; 220</p>
<p>943 Multirisk Assessment&nbsp; 220</p>
<p>95 Evacuation Modeling&nbsp;&nbsp; 220</p>
<p>96 Centralized Hazard Modeling Initiatives 221</p>
<p>961 Fire Potential Modeling&nbsp; 221</p>
<p>962 Drought Modeling&nbsp;&nbsp; 223</p>
<p>97 Evaluating Hazard Models&nbsp; 224</p>
<p>Summary&nbsp; 225</p>
<p>Key Terms&nbsp;&nbsp; 225</p>
<p>Assess Your Understanding&nbsp;&nbsp; 226</p>
<p>References&nbsp;&nbsp; 226</p>
<p>10 Operational Problems and Technology: Making Technology Work for You228</p>
<p>Introduction&nbsp;&nbsp;&nbsp; 229</p>
<p>101 Barriers in Implementing Technology in Emergency Management&nbsp;&nbsp; 229</p>
<p>102 The Role of the Emergency Manager in Using</p>
<p>Technology&nbsp;&nbsp;&nbsp; 231</p>
<p>1021 Managing an Organization&nbsp;&nbsp; 233</p>
<p>103 Using Technology to Overcome Organizational Boundaries&nbsp;&nbsp; 234</p>
<p>104 Pitfalls of Technology&nbsp;&nbsp; 235</p>
<p>1041 Reliance on Technology&nbsp; 235</p>
<p>1042 Obsolescence&nbsp;&nbsp; 236</p>
<p>1043 Information Overload&nbsp; 236</p>
<p>1044 Data Integration&nbsp; 236</p>
<p>1045 Real ]Time Response Data&nbsp;&nbsp; 237</p>
<p>1046 Security&nbsp;&nbsp; 237</p>
<p>105 Managing the Technology&nbsp; 237</p>
<p>Summary&nbsp; 240</p>
<p>Key Terms&nbsp;&nbsp; 240</p>
<p>Assess Your Understanding&nbsp;&nbsp; 240</p>
<p>References&nbsp;&nbsp; 240</p>
<p>11 Trends in Technology: New Tools for Challenges to Emergency Management242</p>
<p>Introduction&nbsp;&nbsp;&nbsp; 243</p>
<p>111 Using Technology for Information Exchange 243</p>
<p>1111 Emergency Preparedness Information</p>
<p>Exchange&nbsp;&nbsp;&nbsp; 244</p>
<p>1112 Television and Internet Information 244</p>
<p>1113 Digital Libraries and Publications 244</p>
<p>112 Distance Learning&nbsp;&nbsp;&nbsp; 246</p>
<p>1121 Using Remote Technology&nbsp;&nbsp; 246</p>
<p>1122 Disaster Situational Maps&nbsp;&nbsp; 247</p>
<p>1123 Federal Agency Situational Mapping Programs&nbsp;&nbsp; 249</p>
<p>1124 Innovative Visualization Efforts 252</p>
<p>1125 Updating Outputs&nbsp;&nbsp; 252</p>
<p>113 Managing the Technology&nbsp; 253</p>
<p>1131 Organizational Coordination and Collaboration Strategies&nbsp; 254</p>
<p>1132 Technology Life Cycles&nbsp; 254</p>
<p>1133 Engaging Stakeholders&nbsp; 255</p>
<p>1134 Information Exchange&nbsp; 255</p>
<p>1135 Dealing with Information Overload 256</p>
<p>Summary&nbsp; 257</p>
<p>Key Terms&nbsp;&nbsp; 257</p>
<p>Assess Your Understanding&nbsp;&nbsp; 257</p>
<p>References&nbsp;&nbsp; 257</p>
<p>Figure Credits260</p>
<p>Index 261</p>
<p>&nbsp;</p>

Managementboek Top 100

Rubrieken

    Personen

      Trefwoorden

        Technology and Emergency Management 2e