9,522 research outputs found

    Research Directions in Information Systems for Humanitarian Logistics

    Get PDF
    This article systematically reviews the literature on using IT (Information Technology) in humanitarian logistics focusing on disaster relief operations. We first discuss problems in humanitarian relief logistics. We then identify the stage and disaster type for each article as well as the article’s research methodology and research contribution. Finally, we identify potential future research directions

    How Mobile Devices are Transforming Disaster Relief and Public Safety

    Get PDF
    With its growing usage, mobile technology is greatly improving disaster relief and public safety efforts. Countries around the world face threats from natural disasters, climate change, civil unrest, terrorist attacks, and criminal activities, among others. Mobile devices, tablets, and smart phones enable emergency providers and the general public to manage these challenges and mitigate public safety concerns.In this paper, part of the Brookings Mobile Economy Project, we focus on how mobile technology provides an early warning system, aids in emergency coordination, and improves public communications. In particular, we review how mobile devices assist with public safety, disaster planning, and crisis response. We explain how these devices are instrumental in the design and functioning of integrated, multi-layered communications networks. We demonstrate how they have helped save lives and ameliorate human suffering throughout the world

    Why Information Matters: A Foundation for Resilience

    Get PDF
    Embracing Change: The Critical Role of Information, a research project by the Internews' Center for Innovation & Learning, supported by the Rockefeller Foundation, combines Internews' longstanding effort to highlight the important role ofinformation with Rockefeller's groundbreaking work on resilience. The project focuses on three major aspects:- Building knowledge around the role of information in empowering communities to understand and adapt to different types of change: slow onset, long-term, and rapid onset / disruptive;- Identifying strategies and techniques for strengthening information ecosystems to support behavioral adaptation to disruptive change; and- Disseminating knowledge and principles to individuals, communities, the private sector, policymakers, and other partners so that they can incorporate healthy information ecosystems as a core element of their social resilience strategies

    Crisis management: operational logistics and asset visibility technologies

    Get PDF
    MBA Professional ReportThe purpose of this MBA Project was to identify and explore logistical frameworks that leverage technology to overcome problems associated with coordinated logistics operations during crisis management. Over the past ten years, there have been significant advances in RFID, satellite and other related asset visibility technologies. These advances are mature enough to significantly increase the probability of achieving a useful common operational picture during emergency response activities. Recent crisis response operations that would have benefited from improved asset visibility include the Indian Ocean tsunami, the Pakistani earthquake, Hurricane Katrina and those related to the Global War on Terror. In each of these cases, multi-agency involvement, both foreign and domestic, compounded the complexity of asset tracking and communication protocols. The establishment of a logisticstracking framework that provides adequate asset visibility, while maintaining operational security, will greatly increase the effectiveness of future crisis response operations. The proposed logistics framework serves as a viable solution for common logistical problems encountered by the U.S. and other industrialized nations while conducting crisis response operations. The framework identifies concepts, technologies and protocols that can be used to improve crisis operations on a global scale.http://archive.org/details/crisismanagement1094510122Approved for public release; distribution is unlimited

    Geographic Information Systems (GIS) in Humanitarian Assistance: A Meta-Analysis

    Get PDF
    Every year natural and man-made disasters cause mass population displacement, loss of lives, and human suffering. On a given disaster several international or non-profit organizations will respond depending on the region in need as well as media and donor attention Olsen, Gorm Rye, et al (2003). Because of the extreme unique difficulties found in each disaster zone such as infrastructural damages, uncertain demand and supply, geographical challenges and time pressures, it is imperative that humanitarian organizations have readily available and applicable response methodologies as well as information technologies to increase their relief impact. In regards to the latter Geographic Information Systems (GIS) has proven to be an indispensable tool in the humanitarian sector. However, despite there being great recognition in regards to the importance of geospatial information in relief operations there is still a knowledge gap in regards to all the different tasks and uses of GIS in the humanitarian sector. For example, Espindola et al (2016) lament that despite the recent increase in literature which utilizes GIS for humanitarian logistics most of the research is limited to net-work analysis and also that GIS’s full potential for disaster relief has not been fully tapped. This meta-analysis, for the first time, seeks to address such gap of knowledge by achieving two main goals: (1) To better understand the various ways in which Geographic Information System (GIS) can be applied in humanitarian settings by revealing how the academic community is utilizing such technology in their research, and (2) to point out strengths and areas that have been overlooked as well as help guide future research in this field

    Rapid Response Command and Control (R2C2): a systems engineering analysis of scaleable communications for Regional Combatant Commanders

    Get PDF
    Includes supplementary materialDisaster relief operations, such as the 2005 Tsunami and Hurricane Katrina, and wartime operations, such as Operation Enduring Freedom and Operation Iraqi Freedom, have identified the need for a standardized command and control system interoperable among Joint, Coalition, and Interagency entities. The Systems Engineering Analysis Cohort 9 (SEA-9) Rapid Response Command and Control (R2C2) integrated project team completed a systems engineering (SE) process to address the military’s command and control capability gap. During the process, the R2C2 team conducted mission analysis, generated requirements, developed and modeled architectures, and analyzed and compared current operational systems versus the team’s R2C2 system. The R2C2 system provided a reachback capability to the Regional Combatant Commander’s (RCC) headquarters, a local communications network for situational assessments, and Internet access for civilian counterparts participating in Humanitarian Assistance/Disaster Relief operations. Because the team designed the R2C2 system to be modular, analysis concluded that the R2C2 system was the preferred method to provide the RCC with the required flexibility and scalability to deliver a rapidly deployable command and control capability to perform the range of military operations

    Disaster Relief 2.0: The Future of Information Sharing in Humanitarian Emergencies

    Get PDF
    Outlines the challenges of and recommendations for creating an effective interface between humanitarian groups and volunteer and technical communities aggregating, visualizing, and analyzing data on and from affected communities to support relief efforts

    Terrorism and the Internet: new media - new threat?

    Get PDF
    The Internet is a powerful political instrument, which is increasingly employed by terrorists to forward their goals. The five most prominent contemporary terrorist uses of the Net are information provision, financing, networking, recruitment, and information gathering. This article describes and explains each of these uses and follows up with examples. The final section of the paper describes the responses of government, law enforcement, intelligence agencies, and others to the terrorism-Internet nexus. There is a particular emphasis within the text on the UK experience, although examples from other jurisdictions are also employed
    corecore