IJISCRAM Editorial Board
Editors-in-Chief:
Murray E. Jennex, San Diego State U., USA
Bartel Van de Walle, Tilburg U., The Netherlands
Associate Editors:
Tom De Groeve, EU Joint Research Center, Italy
Dewald van Niekerk, African Center for Disaster Studies, South Africa
Murray Turoff, New Jersey Institute of Technology, USA
Song Yan, Harbin Engineering U., China
IGI Editorial:
Heather A. Probst, Director of Journal Publications
Jamie M. Wilson, Journal Development Editor
Ron Blair, Journal Editorial Assistant
Chris Hrobak, Journal Production Lead
Gregory Snader, Production Assistant
Brittany Metzel, Production Assistant
International Editorial Review Board:
Walter Ammann, IDRC, Switzerland
Einar Bjorgo, UNOSAT, Switzerland
Marcos Borges, Federal U. of Rio de Janeiro, Brazil
Tung Bui, U. of Hawaii, USA
Paul Burghardt, DECIS, The Netherlands
José H. Canós Cerdá, Universitat Politècnica de
València, Spain
Benny Carlé, Nuclear Research Center SCK-CEN,
Belgium
Paul Currion, humanitarian.info, USA
Chamindra de Silva, Lanka Software Foundation,
Sri Lanka
Paloma Díaz, Universidad Carlos III de Madrid,
Spain
Julie Dugdale, Université Pierre Mendes France,
France
Frank Fiedrich, George Washington U., USA
Simon French, Manchester Business School, UK
Eric Frost, San Diego State U., USA
Tim Grant, Netherlands Defense Academy,
The Netherlands
IGIP
Jack Harrald, George Washington U., USA
Mark Haselkorn, Washington U., USA
Sanjana Hattotuwa, info-share.org, Sri Lanka
Roxanne Hiltz, New Jersey Institute of Technology,
USA
Renato Iannella, National ICT Australia, Australia
Jonas Landgren, Viktoria Institute, Sweden
Greg Madey, U. of Notre Dame, USA
David Mendonca, New Jersey Institute of
Technology, USA
Leysia Palen, U. of Colorado, USA
Nigel Snoad, Microsoft, USA
Suha Ulgen, UN OCHA, Switzerland
Firoz Verjee, NOAA, USA
Peter Wooders, Department of Internal Affairs,
New Zealand
Sisi Zlatanova, Delft U. of Technology,
The Netherlands
IGI PublIshInG
www.igi-global.com
CALL FOR ARTICLES
International Journal of Information Systems for
Crisis Response and Management
An oficial publication of the Conference on Information Systems for Crisis Response and
Management
The International Journal of Information Systems for Crisis Response and Management (IJISCRAM), is an
academically rigorous outlet for research into crisis response and management. It is focused on the design,
development, implementation, use and evaluation of IS technologies and methodologies to support crisis
response and management. It explores issues critical to the application of
IS to crisis response and management.
MISSION:
The mission of the International Journal of Information Systems for Crisis
Response and Management (IJISCRAM) is to provide an outlet for innovative research in the area of information systems for crisis response and
management. Research is expected to be rigorous but can utilize any accepted
methodology and may be qualitative or quantitative in nature. The journal
will provide a comprehensive cross disciplinary forum for advancing the
understanding of the organizational, technical, human, and cognitive issues
associated with the use of information systems in responding and managing
crises of all kinds.
COVERAGE/MAJOR TOPICS: Topics include but are not limited
to...
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
•
Case studies, research methods, and modeling approaches
Collaborative and intelligent systems
Command and control
Communication technologies
Crisis planning, training, exercising, and gaming
Data fusion, representation, and visualization
Decision making and judgment
Disaster risk reduction, risk management, ad-hoc, and sensor networks
Early warning systems
Emergency response systems
Geographical information systems
Globalization and development issues
Healthcare and health information systems
Human-computer interaction
Humanitarian operations
Information systems strategy
Knowledge management and systems
Systems interoperability information systems infrastructures
Virtual teams and organizations
ISSN 1937-9390
eISSN 1937-9420
Published quarterly
Please send all submissions to:
Murray E. Jennex and
Bartel Van de Walle
IJISCRAM@iscram.org
Ideas for Special Theme Issues may be submitted to the Editor-in-Chief.
Please recommend this publication to your librarian. For a convenient
easy-to-use library recommendation form, please visit: http://www.igiglobal.com/IJISCRAM and click on the "Library Recommendation Form" link
along the right margin.
InternatIonal Journal of
InformatIon SyStemS for CrISIS
reSponSe and management
July-September 2010, Vol. 2, No. 3
Table of Contents
Research Articles
1
Lessons Learned on the Operation of the LoST Protocol for Mobile IP-based
Emergency Calls
Ana Goulart, Texas A&M University, USA
Anna Zacchi, Texas A&M University, USA
Bharath Chintapatla, Texas A&M University, USA
Walt Magnussen, Texas A&M University, USA
25 Factors that Inluence Crisis Managers and their Decision-Making Ability during
Extreme Events
Connie White, Jacksonville State University, USA
Murray Turof, New Jersey Institute of Technology, USA
36 Achieving Electric Restoration Logistical Eiciencies During Critical Infrastructure
Crisis Response: A Knowledge Management Analysis
Teresa Durbin, San Diego Gas and Electric, USA
Murray E. Jennex, San Diego State University, USA
Eric Frost, San Diego State University, USA
Robert Judge, San Diego State University, USA
51 Curriculum Design and Development at the Nexus of International Crisis Management
and Information Systems
Keith Clement, California State University Fresno, USA
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010 1
Lessons Learned on the
Operation of the LoST
Protocol for Mobile IPbased Emergency Calls
Ana Goulart, Texas A&M University, USA
Anna Zacchi, Texas A&M University, USA
Bharath Chintapatla, Texas A&M University, USA
Walt Magnussen, Texas A&M University, USA
ABSTRACT
The technology used in citizen-to-authority emergency calls is based on traditional telephony, that is, circuitswitched systems. However, new standards and protocols are being developed by the Internet Engineering Task
Force (IETF) to allow emergency communications over packet switched networks, such as the Internet. This
architecture is known as Next Generation-9-1-1 (NG-911). In this paper, the authors present lessons learned
from experiments on the IETF standard called Location to Service Translation protocol (LoST). LoST maps
the user’s location to the address of the emergency call center that serves that location. After implementing the
standards in a test-bed with real-world systems, spatial databases, and communication networks, the authors
observed performance issues that users may experience. Based on their observations, the authors propose
practical ideas to improve the performance of the NG-911 system and LoST protocol operation for mobile users.
Keywords:
Location-Based Services, Location to Service Translation (LoST), NG-911, Session Initiation
Protocol (SIP), Test-Bed, Voice over IP (VoIP)
1. INTRODUCTION
Every minute, tens of thousands of emergency
calls are placed in the United States. Thousands
more are probably being made in other countries.
Within each country or region, there is usually
a common number to reach emergency services
DOI: 10.4018/jiscrm.2010070101
(e.g., 9-1-1, 1-1-2, etc). In order to better explain
the context of this paper, next we provide a
brief history of emergency calls, followed by
a description of this paper’s motivation.
A. A Brief History of
Emergency Call Systems
It was in 1937, in Great Britain, that the idea
of a single emergency number was developed.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
2 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010
By dialing 9-9-9, British citizens could contact
the police, fire department, or medical services.
Only later, in 1958 US legislators began to
consider the use of a single emergency number.
The number chosen in the US was 9-1-1. It is
known that one of the reasons for this choice
is that the numbers were located on opposite
sides of the key-pad, which reduced the chances
of accidental calls.
In 1968, the first 9-1-1 call was made
in Alabama. Later that year, the American
Telephone and Telegraph Company (AT&T)
announced the 9-1-1 service. This first 9-1-1
service is also known as “traditional 9-1-1”. It
directed all emergency calls to a nearby Public
Safety Answering Point (PSAP) which was
directly connected, via dedicated trunks, to the
telephone company’s central office (CO). A
typical PSAP consists of a group of call takers
who are responsible for answering emergency
calls as well as dispatching the appropriate
emergency service (such as ambulance, or
police, or fire fighters).
Because the plain old telephone system
(POTS) network only established and terminated calls, call takers had few resources to
determine the caller’s location. As a result,
traditional 9-1-1 soon gave way to landline Enhanced 9-1-1 (E-911), which greatly increased
the ability to locate the caller. E-911 employs
an address database called Automatic Location
Identification (ALI), which uses the telephone
number of the caller to determine his/her identity
and location. E-911 was implemented in 1978
and is still being used today (Figure 1).
Landline E-911, however, only temporarily met the new technological need. Cell phones
soon made it necessary to again upgrade the
system. The Federal Communications Commission (FCC) mandated that all United States
wireless carriers provide the location information of the caller (Reed, Krizman, Woerner, &
Rappaport, 1998). Implementation of this
mandate would enable wireless carriers to
“pinpoint” the location of any 9-1-1 caller.
The FCC mandate was divided in two
phases: Phase I required the wireless carrier to
send the PSAP the location of the antenna or
cell site; Phase II required the wireless carrier
to send an estimate of the geographic coordinates of the mobile user, typically using some
type of network triangulation scheme (Feng
& Law, 2002; Sayed, Tarighat, & Khajehnour,
2005). Not all wireless providers have implemented Phase II service as of 2009, based on
the National Emergency Number Association
(NENA)’s recent 9-1-1 Deployment Reports
(NENA, 2010).
In the late 1990s, with the onset of voice
over Internet Protocol (VoIP) (Goode, 2002) and
other Internet services, researchers and developers have realized that a complete overhaul of the
current E-911 system is necessary – proposing
a Next Generation 9-1-1 (NG-911) (Hixson,
Cobb, & Halley, 2007; NENA, 2007a, 2007b;
Schulzrinne & Arabshian, 2002) system that
Figure 1. Evolution of North American 9-1-1 emergency calling system
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010 3
enables both voice and data communications
for emergency calls.
Recently, an NG-911 proof-of-concept was
developed (Kim, Song, & Schulzrinne, 2006;
Song et al., 2008). This development represents
a critical step and an important building block
to validate IP-based emergency calling. The
proof-of-concept allowed the testing of IPbased emergency calls to IP-based PSAPs on
five main scenarios: (i) calls from traditional
landline phones, (ii) calls from cellular phones,
(iii) text messages (SMS), (iv) telematics service
messages, and (v) multimedia calls from fixed/
enterprise VoIP devices.
In addition, the NG-911 proof-of-concept
tested the idea of Emergency Services Router
Proxies (ESRPs) for policy-based routing. ESRPs improve the call routing capability of 9-1-1
calls: they can re-route emergency calls to any
PSAP (e.g., PSAPs that are not overloaded, or
PSAPs with special capabilities such as the ones
with sign-language capable call takers). With
IP-based emergency calling, a PSAP can now
be anywhere, even in a mobile device such as
a laptop. The NG-9-1-1 proof-of-concept and
all the technology behind it mean that a PSAP
does not have to be a centralized call center
as before, but can be a much more flexible,
portable, and less
expensive system.
The NG-911 proof-of-concept concludes
our brief history of the 9-1-1 evolution. However, IP-based emergency calling still faces
new challenges. Standards are being developed,
security vulnerabilities must be addressed, and
the transition from PSTN-based PSAPs to IPbased PSAPs is being investigated.
B. Motivations for This Paper
One important NG-911 research challenge is
related to the location of the caller, which can
be very dynamic. Enterprise VoIP phones have
the flexibility to be connected to any network
port. Home VoIP subscribers can be connected
to any access network (e.g., an Internet service
provider). Also, mobile devices such as dualmode cell phones (with 802.11 radio), laptops
with broadband wireless coverage (using 3G,
or 4G cellular data cards) can be constantly
changing its location.
Moreover, the architecture for IP-based
emergency services will have different entities: the access infrastructure network and the
application service provider (such as a voice
service provider (VSP)) (Tschofenig, Schulzrinne, Shanmugan, & Newton, 2007). This
poses unique challenges to current IP-based
emergency systems. For instance, it is the
subscriber’s responsibility to provide his/her
location to the VoIP service provider; however,
the subscriber may not update this information
when the VoIP device is moved to a different
location (i.e., a different access network).
As a result, VoIP service providers may not
have the most up to date civic or geographic
address of the user.
New Internet Engineering Task Force
(IETF) standards have been created to allow
the addition of location information (Peterson,
2005; Polk & Rosen, 2009) to the Session
Initiation Protocol (SIP) call setup messages
(known as SIP Invites) (Rosenberg et al., 2002).
In addition, the Location to Service Translation
(LoST) protocol (Hardie, Newton, Schulrzrinne,
& Tschofenig, 2008; Schulzrinne, Tschofenig,
Hardie, & Newton, 2007; Schulzrinne, 2008)
has been created to help both end users or SIP
proxies to obtain the SIP address of the PSAP
where the emergency call must be routed to. This
SIP address is known as SIP Uniform Resource
Identifier (URI) (e.g., sip:psap1@domain).
Initial experiments using the LoST protocol
were performed in (Schulzrinne, Tschofenig,
Hardie, & Newton, 2007), which presents the
concept of the LoST protocol, introduces the
idea of the Emergency Services IP Network
(ESInet), and how the protocol queries are
performed. The authors conclude the paper
with a few performance results, mainly delays
of the LoST queries.
Additionally, the use of emergency services
by mobile users is described by an IETF standard
on best current practices (Rosen & Polk, 2009;
Schulzrinne & Marshall, 2008). It provides a
set of guidelines on obtaining the location of
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
4 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010
mobile users, querying LoST servers, and storing the PSAP URI at a cache at the SIP/LoST
client (Wu & Schulzrinne, 2004).
In Chintapatla, Goulart, and Magnussen
(2010), we presented preliminary results from
an initial work with the NG-911 testbed, where
preliminary performance results on the LoST
queries and processing delay at the mobile client
were presented. Now, we present in this paper
more detailed experiments, lessons learned,
and a complete overview of the operation and
performance of the LoST protocol, including
description of techniques in computational
geometry for processing location information
and service boundaries data (both at the LoST
client and server).
Contributions
This paper provides a detailed tutorial on the
routing of IP-based emergency calls; moreover,
it presents experimental results that provide new
insights on the operation and performance of
the LoST protocol for mobile users. Using realworld service boundaries data, we performed
a large set of test-bed experiments; the results
helped us identify new algorithms to more efficiently support the caching mechanism (Rosen
& Polk, 2009) of the LoST protocol for mobile
users (i.e., clients with dynamic location information). This work is valuable to researchers and
practitioners working not only on the transition
of traditional emergency communications to
IP-based emergency communications but also
on applications that use location-based services
for mobile users.
This paper is organized as follows. Section
2 provides an overview of the operation of the
LoST protocol. Then, Section 3 discusses the
issue of detecting service boundary crossings at
the mobile LoST client, which can be addressed
by algorithms of computational geometry. Section 4 also discusses service boundaries, but
from the viewpoint of the LoST server. Section
5 describes our testbed setup, followed by the
experimental results which are presented in
Section 6. Finally, this paper is concluded in
Section 7.
2. A NEW ARCHITECTURE
FOR ROUTING IP-BASED
EMERGENCY CALLS
In an emergency call, location information,
or a reference to a server that has the location
information, must be added to the body of the
SIP Invite message. Location information can
be obtained by the user or a SIP proxy (Barnes,
2008; NENA, 2006; Polk, Schnizlein, & Linsner, 2004; TIA, 2006). As in traditional E-9-1-1
services, location is needed for routing the call
to the appropriate PSAP. In addition, location is
needed for dispatching the necessary services.
There are different accuracy needs between routing and dispatching. For routing,
typically an approximate location will suffice,
unless the mobile user is close to the border of
a jurisdictional boundary which could lead to
routing the call to the wrong PSAP. However,
for dispatching, emergency responders really
need an accurate location in order to quickly
reach the user.
Concerning the routing of IP-based emergency calls, the LoST protocol is the new protocol specified for call routing in the NG-911
architecture. It maps the caller’s location to the
PSAP’s Uniform Resource Identifier (URI).
In other words, it resolves a user’s location to
the address of a specific PSAP (in the IP-based
architecture, the address is an IP address). Or it
could be an IP address of an Emergency Services Routing Proxy (ESRP). In case there is
neither location nor mapping information in a
SIP Invite, the call is routed to a default PSAP.
A. Call Flow
Figure 2 illustrates the basic operation of the
LoST protocol in our NG-911 test-bed. The
Geocoder machine shown in the box includes
the SIP proxy, LoST server, and Domain Name
System (DNS) server.
As an example, here are the main steps for
an emergency call going through the ESINet
based on our current test-bed:
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010 5
Figure 2. NG-911 testbed
1.
2.
3.
4.
5.
A caller from College Station in Brazos
County makes a LoST lookup on the statewide LoST server, with the result being that
the caller should instead route to Brazos’
ESRP.
The caller calls his/her local SIP proxy with
the “Route” field of the SIP Invite being
set to esrp-brazos.tamu.edu.
The ESRP makes a LoST lookup on the
Brazos County LoST server, with the
result that the caller should be connected
to College Station’s police department at
psap-collegestation.tamu.edu.
The call is routed to the PSAP server at
College Station.
The server at College Station’s police PSAP
distributes the call among its call takers.
It is expected that the end user makes a
LoST query when it gets its location information. In this way, the PSAP address is stored in a
cache, and updated when the location changes.
When the need for an emergency call arises, a
new LoST query can be made, or if a new LoST
cannot be made or is not successful, the stored
results can be used. Then, if an emergency arise,
the new (or cached) PSAP URI is added to the
header of the SIP message, while the actual
location information is added to the body of
the SIP message in an XML format known as
Presence Information Data Format-Location
Object (PIDF-LO) (Peterson, 2005).
A practical hierarchy of LoST servers is
illustrated in Figure 3, where different levels
of information can be implemented at LoST
databases at the city, council of governance
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
6 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010
(COG), state, country, and even global levels
(Schulzrinne, 2008).
B. Service Boundaries Crossings
Now consider mobile devices such as cell
phones moving along a highway at high speeds.
In this case, the LoST client would need to
make a new LoST query every time its location changes based on its GPS updates, for
instance. But according to the IETF’s draft on
best current practices for IP-based emergency
calls (Rosen & Polk, 2009), “mapping should
be performed at boot time and whenever location changes beyond the service boundary”.
This requires the service boundary to be sent
to the mobile because the mobile device needs
to decide whether its new location is inside or
outside the current boundary.
To allow the client to check service boundary crossings, the LoST protocol specifies a
getServiceBoundary query. With this query,
the client can get the coordinates of the service
boundary, which is a polygon. Both findService
and getServiceBoundary queries are illustrated
in Figure 4. Both transactions can happen between the LoST client and LoST server several
times prior to an emergency call, without the
user even knowing about them.
The findService query returns a key that
identifies a certain polygon. If the polygon
coordinates are saved in the client’s cache, then
there is no need to get the coordinates of the
polygon. This typically happens when the
mobile user returns to a service boundary that
he/she has visited before. But if the mobile user
has never visited that service boundary, the key
will not be in the cache. An additional LoST
query needs to be made (getServiceBoundary
query) to download the service boundary information. Thus, a new boundary will be saved
at the mobile user.
To illustrate the findService query, in Figure 5 we show a sample of a LoST findService
query sent to our server, using service boundary as reference. The current user location is
sent as geographic coordinate (in this example
30.627977 and -96.3344068). The response to
this query provides the PSAP address information (as a URI) and the key to the service
boundary for that PSAP. Note that the LoST
messages are in Extensible Markup Language
(XML) format, carried in HyperText Transfer
Protocol (HTTP) and HTTP secure (HTTPS)
protocol exchanges.
In summary, each PSAP has a certain area
or region it would serve. The area each PSAP
serves is stored as corners of a polygon. Using
Figure 3. Potential hierarchy of LoST databases
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010 7
Figure 4. LoST queries: findService gives the PSAP USI and getServiceBoundary gives the
service boundary
Figure 5. A sample of a findService query (XML format)
these points, we can determine which PSAP
would serve a particular point. Thus, whenever the client makes a LoST query, along with
the PSAP address it also gets the boundary
information of the service are that the PSAP is
serving. The rationale for doing the boundary
checks at the mobile is that there may be thousands of mobile devices for only one LoST
server. It reduces the load at the LoST server
which otherwise would be overloaded with too
many findService queries.
As a drawback of the schemes that we have
just described is the requirement for additional
calculations at the client, which is the mobile
users. This issue is addressed in the Section 3,
where we describe in more detail techniques
that can be implemented in the LoST client
to determine if a location is inside the service
boundary. This is usually called point inclusion
problem.
3. CLIENT-BASED
APPROACHES TO DETECT
BOUNDARY CROSSINGS
The calculations done at the client to determine
if it has crossed the boundary can be solved using well-established point-inclusion techniques
which are based on the Jordan Curve theorem
(Preparata & Shamos, 1985; Shimrat, 1962).
The main one is known as Ray-tracing algorithm. We also propose a new technique that
uses the concept of pre-processing to reduce
the calculation time.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
8 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010
A. Ray-Tracing Method
A simple way to describe the Ray-Tracing
method is that a horizontal line (i.e., a “ray”)
is traced through the point which is our current
location. Then we must check if each and every
edge of the service boundary intersects this
horizontal line. Depending on the number of
intersections, we can determine if the point is
inside or outside the service boundary.
Let us consider the point of our location
as z and the service boundary as a polygon P,
as shown in Figure 6. For checking whether
the edge intersects the horizontal line through
z, we test if one vertex of the edge is above the
horizontal line and the other vertex below it.
Once we find such an edge, then using elementary geometry we find the x-coordinate of the
point of intersection.
Comparing the x-coordinates of the points
of intersection, we can determine the number
of intersections which are left of z and right of
z. Based on the Jordan theorem, the number of
points of intersection is always an even number,
except in the case the horizontal line crosses a
vertex of the polygon. If the number of points
of intersection towards its left and right is an
odd number, then that point is inside the polygon. It the number of intersections is even, the
point is outside the polygon.
Because the Ray-Tracing method’s implementation requires a loop over all the points in
the polygon every time the location changes,
the processing time whether a point z is internal
to a simple N-gon polygon can be determined in
O(N) time (Preparata & Shamos, 1985).
Although the Ray-Tracing method is very
efficient for checking if the point is inside the
polygon for the first time, it is not efficient
when we have a dynamic point. In other words,
if repetitive calculations are needed, it does
not use the information from previous checks
to make a decision about the current check.
This motivated us to investigate a new method
which uses information from previous checks to
make a decision. Note that there are other preprocessing calculations that are presented in the
literature. For instance, in Preparata and Shamos
(1985) a pre-processing approach requires the
polygon to be divided into wedges that are then
used in the point-inclusion problem. However,
when discussing the practical implementation
of that approach, we concluded that some of
the pre-processing would require calculations
at the LoST server. Our approach that uses preprocessing is done at the client side, which is
described next.
B. Minimum Distance Method
In this subsection, a new method is proposed –
we call it the Minimum Distance method. It is
used with the Ray-Tracing method but it takes
advantage of previous Ray-Tracing calculations
The Minimum Distance method aims to determine if a point z is inside a polygon P. The first
time there is a location change, the Ray-Tracing
method is used to determine if the mobile client
Figure 6. Point inclusion detection using the Ray-tracing method
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010 9
crossed the boundary of the current polygon P.
Using the points of intersections found using
the Ray-Tracing method, we select the closest
intersection p. Then using simple trigonometry,
we calculate the distance between p and z, which
is the minimum distance between the current
location and the boundary of the polygon dmin.
This can be illustrated as the process of drawing
a circle around the current location with a radius
equal to the minimum distance, and the point z
at the center (Figure 7).
When the mobile changes its location, the
algorithm checks if the mobile has moved outside
the polygon P by comparing the distance moved
di with the radius of the circle dmin. As long as
the total distance moved by the mobile client is
less than dmin, we do not need to do any other
calculation. Once the client moves a distance
greater than the radius we need to do a new
Ray-Tracing-based check to confirm if the client
moved outside of the polygon.
In summary, the advantage of the Minimum
Distance method is that once the minimum
distance is calculated it takes less processing
for future calculations. However, compared to
the Ray-Tracing method, the minimum distance
method requires additional calculations to find
the initial radius (i.e., minimum distance). Also,
it may give false positives, when the mobile
moves in different directions within the minimum
distance circle, but the total distance moved
becomes higher than the minimum distance,
the process starts all over again: the minimum
distance value will need to be updated.
4. SERVER-BASED
APPROACH TO SIMPLIFY
THE SERVICE BOUNDARY
Continuing on the issue of determining service boundary crossing, we also researched
potential improvements at the LoST server’s
side. The new way refers to one sentence of
the LoST standard (Hardie, Newton, Schulzrinne & Tschofenig, 2008) that states that a
hint of the polygon may be sent as a response
to getServiceBoundary. Therefore, we investigated changes in the LoST server to allow the
use of simplified polygons. This server-based
approach was motivated by two things: (i) to
reduce the amount of information sent to the
client, and (ii) to make the point-in-polygon
calculations faster.
A simplified polygon is an abbreviated
version of a polygon. It has less number of
corners compared to the original polygon. The
example shown in Figure 8 shows two polygons:
an external and an internal polygon. (We say
that this polygon has a “hole”. Surprisingly, in
our LoST database we observed several cases
of polygons with holes in it, making the point
inclusion determination even more complex.)
In the simplified version of a polygon in Figure
8, the original corners of the inner and outer
polygon are shown in darker color, while the
simplified version has corners shown in a lighter
color. We can see the reduced number of points
in the lighter color.
Figure 7. Point inclusion detection using the Minimum Distance method
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
10 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010
Using the simplified polygon approach,
our LoST server maintained two polygons for
every service boundary: the original polygon
is used by the server to map location to PSAP
in findService query; the simplified polygon is
sent as a response to getServiceBoundary.
The algorithm we used is the Ramer-Douglas-Peucker algorithm (Douglas & Peucker,
1973). Given two initial points in the polygon,
new points are added and a line segment is drawn
through them. Then, we measure the distance
between all other points and the line segment.
The point that is farthest from the line segment
is selected first. If the distance from this point
to the line is greater than some constant (which
is the accuracy required, e.g., 100m) we include
the point in the polygon. Then recursively this is
done with these two new line segments. In other
words, all the points of the simplified polygon
are actual points of the service boundary, but
in a reduced amount (i.e., points in between
are omitted).
Additionally, the calculations of the simplified polygon can be done off-line and installed in
the LoST server prior to its operation. Therefore,
this method makes changes at the LoST server’s
side. To ensure compatibility with the LoST
protocol, servers that support the simplified
polygon should not require major changes in
the LoST queries. After presenting our testbed
and results in the next sections, we will further
discuss this topic of implementation.
5. TESTBED SETUP – LOST
CLIENTS AND SERVER
The NG-911 testbed and call flow has been introduced in Section 2 (Figure 2). We now provide
additional details on the types of LoST clients,
and the spatial database at the LoST server.
A. LoST Clients
We performed experiments with two different
mobile clients:
i.
A laptop that implements the functions of
a SIP client and a LoST client: we used
the multi-agent SIP/LoST client implemented at Columbia University (Wu &
Schulzrinne, 2004). To communicate with
the servers in the test-bed, the laptop uses
a wireless 3G data card (Sprint Sierra
Wireless Aircard 597A). Embedded in
the 3G data card, a GPS receiver obtains
Figure 8. Simplified polygon of Brazos County (lighter dots)
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010 11
the end-user’s location. The GPS location
is then sent to a serial port. The SIP client
continuously reads the GPS data from the
serial port and compares if the location
has changed. If it has changed, the LoST
client verifies if this location is within the
same service boundary (or jurisdictional
boundary).
ii. A cell-phone: In addition to the SIP client
running on a laptop, we have implemented
the functionality of the LoST protocol on a
smart-phone (Figure 9). The cell phone’s
LoST client was implemented in JavaME.
It runs on the BlackBerry 8820 with the
Blackberry 4.5 OS. This LoST client also
has a GPS and can use the latitude and
longitude readings to perform the LoST
queries. To parse the results of the LoST
queries we used the kxml parse (http://
kxml.sourceforge.net/). The kxml parser
is a pull parser: it reads a little bit of a
document at each time, while still downloading the data. The application drives the
parser through the document by repeatedly
requesting the next piece. The LoST client
verifies the new GPS reading in the same
way as the client on the laptop, by checking
for every new location if it is within the
current service boundary.
Because the experiments required long
trips to physically move the clients to a different service boundary, we have enabled both the
LoST client at the laptop and at the smart-phone
to read simulated GPS data so that we could
test points in several boundaries. We have also
tested these points at different cellular networks
(e.g., rural and urban areas) (Zhan & Goulart,
2009).
B. LoST Server/Database
The LoST server was implemented using PostgreSQL with PostGIS for the mapping service.
The computer running this service has a dual
core processor at 1800 MHz, with 1GByte of
memory. Columbia University provided the
software implementation of the LoST protocol
(Song et al., 2008), and we have populated the
database with our local data.
The data contained in our database is
at the state level (as in Figure 3) with actual
data from the service boundaries in our state
(i.e.,Texas). There are around 500 service
boundaries in Texas. Out of this large number.
we have sampled 198 boundaries to verify their
complexity in terms of number of corners. To
clarify the concept of “number of corners”,
the service boundaries consist of data files
that contains the geographic coordinates (i.e.,
latitude and longitude pairs) of each corner. In
this way, each data file describes the corners
of a polygon.
Figure 10 shows a histogram of our sampled
data, in terms of number of corners. The first bar
shows that there are 74 service boundaries with
less than 1000 corners. Out of 198 samples, this
accounts for 37 percent. These low complexity
boundaries typically have a regular shape (e.g.,
rectangular-like shape). However, Figure 10
also shows that there are several boundaries
with a few thousands of corners.
It is of our special interest to verify the
performance of the LoST protocol for such
complex service boundaries, especially boundaries with more than 5000 corners, which accounted for 29 service boundaries in our
sample, or 15 percent. We have observed that
the complexity of the boundary depends on
geography (borders with neighboring states,
rivers, mountains, coastal lines) and population.
On the latter, it is significant to mention the
size metropolitan areas contribute to the complexity of the service boundary. For example,
the four counties with largest population in
Texas have service boundaries with more than
5000 corners. Note that the maximum number
of corners that we observed in our database was
19278 corners.
6. EXPERIMENTAL RESULTS
This section presents experimental results that
illustrate the operation of the LoST protocol in
a NG-911 test-bed (Figure 2) The operation of
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
12 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010
Figure 9. LoST client implemented in a smart-phone, returning PSAP URI, boundary key, and
delay to get response
the SIP and LoST protocol together with the
computational geometry algorithms of Section
4 are tested in terms of message sizes, service
boundaries’ complexity, delays for findService
and getServiceBoundary queries, and processing delays for the point inclusion problem.
A. SIP Call Flow – Message Size
and Delay at the Access Network
The SIP call setup transaction in Figure 11
follows a standard SIP call flow, with mobile’s
location information added in the initial SIP
Invite message. The two intermediate servers
are the SIP proxy (geocoder) which is at the side
of the SIP client’s domain, and the emergency
services routing proxy (ESRP) which is at the
side of the PSAP, in the Emergency Services IP
network (ESInet). Note that all SIP messages in
an emergency call are transported over Transport
Control Protocol (TCP), which provides reliable
transport to IP packets.
From our example (Figure 11), the number
of bytes exchanged between the SIP client and
SIP proxy to complete the call setup transaction
was 4744 bytes. The largest message is the
initial SIP Invite message: 2230 bytes. This
large size is due to the location information
which is in the body of the SIP Invite message,
in an Extensible Markup Language (XML)
format known as Presence Information Data
Format – Location Object (PIDF-LO). In our
experiments we are observing that the SIP Invite
messages are being fragmented (or divided) in
two different packets, whereas regular nonemergency SIP Invites are usually smaller than
1000 bytes and are not fragmented. This was
an important finding, and raised some questions
on the issue of one of the fragments of the SIP
Invite being lost. TCP will take care of retrans-
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010 13
Figure 10. Distribution of the number of corners from a sample of in 198 service boundaries
in the state of Texas
mitting the message, but the added delay to
retransmit the complete SIP Invite to the PSAP
can be very critical.
We also measured the average time to
connect the emergency call to a PSAP using
the 3G data card: it took an average of 1.5 sec
using the laptop. There were no other calls to the
PSAP. We concluded that the 3G access network
adds a considerable delay in the SIP call setup
process. For instance, we measured the round
trip times (RTT) for wireless connections such
as IEEE 802.11g (54 Mbps) and a 3G card for
packet sizes from 128 to 1024 bytes (Table 1).
From the call flow shown in Figure 4, we can
observe that the wireless network we use will
affect only those packets which are sent or
received by SIP client. However, the wireless
access network is the major source of delay in
this lightly loaded scenario.
B. SIP LoST “findService” Query
Delays
In this experiment, we measured the delay from
the time the LoST client sends a findService
query to the time it gets and parses the findService response, which contains the PSAP URI and
the key to the service boundary. This is the first
two messages shown in Figure 11. We have used
as the LoST client the smart-phone, connected
to a commercial 3G network. As mentioned in
the previous sub-section, the delay at the 3G
access network is relevant, and we will see in
the next results that this delay depends on the
mobile’s location.
The data used in the tests correspond to
simulated GPS data representing points in five
different service boundaries: Stonewall, College
Station, Harris, Fort Worth, and Brazos jurisdictional boundaries. These boundaries are of
varying complexity, with a minimum number
of corners of 322 and a maximum of 10718. For
each test, all the five coordinates were sent to
the LoST server and the corresponding service
PSAP URI was sent back to the client. For each
coordinate, three measurements were taken.
Each test was done at different places
(rural, urban), adding to a total of 22 different
locations. The results in Figure 12 show the
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
14 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010
Figure 11. Emegency call flow (SIP and LoST transations), with message sizes and fragmentation
average delay of findService queries. The data
points are grouped by the place where they were
collected, where Figure 12 shows the results in
10 locations. From this graph, we conclude that
the location of the mobile user was an important
factor in the performance of the LoST client to
receive a response from the server. Location 7,
for instance. had the worst delays for most of
the boundaries.
Additionally, Table 2 shows the average
delay of all our measurements, in all locations
with the correspondent standard deviation. Note
that for the service boundary with the smallest
number of corners (323 corners) the delays
were smaller than all the others, about 200 msec
less. This was interesting because we expected
that the findService delays by reference were
independent of the size of the service boundary.
The size in bytes of the queries and responses
are about the same (around 600 bytes for the
findService query and 800 bytes for the findService response, as shown in Figure 11) no
matter which service boundary. Therefore, the
network delays are approximately the same,
but we suspect that there is an additional processing delay component at the LoST server
when it accesses the database.
To verify if there are differences in the
processing delays when a server receives a
findService query, we have used a packet analyzer (e.g., Wireshark) at the server to to measure the time between the arrival of a findSer-
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010 15
Table 1. Wireless access networks delay comparison
Packet Size
802.11g - RTT
3G card – RTT
128 bytes
6 ms
156 ms
256 bytes
11 ms
160 ms
512 bytes
10 ms
216 ms
1024 bytes
25 ms
270 ms
Figure 12. FindService query delays for a mobile user at different locations, simulating points
from 5 different service boundaries
vice query and the time the server issues the
response. Figure 13 shows the average results
for four different service boundaries, ranging
from 323 to 13,528 corners. A total of 10 measurements were taken for each boundary. For
instance, a 10,700-corner-boundary required
approximately 0.5 seconds of processing time
at the server. Although the delays at the server
had a large variance for a couple of boundary
sizes (the ones with 2,045 and 13,528 corners),
we conclude that the processing delay increases with the complexity of the boundary,
i.e., complexity in terms of number of corners
and number of holes in the boundary (see third
column in Table 2). The high processing delay
was unexpected, and this could be due to the
limited memory size of our server (1GByte),
but further experiments are needed to confirm
that.
In short, the findService delays had two
main components: the network delay and the
processing time at the server. Our results showed
that the network delays are very dependent on
the physical location of the mobile user (e.g.,
near a cell tower or the number of users in the
cell site), whereas the processing delay at the
servers depend on the service boundary’s complexity. Also, the difference in processing delays
was clearly observed for the polygons with a
very small number of corners (such as Stonewall
with 323 corners) than the ones with thousands
of corners. Next, we will see how the service
boundary complexity affects the getServiceBoundary query.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
16 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010
Table 2. FindServiceResponse Delays
Service boundary
name
Number of
corners
Number of holes
in the boundary
Mean delay for
findServiceResponse (ms)
Standard deviation
for findservice
(ms)
Stonewall
323
0
1946.5
244.0
College Station
2045
0
2151.9
602.7
Harris
5343
17
2291.3
985.1
Fort Worth
10606
7
2160.3
611.4
Brazos
10719
1
2181.0
759.6
C. LoST getServiceBoundary
Query Delays
boundary. This processing delay is discussed
next.
When a getServiceBoundary is issued (normally after the findService transaction), the
server sends the mobile all the coordinates of
the polygon (i.e., all the corners). For instance,
Figure 11 shows an example in which the size
of the getServiceBoundaryResponse message
was 250Kbytes, which resulted in 199 packets
sent from the LoST server to the client.
To have a better idea of the delays for a
mobile user to obtain the service boundaries,
we tested several service boundary downloads
using the LoST client at the smart-phone (Figure
13). Large delays, on the order of 1 minute are
observed for the service boundaries with more
than 10000 corners. There is a clear dependency
on the number of corners and the delay to obtain
the service boundary, since the response messages contain all the corners of the polygon.
In a lesser degree, the delays depend on the
location of the user and the type of network
access, as discussed previously. The delays
also depend on the type of mobile device (e.g.,
smart-phones had larger delays than laptops).
Although boundary downloads occur only when
a user changes to a new service boundary, it is
clear that such delays are very large. Users can
definitely perceive the delay for a LoST client
to download complex service boundaries, i.e.,
with more than 5000 corners (Figure 14).
Once the boundary has been downloaded
and stored in cache, the mobile will use this
data to decide if a new location is within the
D. Processing Time to Detect
Service Boundary Crossings
In this experiment we measured the time the
client spends checking whether a given point is
inside the polygon. We compare the processing
using the Ray-Tracing method and the Minimum Distance method (Section 3). The tests
were performed using polygon of different
complexities. The simplest polygon has 323
corners, while the most complex has 14,389
corners. To be able to simulate these different
service boundaries, we simulated GPS data as
inputs to the LoST client, with a new location
update every 5 seconds. In this experiment we
used the combined SIP/LoST client installed
in a laptop.
The results are shown in Figure 15. The
x-axis represents the different service boundaries and their number of corners. The y-axis
shows the processing delay that each method
(Ray-Tracing or Minimum Distance) needed to
check if the new location is inside or outside
the boundary. To measure this processing delay,
we used a timer that is triggered every time a
program function named “contains” is called.
Note that we have two different programs, each
with a different version of the “contains” function: one that implements the pure Ray-Tracing
method, and one that implements the Minimum
Distance Method. At the end of the “contains”
function, the timer stops.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010 17
Figure 13. Processing delay at the LoST server before a findServiceResponse
The results show that as the number of
corners of the polygon increases, the time
taken to check whether a given point is inside
the polygon increases proportionally with the
number of corners in the Ray-Tracing method
(O(n) where n is the number of corners). This
does not happen with the Minimum Distance
method, which had small delays that varied
independently of the complexity of the polygons. The difference in delays between RayTracing and Minimum Distance methods is
significant for the last three polygons in Figure
15, which have above 5000 corners.
However, with the Minimum Distance
method we have an overhead of calculating
the minimum distance value for the first time.
In the worst case scenario, i.e., for polygons
with more than 10000 corners, we measured
the overhead as approximately 400ms. Given
this overhead, the Minimum Distance method
would be advantageous in certain scenarios:
•
•
•
When the service boundaries has a large
number of corners (5000 or more),
When the mobile is far from the boundary
(i.e., the minimum distance will be large).
When the mobile is stationary or travels at
low speed, so the traveled distance would
remain smaller than the minimum distance
for a long period of time.
Thus, new calculations of the Minimum
Distance radius and its implicit overhead would
not be needed very often.
E. Experiments with
Simplified Polygons
The previous experiments have shown that small
polygons such as the Stonewal service boundary with 323 corners have smaller findService
delays, getServiceBoundary delays, and smaller
processing delay to verify if a point is inside
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
18 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010
Figure 14. GetserviceBoundary Response delay from server for a mobile LoST client (smart-phone)
its boundary than all the other larger polygons.
What if all the polygons were as simple as this
one? In this section, we show that by using the
algorithm described in Section 4 to simplify
polygons can considerably reduce the complexity of the polygons.
For instance, using the Ramer-DouglasPeucker, with two different accuracy values
(0.1 miles and 0.03 miles), Figure 16 shows the
percentage reduction in the number of corners of
the simplified polygon for 75 service boundaries within the state of Texas. All polygons that
were simplified had more than 2000 corners in
its original version.
Another way to illustrate this dramatic
change in the size of the polygons, the average
size of all the original polygons was 4998
corners. When we applied the simplification
algorithm with accuracy of 0.1 miles, the average size of all polygons became 336 corners.
With 0.03 miles, the reduction is less but still
considerable: the average size of all polygons
was 748 corners.
We observed that the number of points in
the simplified polygon does not directly depend
on the number of points in the original polygon;
however, they depend on the shape of the original polygon, as shown in the simplified polygon
of Figure 17, which illustrates the boundary
at a coastal area. And a polygon with many
curves will have more points in its simplified
version. But in all the cases the decrease is very
significant. For an accuracy of 0.1 mile and for
the polygons shown in Table 3, the reduction
was in average 92 percent.
Implementing a Database with
Simplified Polygons
Once we have the simplified polygons, we updated our LoST database to add a new column
named “simplified polygon”. This column will
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010 19
Figure 15. Client processing time to detect if point is inside service boundary
have the simplified version of the polygon for
each PSAP boundary. Our LoST server uses
this polygon to reply to a GetServiceBoundary
query. This decreases the GetServiceBoundary
response time significantly. For instance, we
performed experiments at the border of a service boundary with 2045 corners. In this case
we used the client implemented in the laptop
with the 3G data card. As shown in Figure 18
when we queried the LoST server without the
simplified polygon (from a location inside the
boundary “30.622 -96.34934”) it took an average 4.6 seconds to reply, with the worst case
being 8.27 seconds. But when we queried a
LoST server with Simplified Polygon from the
same location it took only 0.4 seconds on an
average with worst case being 0.511 seconds.
In our test-bed, we are using the original
polygon to respond to the findService query.
In other words, the mobile will always get an
accurate PSAP URI. But when the client requests
the service boundary data, the server sends the
simplified polygon along with a warning message. Either the Ray Tracing or the Minimum
Distance algorithms may be used to process the
point inclusion problem within that simplified
boundary. Of course, there will be a loss in the
accuracy on the decisions at the mobile.
The approach of using different polygons
for findService and getServiceBoundary queries
is only for testing purposes. In a real system,
we recommend that if a small accuracy loss is
acceptable (e.g., 0.03 miles), the same service
boundary should be used for all queries. The
reason is that in very rare situations when our
client is near the border of a service boundary,
we observed a potential deadlock situation: the
mobile’s location is inside the original polygon
but outside the simplified version, it would lead
to a new findService query all the time, which
may lead to a performance problem.
7. CONCLUSION AND
FUTURE WORK
In this paper we described the new architecture
for routing calls using the Location to Service
Translation (LoST) protocol. Since the number
of mobile broadband users is expanding rapidly,
we focused on mobile LoST clients, such as
laptops and smart-phones using cellular access
networks.
After implementing and testing the operation of the LoST protocol in a testbed with
real-world service boundary information, we
observed that the complexity of the service
boundaries (i.e., number of corners and also
number of holes) contribute to the delays in
the LoST queries (both findService and getServiceBoundary), in addition to the processing
delay at the mobile. Considerable delays were
observed for boundaries with more than 5000
corners. Therefore, we explored new approaches
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
20 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010
Figure 16. Percentage reduction in the number of points in the boundary polygon using RamerDouglas-Peucker Method
Figure 17. The complexity and the simplification of a coastal service boundary
to improve the performance of the LoST transactions with the caching mechanism: the minimum
distance method (at the client side) and the
simplified polygons (at the server side). They do
not require changes in the standard protocol and
the results are promising, although they do have
some limitations such as false positives for the
minimum distance method, and the performance
issue when the mobile is outside the simplified
polygon but inside the original polygon. As one
can observe, this is an on-going work and we
are still researching further improvements to
the operation of the LoST transactions and the
approaches here discussed.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010 21
Table 3. Reduction in number of points with a 0.1 mile error
Polygon Name
Number of Points in Original
Number of Points in Simplified
% Reduction
Bryan
10717
379
96.46356
College Station
2045
94
95.40342
Harris
14388
2007
86.05088
Stonewall
322
31
90.37267
Anderson
4979
423
91.50432
Houston
9355
1334
85.74025
Fortbend
9680
653
93.25413
Forworth
10620
831
92.17514
Dickens
746
8
98.92761
Eastland
450
10
97.77778
Austin
8070
866
89.2689
Ellis
9337
769
91.76395
Figure 18. GetServiceBoundary query delays using simplified and original polygon
Moreover, future work includes tests on
IETF’s proposed security schemes for the
LoST transactions, to assure the confidentiality of both location information and routing
information. Also, as fourth generation (4G)
cellular technologies are being deployed, we
will perform experiments on the performance
of the LoST queries and re-evaluate the impact
of the complex service boundaries on delays
and processing time.
ACKNOWLEDGMENT
This study was supported by a grant from the
National Science Foundation (NSF) award no.
0751118.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
22 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010
REFERENCES
Barnes, M. (2008). HTTP Enabled Location Delivery
(HELD) (IETF draft-ietf-geopriv-http-locationdelivery-07). Internet Engineering Task Force. IETF.
Chintapatla, B., Goulart, A., & Magnussen, W.
(2010). Testbed Experiments on the Location to
Service Translation (LoST) Protocol for Mobile
Users. In Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC).
Douglas, D., & Peucker, T. (1973). Algorithms for
the reduction of the number of points required to
represent a digitized line or its caricature. The Canadian Cartographer, 10(2), 112–122.
Peterson, J. (2005). A Presence-based GEOPRIV
Location Object Format (IETF RFC 4119). Internet
Engineering Task Force. IETF.
Polk, J., & Rosen, B. (2009). Location conveyance
for the session initiation protocol (IETF draft-ietfsip-location-conveyance-13). Internet Engineering
Task Force. IETF.
Polk, J., Schnizlein, J., & Linsner, M. (2004).
Dynamic host configuration protocol option for
coordinate-based location configuration information (IETF RFC 3825). Internet Engineering Task
Force. IETF.
Preparata, F., & Shamos, M. (1985). Computational
Geometry – An Introduction. New York: Springer.
Feng, S., & Law, C. (2002). Assisted GPS and its
Impact on Navigation in Intelligent Transportation
Systems. In Proceedings of the 5th IEEE International
Conference on Intelligent Transportation Systems
(pp. 926-993).
Reed, J., Krizman, K., Woerner, B., & Rappaport,
T. (1998). An overview of the challenges and progress in meeting the E-911 requirements for location
service. IEEE Communications Magazine, 30–37.
doi:10.1109/35.667410
Goode, B. (2002). Voice over Internet Protocol
(VoIP). Proceedings of the IEEE, 90(9), 1495–1517.
doi:10.1109/JPROC.2002.802005
Rosen, B., & Polk, J. (2009). Best current practices
for communication services in support of emergency
calling (IETF draft-ietf-ecrit-phonebcp-08). Internet
Engineering Task Force. IETF.
Hardie, T., Newton, A., Schulzrinne, H., &
Tschofenig, H. (2008). LoST: A Location-to-Service
Translation Protocol (IETF RFC 5222). Internet
Engineering Task Force. IETF.
Hixson, R., Cobb, B., & Halley, P. (2007). 9-1-1: The
Next Generation. 9-1-1 Magazine, 18-21.
Kim, J. Y., Song, W., & Schulzrinne, H. (2006).
An Enhanced VoIP Emergency Services Prototype.
Paper presented at the 3rd International Information Systems for Crisis Response and Management
(ISCRAM) Conference.
NENA. (2006). NENA recommended method(s) for
location determination to support IP-based emergency services (No. 08-505 v1). Retrieved from http://
www.nena.org/standards/technical/voip/locationdetermination-ip-based-emergency-services
NENA. (2007a). NENA Functional and Interface
Standards for Next Generation 9-1-1 Version 1.0
(i3) (No. 08-002). Retrieved from http://www.nena.
org/standards/technical/voip/functional-interfaceNG911-i3
NENA. (2007b). IP-capable PSAP Minimum Operational Requirements Standard (No. 58-001).
Retrieved from http://www.nena.org/standards/
operations/IP-PSAP-minimum-requirements
NENA. (2010). NENA 9-1-1 Deployment Reports &
Maps. Retrieved from http://nena.ddti.net
Rosenberg, J., Schulzrinne, H., Camarillo, G.,
Johnston, A., Peterson, J., & Sparks, R. (2002).
SIP: Session Initiation Protocol (IETF RFC 3261).
Internet Engineering Task Force. IETF.
Sayed, A., Tarighat, A., & Khajehnour, N. (2005).
Network-based wireless location. IEEE Signal
Processing Magazine, 22(4), 24–40. doi:10.1109/
MSP.2005.1458275
Schulzrinne, H. (2008). Synchronizing Location to
Service Translation (LoST) Servers (IETF draftietf-ecrit-lost-sync-00). Internet Engineering Task
Force. IETF.
Schulzrinne, H., & Arabshian, K. (2002). Providing emergency services in Internet telephony. IEEE
Internet Computing, 6(3), 39–47. doi:10.1109/
MIC.2002.1003130
Schulzrinne, H., & Marshall, R. (2008). Requirements for emergency context resolution with Internet
technologies (IETF RFC 5012). Internet Engineering
Task Force. IETF.
Schulzrinne, H., Tschofenig, H., Hardie, T., &
Newton, A. (2007). LoST: A Protocol for Mapping
Geographic Locations to Public Safety Answering
Points. In Proceedings of the IEEE International
Performance, Computing, and Communications
Conference (IPCCC) (pp. 606-611).
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010 23
Shimrat, M. (1962). Algorithm 112: Position of
point relative to polygon. Communications of the
ACM Archive, 5(8), 434. doi:10.1145/368637.368653
Song, W., et al. (2008). Next Generation 9-1-1
Proof-of-Concept System. Paper presented at SIGCOMM ’08.
Telecommunications Industry Association. (2006).
Link layer discovery protocol for media endpoint
devices (LLDP-MED) (ANSI-TIA-1057). Arlington,
VA: Author.
Tschofenig, H., Schulzrinne, H., Shanmugan, M., &
Newton, A. (2007). Protecting First-Level Responder
Resources in an IP-based Emergency Services Architecture. In Proceedings of the IEEE International
Performance, Computing, and Communications
Conference (IPCCC) (pp. 626-631).
Wu, X., & Schulzrinne, H. (2004). SIPc, a multifunction SIP user agent. In Proceedings of the
IFIP/IEEE International Conference, Management
of Multimedia Networks and Services (MMNS’04)
(pp. 269-281).
Zhan, W., & Goulart, A. (2009). Statistical Analysis
of Broadband Wireless Links in Rural Areas. The
Journal of Communication, 4(5), 320–328.
Ana E. Goulart received a bachelor’s degree in electrical engineering from the Federal School
of Engineering of Itajuba (EFEI), in Brazil. While working in the industry, she received a M. Sc.
degree in Information Systems Management from the Pontificial Catholic University of Campinas, in 1997. She moved to the United States in 1997 where she earned a M. Sc. in Computer
Engineering at North Carolina State University, Raleigh, NC; followed by a Ph.D. in Electrical
and Computer Engineering at Georgia Tech, Atlanta, GA, in 2005. She is currently an Assistant
Professor in the Electronics and Telecommunications Engineering Technology program at Texas
A&M University, in College Station, TX. Her research interests include wireless communications,
protocols for real-time voice and video communications, IP-based emergency communications,
networked robotics, and rural telecommunications.
Anna Zacchi received a Laurea cum laude in Information Science from the Universita' degli
Studi di Milano, Italy, and her M. Sc. in Computer Science from Texas A&M University. She
is currently a Ph.D. student in the department of Computer Science and Engineering at Texas
A&M University. From 2007 to 2009 she collaborated in the Next Generation 911 (NG-911),
project sponsored by US Department of Transportation (DoT); the purpose of the project was to
develop a proof-of-concept for NG911. In 2009-10 she participated in the NSF funded research
project about NG-911 security. She is now working on a research project in the field of Human
Computer Interaction.
Bharath Chintapatla is a masters student in Computer Science at Texas A&M University. He
received his BTech in Computer Science & Engineering from Indian Institute of Technology,
Guwahati in August 2008. His research interests include network protocols, wireless technologies, and network security.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
24 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),1-24,July-September2010
Walt Magnussen is the Director for the Texas A&M University Telecommunications Office, and
the Director for the Texas A&M Internet2 Evaluation Center. As Telecommunications Director,
Dr. Magnussen manages all aspects of telecommunications for the third largest university in the
United States. As the Director of the ITEC, he leads the Voice-over-Internet Protocol (VoIP)
and Internet Protocol Television (IPTV) initiatives for Internet2, a consortium of the 209 leading research universities in the United States. Dr. Magnussen has been the lead for many other
projects completed within the ITEC, including lead in the development of the Next Generation
9-1-1 (NG9-1-1) Proof of Concept projects for the United States’ Departments of Commerce and
Transportation. Dr. Magnussen acquired his bachelor’s and master’s degrees from the University
of Minnesota, and his doctoral degree from Texas A&M University.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),25-35,July-September2010 25
Factors that Inluence
Crisis Managers and their
Decision-Making Ability
during Extreme Events
Connie White, Jacksonville State University, USA
Murray Turoff, New Jersey Institute of Technology, USA
ABSTRACT
This paper reviews crisis literature, identifying factors that most challenge decision makers during extreme
events. The objectives are to understand the environment in which the emergency manager is working; isolate
factors that hinder the decision maker’s ability to implement optimum solutions; and identify structures that
best it the problem type. These objectives are important because extreme events are not well managed. Extreme
events are best characterized as wicked problems. Stress, information overload, bias, and uncertainty create
an environment that challenges even the best decision makers. Factors must be better understood so that
policies, systems, and technologies can be created to better it the needs of the decision maker. The authors
discuss ongoing research efforts and describe systems being designed and implemented that provide a variety
of web based collaborative tools, as well as solutions to these wicked problems.
Keywords:
Crisis Management, Crisis Managers, Decision Makers, Emergency Response, Web Based
Collaborative Tools
INTRODUCTION
The objective of this article is to examine the
emergency and disaster literature in order to
identify the factors that challenge crisis managers over the course of a catastrophic event.
Characteristics of an extreme event are identified and found to match the same characteristics
that define wicked problems. “An emergency is
by definition a unique and unpredictable event,
DOI: 10.4018/jiscrm.2010070102
and it is seldom possible, even in retrospect, to
assess what the outcome of an emergency response would have been if alternative measures
had been followed” (Danielsson & Ohlsson,
1999, p. 92).
Responding to the needs of an emergency
depends on the severity of the event that has
occurred. On one extreme of the scale, there is
the routine every day emergency. This includes
responding to a car wreck, a heart attack, or to a
local flood. These types of problems are structured, occur frequently and protocols exist to
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
26 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),25-35,July-September2010
mitigate the situation. More severe emergencies,
like 100 year floods, earthquakes, and tornadoes,
occur less frequently and pose a greater challenge to crisis managers. These are defined as
ill-structured problems and can eventually be
tamed into a series of structured sub-problems
that can be managed (Turoff & Hiltz, 1982). The
most severe crisis are catastrophic events like
the 1974 Super Outbreak where 148 Tornadoes
touched down over a two day period across the
United States, the 1980 eruption of Mount St.
Helens, the 2004 Asian Tsunami and in 2005,
Hurricane Katrina. Extreme events occur rarely,
have not been experienced before by crisis
management and have no clear solutions to
problems. Extreme events are best characterized
as wicked structures problems.
The literature reveals that extreme events
do have particular characteristics with common themes reappearing throughout scientific
literature. Carl Von Clausewitz offers a cohesive
observation of the characteristics plaguing
extreme events. He wrote:
“A commander must continually face situations involving uncertainties, questionable or
incomplete data or several possible alternatives. As the primary decision maker, he, with
the assistance of his staff, must not only decide
what to do and how to do it, but he must also
recognize if and when he must make a decision”
(Clausewitz, 1976, p. 383).
This research is important because the
needs of crisis managers must be identified
from the literature found within the emergency
domain. Too often, systems are designed, policies are created and plans are written that don’t
consider the ground level decision maker. For
disasters to be managed so that the solutions are
a good fit to the problem, the systems, policies
and plans need to be created by asking:
➢
➢
Who is the decision maker?
Under what conditions are these decisions
being made?
➢
➢
What factors pose the greatest threat to
making optimal decisions?
How can a system be designed to overcome the most challenging factors that
hinder decision making?
It is important for the results of studies
confirming the task type, needs and considerations of the practitioners themselves to be
observed so that technology, systems, policy
and procedures can be developed to support the
needs of decision makers to facilitate a rapid
response and recovery given a catastrophic event
has occurred. The literature clearly revealed a
number of influences that can be managed better
if systems are designed to meet those needs.
BACKGROUND
Stressors
Decisions are time critical and can be emotionally stressful when life and death triage type
decisions must be made. Crisis managers are
confronted with additional stressors that challenge the best decision makers. Simple creature
comforts are nonexistent and that affects a human’s decision making ability without taking
into account, the numerous other stressors that
are ongoing. A lack of sleep, personal issues
(family, home), proper nutrition, hygiene, and
transportation are characteristics of the environment in which the decisions are being made.
After the great Deluge of New Orleans
when the levees broke flooding 80% of the
city, many first responders’ had lost their own
homes, their own family members, had no food,
no place to sleep and were every bit as much
victims as the people they were to help rescue
and protect. Responders reacted in a number of
ways; most notorious were a small percentage of
the police force who abandoned their roles, and
a handful who abused their authority (Kushma,
2007). This contradicted the expected roles they
represented. These environmental, mental and
physical influences were beyond their control
and clearly affected their rational decision mak-
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),25-35,July-September2010 27
ing ability. In the face of adversity, most these
men and women reported for duty. However,
reports of police brutality resulting in murder
charges and convictions are the end result of
those responders who could not handle stress
on a personal level (Brinkley, 2006).
Stress is an understandable emotion felt by
emergency managers. They must make life and
death decisions especially where such tragedies
requiring triage may have to be decided in the
selection criterion between groups of people
(Kowalski-Trakofler, Vaught, & Scharf, 2003).
Another source of stress arises when decisions
must be made under severe time constraints
(Rodriquez, 1997; Kowalski-Trakofler et al.,
2003). Decision makers have to forecast and
make predictions given the uncertainty in expectations of future events (Rodriguez, 1997).
Time is precious, and accurate decisions must
be made along a time line at particular points
in time over the duration of the event as a disaster evolves (Brehmer, 1987; Danielsson &
Ohlsson, 1999), “The operational commander
continually faces an uncertain environment”
(Rodriguez, 1997, p. 5).
Information: Too Much,
Too Little, Too Late
Initially, getting enough accurate and timely
data is a challenge, but afterwards information overload can create bias conducive to
poor decisions being implemented. This is all
confounded by the lack of experience managing
similar events of the same magnitude by teams
and leadership. If a decision is made one way
or the other, no one is sure what the outcome
will be so there’s a roll of the dice with every
alternative.
Critical judgments must be made where
large amounts of information are available for
consideration creating information overload.
To make matters worse, this information can be
wrong or incomplete (Kowalski-Trakofler et al.,
2003) or sufficient time may be lacking to gain
the perfect and complete information needed
before the decision is made (Rodriquez, 1997).
“In dealing with the uncertainty of a continually
changing environment, the decision maker must
achieve a trade-off between the cost of action
and the risk of non-action” (Kowalski-Trakofler
& Vaught, 2003, p. 283). Sometimes these decisions are made on the decision maker’s (DM)
assumptions and intuition when information is
not attainable (Rodriquez, 1997).
One person is in charge of making the final
decision for action, but this is a collaborative effort of numerous stakeholders sharing numerous
overlapping tasks. “As complexity increases, it
becomes impossible for a single individual with
the limited information processing capacity to
gain control” (Danielsson & Ohlsson, 1999, p.
93). A dynamic decision making approach is a
much needed method due to the inherent nature
of the chaos characteristic of extreme events
(Danielsson & Ohlsson 1999). Extreme events
need to be managed using structure with flexibility to improvise or adapt where necessary
to achieve agility (Harrald, 2009).
Lack of Experience
Small events occur frequently, and catastrophic
events occur rarely (Hyndman and Hyndman,
2006). Protocols or heuristics can be used for
the emergencies that are smaller and occur more
frequently. However, management is posed
with the problem of not having any or little
prior experience to larger events where national
boundaries are ignored and the demands of the
resources needed far exceed the availability of
supply. Research reveals that extreme events
have different characteristics from smaller disasters (Skertchly & Skertchly, 2001). This calls
for a dynamic approach to decision making to
fit the task due to the overwhelming nature of
these extreme events considered with the limitations of a human’s mental capacity and ability
to manage a large set of ongoing problems at
any one given time. A major problem exists in
a decision maker’s ability to effectively manage
all of the ongoing events simultaneously during
an extreme event (Danielsson & Ohlsson, 1999;
Kerstholt, 1996).
In the remainder of this chapter, these
areas will be explored further probing deeper
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
28 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),25-35,July-September2010
into the needs of emergency managers. First,
how extreme events are different from small
emergencies and must be approached as a different task type is covered. Second, extreme
events are defined as wicked problems. These
characteristics are laid out and mapped against
extreme events. Good versus bad characteristics
in crisis decision making from the literature are
listed in attempts to steer design. Third, types
of bias that are specific in emergency situations and decision making are covered. Next,
literature findings concerning time, stress and
information overload are provided. Methods
describing how crisis managers handle information presently are discussed and related to
other research concepts already explored in
this research effort. Next, research indicating
how feedback and expert intuition are used to
manage uncertainty is presented. We close by
providing some ongoing research endeavors that
are being designed to help solve these problems.
Extreme Events
Large scale extreme events are not like small
emergencies. Small emergencies occur regularly where most decisions are rule based due to
the experience of the event (Rasmussen, 1983).
This is referred to as procedural expertise (Adams & Ericsson, 2000). In the event that a small
emergency should occur, the EM may not even
be notified because firefighters, police and emergency medical attendants already know how to
proceed (Danielsson & Ohlsson, 1999). On the
other hand, extreme events present a different
set of characteristics due to the problem type
and task structure (Campbell, 1999; Mitchell,
1999; McLellan et al., 2003).
In large-scale operations, the cognitive
demands on the EM are severe (Danielsson &
Ohlsson, 1999). Team coordination strategies
will evolve from explicit coordination under low
workload conditions to implicit coordination as
work load increases. Large-scale emergency
operations imply distributed decision making
in that decisions are disseminated among many
stakeholders, of which no single individual has
complete knowledge of the current situation
(Danielsson & Ohlsson, 1999; Mitchell, 1999;
Kowalski-Trakofler & Vaught, 2003).
Wicked Problems
Extreme events possess characteristics, are
problem types and have task structures that
are categorized as wicked. Wicked problems
are volatile and of a very dynamic nature with
considerable uncertainty and ambiguity (Horn,
2005). Wicked problems are ongoing and have
no stopping rule (Rittel & Webber, 1973, Digh,
2000). They are never resolved and change
over time (Conklin, 1998). Wicked problems
are solved per se when they no longer are of
interest to the stakeholders, when resources are
depleted or when the political agenda changes
(Horst & Webber, 1973). Many stakeholders
with multiple value conflicts redefine what
the problem is repeatedly, reconsider what the
causal factors are and have multiple views of
how to approach and hopefully deal with the
problem (Rittel & Webber, 1973; Conklin,
1998; Digh, 2000). Getting and maintaining
agreement amongst the stakeholders is most
difficult because each has their own perception and, thus, opinion of what is best (Rittel
& Webber, 1973).
Extreme events possess the characteristics
of those found within the definitions of wicked
problems. “Each dysfunctional event has its own
unique characteristics, impacts, and legacies”
(Skertchly & Skertchly, 2001, p. 23). For example, catastrophic disasters have the following
attributes and dimensions many of which are the
same as those described in wicked problems:
➢
➢
➢
➢
➢
➢
*They don’t have any rules.
Often, emergency services are insufficient
to cope with the demands given the limited
amount of available resources.
Vital resources are damaged and nonfunctional.
*Procedures for dealing with the situation
are inadequate.
*No solutions for resolution exist on a
short-term basis.
*Events continue to escalate.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),25-35,July-September2010 29
*Serious differences of opinion arise
about how things should be managed.
➢ The government of the day and the bureaucracy becomes seriously involved.
➢ The public takes an armchair position
and is fed by the media.
➢ *The number of authorities and officials
involved are growing.
➢ *Sometimes simply trying to identify
which of the emergency services and
investigative bodies is doing what results
in complete chaos.
➢ The need to know who is in charge is
urgent (Campbell, 1999, p. 52).
*are characteristic of wicked problems
➢
Crisis managers’ tasks differ from control
task types in that, no two events are the same
so different decision processes are required to
be implemented. Interacting variables are many,
and the domain is ill defined and unknown
at times (Danielsson & Ohlsson, 1999). An
emergency manager cannot project any future
decisions with any degree of accuracy due to
all of the variables that are involved and all of
the different scenarios that can exist due to the
great amount of uncertainty involved and lack
of experience of the unknown (U.S. Naval War
College, 1996).
Decision Making in
Emergency Management
Decision tasks are perceived to be difficult
by the EM where issues involving life saving
operations such as evacuations or triage have
the potential to have devastating results if not
conducted accurately (Danielsson & Ohlsson,
1999).
Studies show an EMs most difficult aspects
of work are:
➢
➢
Lack of routine and practice–refers to the
infrequency of major accidents, making
it difficult to get experiences of the command and control proper.
Communicational shortcomings.
➢
➢
➢
➢
➢
Information overload is salient during the
initial phase of an emergency response
and is seen as especially severe if no
staff members are available to perform
communication duties.
Technical equipment inadequacy.
Lack of skills in handling communication
equipment.
Feelings of isolation.
Lack of peers with whom to discuss common problems (Danielsson & Ohlsson
1999, p. 94).
Other psychological processes are associated with decisions made by crisis decision makers. Effective decision makers must take many
factors of the environment into consideration
to understand that these are complex, dynamic,
time-pressured, high-stakes, multi-person task
environments (McLellan et al., 2003).
Some hazard conceptualization and management problems developed from Mitchell
(1999) are presented:
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
➢
*Lack of agreement about definition and
identification of problems
*Lack of awareness of natural and unnatural (human-made) hazards
*Lack of future forecasting capabilities
*Misperception of misjudgment of risks
associated with hazards
Deliberate misrepresentation of hazards
and risks
*Lack of awareness of appropriate responses
*Lack of expertise to make use of responses
Lack of money or resources to pay for
responses
*Lack of coordination among institutions
and organizations
Lack of attention to relationship between
‘disasters’ and ‘development’
Failure to treat hazards as contextual
problem whose components require simultaneous attention
Lack of access by affected populations
to decision making
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
30 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),25-35,July-September2010
Lack of public confidence in scientific
knowledge
➢ Lack of capable and enlightened political
leadership
➢ *Conflicting goals among populations at
risk
➢ *Fluctuating salience of hazards
➢ Public opposition by negatively affected
individuals and groups.
*wicked characteristics
➢
Many of these are also characteristic of the
wicked problem types defined earlier and have
characteristics in common with those of extreme
events (Rittel & Webber, 1973; Campbell,
1999). Other commonalities between wicked
problems and extreme events are that the event
is continuous; the operation is twenty-four hours
a day. The decision maker has to trust others
to make his or her decisions when they are not
awake. It is unpredictable what the problems
will be, who will be involved or who needs to
be involved so sharing of the current situation
by all involved is critical.
Time
Time lost is always a disadvantage that is
bound in some way to weaken he who loses it
(Clauswitz, 1976, p. 383).
Time is a critical factor that further complicates the decision making process. In extreme
events, an emergency manager must consider an
enormous number of factors quickly (KowalskiTrakofler et al., 2003). Decisions must be made,
sometimes forced due to time constraints. “The
faster a decision has to be made, the less time the
information processing system has to convert or
gather enough accurate information to convert
assumptions to facts” (Rodriquez, 1997, pp.
7-8). This means that decisions are made under
uncertainty and without full consideration. Crisis managers must weigh delaying the decision
making against the negative consequences that
may occur while waiting for more requested
information (Kowalski-Trakofler & Vaught,
2003). Once time has passed, alternative actions are no longer possible and perhaps the
best decision has been bypassed leaving only
less optimal conditions from which to choose.
Kowalski-Trakofler and Vaught conducted
a study of good decision making characteristics
under life threatening situations. They found
that, during any phase of the decision making
process, a set of factors could significantly impact one’s ability to deal with complex problems
under time critical situations. These factors are:
➢
➢
➢
➢
Psychomotor skills, knowledge and
attitude
Information quality and completeness
Stress–generated both by the problem
at hand and any existing background
problem
The complexity of elements that must be
attended (2003, p. 285).
One research finding indicates that performance can be maintained under time pressure
if the communication changes from explicit to
implicit (Serfaty & Entin, 1993). They found that
Implicit coordination patterns, anticipatory
behavior, and redirection of the team communication strategy are evident under conditions of
increased time-pressure. The authors conclude
that effective changes in communication patterns may involve updating team members,
regularly anticipating the needs of others by
offering unrequested information, minimizing
interruptions, and articulating plans at a high
level in order to allow flexibility in the role of
front-line emergency responders (Serfaty &
Entin, 1993).
Stress
Stress is defined as “a process by which certain
work demands evoke an appraisal process in
which perceived demands exceed resources and
result in undesirable physiological, emotional,
cognitive and social changes” (Salas, Driskell,
& Hughs, 1996, p.6).
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),25-35,July-September2010 31
Studies show that during an emergency,
information quality varies on three dimensions: reliability, availability and relevance
(Danielsson & Ohlsson, 1999). The decision
to use information at any given time and the
weight of the usage of the information is based
on these dimensions.
Information during an emergency can be
the source of stress in many ways (KowalskiTrakofler, et al., 2003). First, due to technical
malfunctions or just poor implementation, the
initial warnings can be ambiguous and create
a greater need for clarity in a situation. This
causes the situation to be interpreted differently
and leads to misinterpretations in how people
perceive the information and hence, respond.
Stressors due to information mismanagement
are formed when people do not fully understand
what is going on which creates disagreement
between stakeholders; the right information is
not gathered. This wastes time and causes more
stress and frustration.
Poor leadership is a stressor experienced
too often. An enormous amount of stress was
expressed by the Gulf Coast emergency community during the 2010 British Petroleum Oil
crisis. Not being able to protect the wildlife
and shorelines were most frustrating to local
officials who watched helplessly as the oil
decimated the marshlands and white sandy
beaches. Poor leadership was exhibited in BP
Oil crisis, the President of the United States
was weak, the President of BP was weak, both
were inexperienced and out of touch. Weak
leadership exacerbates a problem, usually delaying resources creating a much worse human
disaster due to mismanagement. Last, when
technology or other apparatus fails, this leaves
people without information and the inability to
keep current with response efforts and will add
more stress (Kowalski-Trakofler et al., 2003).
Stress is a major factor in decision making especially during life critical situations
(Kowalski-Trakofler et al., 2003). One of the
primary stressors is the lack of information immediately after the event during the early phase
of the emergency response where it concerns
determining scale and the characteristics of
damage (Danielsson & Ohlsson, 1999).
A major problem occurs when people are
making decisions under stress that leads to
poor decision making. Research shows all of
the feasible choices are not considered, and
a decision is likely to be made prematurely
(Keinan, Friedland, & Ben-Porath, 1987). This
is not good because no matter how experienced
an emergency manager may be, he/she will be
confronted with situations they have not experienced previously (Harrald, 2009).
Information Overload
Good incident commanders function as if
they have a good practical understanding of
the limitations of their information processing
system, and the corresponding limitations of
others (McLellan et al., 2003). In particular,
they operated in such a manner that (a) their
effective working memory capacity was not
exceeded, (b) they monitored and regulated
their emotions and their arousal level, and (c)
they communicated with subordinates in ways
that took into account subordinates’ working
memory capacity limitations. The foundation
of their ability to manage their own information
load effectively seems to be prior learning from
past experience.
Bias
Many forms of bias exist when it comes to decision making, but emergency management has a
set that is associated with disastrous leadership.
Research indicates that this is from a lack of self
awareness which is a normal reaction concerning information processing. Table 1 lists the bias
types along with a brief description derived by
Adams and Ericsson (2000).
Muddling Through
A large amount of information must be considered in a very small amount of time. Time to
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
32 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),25-35,July-September2010
Table 1. Bias in emergency management decision making
Bias Type
Description
Sunk-costs
Persisting with a tactic, which to the dispassionate observer is demonstrably ineffectual, simply
because time and resources have already been invested in the tactic.
Optimism
Choosing a course of action which necessitates nothing whatsoever going wrong if it is to
succeed. For example, positioning a crew on steep sloping terrain with high levels of burnable
material above and below them.
Need for Action
Good incident commanders frequently report having to deliberately exercise self-restraint so
as not to precipitately commit resources to a course of action before completing a thorough
situation assessment
Linear Rate
of Change
Associated with disastrous incident command at wildland fires; human beings seem to be
incapable of accurately predicting non-linear rates of change.
fully explore all alternatives is lacking not to
mention, stress has a tendency to make decision
makers focus narrowly on the list of available
alternatives. Studies found that good crisis
managers only focus on the most feasible and
reliable solutions and eliminate the nonessential
information (Kowalski-Trakofler et al., 2003).
This does not compromise the decision making ability to make good decisions, but rather,
simplifies the process allowing them to focus
on the critical issues.
This same approach was validated by other
research studying decision processes of good
decision making (McLellan et al., 2003). The
study indicated that all of the information was
scanned but focus was only considered on a
‘need to know’ basis and only on the relevant
factors which needed to be considered.
This decision making strategy is described
by Charles Lindblom as Muddling Through
(Lindblom, 1959, 1979). This employs methods
that help a decision maker focus on the most
relevant subgroup, given a list of alternatives
from which to choose for any given task. Muddling through a problem guides decision makers
to direct their focus into selecting incremental
changes.
The critical aspect of Lindlom is that
everyone needs to be involved who is at any
level in the organization if there is a problem
to be solved which means the open sharing of
information from any part of the organization
to any other (Turoff, White, & Plotnick, 2009).
Feedback
Timely and reliable feedback is one means to
help crisis managers make good judgments.
One type of uncertainty is from the lack of
feedback or reported information from the initial
assessment from affected areas. Particularly
bothersome to emergency management can be
in the lack of feedback where the next decision
cannot be made without the present information
acquired especially when the damage cannot be
visualized (Danielsson & Ohlsson, 1999). This
can have detrimental effects on the outcome of
the event, because the emergency manager’s
performance is diminished.
Uncertainty
The demands on emergency management are
described by The Catastrophic Annex to the
National Response Plan (NRP) (DHS, 2004):
“A detailed and credible common operating
picture may not be achievable for 24 to 48 hours
(or longer).” “As a result, response activities
must begin without the benefit of a detailed or
complete situation and critical needs assessment” (Harrald, 2006, p. 258). Due to the nature
of an extreme event, many judgments must be
made with information that is often ambiguous,
wrong and incomplete (Kowalski-Trakofler et
al., 2003). The operational activities involve
“hierarchical teams of trained individuals, using
specialized equipment, whose efforts must be
coordinated via command, control, and com-
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),25-35,July-September2010 33
munication processes to achieve specified objectives under conditions of threat, uncertainty,
and limited resources, both human and material”
(McLellan et al., 2003, p. 2).
Not only are the decisions made presently
under questionable information, in addition,
forecasting future events poses a challenge
due to the uncertainty in the future events as
they play out over the duration of the extreme
event (Rodriguez, 1997). “To make decisions
about an uncertain future, the commander must
make many assumptions. Intuitive thinking is
an important skill in the ability to make a sound
assumption” (Rodriguez, 1997, p. 1). Disconnected bits of data exist where gaps in the logic
providing useful information are missing. This
is where the experts are using intuition to fill
gaps in information needs.
Expert Intuition
Assumptions are used by crisis managers to fill
in gaps where uncertainty exists (Rodriguez,
1997). Intuition plays a large role in filling in
these gaps and can have good consequences
from those with experience. “For experienced
commanders, intuition fills in the decision
making processes where imperfect information
leaves off” (Battle Command, 1994, p. 25).
A study conducted on a large group of top
executives supports the concept that intuition
was used to guide critical decision making
situations. The situations and environments in
which intuition was mostly used and helpful
were found to be where:
➢
➢
➢
➢
➢
➢
➢
A high level of uncertainty exists
The event has little previous precedent
Variables are often not scientifically
predictable
“Facts are limited”
Facts do not clearly point the way to go
Time is limited and the pressure is to be
right
Several plausible alternative solutions
are available to choose from, with good
arguments for each (Argot, 1986, p 18).
When considering the issue of analytical
versus intuition judgment, the National Institute
for Occupational Safety and Health (NIOSH)
reported:
The point here is that research which focuses
on judgment must include scrutiny not only of
decisions that are made, but also of real-world
variables that influence them. The quality of any
decision may have little or no direct relationship to the eventual outcome of its execution in
a given situation. This is because a decisionmaker is constrained not only by the stress
of the situation or personal knowledge and
attitudes, but also because he or she can only
weigh information that is available (KowalskiTrakofler et al., 2003, p. 286).
Normal decision making techniques do not
suffice in such complex situations as extreme
events. Characteristics were identified as:
➢
➢
➢
Novelty—the officer had never encountered such a situation before,
Opacity—needed information was not
available,
Resource inadequacy—the resources
currently available were not sufficient to
permit an optimal response (McLellan et
al., 2003, p. 3).
The emergency manager is continually
facing an uncertain environment. There is insufficient time for the crisis managers to get the
correct information they need and this must be
weighed against the need to make a decision
at a particular time, so he/she must rely on assumptions and intuition. Intuition fills the gap
between disconnected bits of information helping to create a full picture from which problems
can be best defined and solution sets available
to fit the needs of the emergency manager.
SUMMARY
Ongoing research efforts are addressing ways to
solve these problems. It is important to have dis-
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
34 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),25-35,July-September2010
tributed command and control operations which
allow the participation of anyone at any time
and any place in both the planning and ongoing
operations (Turoff, Chumar, de Walle, & Yao,
2003). Current research explores highly efficient
ways for emergent problems to be supported
by concerned subgroups addressing complex
problems by proposing solution components
and comparing via voting their agreement
where participating have the ability to supply
comments on disagreements (White, Turoff, &
Hiltz, 2010). Collaborative systems are being
designed to support all phases of emergency
management where participants distributed
can collaborate on evolving scenarios to support planning (Yao, Turoff, & Chumar, 2009).
Clearly, the literature demonstrates that
there is a common theme identifying characteristics that influence a crisis manager’s ability
to make optimal decisions during and after an
extreme event has occurred. The decision maker
should be the core focus upon which policies,
protocols and systems are designed.
Danielsson, M., & Ohlsson, K. (1999). Decision
Making in Emergency Management: A Survey Study.
International Journal of Cognitive Ergonomics, 3(2),
91–99. doi:10.1207/s15327566ijce0302_2
REFERENCES
Kushma, J. (2007). Role Abandonment: Should we
leave this myth behind. Natural Hazards Observer,
XXXI(5).
Adams, R. J., & Ericsson, A. E. (2000). Introduction
to the cognitive processes of expert pilots. Journal
of Human Performance in Extreme Environments,
5(1), 44–62.
Agor, W. H. (1986). The Logic of Intuitive Decision
Making. New York: Quorom Books.
Battle Command. (1994). Leadership and Decision
Making for War and Operations Other than War.
Fort Leavenworth, KS: Battle Command Battle
Laboratory.
Baumgart, L., Bass, E., Philips, B., & Kloesel, K.
(2008). Emergency Management Decision-Making
During Severe Weather. Weather and Forecasting,
23(6), 1268–1279. doi:10.1175/2008WAF2007092.1
Campbell, R. (1999). Controlling Crisis Chaos.
Journal of Emergency Management Australia,
14(3), 51–54.
Clausewitz, C. V. (1984). On War. Princeton, NJ:
Princeton University Press.
Harrald, J. (2006). Agilitly and Discipline: Critical
Success Factors for Disaster Response. AAPSS Annals, 604(1), 256–272.
Harrald, J. (2009). Achieving Agility in Disaster
Management. International Journal of Information
Systems and Crisis Management, 1(1).
Keinan, G., Friedland, N., & Ben-Porath, Y. (1987).
Decision-making under stress: Scanning of alternatives under physical threat. Acta Psychologica, 64,
219–228. doi:10.1016/0001-6918(87)90008-4
Kerstholt, J. (1996). Dynamic Decision Making.
Soesterberg, The Netherlands: TNO Human Factors.
Kontogiannis, T., & Kossiavelou, Z. (1999). Stress
and team performance: principles and challenges for
intelligent decision aids, Safety Science, December,
Vol.33, Issue 3, pp. 103 -128,.
Kowalski-Trakofler, K., & Vaught, T. (2003).
Judgment and decision making under stress: an
overview for emergency managers. International
Journal of Emergency Management, 1(3), 278–289.
doi:10.1504/IJEM.2003.003297
McLennan, J., Holgate, A., & Wearing, A. (2003,
September). Human Information Processing aspects
of Effective Emergency Incident Management Decision Making. Paper presented at the Human Factors
of Decision Making in Complex Systems Conference,
Dunblane, Scotland.
Mitchell, J. K. (1999). Crucibles of Hazard: MegaCities and Disasters in Transition. Tokyo: United
Nations University Press.
Rodriguez, D. M. (1997). Dominating Time in the
Operational Decision Making Process. Newport,
RI: U.S. Naval War College.
Salas, E., Driskell, E., & Hughs, S. (1996). The study
of stress and human performance . In Driskell, J. E., &
Salas, E. (Eds.), Stress and Human Performance (pp.
1–45). Mahwah, NJ: Lawrence Erlbaum Associates.
Skertchly, A., & Skertcly, K. (2001). Catastrophe
management: coping with totally unexpected extreme
disasters. The Australian Journal of Emergency
Management, 16(1).
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),25-35,July-September2010 35
Turoff, M., Chumer, M., Van de Walle, B., & Yao,
X. (2003). The Design of a Dynamic Emergency
Response Management Information System (DERMIS). Journal of Information Technology Theory
and Application, 5(4).
Turoff, M., & Hiltz, S. R. (1982). Computer Support
for Group versus Individual Decision Support. IEEE
Transactions on Communications, 30(1), 82–91.
doi:10.1109/TCOM.1982.1095370
Turoff, M., White, C., & Plotnick, L. (2009). Dynamic
Emergency Response Management For Large Scale
Extreme Events. International Journal for Information
Systems and Crisis Response Management.
U.S. Naval War College. (1996). Operational
Decision Making. Instructional PPer NWC 4108.
Newport, RI: Joint Military Operations Department,
U.S. Naval War College.
White, C., Hiltz, S. R., & Turoff, M. (2008). United
We Respond: One Community, One Voice. Paper presented at the Information Systems for Crisis Response
and Management Conference 2008, Washington, DC.
White, C., Turoff, M., & de Walle, B. V. (2007).
A Dynamic Delphi Process Utilizing a Modified
Thurstone Scaling Method: Collaborative Judgment
in Emergency Response. Paper presented at the 4th
Annual Information Systems on Crisis and Response
Management, Delft, The Netherlands.
Yao, X., Turoff, M., & Chumar, M. (2009). Designing a Group Support System to Review and Practice
Emergency Plans in Virtual Teams. Paper presented
at the 6th Annual Information Systems on Crisis and
Response Management, Washington, DC.
Connie White is an Assistant Professor with the Institute of Emergency Preparedness at Jacksonville State University. Her research interests include designing and implementing web based
Delphi systems and leveraging social media to support crisis communications. Dr. White’s
background with a list of her publications can be found on her homepage: http://sites.google.
com/site/conniemwhite/
Murray Turoff is a Distinguished Professor Emeritus at the New Jersey Institute of Technology. He is a co editor of a recent book on Emergency Management Information Systems (M.E.
Sharp 2010). Besides his early and continuing work with the Delphi Method, he spent most of
academic research career in the design and evaluation of Computer Mediated Communication
systems. After 9/11 he turned his attention back to his early work in Emergency Management and
related work in Planning and Foresight and Delphi Design. In 2004 he was a cofounder of the
international organization ISCRAM (Information Systems for Crisis Response and Management).
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
36 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010
Achieving Electric Restoration
Logistical Eficiencies
During Critical Infrastructure
Crisis Response:
A Knowledge Management Analysis
Teresa Durbin, San Diego Gas and Electric, USA
Murray E. Jennex, San Diego State University, USA
Eric Frost, San Diego State University, USA
Robert Judge, San Diego State University, USA
ABSTRACT
After the 2007 Southern California wildire events, event-assessment of the eficacy of spreadsheets and paper
forms raised the question of whether alternative tools could have achieved greater eficiencies in the logistical support of command centers, the sites from which the local utility’s electric restoration personnel were
deployed. In this paper, the authors examine what approach would have enabled personnel working on the
logistics of the command center effort to have easier-to-use, faster-to-access, command center data stored
in, and provided via, a catastrophe resilient platform other than the traditional company computer network.
Additionally, the capability to store basic command center requirements from previous emergency responses,
thereby saving time during the next emergency, was examined.
Keywords:
Command Center Logistics, Crisis Response, Crisis Response Logistics, Critical Infrastructure,
Emergency Management, Knowledge Management
INTRODUCTION
Gas and electric services in the County of San
Diego are provided by San Diego Gas & Electric
Company (SDG&E), an investor-owned public
utility. Many useful issues can be analyzed from
the wildfires that damaged SDG&E’s electric
system in 2003 and 2007 and certain activities
that supported efficient service restoration can
be examined and used for comparative analysis
for a terrorist attack scenario, earthquakes,
wildfires, or any other event that might impact
service delivery.
DOI: 10.4018/jiscrm.2010070103
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010 37
This paper analyzes the logistics support
provided during the wild fires to determine what
could be improved. This is an important topic
as there is little research literature addressing
crisis response logistics. Whybark et al. (2010)
discuss disaster relief supply chains but only
propose a research agenda. We agree there needs
to be research in this area and start with this
case study. Logistics/supply chains ensure that
responders are able to sustain disaster relief.
Their importance is illustrated by the response
to the 2009 Haiti earthquake where ships and
supplies stood empty or unused off the coast
because of an inability to deliver supplies and
evacuate injured. Keeping responders in the
field is critical for long term disaster relief.
Providing relief is critical for affected persons
and societies to recover. This paper hopes to
start this important research area by exploring
alternatives to the spreadsheet approach used
in the 2007 wild fires.
Finally, the research question for this paper
was what alternatives could be used in lieu of
paper forms and spreadsheets to achieve more
accurate, timely logistics data and solutions?
METHODOLOGY
This paper is a case study using action research
to assess whether future activities by the command center support teams can be influenced
to convert from paper forms and spreadsheets
to something more real-time, as a new solution
for crisis response.
The working definition of action research
(Zuber-Skerrit & Fletcher, 2007, p. 413)
incorporated situations where people reflect
and improve (or develop) their own work and
their own situations by tightly interlinking their
reflection and action; and also making their
experience public not only to other participants
but also to other persons interested in and concerned about the work and the situation, i.e.
their public theories and practices of the work
and the situation, and in which the situation is
increasingly: data-gathering by participants
themselves (or with the help of others) in rela-
tion to their own questions; participation (in
problem-posing and in answering questions)
in decision-making, self-reflection, self-evaluation and self-management by autonomous
and responsible persons and groups. This study
is action research as the lead author is a team
lead of the SDG&E supply chain systems team
tasked with assessing logistics performance.
Reflection for this study was done using
knowledge management, KM as the reflective
lens. Jennex (2005) summarized KM definitions to conclude that KM is about capturing
knowledge created in an organization and
making it available to those who need it to
make decisions and improve organizational
performance. Jennex (2007) discussed the role
of KM in crisis response and included the role
of post event evaluation of lessons learned as a
way of capturing knowledge generated during
an event and ensuring that knowledge is shared
and incorporated into crisis response activities.
This implies that KM is a good reflective lens
for crisis response research.
The ability to apply KM to the 2007
command center logistical effort and how it
can benefit future emergency responders corresponds to KM in support of crisis response as
expanded upon by Jennex and Raman (2009).
The underlying KM principle upon which
this study is constructed are that experience
gained from one emergency can be applied as
knowledge when shared with others to improve
performance during a subsequent emergency.
Additionally, improved performance will help
an organization meet its goals or mandated
objectives acceptably.
Comparing how the basic computer tools
used in the 2007 command center set-ups
performed against how an alternative process
would perform should demonstrate the need to
move towards tools that are multi-user, require
no consolidation of data, and which can be
used with little to no training in the fast-paced
environment of an emergency.
Improving an existing business process
draws justification from the theory of action
research as discussed in the Technology Acceptance Model (TAM) of perceived usefulness
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
38 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010
(Venkatesh et al., 2003). TAM addresses the
realm of computer technology and validation
of the usefulness of employees’ outputs. Davis
(1989) verifies the usefulness of the employees’
outputs based on their belief of how they performed in that activity. Additionally, Bandura
(1982) reiterated the general concept with his
self-efficacy model of people’s response and
reaction being based on their perception of their
competency in face of new technologies resulting from the computer and internet evolution.
Bandura (1982, p. 122) stated, “A capability is
only as good as its execution.” Based on this,
converting the paper forms and spreadsheets
used for the command center logistical effort in
2007 to an alternative tool might be indicated.
The action research of this paper is using lessons
learned to convert the information tracked in the
spreadsheets to a more technological format for
easier and faster access in emergency response.
This serves as the impetus for improving the
existing emergency response process via a
technology tool (Bandura, 1982; Davis, 1989;
Venkatesh et al., 2003).
The data used in this paper is from the
2007 Firestorm responses of San Diego Gas
& Electric’s command center support. Their
spreadsheets, emails, phone calls, including the
personal observations of the lead author, who
participated in the effort, provided the data for
this study. The action research format is appropriate for this paper because the research process
involved manipulating outputs containing the
command center logistical details and their role
in the activities in the organization’s response
to emergency situations. The data that were
analyzed related solely to the support of the command center camps and what it took to sustain
their mission as bases from which to deploy the
electric restoration personnel during the power
outages. The details surrounding the ordering,
receiving, inventorying, handling, staging, and
deployment of construction materials, such
as poles and wires, were not the purview of
BSLs’ work in support of the command centers.
Material handling was the responsibility of the
Logistics and Warehousing groups.
The spreadsheet listed 25 categories of
information that included the following column
headings: Region, Need for Site: Yes/Pending,
Site Name, Command Center/Staging Area, Site
Coordinator & Phone #, Thomas Brothers page,
Address, Start Date, Estimated End Date, Total
# of People, Food Counts, #B, #L, #D, water
buffalo Y/N or 5 gal H2o, # of Porta Potties,
Trash bin type: trash/cable/metal/treated wood/
recyclables, # of hand-wash stands, Portable
Office Trailer, Copier, Lights, Generator(s),
Parking Space Reqmnts (Requirements), Material Laydown Space Reqmnts (Requirements),
Security, # of Vehicles, Phone /Data/Radio/
Printer, BMP Materials, Notes/Comments.
The data that were examined were three
versions of the spreadsheet, Firestorm 2007 Command Centers and Staging Areas, during
the time frame of October 24, 2007 through
November 10, 2007, to demonstrate the progression of the command centers’ expansion
and contraction over time. The spreadsheet also
displayed the types of items being tracked at a
consolidated level.
WILD FIRE LOGISTICS
During the week of October 21, 2007, winddriven wildfires raged across San Diego County
burning more than 360,000 acres and destroying
at least 1,700 homes. As soon as the fires had
moved through an area, SDG&E crews were
on-site to assess damage to the utility’s assets.
As a result, 750 SDG&E employees, along with
203 neighbor-state mutual-aid personnel and, at
peak periods, 78 contract electric crews and 129
digging crews, were deployed to perform the
service restoration efforts. Service was restored
for approximately 83,000 customers affected by
the fire and SDG&E eventually replaced more
than 2,170 utility poles, 338 transformers, and
at least 35 miles of overhead electrical wire
(Geier, 2009).
Four years earlier, after San Diego County’s
2003 wildfires, SDG&E had refined a model
for supporting the logistical components of
establishing and supporting command centers.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010 39
This model was ready for implementation during the October 21, 2007. SDG&E’s electric
restoration response to the 2007 fires was supported by teams of employees from the Fleet,
Facilities, Environmental, Supply Management,
Logistics & Warehousing, Fleet Services, Facilities, Real Estate/Land, Environmental, and
Safety departments (Dulgeroff, 2009). These
teams were tasked with supporting the logistical
needs for electric construction crews allowing
the construction foremen and supervisors to
be available to perform their core competency
of repairing or rebuilding the electric system.
Working in teams of approximately three
people per shift, the support team employees
were consumed for 10-15 hours a day for the first
10 days of the emergency. They had to respond to
central points near the fire-damaged areas where
they set-up command center camps to serve
three meals a day. The command center sites
included restrooms, shaded rest areas, water, ice,
and snacks to all the crews who were working
16-hour shifts (Dulgeroff, 2009). In addition,
the command center sites needed mobile offices
with internet connectivity (often via satellite due
to the remote locations and/or damage to on-site
power and telecommunications connections).
Also required were helicopter landing areas for
hard-to-access, power pole replacements, water
trucks for dust mitigation in the rural settings,
mobile radio repeaters, and dedicated space for
all the materials to be staged for the crews’ use.
Preventative environmental checklists had
to be followed at the rural sites. Straw wattle
to prevent run-off, steel shaker plates to keep
the vehicles from tracking loose dirt out onto
the streets, and traffic control where the extra
traffic related to the command center made an
impact to normal traffic flow at the entrance were
all required. Sites that were designated just as
material lay-down locations, still needed restrooms and trash containers (Dulgeroff, 2009).
The region’s basic communications infrastructure was not impacted by the fires, therefore
alternate communications systems were not
needed in the 2007 firestorm. It is timely to note
however that emerging technologies leveraging
communications devices already being used
are being tested for response to emergencies
impacting infrastructure. This new type of
infrastructure-less wireless network, such as
Georgia Tech’s LifeNet model (Wilson, 2005),
which is formed out of consumer electronic
devices such as laptops or smart phones could
have great utility in disaster scenarios impacting the traditional means of communications.
Using consumer devices such as smart
phones and laptops to remove dependence on
a company’s local network infrastructure and
data center could also be addressed by cloud
computing.
In SDG&E’s 2007 response, the team
members used cell phones and laptops with air
cards to track all the support activities and items
for command centers, on spreadsheets that were
emailed back and forth to the manager leading
the command center efforts. This enabled them
to track the logistics of all command center sites
in a consolidated manner. Each day the team
members participated in two conference calls
with their counterparts, during which they were
given updates from other SDG&E departments
supporting the logistical efforts.
OBSERVED ISSUES
The SDG&E team members who were serving
as business solutions liaisons (BSLs) between
the construction supervisors leading the restoration and rebuilding efforts of the crews, and the
departments that procure and oversee delivery
of the material and services used to set-up the
command centers, reported occasions when
their requests for items needed for the command
centers were not conveyed exactly, or delivery
was late. Other times requests were duplicated,
or second and third calls were received from the
providers to confirm if materials or meals were
still needed, when the items had already been
received. The BSLs’ daily submittal of the tracking spreadsheet to the manager’s administrative
support required a significant consolidation
chore and lacked real-time status. For example,
an impact of the spreadsheet’s lack of timeliness
was that if the BSLs needed to track something
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
40 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010
more timely than information from the afternoon
before, they would have to participate in both
conference calls each day, despite other tasks
they might have been performing. Additionally,
the BSLs needed to take their own notes as to
what each command center team was reporting
during the calls. Then, the spreadsheet combined
with their handwritten notes provided them
with more detailed information, but resulted
in an abundance of paper. Further, the daily
consolidation of spreadsheets from 17 different
command centers contributed to the chance of
errors being made. The possibility of achieving
efficiencies through a more real-time method,
rather than paper forms, repeated consolidation
of emailed spreadsheets, and email requests first
arose during the type of miscommunication
reported above. This suggested an opportunity
for investigation of a more real-time approach to
handling the logistics related to the emergency
response.
The rush to procure water, meals, tents,
lights, portable bathrooms, and mobile offices
is all performed in competition with other
responding agencies in the region, public and
private-sector. Any lag in response time could
present the loss of the opportunity to obtain what
is essential. Because of that competition for
scarce resources, the first five days of a response
are the most time-sensitive. Consequently, the
potential for errors in the spreadsheets could
have represented a loss of needed resources.
Research discusses the range of spreadsheet
errors from calculation errors, to one that is
more germane to this study, errors in data quality. Caulkins et al. (2005) cite these errors in
data quality as one of three typical reasons that
contribute to undetected errors in an alarming
“91 percent of spreadsheets” (p. 22). These
authors contend that a simple task such as a
“bad sort can destroy the integrity of a row, or
a mismatch of units” (p. 23). This is supported
by Panko’s research in which he estimated 94
percent of spreadsheets contain errors (Panko,
2007). Therefore, it is clear that any solution
must need no manual manipulation of the data
such as is needed when using spreadsheets for
database functions. An alternate solution must
also have virtually no training-time requirements, since the employees assigned to the
task in subsequent emergencies will likely have
no experience with the solution, nor would
they have the luxury of time to learn it. The
possibility of SDG&E changing its approach
to command center logistics tracking as Commonwealth Edison and Duke Energy were able
to do, merits further study.
After the 2007 fires, event-assessment and
debrief of the command center support personnel included the subject being raised of the efficacy of spreadsheets and paper forms and the
question of whether an alternate approach could
have achieved greater efficiencies, especially in
the areas where duplications and problems were
encountered was posed. This study addresses
the following research questions:
•
•
•
What alternative approach would have
enabled the teams working on the command center effort of emergency response
to have easier-to-use, faster-to-access data?
What solution would include the capability
to store basic command center requirements
from previous emergency responses to save
time in addressing the first or most crucial
items needed during the next emergency?
What resiliency could be built into command center logistics tracking in case the
company’s network was rendered inaccessible at the same time as command
centers were needed for service restoration
activities?
Therefore, if SDG&E’s electric or gas
system was damaged by terrorist activity or
another natural disaster with equal or greater
severity than the firestorms of 2003 and 2007,
tracking the command center logistics could
become exponentially more difficult proportionate to the severity of the disaster. An alternative
solution designed for easy access by users in
multiple areas could enhance the support of the
logistical efforts to bring the region’s critical
infrastructure back to normalcy in the most
effective manner possible.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010 41
This study is designed to investigate the
possibility of an alternate, multi-user approach,
in order to improve accessibility or timeliness of
information in a further refinement of disaster
response tools. Results could aid decisionmakers in their planning for subsequent emergencies. The present body of knowledge will
be expanded by the study of converting from
spreadsheets and paper forms currently used
for some emergency management activities to
more effective tools of response.
to make requests of many areas for their needs
(Dulgeroff, 2009). The BSLs are not examined
in this paper as a population. Their data output,
however, is the sample examined.
The BSL program would be activated under
certain conditions including:
•
•
•
•
POST WILD FIRE ANALYSIS
After the Southern California fires of 2003,
the Sempra Energy utilities’ vice president of
Business Solutions, and Directors leading the
support-type departments of Supply Management/Logistics, Fleet Services, Facilities,
Real Estate/Land, Environmental, and Safety,
formulated a program to further enhance their
support to field operations areas in their response to emergencies. That new program
was enacted for the first time during the 2007
Southern California fires. Under a dotted line
reporting relationship to a manager responsible
for all command center and staging area sites,
“Business Solutions Liaisons” (BSLs) fulfilled
a strategy that was designed to provide them as
central points of contact. They were to interface
between the operating centers’ field operations
and SDG&E’s high-level central coordination
and communications Emergency Operations
Center (EOC), during emergencies that necessitated the set-up of staging areas and/or crew
deployment areas. The BSLs were selected from
a qualified pool of employees from the support
departments, and based on their availability to
respond to remote locations for ten-hour shifts.
The BSLs were to be a visible presence in the
field to facilitate proper two-way communications between field operations groups, the support departments, and the EOC, where requests
would be received and dispatched to the proper
responding support departments. The BSLs
were intended to be the “one-stop-shop” for
all requests instead of field supervisors having
The utility experiences a major event
The EOC is activated
One or more off-property staging areas
are needed
It is requested by EOC staff
The BSLs had to be ready to mobilize at
the beginning of an event through response and
recovery. They were to engage with operating
groups and coordinate with existing emergency
response systems. In addition, the BSLs were
to be familiar with field operations activities,
be prepared for inclement weather, and be
field-ready.
Teams of two BSLs were assigned to each
location to cover two shifts per day. Sites were
determined by identifying areas where the utility’s system had sustained significant damage,
for economies of adjacency in location decisions. If there was suitable land, and the area
met strategic placement guidelines, a command
center was located there (Dulgeroff, 2009).
In the first three days of the emergency, the
Facilities department was activating its baseline
set of plans, to achieve the earliest response
to the expected need for some type of field
command centers or staging areas. Therefore,
they already had contingency plans in place
for rapid procurement of several large tents
to house the resting and dining functions for
the emergency response, generators, lighting,
drinking water, catering, and portable sanitation services. As soon as they reported to their
assigned command center locations with their
laptops and air cards, cell phones, and personal
protective equipment, BSLs checked-in with
the construction supervisors to receive any logistical requests and support them in their core
mission of directing system repair for service
restoration of the utility system.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
42 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010
As the emergency unfolded, appropriate
numbers of utility personnel, mutual assistance
crews, and contract construction company crews
were deployed to repair damaged segments of
the system (Dulgeroff, 2009) The BSLs were
apprised by the construction supervisors, of
the crew size increases or decreases, as work
progressed across the damaged areas, and as
mutual assistance crews arrived. The command
center needs were adjusted depending on that
crew movement (Dulgeroff, 2009).
In order of priority, meals, water, ice, and
sanitation facilities were the most important
of the many things needed at the command
centers. Shelter (tents), electricity, portable
offices, internet connectivity, and garbage
containers and garbage collection were next
in order of priority. Following in priority were
a fuel tanker to refuel the crew trucks and a
pad for a helicopter to land, including a water
truck to mitigate dust from the helicopter and
the vehicle traffic.
As soon as the BSLs reported to their assignments, they were to review the template
documents in their binders, time permitting.
There were often requests and/or people waiting for the BSLs as soon as they got to their
locations, and the BSLs provided rapid response
and follow-up on all requests. The One-StopShop was an exceptionally successful response
model because the construction supervisors’
needs were continuous and the BSLs execution
of the ordering and tracking was a better use of
company resources.
It quickly became apparent that the paper
request forms in the binder were unworkable,
for two main reasons. The forms were meant
to be handwritten, then faxed to the EOC representative for that request category, however,
there were no fax machines available, at least
in the first several days of the emergency. Further, the forms required name, date, and time
information. The natural inclination of the BSLs
was to call the EOC representative and initiate
the request via cell phone call, then complete
an email note with the same information as a
written confirmation, and for ease of follow-up.
The email notes automatically recorded name,
date, and time information, and the BSL added
the other shift’s BSL in the carbon copy line.
Early in the process, the paper request forms
served as helpful visual cues for the details that
needed to be included in the phone and email
requests, but beyond that were hardly used.
Similarly, the paper BSL Service Request
Log was viewed as inconvenient given the Sent
Items feature which saves sent-email in a folder
in the sender’s Outlook program. Not all of the
BSLs used this paper Log knowing their Outlook
Sent Items function captured and archived them
automatically and more permanently in case the
information was needed at a later time. Given
that the other shift’s BSL had been copied on any
emails that alternate shift BSL did not need to
review the paper Service Request Log to ensure
smooth transition of information.
FINDINGS AND DATA ANALYSIS
What alternative approach would have enabled
the teams working on the command center effort
for emergency response to have easier-to-use,
faster-to-access data? What solution would
include the capability to store basic command
center requirements from previous emergency
responses to save time in addressing the first
or most crucial items needed during the next
emergency? What resiliency could be built into
command center logistics tracking in case the
company’s network was rendered inaccessible at
the same time as command centers were needed
for service restoration activities?
The 2007 Southern California fires damaged a large amount of San Diego County’s
territory including, in some areas, SDG&E’s
means of delivery of electric service, its poles,
wires, cable, and transformers (Dulgeroff,
2009). SDG&E coordinated a full-scale effort
to restore service for its customers as soon as
possible. “To provide forward support closer
to the actual field locations where the bulk of
the repair and restoration work was occurring,
SDG&E established ‘command centers’ and
‘staging areas’ in strategic locations” (Geier,
2009, p. 14). Establishing and maintaining
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010 43
the command centers and staging areas to
support the crews in their restoration efforts,
and ultimately closing them down, involved
approximately 56 employees from supporting
departments, for approximately three weeks in a
significant logistical exercise (Dulgeroff, 2009).
The process began with: (1) baseline
requirements needed for a command center or
staging area, (2) personnel assigned to the location to be the points of contact, called BSLs, and
(3) the BSLs’ laptop computers with air cards
for internet connectivity, the BSLs’ cell phones,
a master spreadsheet to track all the details
of all the command centers and consolidate
them into one view, and paper forms on which
BSLs could make requests for items needed at
the sites. The spreadsheets did not look at the
causes of the emergency, but helped manage
the responses.
The lead author, a team lead of the SDG&E
supply chain systems team, served in the BSL
capacity. The people who received the requests
and information from the BSLs and fulfilled
them were support department representatives
manning their specific EOC positions. Each
EOC position was staffed around the clock at the
beginning of the emergency, and as appropriate
later in the response, was reduced to 16 hours
per day of coverage.
The BSLs received all the requests associated with taking the command centers from their
baseline configuration to fully-functioning field
operations support, by working as the interface
between the construction supervisors, the EOC
representatives, and on occasion, directly with
the vendors. The defined method for initiating
a request for materials or services was in the
library of paper forms.
In practice however, instead of using the
paper forms to initiate requests, there were two
preferred methods by which BSLs sent requests
to the EOC representatives. The first method
was via cell phone call. The second method was
via company email which was available via air
card internet connectivity and VPN computer
network access. These emails were often written follow-up to the initiating phone call. Also,
since they were accessing the network via
VPN, all internal drives and intranet pages and
systems normally available to BSLs were accessible. The EOC representatives were on-site
at SDG&E’s company headquarters location,
and had the full company network available to
them and received BSL email communications
in that manner.
The main tool used to handle the command
center logistics effort was a spreadsheet. The
spreadsheets used for this study are three samples of the daily iterations of the 2007 Firestorm
command center and staging area consolidated
information. All of the categories represented
essential items needed to support response to the
emergency. Many of the BSLs’ actual practices
did not include filling-in the paper forms, which
meant the paper forms provided in the binder
went unused. The service request log in the
binder was also not used by the BSLs as they
preferred the daily-updated spreadsheets that
conveyed the entire command center landscape.
The spreadsheet in its consolidated form was the
most significant tracking output of that effort.
The main benefit of the spreadsheet was the
ability to track, albeit a day later, the logistical
details of the command center, which included
upward reporting to and by the manager. This
information was kept current by the BSLs completing and emailing the spreadsheets back to
the manager after the afternoon conference call,
for his administrative support’s updating. The
inherent inefficiency of its manual consolidation
prompted the research questions.
A consideration of efficiencies to be gained
and opportunities to track more categories of
information, if needed, might reveal a new
structure for the process, using an alternative
approach to the paper forms and the spreadsheet.
Consequently, the analysis of efficiency of the
spreadsheets compared to real-time access
to data, might include a new technology or a
combination of several. An examination of the
details of forms on smart phones, dashboards,
blogs and wikis, and cloud computing would
be timely, as SDG&E continuously strives for
improvement of its crisis response.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
44 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010
DISCUSSION
Based on the data resulting from SDG&E’s
2007 Firestorm command center support response analysis, two hours a day of conference
call attendance, paper form requirements, and
editing of the spreadsheet by each BSL team,
indicates opportunities to improve efficiency
exist. Several possibilities for alternative approaches to command center logistics tracking
are growing in use and popularity. To address
the first research question on what alternative
approach to emergency response logistics
tracking would be easier-to-use and provide
faster access to data, rendering forms on smart
phones in replacement of paper forms, blogs for
BSLs to convey new situations or information
they encounter, via a posting on a webpage,
making it readily searchable for the next crisis,
wikis, which can capture blog information of a
more formal or permanent nature to document
processes or procedures, and dashboards as a
means to display the real-time, consolidated,
command center information, links, and metrics
are suggested.
The use of a database as the backend data
repository supporting what is displayed in dashboards related to the second question, and the
concept of cloud computing related to the third
research question will be discussed later. This
combination of alternatives incorporates the
concept of building resiliency into a company’s
activities supporting critical infrastructure response work, as well as reducing duplicative or
outdated methods. It also can be viewed through
the lens of the expanded crisis response system
model (Jennex, 2004). The expanded system
encompasses more than the basic components
of database, data analysis, normative models,
and interface. Enhancing the model includes
the addition of trained users (where users are
personnel using the system to respond to or
communicate about the emergency and consist
of first responders, long term responders, the
emergency response team, and experts), dynamic, integrated, and collaborative (yet possibly
physically distributed) methods to communicate
between users and data sources, protocols to
facilitate communication, and processes and
procedures used to guide the response to and
improve decision making during the crisis.
This expanded crisis response system
model is applicable to the discussion of combining alternatives in order to better respond to the
logistics tracking activities of SDG&E’s emergency response. Specifically, the dashboards
fulfill the model’s condition for a dynamic
method of communication, based on the realtime nature of the information received and
displayed. The potentially constantly updated
information supports the optimum display to
users of what is residing in the underlying
data sources and, further, to non-users such
as executive teams, and decision-makers. The
dashboards also fulfill the model’s component
of integrated and collaborative protocols by their
attribute of displaying multiple types of information from multiple sources or contributors
that would not normally be displayed together
in a single view, or viewable by so many different parties. Additionally, the nature of the
field operations and the EOC functions being
physically separated conforms to the model’s
almost-certain distributed teams, sites, and
means of communications.
The sometimes duplicative activities associated with the BSLs’ use of paper forms and
follow-up phone calls, and the time-consuming
consolidation of that information in a spreadsheet with limited visual display characteristics,
implied one or all of these alternatives may have
efficacy in improving BSL-related data output
in subsequent emergency efforts, as supported
by the Jennex expanded crisis response system
model. The result of analyzing enhanced concepts to the command center tracking needs,
suggests further study of forms on smart phones,
and dashboards connected to a robust back-end
database already populated with baseline data
as a starting template to save time, residing on
remote servers in a private cloud. A site linked
to the dashboard on which any participant in
the command center effort could blog about
any special experience for sharing with the
other team members would be timely as well
as easy to access. Problems or issues discussed
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010 45
in the blogs and successfully addressed, could
be elaborated upon or documented in a more
formal and thoroughly developed way and
posted as a wiki, as a more permanent and
searchable archive. The need for resiliency in
case of unforeseen inaccessibility, suggests the
use of private cloud computing, which would
result in a virtual, secure, remote location for
SDG&E-related command center activities to be
developed, housed, and delivered. That need for
secure software and data is important because
of the proprietary nature of the information.
Therefore, a practical solution to help the utility
in case of a catastrophic loss of its computer
network might include private cloud computing. Possibilities of technological alternatives
other than these may be suited for transforming the spreadsheets and the paper forms, and
displaying command center logistics however,
the intricacies of the related technology need to
be addressed as further suggestions.
The viability of these technologies in support of alternative systems for crisis response
is derived from Jennex and Raman (2009).
The forms on smart phones, blogs and wikis,
cloud computing, and the dashboards similar
to those developed by SDSU’s Visualization
Center for flu tracking in San Diego County
when implemented together, can all be considered components in the fusion of KM systems
(Jennex & Raman, 2009).
Filling out paper forms and completing
the spreadsheets was actually just the manual
assembling of a list of data in columns and
rows. It was not a meaningful transfer of ideas,
needs, and information. When ideas, needs,
and information are assembled without further
requirement for consolidation or user adaption,
and then easily rendered visually, it results in
expedient crisis response through impactful
visual cues and a more efficient transfer of
knowledge.
The implication is the tacit knowledge
from BSLs’ previous experiences can not be
appropriately conveyed in a single file when
the information is simply housed in a spreadsheet’s columns and rows format. However,
the multi-dimensional, graphical layering, and
photographic images displayed in a dashboard
format heralds the emergence of knowledge
transfer that would benefit the evolution of
SDG&E’s emergency response model. Blogs
to capture BSLs special experiences or issues,
and wikis to more permanently archive the blog
posts that lend themselves to formal processes
and procedures, provide a searchable, easy to
access forum for command center participants’
specific information, and should be included as
links in the dashboard. Handling the knowledge
in support of crisis response in this manner
substantiates the Jennex and Raman (2009) assertion that, decision makers, when under stress,
need systems that do more than just provide
data, they need systems that can quickly find
and display knowledge relevant to the situation
in a format that facilitates the decision maker
in making decisions.
IMPLICATIONS AND
RECOMMENDATIONS
The research related to the spreadsheets revealed
that they performed in an adequate manner based
on the fact that the command center logistics
tracking was generally accurate and the consensus among the interfacing groups was that the
command center model performed very well.
However, the lag time in displaying updated
information on the distribution of the crews
across the command center landscape during a
day, and how that impacted meal counts which,
potentially dramatically affected the crews’ perception of well being, can be surmised due to the
manual consolidation effort necessary to keep
spreadsheet data current. The literature validates
the significance of the crews’ perceived well
being as having substantial importance.
Relative to the discussion of the crews’ well
being, a tangent factor of the BSLs’ efforts in the
command center support was their stated feelings of satisfaction related to their accomplishments, as discussed in a BSL debrief meeting in
November 2007. The perceived usefulness of
their efforts and their feelings of self-efficacy
gave an indication of how likely BSLs would be
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
46 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010
to embrace alternative approaches to the work if
it meant further improvement in their response
to a crisis. While this relates to implementing
knowledge management systems in support
of crisis response (Jennex & Raman, 2009) it
must be acknowledged that the responsibility
for efficient and timely restoration of essential
services is still a mandate from the federal
government as codified in HSPD7. Despite
SDG&E’s culture of dedicated restoration
activities, the BSLs’ satisfaction in support of
the company mission, or the opportunity to
leverage computer technology and knowledge
management systems to enhance the logistical
support, the restoration activities would still be
required by the federal government even in the
absence of those company requirements and
employee satisfaction drivers.
It also should be recognized that there could
be a scenario when the normal network systems
for achieving compliance with HSPD 7’s requirements would be completely interrupted.
In the event of a loss of SDG&E’s computer
network infrastructure, an alternative to the
company network would be needed to handle
the on-going restoration tracking efforts. One
alternative to the traditional and local company
network would be via cloud computing.
In the event SDG&E’s computer network
was rendered unusable, whatever applications
were needed for the command center response
could be housed on virtual servers in the cloud,
and accessed via the internet, likely through
wireless connectivity such as the BSLs’air cards.
The implication is SDG&E could continuously
access its disaster response support tools if they
were housed and delivered outside the company
network. The security aspect would be addressed
by using the cloud computing model known as
the private cloud, in which processing, storage,
networking, and the application, are via an
intranet, allowing for user authentication, and
encryption of the company’s proprietary data.
Computing via the cloud also allows for
applications to be used on a pay-as-you-go pricing schedule (Vanmechelen et al., 2006). This
would allow the cost of an important emergency
response tool, after its initial development costs,
to be borne only at the time the company is
experiencing an emergency. Responding to
emergencies often carries great costs, some of
which can be recovered in rates if SDG&E’s
governing regulatory agency grants such a request. Matching the costs of a pay-when-used
type of emergency response support tool to the
infrequent occasions of emergencies impacting SDG&E’s critical infrastructure, supports
a position of careful stewardship of costs the
company will eventually request to recover.
Further, using cloud-based tools to house an
emergency response logistics tracking application securely outside SDG&E’s territory and
having it be accessible via any internet-based
connection along with VPN, provides a resilience to catastrophic wildfire- or earthquakecaused network destruction that would interfere
with tracking of, although not halt, SDG&E’s
restoration activities in the field.
Analysis of the manual, and not-well-used
paper forms for BSLs to send requests to the
EOC, demonstrated the need for an alternate
request method. As was demonstrated by actual
practice, phone calls and follow-up emails were
preferred to the paper forms. However, the
email was duplicative to the phone call, which
suggests a less-than-optimal use of the BSLs’
time. The rendering of a paper form for display
and user input on a smart phone has potential
utility as the technology to replace the paper
forms for command center logistics requests.
Data initiated by the request is needed to
execute the activity and provides the EOC recipient with record of the exact details needed for
accurate fulfillment, almost always better than
a phone call request, but usually not faster. Yet
the BSLs all had cell phones and continuously
made requests initiated by phone calls then
followed-up with emails for solid confirmation.
An alternative is using a smart phone with a
form accessed from the phone’s embedded
memory. The efficiency of using the hand-held
portability and instant communications of a cell
phone, while having the accuracy and full detail
inherent in a form, can both be achieved with
this technology. The electronic forms housed in
the smart phones’ memory could also be avail-
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010 47
able in a library of request forms linked on the
dashboard, as a secondary and back-up location
to the smart phones. The practices of the BSLs
in the field imply this alternative merits further
investigation and possible piloting during future
SDG&E emergency drills.
Another implication for future research
addresses the need to experiment with the
dashboard as a more informative alternative for
the current spreadsheet data and to house links
to other BSL-needed information. A test model
would include a dashboard being provided to
the BSLs, their decision-makers, and related
support departments for further determination of
the efficacy of the technology. The user requirements of both dashboard and cloud computing
would be structured by the technical staff at
SDG&E to determine whether cloud computing
and dashboards are viable alternatives to replace
the current emailed spreadsheet.
The spreadsheet as the most significant
tracking output of the BSLs’ 2007 efforts is
important when considering how such a single,
relatively simple file was the source for tracking a great deal of valuable SDG&E-owned or
rented assets, providing the manager with the
ability to report to the EOC and the Executive
team, the extent of the command center support
of field operations and his decision-making
related to consolidations of sites, or needed
geographical changes, particularly while the
fires were still burning. Considering those
substantive uses of the spreadsheet, the lag
time in the data’s accuracy due to the need for
consolidation, indicates the audiences could be
better served as more real-time technologies
become achievable for this specific purpose.
Furthermore, the recognition of the potential
need of other categories and/or sources of
information implies the spreadsheet format
was already at the limit of its utility. The need
for a tool with the ability to display data in a
visual, real-time format, with links to additional
helpful or related sources of information such
as BSL-related blogs and wikis, seems a likely
area for future study, since dashboards provides
internet-browser display of many categories of
data from potentially many sources.
Dashboards also provide for understanding
of performance indicators of importance to a
specific audience, by summarizing them and
often displaying them by graphical icon. The
summarized data displayed in a dashboard can
be the starting point to drill down to their detail.
Conveying the data in a summarized, graphical
way represents a significant, behind-the-scenes
effort of collection, consolidation, and presentation of the data that starts to transfer tacit
knowledge when the consolidation allows for
decision-making based on the whole picture that
is drawn by the dashboard. Dashboards support
two important points made by Turoff, supplying the best possible up-to-date information is
critical to those whose action may risk lives
and resources and that an emergency response
information system must be an integrated electronic library of external data and information
sources (Turoff, 2002). The data in SDG&E’s
command center tracking spreadsheet has the
potential to become enhanced decision-making
information and therefore knowledge that can be
applied by its users through the use of baseline
data from past command center experiences to
respond to a present emergency.
Using a dashboard displaying data taken
from the spreadsheet categories in a more actionable manner could enhance decision-making
or at the least, readability and timeliness. The
summarization and display of all of these types
of information sources in a single dashboard
enables viewers to drill down to access other
websites, company intranet pages, participant
blogs, related wikis, detailed data from maps
and databases, and have it all accessible realtime. It would be a significant enhancement
to the ways this information was available to
SDG&E’s emergency response support teams
in previous emergencies. This practice of
selectively applying knowledge from previous experiences during turbulent moments of
decision making, to current and future decision
making activities with the express purpose of
improving the organization’s effectiveness,
would be possible via a KM system (Jennex &
Raman, 2009) such as a dashboard along with
its underlying means of delivery.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
48 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010
CONCLUSION
This paper proposes using knowledge to drive
an alternative to SDG&E’s paper request
forms for command center needs, and suggests
the use of request forms rendered on smart
phones assigned to the BSLs for the duration
of the effort. In addition, the development of
dashboards, including links to command center
participant blogs and wikis, is suggested as an
effective alternative to spreadsheets to track the
command center logistics, and provide easy to
access information by means of links. Finally,
the use of cloud computing as the development
platform and host of an SDG&E dashboard application is recommended as a timely evolution
to a KM system approach to achieve logistical
tracking efficiencies.
REFERENCES
Jennex, M. E. (2004). Emergency Response Systems:
The Utility Y2K Experience. Journal of Information
Technology Theory and Application, 6(3), 85–102.
Jennex, M. E. (2005). What is knowledge management? International Journal of Knowledge Management, 1(4), i–iv.
Jennex, M. E. (2007, August 25). Knowledge
Management in Support of Crisis Response. Paper
presented at the ISCRAM China Workshop.
Jennex, M. E., & Raman, M. (2009). Knowledge
Management is Support of Crisis Response. International Journal of Information Systems for Crisis
Response and Management, 1(3), 69–82.
Panko, R. P. (2007). Two experiments in reducing
overconfidence in spreadsheet development. Journal of Organizational and End User Computing,
19(1), 1–23.
Turoff, M. (2002). Past and future emergency response information systems. Communications of
the ACM, 45(4), 29–32. doi:10.1145/505248.505265
Bandura, A. (1982). Self-efficacy mechanism in
human agency. The American Psychologist, 37(2),
122–147. doi:10.1037/0003-066X.37.2.122
Vanmechelen, K., Stuer, G., & Broeckhove, J.
(2006). Pricing substitutable grid resources using
commodity market models. Retrieved from http://
www.coms.ua.ac.be/publications/files/KVM_GECON_2006.pdf
Caulkins, J. P., Morrison, E. L., & Weidemann, T.
(2005). Spreadsheet errors: Are they undermining
decision making in your organization? Public Management, 34(1), 22–27.
Venkatesh, V., Morris, M., Davis, G., & Davis, F.
(2003). User acceptance of information technology:
Toward a unified view. Management Information
Systems Quarterly, 27(3), 425–478.
Davis, F. (1989). Perceived usefulness, perceived ease
of use, and user acceptance of information technology. Management Information Systems Quarterly,
13(3), 319–340. doi:10.2307/249008
Whybark, D. C., Melnyk, S. A., Day, J., & Davis, E.
(2010). Disaster Relief Supply Chain Management:
New Realities, Management Challenges, Emerging
Opportunities. Decision Line, 4-7.
Dulgeroff, A. (2009). Application of San Diego Gas
& Electric Company (U 902 M) for authorization to
recover costs related to the 2007 Southern California
wildfires recorded in the Catastrophic Event Memorandum Account (CEMA). Retrieved from http://
www.sdge.com/regulatory/documents/a-09-03-011/
testimony-dulgeroff.pdf
Wilson, S. (2010). Next generation disaster communications technology now a reality with LifeNet.
Retrieved September 25, 2010, from http://www.
scs.gatech.edu/news/next-generation-disastercommunications-technology-now-reality-lifenet
Geier,D. L.(2009). Investigation on the Commission’s
own motion into the operations and practices of Cox
Communications and San Diego Gas & Electric
Company regarding the utility facilities linked to
the Guejito Fire of October 2007.
Zuber-Skerrit, O., & Fletcher, M. (2007). The quality
of an action research thesis in the social sciences.
Quality Assurance in Education, 15(4), 413.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010 49
Teresa Durbin holds a Bachelor of Applied Arts & Sciences degree in Public Administration
with an Emphasis in City Planning, and a Master of Science degree in Homeland Security
with a Specialization in Communications and Information Systems. She has over 10 years of
management experience in utility accounting and regulatory work, supply chain systems administration, and help desk supervision for a large investor-owned utility. She has experience
in responding to the logistics effort supporting gas and electric service restoration after large
scale service interruptions resulting from regional emergencies or catastrophes. Ms. Durbin has
an understanding of intergovernmental relations and specifically private-to-public interactions
and requirements. She has participated in policy analysis and Rule-making filings at the State
level related to merger-related filing and compliance requirements. Ms. Durbin coordinates the
Business Resumption and Continuity Plan as well as the Pandemic Plan and Response training
in a division-wide effort. Her Masters thesis and research analyzed the benefits and potential
results of different information systems and decision support methodologies in the logistical
effort related to utility service restoration, post-emergency.
Murray E. Jennex is an associate professor at San Diego State University, editor in chief of the
International Journal of Knowledge Management, co-editor in chief of the International Journal
of Information Systems for Crisis Response and Management, and president of the Foundation
for Knowledge Management (LLC). Dr. Jennex specializes in knowledge management, system
analysis and design, IS security, e-commerce, and organizational effectiveness. Dr. Jennex serves
as the Knowledge Systems Track co-chair at the Hawaii International Conference on System Sciences. He is the author of over 120 journal articles, book chapters, and conference proceedings on
knowledge management, end user computing, international information systems, organizational
memory systems, ecommerce, cyber security, and software outsourcing. Dr. Jennex conducts
research for the National Center for Border Security Issues on risk management and technology integration. Dr. Jennex is a former US Navy Nuclear Power Propulsion officer and holds a
B.A. in chemistry and physics from William Jewell College, an M.B.A. and an M.S. in software
engineering from National University, an M.S. in telecommunications management and a Ph.D.
in information systems from the Claremont Graduate University. Dr. Jennex is also a registered
professional mechanical engineer in the state of California and a Certified Information Systems
Security Professional (CISSP) and a Certified Secure Software Lifecycle Professional (CSSLP).
Robert Judge holds undergraduate degrees in Biology and Botany, an MBA, and a PhD in the
Management of Information Systems and Technology from Claremont Graduate University.
His career spans the semiconductor, aerospace, consumer electronics, and Internet Service
industries at mid-management and executive levels. He has held functional responsibilities that
include Materiel, Manufacturing, Information Systems, Marketing, Project Management and
Customer Support. Throughout the last 20+ years of his career, he has served both San Diego
State University and the University of San Diego as an adjunct professor teaching graduate and
undergraduate courses in Operations, Supply Chain Management, Manufacturing Planning and
Control Systems, Project Management and Information Systems. His current research interests
lie in understanding how barriers to knowledge flow arise as small organizations grow, and
also in how Knowledge Management Systems in Supply Chains can influence innovation and
the flow of non-logistical knowledge.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
50 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),36-50,July-September2010
Eric Frost directs the SDSU Viz Center and co-directs the Homeland Security Master’s Program,
which includes about 130 Homeland Security practioners from many Federal agencies, state and
local government, NGOs, industry, and governments. Much of the program is based on actual
interaction with real operational training in the US-Mexico border region, as well as many
other international Homeland Security groups such as in Mexico, Central Asia, India, Africa,
and Indonesia. Frost and his colleagues use many new technologies and protocols that are enhanced during exercises such as Strong Angel III (http://www.strongangel3.net/) for situational
awareness for many challenges including H1N1 using tools such as http://www.geoplayer.com/
gateways for Banda Aceh, Katrina, Indonesia, and Haiti disasters (http://hypercube.telascience.
org/haiti). Frost and co-workers work with sensor networks, wireless and optical communication,
data fusion, visualization, and decision support for first responders and humanitarian groups,
especially crossing the civilian-military boundary, especially in unusual coalition areas such as
Somalia, Afghanistan, India. Haiti, and Mexico including using Cloud Computing (http://www.
inrelief.org) with Navy to impact Humanitarian assistance like Haiti and Mexico earthquakes.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),51-60,July-September2010 51
Curriculum Design and
Development at the Nexus of
International Crisis Management
and Information Systems
Keith Clement, California State University Fresno, USA
ABSTRACT
This case study discusses the role of education, curriculum development, research, and service in supporting information systems for crisis response management. The study describes the Council for Emergency
Management and Homeland Security (CEMHS) organization that designs and develops academic programs
and courses in these specialized areas. CEMHS combines all levels of education in California (from K-12
and postsecondary education) into a “state-wide solution” and network of academicians and professionals
in emergency and disaster management, crisis response, and homeland security education and training. The
organizational purpose is constructing a “vertical track” of academic programs and specialized programs
to beneit and enhance information resource and crisis management. The implications and lessons learned
from building collaborative partnerships between the crisis and disaster response academic and professional
communities in academic program development and research initiatives are also discussed.
Keywords:
Best Practices, Crisis Management, Crisis Response, Crisis Response Community, Emergency
Management, Information Systems
INTRODUCTION
There has been an increasing expectation for
active and vigorous government and NonGovernment Organization (NGO) in responding
to natural and man-made disasters. This expectation has translated into greater responsibility,
higher visibility, and more media attention in
the preparation, response, and management of
meteorological, environmental, political violence, and other exigencies. In light of several
DOI: 10.4018/jiscrm.2010070104
significant and recent international disasters,
including the Thailand tsunami, Haiti and Chile
Earthquakes, floods in China and Pakistan,
forest fires in Russia, and Hurricane Katrina,
have dramatically raised global consciousness
and salience for a need to enhance crisis and
disaster response and management. Due to the
critical need to enhance preparedness, prevention, recovery, and mitigation in dealing with
catastrophic or emergency incidents, crisp and
efficient action is required to accomplish the
“all-hazards” crisis response mission. The tremendous loss of life and human misery coupled
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
52 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),51-60,July-September2010
with huge costs for disaster relief and crisis
response has evolved into a critical necessity to
develop policies, social institutions, technology,
and a culture of preparedness to protect lives,
society, critical infrastructure, various sectors
of the economy, and property.
It is with little surprise that there are many
changes to the topographical maps and two-way
radio of yesteryear’s disaster and crisis planners,
managers, and responders. Today, Geographic
Information Systems (GIS), web-based applications, Google Earth, readily available
satellite data, communications technologies,
voice and data fusion on mobile devices and
handsets are all common tools of the trade for
emergency and crisis managers and responders.
In an increasing technological world and social
milieu, the role and value of information has
grown exponentially. This is particularly true
when designing and managing “real time” information resources, remote sensing assets, and
additional knowledge systems in response to the
data intensive demands of crisis response in the
modern digital age. Developing and deploying
information systems are critical tools in the
response, preparedness, decision-making, and
communication of emergencies. Crisis response
personnel must have access to actionable information in order to make informed, effective, and
speedy decisions as dynamic incident events
unfold on the ground.
Technology and information management
are crucial components of crisis and disaster
response. Public safety and emergency response
personnel must be intimately familiar with current technological tools to assist in effective
crisis response, improved preparedness, and
enhanced humanitarian disaster management
capability. This is due in part because of the critical “need for speed” in efficient crisis response:
establishing situational command and control,
restoring basic public health care services and
business continuity, restoring transportation,
critical infrastructure and additional logistical
matters, utilizing geovisual analytics, managing information resources, and communicating
information reliably (for those in need and for
those responding) and any additional steps
necessary towards crisis mitigation and recovery. Several “core principles” in Emergency
Management include “comprehensive, progressive, risk-driven, integrated, collaborative,
coordinated, flexible, and professional” (IAEM,
2007). These are substantial demands that are
placed on our crisis responders and managers
and we must work to build additional tools to
increase our performance and utilization of
information in crisis management.
Given the totality of life and death decisions and hazard to property and security, a
substantial need exists for quality and accessible education and training programs at the
nexus of academic and professional interests
in areas related to information systems, crisis
response, and international disaster management. The need for academic programs and
courses to support and prepare the current (and
next) generation of information systems and
crisis response management professionals has
grown significantly as technology advances
near daily. Thus, developing and enhancing
education programs in this subject area is an
important objective for several reasons. Education programs provide an avenue for faculty
research, opportunity for students, enhances
pedagogy and teaching practices, and further
develops our knowledge base. Education and
research programs can contribute to greater
levels of community and university service for
faculty, staff, and students as well as improves
community engagement (as well as communities assisted through better trained, educated,
and prepared crisis response teams).
However, questions exist about emergency
management and crisis response education and
training programs. What is the current state of
these programs? How are quality and accessible
programs and courses designed, developed,
and implemented? Are there comprehensive
and coordinated academic programs that fully
prepare specialized crisis response and managers in the utilization of information systems
(and other important contributing fields) when
coping with disasters? If this is not currently the
case, how can academicians and practitioners
work together to develop education standards
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),51-60,July-September2010 53
and programs to further support and enhance
academic areas like information management,
remote sensing systems, and knowledge systems dedicated to enhanced crisis management
and response? These are some of the primary
questions, issues, and themes addressed over
the course of this case study.
In terms of organizing this paper, we first
discuss the role of education, curriculum development, research, and service in supporting a
variety of academic disciplines and fields that
contribute to effective crisis response. It is
important to discuss the role and value of education, curriculum development, and implications
in the field of information systems and crisis
response. Next, and the primary purpose of this
case study, is the description and discussion of
an organization, the Council for Emergency
Management and Homeland Security (CEMHS)
that designs and develops academic programs
and courses in these specialized areas. CEMHS
is an interesting case study because it draws
together all levels of education in California
(from K-12 and Postsecondary Education) into
a “state-wide” solution that links a network of
academicians and professionals together in
the fields of emergency and disaster management, crisis response, and homeland security
education and training. Finally, we discuss the
implications and lessons learned from collaborative partnerships between the emergency
management and homeland security academic
and professional communities in academic
program development and research initiatives.
THE ROLE OF EDUCATION AND
CURRICULUM DEVELOPMENT
FOR INFORMATION
SYSTEMS AND CRISIS
RESPONSE MANAGEMENT
What are the implications for academic programs implementation in advanced scientific
fields such as information systems management
as related to crisis response? These questions
quickly become complicated when talking about
dynamic, technical, and scientific disciplines
and specializations like information resource
management. In addition, the past few years
have seen an increased need and demand for a
specialization in crisis management and disaster
response education and training programs. “In
most societies education is constantly being
asked to do more and more things, to higher
and higher standards, with greater accountability and finite (if not diminishing) resources.”
(Davies, 1999, p. 108). Due to the relatively
new entry of crisis response and management
related subjects into academics, colleges, and
universities, there is much planning, design,
development necessary for implementation and
adoption at higher education institutions. This is
particularly true for more focused scientific disciplines like information resource management.
Any absence in quality education and training
opportunities reduces our capability to prepare,
respond, mitigate and recover from natural and
manmade catastrophes. Thus, any potential
challenges and rewards for developing quality
disaster management and academic programs
justify the creation of partnerships among key
stakeholders and partners to achieve long-term
program sustainability and development.
Scholars and practitioners should develop
and communicate best practices” to improve
the management and utilization of information as a resource to enhance international
disaster response capabilities and performance.
Technology and information resources and
needs indicate that scientific, technical, and
professional workforce and skill demand must
be readily prepared and skilled to support the
many diverse fields that participate in disaster
and crisis response. We must find ways to support development (and subsequent response
capability) by designing and implementing education and training programs to support global
information needs by enhancing knowledge
systems management through education and
training strategies. It is important that educators contribute their expertise to crisis response
and disaster management academic program
organization and structure. Educators contribute to the solution through the development,
codification, and transmission of important
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
54 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),51-60,July-September2010
expertise, knowledge, skills, and experience
relevant to emergency and disaster management. “The demands being made upon teachers
and others who provide education call out for
educational practices to be based on the best
available evidence as well as the professional
skills, experience, and competence of teachers”
(Davies, 1999, p. 117).
To increase supply and capacity of quality
education and training in this area, we must
understand the current state of these academic
programs, discover potential gaps in content
and curriculum, adopt quality control and
evaluation measures, and support enhanced
academic standards. If education program and
course supply and demand needs can be met,
we can enhance the availability and quality of
crisis response and management through standardization of programs, government incentives
and funding for program development, and the
benefit of employment of students graduating
from these reputable academic programs. One
solution may be the creation of a template or
blueprint to guide the design, development
and implementation of academic programs at
various levels of education. This would assist
in the furtherance of education, training, and
research collaboration, global partnerships, and
an enhanced network of experts to deploy in
the field, data visualization centers, command
and control, joint incident command posts, and
on incident response teams. It is also critical
to seek educational and training solution to
further integrate the areas of crisis response
and information systems.
CEMHS ORGANIZATION
The Council for Emergency Management and
Homeland Security (CEMHS) was formed in
2008 to enhance and strengthen Emergency
Management (EM) and Homeland Security
(HS) education and training programs and
research partnerships within the State of California. CEMHS is a multi-campus faculty affinity
group within the California State University
and promotes quality and accessible EM-HS
academics, research initiatives, and university/
community service connections. The purpose
of CEMHS is to link comprehensive programs,
courses, and curriculum through the promulgation of “model programs” as developed by
faculty and professional subject matter experts
teams and carefully linked with effective pedagogical practice. The organizational purpose
is accomplished through the utilization of a
curriculum design development framework
and blueprint that guides the construction and
development of different types of emergency
management and homeland security degree
and certificate programs (Associate through
Doctoral programs). CEMHS promulgates the
development of a “state-wide education and
training solution” in the form of comprehensive
“vertical track” education and training programs
to improve disaster and crisis response and, for
example, the efficient utilization of information
resources and technology.
In the program design and curriculum development phase, it is important to ensure that
programs contain all requisite skills and knowledge competency areas necessary to master and
perform within a given field or discipline. The
“templates” and “best practices” framework are
intended for replication as a model curriculum
by additional educational institutions interested
in offering these programs and courses. Thus,
there is the development of a clear road-map in
academic programs from professional training
to advanced terminal degree program in disaster
and crisis response and information systems
management. CEMHS provides facilitated coordination to help develop academic programs
to enhance crisis response and information
systems management and greatly benefit the
international disaster response community.
The Importance of Partnerships
and Collaboration
The primary means of achieving organization
education and research objectives is through
collaboration and partnering between state
educational institutions and major stakeholders
and the development of participation within the
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),51-60,July-September2010 55
emergency management and crisis response
community. As an organization, CEMHS fosters
a shared vision in designing and promoting EMHS curriculum and programs with the active
participation and critical input of key partners
and stakeholders. Particular emphasis is placed
on building facilitative and stronger relations
in a growing network of academicians and
professionals within the field. It is important
to foster partnerships and collaboration and
develop a strategic plan to implement education and training programs at various levels of
government: international, national, state, and
local, educational partners, additional public
organizations, and the private sector.
The discussion of EM-HS curriculum
and initiatives should be conducted within the
framework of delivering standardized, portable
courses and programs that fulfill the needs of
key partnering agencies, faculty, students, and
respective campuses. It is vital to coordinate
streamlined crisis response and emergency management academic programs. This is particularly
true for specialized academic disciplines like
information systems and management. In order
to handle disasters efficiently, crises responders
should have achieved specific competencies and
mastery to perform their respective tasks and
duties. All involved in crisis response should be
properly prepared and experienced in handling
incidents. All crisis responders and information
resource team members should be on the same
page to accomplish tasks as necessary. This is
accomplished through education, training, and
practical experience.
To help sate a demand for information and
knowledge, key partnerships within the academic and professional communities have formed
and coalesced with the purpose of enhancing
disaster preparedness, crisis response, through
education and training programs. The objectives
of CEMHS include building of strategic partnerships among key stakeholders in collaborative
partnerships to support the programmatic and
curriculum development needs. There is a need
to develop education programs to provide a firm
foundation for the many specialized areas of
crisis response like information management,
public health, nursing, civil engineering, victim
services, and many other contributing fields and
disciplines. This activity is achieved through
increased “predictable collaborative action” and
through building multi-campus consortiums and
university-agency partnerships. Since many of
the courses utilized in these programs already
exist, it is primarily an issue of getting involved
stakeholders together and deciding the critical
questions of what these programs look like and
making it happen.
In this way, the needs of major partners are
reflected in the types of academic and training
programs developed, curriculum and content
designed, and necessary skill and knowledge
areas emphasized.
Education, research, and service initiatives
are supported and represented by a variety of
key stakeholders (agencies, universities and colleges, the private sector, public organizations).
In terms of educational partners, members are
found on campuses from the University of
California, California State University, California Community Colleges, County School
Boards, and Private Universities. In terms of
professional partners, the California Emergency
Management Agency (Cal EMA) has provided
grant and funding support for CEMHS. As of
August 2010, CEMHS has over 525 participants
drawn from academic and professional partners.
IN ADDITION, presentations have been made
to the United States Department of Homeland
Security (DHS) and the Federal Emergency
Management Agency (FEMA) Emergency
Management Institute (EMI). CEMHS has
worked closely with the Disaster Resistant
California Community Colleges (DRCCC)
group and the City of Los Angeles Emergency
Management Department’s EM University
Consortium (LAEMUC). In addition, the International Association of Emergency Managers
(IAEM) has an official liaison with CEMHS
workgroups. These partnerships have been
mutually beneficial and supportive and results
in much feedback from colleagues in the many
diverse fields contributing to crisis response
management.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
56 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),51-60,July-September2010
The California Emergency
Management and Homeland
Security Education and
Training Strategic Initiative
Current CEMHS activity consists of preparing
a strategic vision and framework to design,
develop, and implement EM-HS education and
training programs for K-12 and Postsecondary
Education state-wide. This framework, the California Emergency Management and Homeland
Security Education and Training Strategic
Initiative, sketches an outline and blueprint to
guide and develop a “vertical track” of seamless, standardized, and portable Emergency/
Disaster Management and Homeland Security
education and training programs at various
levels of education from Training Academy
through Associate, Bachelor, Master and Doctoral degrees. The benefit of the vertical track
is that students would have the opportunity for
academic programs through terminal degrees.
The Cal EMA has funded the development
and writing of the EM-HS Strategic Initiative
for 2009-10. Details of the Strategic Initiative,
including mission, vision, and objectives are
discussed in the following sections.
Strategic Initiative Mission and Vision
The primary mission of the Strategic Initiative is
to design, develop, and implement a comprehensive, seamless, standardized, and coordinated
‘vertical track’ of emergency/disaster/crisis
management education and training programs
and curriculum at all stages of educational attainment (K-12 and Post-Secondary Education)
to support the critical needs of key stakeholders
and partners in this important subject area. The
vision of the Strategic Initiative is to facilitate
a collaborative partnership between public and
private educational institutions to develop “standardized, seamless, and portable” education and
training programs with the consultation and
guidance of key partners, critical stakeholders,
and Subject Matter Experts (SMEs).
Strategic Initiative Objectives
There are a variety of objectives to foster collaborative relationships and partnerships within
the academic and professional community in
the disaster and crisis management and help
reinforce a culture of preparedness, awareness,
and safety on-campus and within our communities. The primary objective of the Strategic
Initiative is to provide a comprehensive and
linked series of academic programs designed
to meet the complexity and rigor of needs and
skills to fully support the academic and professional communities for safer, more resilient,
and better prepared communities.
The first objective is to develop a common
understanding of crisis and disaster management
education and training programs (i.e. core principles and goals found in these program; types
of important knowledge, skills, and courses
to include within programs and courses; and
how programs are linked together to support
the development of an academic culture and
student support means) required to provide this
important area of education and training, workforce development, and enhance operational
capability. The second objective is to seek to
determine current capacity (and gaps) within
the EM-HS education and training programs
and fill these capability gaps. This includes a
discussion of the mission and vision of EM-HS
education and training programs, foundational
goals and types of courses/materials to teach and
related values like civic engagement, development of a public service ethos, program/course
delivery methods, internships, service learning,
and other auxiliary functions to support core
campus academic programs throughout K-12
and Postsecondary Education.
Third, it is important to design, develop,
and implement a linked network and portfolio
of EM-HS programs (through various levels
of educational attainment). Also to assist in
matriculation and transfer opportunities among
these linked programs to develop a coordinated
“vertical and horizontal track” of EM-HS (and
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),51-60,July-September2010 57
related programs) through terminal degree
programs. The ultimate objective is to design
a model curriculum and series of program/
course templates replicable across schools,
universities, and colleges to further support
emergency management and homeland security
education and training. This is accomplished
through the development of “templates” and
“best practices” for a model curriculum that
details courses, content, and student learning
objectives for programs and courses in this
critical subject area. EM-HS program templates
should be structured and designed with respect
to the academic and curriculum review process
of a particular campus (i.e. covering student
learning outcomes, course descriptions, and
relevant institutional policies).
Towards this end, a tremendous amount of
courses and materials already exist within the
public domain to coordinate into a workable
set of organized programs easily structured and
modified by respective campuses based on their
program specifications and curriculum review
process. In other cases where little program and
course material currently exists, new programs
courses, and specializations to “fill in the gaps”
will be designed and built to round out EM-HS
education and training programs. We need to
frame the discussion of key components of the
Strategic Initiative in the context of a “minimum
baseline” and guidelines to enhance EM-HS
academic programs.
At the end of the day, campuses should
be able to utilize a template for minimum
baseline requirements for whatever degree or
certificate program they are interested in; add
respective institutional strengths and faculty
specializations, geographical location considerations, community interests; any additional
requirements (a capstone or internship class)
and call the program their own. Some have
kindly referred to this as the “CEMHS Menu
Approach” to education/training program
development. The “menu approach” reference
signifies that there are many different factors
that educational institutions keep in mind when
making the decision to build and offer various
programs and courses. Some of these factors
—types of program, intended student audience,
anticipated demand, available resources, faculty
and institutional strengths, etc. are instrumental
in the decision to offer (or not) respective academic programs. Programs should be planned
and designed with these factors in mind.
IMPLICATIONS AND
LESSONS LEARNED
In order to “assist the development of an educated and well trained scientific and technical
workforce to respond to information demands
and crisis response,” we link vast resources,
programs, and faculty expertise together and
provide education and research solutions to
designing comprehensive EM-HS core and specialization programs and courses in a multiple
campus consortium. Due to the many factors
and components involved in academic program
development (and regardless of discipline or
specialization), there are four linked elements
of education, teaching, research and service/
humanitarian outreach implications and lessons learned in the development of information
systems and crisis response academic programs.
These are examples of the implications and
lessons discussed in this case study.
•
•
•
•
Primary Education Strategies
Auxiliary and Education/Training Support
Faculty/Student Research Opportunities
Service/Community/Humanitarian
Outreach
Primary Education Strategies
Primary education strategies involve matters
of core and specialization curriculum design
and development. CEMHS is developing a
core curriculum and templates corresponding to various EM-HS degree and certificate
programs based on “model practices” content
and pedagogy and deliverable through various
delivery modes (traditional, online, hybridized)
and through collaborating campuses. Based on
institutional and faculty interests, specializa-
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
58 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),51-60,July-September2010
tions, strategic needs; program coordination is
facilitated with program coordination and key
partners to develop programs to serve STEM
fields (Science, Technology, Engineering,
and Mathematics) needs (at the international,
regional, and national levels). In addition to
core curriculum, a full slate of programs that
correspond with special areas of “strategic
interest” or addressing specific gaps in “high
needs” technology gaps should be designed and
developed soon.
These specific areas of education and
training are “specializations.” Different specializations are found on all campuses as each
campus individually develops a respective culture relating to teaching, research, and faculty/
staff expertise. Campuses often collaborate and
link together within the context of networks or
“multi-campus” consortiums to provide these
programs. Each campus in the consortium
contributes to the offering of general programs
as well as specializations based on important
considerations like geographic location, institutional strengths, faculty/staff expertise,
additional funding sources/research centers,
etc. In other words, programs are blended into
various levels of education, and tailored to the
needs of students pursuing different educational
goals, with the types of programs that institutions chose to develop and implement them.
In program areas of exceptionally high
academic need, external funding sources would
be utilized to support the development of critical
topic areas that meet the technical and scientific
needs of partners and stakeholders, like in the
areas of data visualization, cryptology, communications interoperability, remote sensing and
many others. There is a particular need for some
types of programs to be designed and develop
and guided by the needs and specifications
of key stakeholders and their view of current
(and future) needs of the EM-HS workforce. In
addition to the development of primary education programs, there is an additional need for
auxiliary support and the development of faculty
and student opportunities in the areas of crisis
response and management.
Auxiliary Education/Training
Support and Faculty/Student
Research Opportunities
Supporting the implementation of a comprehensive and coordinated education and training programs in a vertical track of academics
is an initial first step. However, we must also
develop educational infrastructure to assist in
student and faculty success during the nascent
EM-HS program development process. Without
too much detail, one important factor that partially differentiates crisis/disaster management
education and training from more “traditional
academic pursuits” is in the operational and
experiential needs and information systems
management connection with international and
national government agencies, NGOs, private
sector, and others involved in crisis response.
It follows intuitively there must be additional linkages between agencies and academics
so experiential learning environments should
be developed. Linkages and partnerships include internships, field placements, career and
job skill development fairs, drills, exercises,
tabletops, etc. In addition to providing linkages and connections between academics and
professionals in terms of experiential learning
and research opportunities, there is also interest
in deepening the network between professional
and educational partners in the development of
EM-HS academic programs at various levels
of education.
Service/Community/
Humanitarian Outreach
It is important to support international disaster
response and information systems through
engagement of Service Learning and Civic
Engagement within our communities and internationally. Commitment to community engagement should reflect in the curricula and programs
designed as well as in building experiential
learning networks between professionals and
academicians. This could be accomplished by
developing international information, academic
technology, communications, and interoper-
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),51-60,July-September2010 59
ability groups to coordinate disaster response
with current technologies, data-analysis, and
visualization capabilities to support additional
student and faculty education and research
opportunities. Finally, support additional
collaborative efforts for education, training,
research, and community outreach programs
and initiatives. Build linkages with additional
public and private organizations, and tribal
governments to support community outreach
in EM-HS fields and promote community and
campus preparedness, mental health and victim
services, and enhance resiliency.
CONCLUSION
As relating to the area of information systems
and crisis response, it takes many working together as a team to design, develop, and deploy
technical solutions to disaster and emergency
management. These experts in-training require
education and training programs to reach their
professional goals. We need geography and
geology researchers to understand the dynamics
of earthquakes and wildfires as well as utilize
remote sensors and enhance GIS technology and
delivery. Victim services personnel for crisis
response, future educators, and squaring away
educational needs for groups making valuable
contributions to more resilient communities
are important as well. Thus, there are a wide
variety of knowledge and skill areas to deliver
efficiently and effectively. Many of these key
curriculum decisions relate to the educational
learning objectives promulgated by the specific
program under design and development.
Workable and feasible “real-life” programs
are needed to improve access, availability, and
quality education programs in information systems crisis response. One important case study
theme is an interest to develop and enhance
education, training, and research programs.
These programs, courses, and curriculum should
be designed with the input and feedback of
agencies and professionals (state, federal, local)
and private-sector partners regarding necessary
skills and knowledge areas required for mastery
in these critical subject areas. In addition, these
academically rigorous programs and courses
must be fitted seamlessly so that students can
sequence from training/vocational academy
through community college and bachelors and
masters degree programs. Various modes of
effective program and course delivery are also
explored (traditional courses, asynchronous
delivery, hybrid/blended models, etc.) There
are many necessary details to discuss in the
process of designing and developing EM-HS
academic programs.
There has generally been a low level of
coordination and integration of educational
resources and programs towards the development of a comprehensive national or state-wide
solution for education and training programs.
The boundaries of the field, programs, and
courses require additional development and
specification related to curriculum, content,
and program delivery methods. Academicians
and professionals should collaborate to develop
a “common understanding” of important principles and subject area content to design quality
EM-HS education and training programs that
meet the needs of both communities. In closing, one purpose of this case study is to provide
guidance and information on designing and
developing education programs that promote
preparedness and response and reflect sound
crisis and disaster management principles and
“best practices.” This gives us pause to consider
themes like how information systems and crisis
management should be reflected in post-secondary education programs and course content.
It is important to build programs that speak to
the critical relationship between information,
technology, and how to apply these to crisis
response situations that occur across the globe.
REFERENCES
Davies, P.(199). What is Evidence-Based Education? British Journal of Educational Studies, 47(2),
108–121. doi:10.1111/1467-8527.00106
IAEM. (2007). Principles of Emergency Management. Retrieved August 10, 2010, from http://www.
iaem.com/EMPrinciples/documents/PrinciplesofEmergencyManagement.pdf
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
60 InternationalJournalofInformationSystemsforCrisisResponseandManagement,2(3),51-60,July-September2010
Keith Clement is an Assistant Professor in the Department of Criminology at California State
University, Fresno and Director of the Graduate Homeland Security Program. Professor Clement
teaches undergraduate courses in Comparative (International) Criminal Justice and graduate
courses in Psychology of Terrorism and Crisis Response and Essentials of Homeland Security.
His research interests include risk perception of border security, transnational crimes, and
its effect on security, and interoperability/communications issues. He also serves as Planning
Director for the CSU Council for Emergency Management and Homeland Security (CEMHS),
a 525+ member organization linking universities and colleges with key stakeholders to build
EM-HS education and training programs and curriculum. He is a recipient of a United States
Department of Homeland Security (DHS) Early Career Faculty Award under the Scientific
Leadership Award for MSI Program.
Copyright © 2010, IGI Global. Copying or distributing in print or electronic forms without written permission of IGI Global
is prohibited.
International Journal of
Information Systems for Crisis Response and
Management
An oficial publication of the Conference on Information Systems for Crisis Response and Management
Mission
The mission of the International Journal of Information Systems for Crisis Response and Management (IJISCRAM)is to provide an outlet for innovative research in the area of information systems for crisis response
and management. Research is expected to be rigorous but can utilize any accepted methodology and may be
qualitative or quantitative in nature. The journal will provide a comprehensive cross disciplinary forum for
advancing the understanding of the organizational, technical, human, and cognitive issues associated with the
use of information systems in responding and managing crises of all kinds.
Subscription Information
IJISCRAM is published quarterly: January-March; April-June; July-September; October-December by IGI
Global. Full subscription information may be found at www.igi-global.com/ijiscram. The journal is available
in print and electronic formats.
Institutions may also purchase a site license providing access to the full IGI Global journal collection featuring
more than 100 topical journals in information/computer science and technology applied to business & public
administration, engineering, education, medical & healthcare, and social science. For information visit www.
infosci-journals.com or contact IGI at eresources@igi-global.com.
Copies of Articles
Copies of individual articles are available for purchase at InfoSci-On-Demand (www.infosci-on-demand.com),
an aggregated database consisting of more than 31,000 research articles written by prominent experts and
scholars in the ield of information/computer science and technology applied to business & public administration, engineering, education, medical & healthcare, and social science.
TOC Alerts
Please go to www.igi-global.com/IJISCRAM and click on the "TOC Alert" tab on the left menu if you want to
be emailed the table of contents of each issue of this journal as it is released.
Copyright
The International Journal of Information Systems for Crisis Response and Management (ISSN 1937-9390;
e-ISSN 1937-9420). Copyright © 2010 IGI Global. All rights, including translation into other languages reserved by the publisher. No part of this journal may be reproduced or used in any form or by any means without
written permission from the publisher, except for noncommercial, educational use including classroom teaching purposes. Product or company names used in this journal are for identiication purposes only. Inclusion of
the names of the products or companies does not indicate a claim of ownership by IGI Global of the trademark
or registered trademark. The views expressed in this journal are those of the authors but not necessarily of IGI
Global.
Correspondence and questions:
Editorial:
Murray E. Jennex,
San Diego State University, USA
Bartel A. Van de Walle,
Tilburg University, the Netherlands
IJISCRAM@iscram.org
Subscriber Info:
IGI Global
Customer Service
701 E Chocolate Avenue
Hershey PA 17033-1240, USA
Tel: 717/533-8845 x100
E-mail: cust@igi-global.com
IJISCRAM is listed in the following indexes: Cabell's Directory; GetCited; Index of Information Systems
Journal; INSPEC; Media Finder; Norwegian Social Science Data Services (NSD); Standard Periodicals
Directory; Ulrich's Periodicals Directory