Technology and Emergency Management (2nd Ed.)

Author:

Language: English

85.75 €

In Print (Delivery period: 14 days).

Add to cartAdd to cart
Publication date:
288 p. · 17.5x25.2 cm · Paperback

The first book devoted to a critically important aspect of disaster planning, management, and mitigation

Technology and Emergency Management, Second Edition describes best practices for technology use in emergency planning, response, recovery, and mitigation. It also describes the key elements that must be in place for technology to enhance the emergency management process. The tools, resources, and strategies discussed have been applied by organizations worldwide tasked with planning for and managing every variety of natural and man-made hazard and disaster. Illustrative case studies based on their experiences appear throughout the book. 

This new addition of the critically acclaimed guide has been fully updated and expanded to reflect significant developments occurring in the field over the past decade. It features in-depth coverage of major advances in GIS technologies, including the development of mapping tools and high-resolution remote sensing imaging. Also covered is the increase in computer processing power and mobility and enhanced analytical capabilities for assessing the present conditions of natural systems and extrapolating from them to create accurate models of potential crisis conditions. This second edition also features a new section on cybersecurity and a new chapter on social media and disaster preparedness, response, and recovery has been added.

  • Explores the role of technology in emergency planning, response, recovery, and mitigation efforts
  • Explores applications of the Internet, telecommunications, and networks to emergency management, as well as geospatial technologies and their applications
  • Reviews the elements of hazard models and the relative strengths and weaknesses of modeling programs
  • Describes techniques for developing hazard prediction models using direct and remote sensing data
  • Includes test questions for each chapter, and a solutions manual and PowerPoint slides are available on a companion website

Technology and Emergency Management, Second Edition is a valuable working resource for practicing emergency managers and an excellent supplementary text for undergraduate and graduate students in emergency management and disaster management programs, urban and regional planning, and related fields.

Concept xiii

About the Author xiv

List of Contributors xv

About the Companion Website xvi

1 The Need for Technology in Emergency Management 1

Introduction 2

1.1 Technology and Disaster Management 2

1.1.1 Focus on Current and Emerging Technology 3

1.2 Technology as a Management Tool 4

1.2.1 Response to Complex Disaster Events 5

1.2.2 Ease of Use of Technology 5

1.3 Using Technologies 6

1.3.1 Technology in a Changing Environment 8

1.3.2 Examples of Technology 8

1.3.3 Communicate Quickly 8

1.3.4 Develop a Better Understanding of Hazards 9

1.3.5 Improve Response 9

1.3.6 Increase Coordination 9

1.3.7 Improve Efficiency 9

1.3.8 Training 9

1.4 Completing a Needs Assessment 10

1.4.1 Nature of a Needs Assessment 10

1.4.2 Steps to Complete a Needs Assessment 11

1.4.3 Implementing the Needs Assessment 12

1.4.4 Impacts of Implementing Innovation 12

Summary 14

Key Terms 14

Assess Your Understanding 14

References 15

2 Computer Networks and Emergency Management 17

Introduction 18

2.1 What Is a Network? 19

2.2 Types of Networks 19

2.2.1 Local Area Network 19

2.2.2 Metropolitan Area Network 20

2.2.3 Wide Area Network 20

2.2.4 Personal Area Network 21

2.3 The Internet 21

2.4 Communication Technologies 24

2.4.1 Wired Network Technologies 24

2.4.2 Long‐Range Wireless Network Technologies 27

2.4.3 Short‐Range Wireless Network Technologies 30

2.5 The Internet and Emergency Management 32

2.6 IoT and Emergency Management 35

Summary 38

Key Terms 38

Assess Your Understanding 40

References 40

3 Cyber Security.42

Introduction 43

3.1 Sources of Attacks 45

3.2 Attack Vectors 46

3.2.1 Vulnerabilities 46

3.2.2 Phishing 46

3.2.3 Stolen Credentials 47

3.2.4 Web Applications 47

3.2.5 Point of Sale Intrusions 48

3.2.6 Payment Card Skimmers 49

3.2.7 Insider and Privilege Misuse 49

3.2.8 Physical Theft and Loss 49

3.2.9 Denial of Service Attacks 49

3.3 Overview of Malware 49

3.3.1 Malware Propagation 50

3.3.2 Malware Payload 51

3.4 Securing Cyber Systems 52

3.5 Securing Data 54

3.6 Cyber Security Attack Recovery 56

Summary 57

Key Terms 57

Assess Your Understanding 59

References 59

4 Social Media and Emergency Management 61

Introduction 62

4.1 Situational Awareness, Emergency Communications, and the Public Realm 62

4.2 What Is Social Media? 64

4.2.1 The Birth of Web 2.0 64

4.3 Types of Social Media Used in Disasters 65

4.4 Mass Alert Systems 67

4.5 Mass Media and Social Media Use in Virginia Tech Shooting  Response 67

4.5.1 Information Communication Technologies 69

4.6 What Is a Disaster? 69

4.7 Usage Patterns of Social Media Over Time 70

4.8 Social Media’s Growth and the Role of Traditional Sources 73

4.8.1 Role of Social Media in Disasters 74

4.8.2 Use of Social Media by People Affected by Crisis 74

4.9 Use of Social Media for Preparedness and Planning 74

4.9.1 Expansion of Communication Networks 75

4.10 Use of Social Media Before and During Mass Emergencies 75

4.10.1 Emergency Managers’ Use of Social Media in Response 76

4.10.2 Emergency Managers in Listening Mode 76

4.10.3 Managing the Use of Twitter or Facebook 76

4.10.4 Information‐Vetting Dynamics 76

4.10.5 Building Resiliency 77

4.10.6 Changing Nature of Social Behaviors 78

4.11 Issues Arising from the Use of Social Media by Emergency Managers During Events 81

4.11.1 Changing Role of PIO 81

4.12 Using Social Media to Establish Information on Damages and Recovery 81

4.12.1 Evolving Networks 82

4.12.2 Expanding Information Relevant to a Specific Event 82

4.12.3 Expanded Communication Benefits 83

4.13 The Advantages and Fall backs of Geo targeting 83

4.14 Social Media Companies’ Contribution to Emergency Response 84

4.14.1 Information Dissemination and Feedback 84

4.15 Concerns About and Limitations of Social Media Usage in Disasters 85

4.15.1 Misleading Information 85

4.15.2 Dependable Networks 85

4.15.3 Reliable Information Sources 86

4.15.4 Communicating with a Broad Audience 86

4.15.5 Managing a Large Quantity of Data 86

4.16 The Future of Social Media in Disasters 87

4.16.1 New Role for the Public in a Crisis 87

4.16.2 Dynamic Nature of Social Media 87

4.16.3 Social Media as a Valuable Resource 88

4.16.4 Self‐correcting Nature of Social Media 88

4.16.5 Accuracy of Information 88

4.16.6 Threats of Technology Failure 88

4.16.7 Case Example: Crowd funding and Remote Emergency Response: 2010 Haitian Earthquake as a Case Study 89

4.16.8 Examining the Use of Social Media in Haiti 90

4.17 Looking Forward 91

Key Terms 91

Assess Your Understanding 93

References 94

5 Geospatial Technologies and Emergency Management 97

Introduction 98

5.1 Geospatial Technologies and Emergency Management  99

5.1.1 Elements of GT 99

5.1.2 Use of GT to Answer Questions in Emergency Management  100

5.2 GT Across the Human–Hazard Interface 100

5.2.1 Our People 100

5.2.2 Limitations of Census Data 101

5.3 Our Resources 104

5.3.1 Understanding Critical Infrastructure 104

5.3.2 Understanding Critical Social Infrastructure  105

5.3.3 Resources of Social Importance 106

5.3.4 Spatial Video Geo narrative 107

5.4 Understanding Our Hazards 108

5.4.1 Natural Hazards Casualties in the United States  108

5.4.2 Hazard Zonation 109

5.4.3 Our Human–Hazard Interface 110

5.4.4 Understanding Overlays and Buffers 110

5.5 Dissemination and Hazard Communication 112

5.5.1 Contribution of Google Earth 113

5.6 Summary 113

5.7 Conclusions 115

Key Terms 116

Assess Your Understanding 117

References 117

6 Direct and Remote Sensing Systems: Describing and Detecting Hazards 120

Introduction 121

6.1 Data Collection 121

6.2 Weather Stations 124

6.2.1 Weather Station Data 125

6.2.2 Weather Station Networks 126

6.2.3 Geospatial Multi‐agency Coordination Wildfire Application 127

6.3 Water Data Sensors 128

6.3.1 Flood Warning Systems for Local Communities 128

6.3.2 Rain and Stream Gauges 130

6.3.3 How a USGS Stream Gauge Works 130

6.3.4 The USGS Stream Gaging Program 131

6.3.5 Using USGS Stream‐flow Data for Emergency Management 131

6.4 Air Sensors 132

6.4.1 Outdoor Air Quality Sensors 132

6.4.2 Chemical Sensors 133

6.5 Evaluating the Technology133

6.6 Remote Sensing 134

6.6.1 An Overview of Remote Sensing 135

6.6.2 Optical Satellite Remote Sensing 136

6.6.3 Satellite Remote Sensing of Weather 145

6.6.4 Radar Imaging 147

6.6.5 Manned and Unmanned Airborne Remote Sensing  147

6.7 Using and Assessing Data 150

6.8 Trends in Remote and Direct Sensing Technology  151

Summary 151

Key Terms 152

Online Resources 154

Assess Your Understanding 155

References155

7 Emergency Management Decision Support Systems: Using Data to Manage Disasters 157

Introduction 158

7.1 Emergency Management Information Systems and Networks 158

7.2 Evaluating Information Systems 161

7.2.1 Quality 161

7.2.2 Timeliness 161

7.2.3 Completeness 162

7.2.4 Performance 162

7.3 Federal, State, and Local Information Systems 163

7.3.1 Management Information Systems 163

7.3.2 The National Emergency Management Information System  163

7.3.3 Computer Aided Management of Emergency Operations 164

7.4 Using Data 165

7.4.1 Databases 166

7.4.2 Data Dictionary (Meta‐data) 166

7.5 Evaluating Databases 168

7.6 Using Emergency Management Databases 169

7.6.1 HAZUS‐MH Datasets 171

7.7 Management Roles in Decision Support Systems 171

7.8 Obtaining Data from Public Federal Data Sources 172

7.9 The Future of Decision Support Systems: The Intelligent Community   173

Summary 174

Key Terms 174

Assess Your Understanding 174

References 175

8 Warning Systems: Alerting the Public to Danger 177

Introduction 178

8.1 Warning Systems 178

8.1.1 Key Information 178

8.1.2 Key Components of Warning Systems 178

8.1.3 Warning Subsystems 179

8.2 Detection and Management 180

8.2.1 Case Study: Detection at aLocal Level 180

8.2.2 National Weather Service 182

8.2.3 Case Study: Detection at a National Level 184

8.3 Issuing Warnings 185

8.3.1 Technical Issues 185

8.3.2 Organizational Issues 185

8.3.3 Societal Issues 187

8.4 Types of Warning Systems 187

8.4.1 Sirens 188

8.4.2 The Emergency Alert System 188

8.4.3 Phone Alert Systems: Reverse 911 190

8.4.4 Disadvantages of Phone Notification Systems 190

8.4.5 Communicating with Those with Disabilities 190

8.4.6 Barriers to Warnings 191

8.4.7 Case Example: A Nuclear Disaster 191

8.5 Response 193

8.5.1 Case Study: Response to Hurricane Katrina 194

Summary 194

Key Terms 195

AssessYourUnderstanding195

References195

9 Hazards Analysis and Modeling: Predicting the Impact of Disasters 197

Introduction 198

9.1 Modeling and Emergency Management 198

9.1.1 The Technology behind Modeling 199

9.1.2 Mathematical Models 201

9.1.3 Understanding the Results of Modeling 202

9.1.4 Fast Exchange of Model Results to Users 203

9.2 Using a Hurricane Model (SLOSH) 203

9.2.1 SLOSH for Planning, Response, Recovery, and Mitigation 205

9.2.2 SLOSH Display Program 206

9.2.3 Strengths of SLOSH2 06

9.2.4 Limitations of SLOSH 206

9.2.5 Saffir–Simps on Scale 208

9.3 Using the ALOHA Chemical Dispersion Model 209

9.3.1 How ALOHA Works 210

9.3.2 Model Outputs 210

9.3.3 Threat Zone Estimates and Threat at a Point 210

9.3.4 Strengths of ALOHA 211

9.3.5 Limitations of ALOHA212

9.3.6 Terms Used in ALOHA 213

9.3.7 Concentration Patchiness, Particularly Near the Source215

9.4 Hazards United States—Multi Hazard Model 216

9.4.1 Strengths of HAZUS‐MH 219

9.4.2 Limitations of HAZUS‐MH 220

9.4.3 Multi risk Assessment 220

9.5 Evacuation Modeling 220

9.6 Centralized Hazard Modeling Initiatives 221

9.6.1 Fire Potential Modeling 221

9.6.2 Drought Modeling 223

9.7 Evaluating Hazard Models 224

Summary 225

Key Terms 225

Assess Your Understanding 226

References 226

10 Operational Problems and Technology: Making Technology Work for You 228

Introduction 229

10.1 Barriers in Implementing Technology in Emergency Management 229

10.2 The Role of the Emergency Manager in Using Technology 231

10.2.1 Managing an Organization 233

10.3 Using Technology to Overcome Organizational Boundaries 234

10.4 Pitfalls of Technology 235

10.4.1 Reliance on Technology 235

10.4.2 Obsolescence 236

10.4.3 Information Overload 236

10.4.4 Data Integration 236

10.4.5 Real‐Time Response Data 237

10.4.6 Security 237

10.5 Managing the Technology 237

Summary 240

Key Terms 240

Assess Your Understanding 240

References 240

11 Trends in Technology: New Tools for Challenges to Emergency Management 242

Introduction 243

11.1 Using Technology for Information Exchange 243

11.1.1 Emergency Preparedness Information Exchange 244

11.1.2 Television and Internet Information 244

11.1.3 Digital Libraries and Publications 244

11.2 Distance Learning 246

11.2.1 Using Remote Technology 246

11.2.2 Disaster Situational Maps 247

11.2.3 Federal Agency Situational Mapping Programs249

11.2.4 Innovative Visualization Efforts 252

11.2.5 Updating Outputs 252

11.3 Managing the Technology 253

11.3.1 Organizational Coordination and Collaboration Strategies 254

11.3.2 Technology Life Cycles 254

11.3.3 Engaging Stakeholders 255

11.3.4 Information Exchange 255

11.3.5 Dealing with Information Overload 256

Summary 257

Key Terms 257

Assess Your Understanding 257

References 257

Figure Credits 260

Index 261

John C. Pine, Ed.D, is a professor in the Department of Geography and Planning at Appalachian State University, and formerly Director of the Research Institute for Environment, Energy & Economics at Appalachian. He joined the Appalachian faculty in 2009 after serving thirty years at Louisiana State University in Baton Rouge where he directed a graduate and undergraduate Disaster Science and Management Program and served as a Professor with the Department of Environmental Science in the School of the Coast and Environment.