1,017 research outputs found

    Assessment of delaminations in composite beams using experimental frequencies

    Get PDF
    In this paper, we introduce a vibration based method using changes in frequencies to detect delamination damage in composite beams. The basis of the present detection method is to first determine how changes in natural frequencies are related to the location and severity of delamination damage and then use this information to solve the inverse problem of predicting the delamination characteristics from measured frequency changes. To study the forward problem, a theoretical model of composite beams with delaminations is built to obtain the natural frequencies as a function of delamination sizes and locations. The inverse detection of delamination is realized using a graphical method, which makes use of frequency changes in multiple modes to assess the damage characteristics. The efficiency and accuracy of the present method are validated using experimental results reported in literature

    Modeling Public Response to Data Breaches

    Get PDF
    In this document we describe a theoretical approach to modeling public emotional response cycles to crisis events. We also provide a preliminary theoretical approach to modeling crisis communication propagation that is counter intuitive to existing belief and literature regarding emotionally charged language and discussion artifact dispersion. The data set used to test these theories is contextualized by the OPM data breach of 2015 and consists of twitter data corresponding to the ensuing discussion following public notification that the breach had occurred. The resulting analysis reveals that an adapted Kübler-Ross model fits the aggregated public emotional response cycle and that emotionally charged language is negatively associated with messages the disperse more than average

    Data Model Development for Fire Related Extreme Events - An Activity Theory and Semiotics Approach

    Get PDF
    Post analyses of major extreme events reveal that information sharing is critical for an effective emergency response. The lack of consistent data standards in the current emergency management practice however serves only to hinder efficient critical information flow among the incident responders. In this paper, we adopt a theory driven approach to develop a XML-based data model that prescribes a comprehensive set of data standards for fire related extreme events to better address the challenges of information interoperability. The data model development is guided by third generation Activity Theory and semiotics theories for requirement analyses. The model validation is achieved using a RFC-like process typical in standards development. This paper applies the standards to the real case of a fire incident scenario. Further, it complies with the national leading initiatives in emergency standards (National Information Exchange Model)

    Information Theoretic Approach to Design of Emergency Response Systems

    Get PDF
    Emergency response information systems provide critical support to the disaster management. Despite of the growing interest in this area, the existing research is scanty. A significant limitation is the lack of sound theoretical foundations for emergency management and the information system development. In this paper, the authors adapt Information Theory to explore the theoretical underpinnings of emergency response and discuss the general system design issues

    ANALYTICAL SOLUTION OF A STOCHASTIC EUTROPHICATION MODEL

    Get PDF

    An Empirical Examination of IT-Enabled Emergency Response: The Cases of Hurricane Katrina and Hurricane Rita

    Get PDF
    This paper reports the results of an empirical study that analyzes emergency incident response. The paper studies how information systems (IS) complement other organizational assets to help emergency responders achieve satisfactory response performance. We test the research model using empirical data collected from responses to Hurricane Katrina and Hurricane Rita. The results show that IS-enabled asset allocation support directly improves emergency response performance and also positively interacts with non-IS response assets in achieving response success. The results also confirm the value of dispatch systems, interagency communications, and knowledge repositories in developing asset allocation support for an emergency response organization

    Emergency Response Information System Interoperability: Development of Chemical Incident Response Data Model

    Get PDF
    Emergency response requires an efficient information supply chain for the smooth operations of intra- and inter-organizational emergency management processes. However, the breakdown of this information supply chain due to the lack of consistent data standards presents a significant problem. In this paper, we adopt a theory- driven novel approach to develop an XML-based data model that prescribes a comprehensive set of data standards (semantics and internal structures) for emergency management to better address the challenges of information interoperability. Actual documents currently being used in mitigating chemical emergencies from a large number of incidents are used in the analysis stage. The data model development is guided by Activity Theory and is validated through a RFC-like process used in standards development. This paper applies the standards to the real case of a chemical incident scenario. Further, it complies with the national leading initiatives in emergency standards (National Information Exchange Model

    An Exploration of Phishing Information Sharing: A Heuristic-Systematic Approach

    Get PDF
    Phishing is an attempt to acquire sensitive information from a user by malicious means. The losses due to phishing have exceeded a trillion dollars globally. Social media has provided an alternate to sharing information about phishing online. However, very little attention has been paid to phishing information sharing on social media. In this paper, we explore the risk characteristics of phishing information on social media, and investigate its effect on people’s sharing of information regarding phishing. We address the research questions: (a) how do people decide which phishing information to share? (b) what aspects of phishing information are more or less consequential in influencing a user to share it? The findings suggest that the phishing messages that afford coping strategies, and come from users with higher credibility are likely to achieve higher level of sharing
    • …
    corecore