Search results
1 – 10 of 71This study aims to predict the consequences associated with the propagation of the flood wave that may occur after the failure of the Taksebt dam and suggest an efficient…
Abstract
Purpose
This study aims to predict the consequences associated with the propagation of the flood wave that may occur after the failure of the Taksebt dam and suggest an efficient emergency action plan for mitigation purposes.
Design/methodology/approach
To achieve the objectives of this study, the hydrodynamic model HEC-RAS 2D was used for the flood routing of the dam-break wave, which gave an estimate of the hydraulic characteristics downstream the Taksebt dam.
Findings
Geospatial analysis of the simulation results conducted in a geographic information system (GIS) environment showed that many residential areas are considered to be in danger in case of the Taksebt dam-break event. Based on the obtained results, an emergency actions plan was suggested to moderate the causalities in the downstream area at risk.
Originality/value
Overall, this study showed that the integration of 2D hydraulic modeling and GIS provides great capabilities in providing realistic view of the dam-break wave propagation that enhances assessing the associated risks and proposing appropriate mitigation measures.
Details
Keywords
Catherine Sandoval and Patrick Lanthier
This chapter analyzes the link between the digital divide, infrastructure regulation, and disaster planning and relief through a case study of the flood in San Jose, California…
Abstract
This chapter analyzes the link between the digital divide, infrastructure regulation, and disaster planning and relief through a case study of the flood in San Jose, California triggered by the Anderson dam’s overtopping in February 2017 and an examination of communication failures during the 2018 wildfire in Paradise, California. This chapter theorizes that regulatory decisions construct social and disaster vulnerability. Rooted in the Whole Community approach to disaster planning and relief espoused by the United Nations and the Federal Emergency Management Agency, this chapter calls for leadership to end the digital divide. It highlights the imperative of understanding community information needs and argues for linking strategies to close the digital divide with infrastructure and emergency planning. As the Internet’s integration into society increases, the digital divide diminishes access to societal resources including disaster aid, and exacerbates wildfire, flood, pandemic, and other risks. To mitigate climate change, climate-induced disaster, protect access to social services and the economy, and safeguard democracy, it argues for digital inclusion strategies as a centerpiece of community-centered infrastructure regulation and disaster relief.
Details
Keywords
Annette Mills, Nelly Todorova and Jing Zhang
Disasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS…
Abstract
Purpose
Disasters and other emergencies are increasing, with millions of people affected by events like earthquakes, fires and flooding. The use of mobile emergency alert systems (MEAS) can improve people’s responses by providing targeted alerts based on location and other personal details. This study aims to understand the factors that influence people’s willingness to share the personal information that is needed to provide context-specific messaging about a threat and protective actions.
Design/methodology/approach
Drawing on protection motivation theory (PMT), this study proposes and tests a model of willingness to use personalised MEAS that incorporates key factors related to an individual’s appraisal of a potential threat (i.e. perceived vulnerability and severity) and coping capacity (i.e. response efficacy and self-efficacy), with deterrents like response cost and privacy concern. This study uses survey data from 226 respondents in New Zealand and SmartPLS to assess the model.
Findings
The results show how willingness to use MEAS is influenced by people’s appraisal of an emergency threat and their perception of how using MEAS would help them to cope effectively. Fear and perceived severity are significant motivators of MEAS use, along with coping appraisal. However, when the negative influences of privacy concern and response cost are strong enough, they can dissuade use, despite knowing the risks.
Originality/value
The study addresses a gap in research on the use of alert systems like MEAS, which require sharing of personal information and continuous engagement such as the real-time disclosure of one’s location. It confirms the significance of factors not studied in prior research, such as privacy concerns, that can dissuade use. This study also extends the application of the PMT in the context of emergency management.
Details
Keywords
Faisal Lone, Harsh Kumar Verma and Krishna Pal Sharma
The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable…
Abstract
Purpose
The purpose of this study is to extensively explore the vehicular network paradigm, challenges faced by them and provide a reasonable solution for securing these vulnerable networks. Vehicle-to-everything (V2X) communication has brought the long-anticipated goal of safe, convenient and sustainable transportation closer to reality. The connected vehicle (CV) paradigm is critical to the intelligent transportation systems vision. It imagines a society free of a troublesome transportation system burdened by gridlock, fatal accidents and a polluted environment. The authors cannot overstate the importance of CVs in solving long-standing mobility issues and making travel safer and more convenient. It is high time to explore vehicular networks in detail to suggest solutions to the challenges encountered by these highly dynamic networks.
Design/methodology/approach
This paper compiles research on various V2X topics, from a comprehensive overview of V2X networks to their unique characteristics and challenges. In doing so, the authors identify multiple issues encountered by V2X communication networks due to their open communication nature and high mobility, especially from a security perspective. Thus, this paper proposes a trust-based model to secure vehicular networks. The proposed approach uses the communicating nodes’ behavior to establish trustworthy relationships. The proposed model only allows trusted nodes to communicate among themselves while isolating malicious nodes to achieve secure communication.
Findings
Despite the benefits offered by V2X networks, they have associated challenges. As the number of CVs on the roads increase, so does the attack surface. Connected cars provide numerous safety-critical applications that, if compromised, can result in fatal consequences. While cryptographic mechanisms effectively prevent external attacks, various studies propose trust-based models to complement cryptographic solutions for dealing with internal attacks. While numerous trust-based models have been proposed, there is room for improvement in malicious node detection and complexity. Optimizing the number of nodes considered in trust calculation can reduce the complexity of state-of-the-art solutions. The theoretical analysis of the proposed model exhibits an improvement in trust calculation, better malicious node detection and fewer computations.
Originality/value
The proposed model is the first to add another dimension to trust calculation by incorporating opinions about recommender nodes. The added dimension improves the trust calculation resulting in better performance in thwarting attacks and enhancing security while also reducing the trust calculation complexity.
Details
Keywords
Zaheer Doomah, Asish Seeboo and Tulsi Pawan Fowdur
This chapter provides an overview of the potential use of Intelligent Transport Systems (ITS) and associated artificial intelligence (AI) techniques in the land transport sector…
Abstract
This chapter provides an overview of the potential use of Intelligent Transport Systems (ITS) and associated artificial intelligence (AI) techniques in the land transport sector in an attempt to achieve related United Nations Sustainable Development Goals (SDGs) targets. ITS applications that have now been extensively tested worldwide and have become part of the everyday transport toolkit available to practitioners have been discussed. AI techniques applied successfully in specific ITS applications such as automatic traffic control systems, real-time image processing, automatic incident detection, safety management, road condition assessment, asset management and traffic enforcement systems have been identified. These methods have helped to provide traffic engineers and transport planners with novel ways to improve safety, mobility, accessibility and efficiency in the sector and thus move closer to achieving the various SDG targets pertaining to transportation.
Details
Keywords
This paper aims to describe the phenomenon of multiple simultaneous un/natural disasters (MSDs). This study also aims to describe the importance and contribution of philosophy in…
Abstract
Purpose
This paper aims to describe the phenomenon of multiple simultaneous un/natural disasters (MSDs). This study also aims to describe the importance and contribution of philosophy in describing MSDs warning and alarming systems.
Design/methodology/approach
The paper summarizes topics in the philosophy of MSDs that were covered in detail in previous research in order to continue with the topic of the philosophy of MSDs alarming and warning. A practical solution to conceptual paradoxes is researched by means of conceptual-morphological analysis.
Findings
The paper proposes a conceptual idea for MSDs alarming system which is its main topic; namely, it offers a conceptual solution to a series of practical-conceptual paradoxes that occur before, during and after MSDs.
Research limitations/implications
This is only a conceptual research, and it does not deal with particular technological solutions.
Practical implications
The proposed solution of this research could be implemented in various warning and alarm systems.
Originality/value
The proposed concept of a universal alarm system for MSDs was not previously proposed.
Details
Keywords
Luiza Ribeiro Alves Cunha, Adriana Leiras and Paulo Goncalves
Due to the unknown location, size and timing of disasters, the rapid response required by humanitarian operations (HO) faces high uncertainty and limited time to raise funds…
Abstract
Purpose
Due to the unknown location, size and timing of disasters, the rapid response required by humanitarian operations (HO) faces high uncertainty and limited time to raise funds. These harsh realities make HO challenging. This study aims to systematically capture the complex dynamic relationships between operations in humanitarian settings.
Design/methodology/approach
To achieve this goal, the authors undertook a systematic review of the extant academic literature linking HO to system dynamics (SD) simulation.
Findings
The research reviews 88 papers to propose a taxonomy of different topics covered in the literature; a framework represented through a causal loop diagram (CLD) to summarise the taxonomy, offering a view of operational activities and their linkages before and after disasters; and a research agenda for future research avenues.
Practical implications
As the authors provide an adequate representation of reality, the findings can help decision makers understand the problems faced in HO and make more effective decisions.
Originality/value
While other reviews on the application of SD in HO have focused on specific subjects, the current research presents a broad view, summarising the main results of a comprehensive CLD.
Details
Keywords
Each stage in disaster management faces different challenges concerning information gathering, sharing, interpretation and dissemination. However, a comprehensive understanding of…
Abstract
Purpose
Each stage in disaster management faces different challenges concerning information gathering, sharing, interpretation and dissemination. However, a comprehensive understanding of different information and communication technology (ICT) systems utilised for humanitarian disaster management is limited. Therefore, the paper follows a systems thinking approach to examine ten major man-made and/or natural disasters to comprehend the influence of ICT systems on humanitarian relief operations.
Design/methodology/approach
A longitudinal, multi-case study captures the use of ICT tools, stakeholders involvement, disaster stages and zones of operations for relief operations over the past two decades. A systems thinking approach is utilised to draw several inferences and develop frameworks.
Findings
Multiple ICT tools such as geographic information systems, online webpages/search engines, social media, unmanned aerial vehicles/robots and artificial intelligence are used for rapid disaster response and mitigation. Speed and coordination of relief operations have significantly increased in recent years due to the increased use of ICT systems.
Research limitations/implications
Secondary data on the past ten disasters is utilised to draw inferences. The developed ICT-driven model must be validated during upcoming humanitarian relief operations.
Practical implications
A holistic understanding of a complex inter-relationship between influential variables (stakeholders, disaster stages, zones of operation, ICT systems) is beneficial for effectively managing humanitarian disasters.
Originality/value
Broadly classifying the ICT systems into surveillance, decision support and broadcasting systems, a novel ICT-enabled model for humanitarian relief operations is developed.
Details
Keywords
Tim Gruchmann, Gernot M. Stadtfeld, Matthias Thürer and Dmitry Ivanov
Experiencing more frequent, system-wide disruptions, such as pandemics and geopolitical conflicts, supply chains can be largely destabilized by a lack of materials, services or…
Abstract
Purpose
Experiencing more frequent, system-wide disruptions, such as pandemics and geopolitical conflicts, supply chains can be largely destabilized by a lack of materials, services or components. Supply chain resilience (SCRES) constitutes the network ability to recover after and survive during such unexpected events. To enhance the understanding of SCRES as a system-wide quality, this study tests a comprehensive SCRES model with data from multiple industries.
Design/methodology/approach
The study proposes a theoretical framework conceptualizing SCRES as system quality, extending the classical proactive/reactive taxonomy by multiple system states consisting of the supply system properties, behaviors and responses to disruptions. Underlying hypotheses were tested using an online survey. The sample consists of 219 responses from German industries. Maximum likelihood structural equation modeling (ML-SEM) and moderation analysis were used for analyzing the survey data. The study was particularly designed to elaborate on supply chain theory.
Findings
Two pathways of parallel SCRES building were identified: proactive preparedness via anticipation and reactive responsiveness via agility. Both system responses are primarily built simultaneously rather than successively. The present study further provides empirical evidence on the central role of visibility and velocity in achieving comprehensive SCRES, while flexibility only exerts short-term support after a disruption. The study additionally points to potential “spillover effects” such as the vital role of proactive SCRES in achieving reactive responsiveness.
Originality/value
The present study confirms and expands existing theories on SCRES. While stressing the multidimensionality of SCRES, it theorizes the (inter-)temporal evolution of a system and offers practical guidelines for SCRES building in various industrial contexts. It thus supports the transformation toward more resilient and viable supply chains, contributing to the increasing efforts of middle-range theory building to achieve an overarching theory. The study also points to potential future research avenues.
Details
Keywords
In the mid-2000s, the operator of New York City’s mass transit network committed more than a half-billion dollars to military contractor Lockheed Martin for a security technology…
Abstract
In the mid-2000s, the operator of New York City’s mass transit network committed more than a half-billion dollars to military contractor Lockheed Martin for a security technology capable, in part, of inferring threats based on analysis of data streams, of developing response strategies, and taking automated action toward alerts and calamities in light of evolving circumstances. The project was a failure. This chapter explores the conceptualization and development of this technology – rooted in cybernetics – and compares its conceptual underpinnings with some situated problems of awareness, communication, coordination, and action in emergencies as they unfold in one of the busiest transport systems in the world, the New York subway. The author shows how the technology, with all the theatrical trappings of a “legitimate” security solution, was apparently conceived without a grounded understanding of actual use-cases, and the degree to which the complex interactions which give rise to subway emergency can be anticipated in – and therefore managed through – a technological system. As a case-study, the chapter illustrates the pitfalls of deploying technology against problems which are not well-defined in the first place, to the neglect of investments against much more fundamental problems – such as inadequate communication systems, and unstable relationships with emergency response agencies – which might offer guaranteed benefits, and indeed lay a firm groundwork for future deployment of more ambitious technology.
Details