4,758 research outputs found

    INTEGRATED COMMUNICATION AND TRANSPORTATION EFFICIENCY – SOME STUDY CASES

    Get PDF
    A critical factor in search, rescue or criminal investigation is time – specifically, the time needed to complete a big number of tasks that occur in any emergency. A critical asset in assisting disaster relief teams and public safety personnel in their mission to save lives and defend property loss is the access to resources data – location of personnel, emergency service resources, streets, buildings. The ability to locate resources, on foot or in vehicles, in relation to the local transportation infrastructure in a specific geographic area need to be considered in a new way of managing emergency situations. The TETRA based systems integrated with a wide range of mapping, tracking, alarming and resource-allocations applications used in conjunction with a dispatcher tool allows operational teams to manage a large ground, water and air-based emergency teams using voice and text communications.Public Safety, Maritime Rescue Co-ordination Centre (MRCC), AIS, RIS, Air Traffic Management (ATM), Incident and Operative Scenarios, Operability, Efficiency

    A Survey on Economic-driven Evaluations of Information Technology

    Get PDF
    The economic-driven evaluation of information technology (IT) has become an important instrument in the management of IT projects. Numerous approaches have been developed to quantify the costs of an IT investment and its assumed profit, to evaluate its impact on business process performance, and to analyze the role of IT regarding the achievement of enterprise objectives. This paper discusses approaches for evaluating IT from an economic-driven perspective. Our comparison is based on a framework distinguishing between classification criteria and evaluation criteria. The former allow for the categorization of evaluation approaches based on their similarities and differences. The latter, by contrast, represent attributes that allow to evaluate the discussed approaches. Finally, we give an example of a typical economic-driven IT evaluation

    Callisto: a cryptographic approach to detecting serial perpetrators of sexual misconduct

    Get PDF
    Sexual misconduct is prevalent in workplace and education settings but stigma and risk of further damage deter many victims from seeking justice. Callisto, a non-profit that has created an online sexual assault reporting platform for college campuses, is expanding its work to combat sexual assault and harassment in other industries. In this new product, users will be invited to an online "matching escrow" that will detect repeat perpetrators and create pathways to support for victims. Users submit encrypted data about their perpetrator, and this data can only be decrypted by the Callisto Options Counselor (a lawyer), when another user enters the identity of the same perpetrator. If the perpetrator identities match, both users will be put in touch independently with the Options Counselor, who will connect them to each other (if appropriate) and help them determine their best path towards justice. The client relationships with the Options Counselors are structured so that any client-counselor communications would be privileged. A combination of client-side encryption, encrypted communication channels, oblivious pseudo-random functions, key federation, and Shamir Secret Sharing keep data confidential in transit, at rest, and during the matching process with the guarantee that only the lawyer ever has access to user submitted data, and even then only when a match is identified.Accepted manuscrip

    Towards a linked information architecture for integrated law enforcement

    Get PDF
    Ponència presentada al Workshop on Linked Democracy: Artificial Intelligence for Democratic Innovation co-located with the 26th International Joint Conference on Artificial Intelligence (IJCAI 2017) celebrat el 19 d'agost de 2017 a Melbourne, AustraliaLaw enforcement agencies are facing an ever-increasing flood of data to be acquired, stored, assessed and used. Automation and advanced data analy-sis capabilities are required to supersede traditional manual work processes and legacy information silos by automatically acquiring information from a range of sources, analyzing it in the context of on-going investigations, and linking it to other pieces of knowledge pertaining to the investigation. This paper outlines a modular architecture for management of linked data in the law enforcement domain and discusses legal and policy issues related to workflows and infor-mation sharing in this context

    A Conceptual Model for Group Support Systems in Local Councils

    Get PDF
    This paper proposes a conceptual model of a context-aware group support system (GSS) to assist local council employees to perform collaborative tasks in conjunction with inter- and intra-organisational stakeholders. Most discussions about e-government focus on the use of ICT to improve the relationship between government and citizen, not on the relationship between government and employees. This paper seeks to expose the unique culture of UK local councils and to show how a GSS could support local government employer and employee needs

    How the Internet of Things Technology Enhances Emergency Response Operations

    Get PDF
    The Internet of Things (IoT) is a novel paradigmthat connects the pervasive presence around us of a variety of things or objects to the Internet by using wireless/wired technologies to reach desired goals. Since the concept of the IoT was introduced in 2005, we see the deployment of a new generation of networked smart objects with communication, sensory and action capabilities for numerous applications, mainly in global supply chain management, environment monitoring and other non-stress environments. This paper introduces the IoT technology for use in the emergency management community. Considering the information required for supporting three sequential and distinct rhythms in emergency response operations: mobilization rhythm, preliminary situation assessment rhythm, and intervention rhythm, the paper proposes a modified task-technology fit approach that is used to investigate how the IoT technology can be incorporated into the three rhythms and enhance emergency response operations. The findings from our research support our two hypotheses: H1: IoT technology fits the identified information requirements; and H2: IoT technology provides added value to emergency response operations in terms of obtaining efficient cooperation, accurate situational awareness, and complete visibility of resources
    corecore