Startseite Cybersecurity and Emergency Management: Encryption and the Inability to Communicate
Artikel
Lizenziert
Nicht lizenziert Erfordert eine Authentifizierung

Cybersecurity and Emergency Management: Encryption and the Inability to Communicate

  • Fred Bolton EMAIL logo
Veröffentlicht/Copyright: 13. April 2013

Abstract

Differences between the emergency management and cybersecurity professions create a barrier to effective communication based on technical jargon and specialized language. This article discusses the nature of professions and the need for common terms in order to improve the ability of organizations to respond to cyber emergencies. Recommendations are provided and include action by the Emergency Management Institute, professional organizations, and improvements in sharing information.


Corresponding author: Fred Bolton, Averett University – GPS, 4880 Cox Road Glen Allen, VA 23060, USA, Tel.: +8043074266, e-mail:

  1. 1

    The National Response Framework (NRF), National Incident Management System (NIMS), and Incident Command System (ICS) are integral components of the emergency response and consequence management process. This system, formalized by DHS, is the foundation of the emergency management profession.

  2. 2

    Confidentiality, integrity, and availability are components of information assurance and IT security. An intrusion detection system is an essential element of network defense allowing the identification of potential unauthorized intrusions.

  3. 3

    Many activities begin with the development and articulation of a “lexicon” to ensure that participants are using the same terms and acronyms with a common meaning.

References

Obama, Barrack (2009) Classified National Security Information (Executive Order 13256). Available at: http://www.whitehouse.gov/the-press-office/executive-order-classified-national-security-information. Accessed on March 31, 2013.Suche in Google Scholar

Orden, Alex (1967) “The Emergence of a Profession,” Communications of the ACM, 10(3):145–147.10.1145/363162.363177Suche in Google Scholar

Patton, Carl V. and David Sawicki (1993) Basic Methods of Policy Analysis and Planning. 2nd ed. Englewood Cliffs, N.J.: Prentice Hall.Suche in Google Scholar

Power, Richard and Christopher Burgess (2006) “Industrial Espionage: Secrets Stolen, Fortunes Lost,” CSO Online. Available at: http://www.csoonline.com/article/220889/industrial-espionage-secrets-stolen-fortunes-lost. Accessed on March 31, 2013.Suche in Google Scholar

Rothman, Robert A. and Robert Perrucci (1971) “Vulnerability to Knowledge Obsolescence among Professionals,” Sociology Quarterly, 12(2):147–158.10.1111/j.1533-8525.1971.tb01347.xSuche in Google Scholar

Squires, Geoffrey (2005) “Art, Science and the Professions,” Studies in Higher Education, 30(2):127–136.10.1080/03075070500043077Suche in Google Scholar

US Department of Homeland Security (2008a) National Incident Management System. Available at: http://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf. Accessed on March 31, 2013.Suche in Google Scholar

US Department of Homeland Security (2008b) National Response Framework. Available at: http://www.fema.gov/pdf/emergency/nrf/nrf-core.pdf. Accessed on March 31, 2013.Suche in Google Scholar

US Department of Homeland Security (2009) National Infrastructure Protection Plan. Available at: http://www.dhs.gov/xlibrary/assets/NIPP_Plan.pdf. Accessed on March 31, 2013.Suche in Google Scholar

US Department of the Army (2011) Commander and Staff Officer Guide (ATTP 5-0.1). Available at: http://armypubs.army.mil/doctrine/DR_pubs/dr_a/pdf/attp5_0x1.pdf. Accessed on March 31, 2013.Suche in Google Scholar

Woods, D.D. and Hollnagel, E. (2005) Joint Cognitive Systems: Foundations of Cognitive Systems Engineering. Boca Raton, FL: CRC Press.10.1201/9781420038194Suche in Google Scholar

Published Online: 2013-04-13
Published in Print: 2013-01-01

©2013 by Walter de Gruyter Berlin Boston

Artikel in diesem Heft

  1. Masthead
  2. Masthead
  3. Research Articles
  4. Integrating Federal Approaches to Post-Cyber Incident Mitigation
  5. Cybersecurity and US Legislative Efforts to address Cybercrime
  6. The Military’s Response to Domestic CBRNE Incidents
  7. Building Public Health Preparedness and Food and Agriculture Defense Capabilities Using Whole Community and One Health Concepts
  8. Situated Response and Learning of Distributed Bushfire Coordinating Teams
  9. A Critical Examination of the Assumptions Regarding Centralized Coordination in Large-Scale Emergency Situations
  10. “Of Gods and Men”: Selected Print Media Coverage of Natural Disasters and Industrial Failures in Three Westminster Countries
  11. Spontaneous Planning after the San Bruno Gas Pipeline Explosion: A Case Study of Anticipation and Improvisation during Response and Recovery Operations
  12. Understanding Incident Response to Unplanned Releases at Chemical Facilities
  13. A Study on the Responsiveness of Local Health Departments that Use Facebook
  14. Texas takes on the TSA: The Constitutional Fight over Airport Security
  15. The Gulf Oil Spill and Economic Impacts: Extending the National Interstate Economic Model (NIEMO) to Account for Induced Impacts
  16. The Economic Value of Water: Providing Confidence and Context to FEMA’s Methodology
  17. Diffusion of Emergency Information during a Crisis within a University
  18. Resilience Building Policies and their Influence in Crisis Prevention, Absorption and Recovery
  19. Communication and News
  20. A Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency Responders
  21. Regional Public-Private Interoperable Communications for Catastrophic Events Using a Cloud Computing Based Portal
  22. It’s Never Too Late: Restructuring the Department of Homeland Security’s Regional Framework
  23. Finding the New High Ground in Cyber War: Malware as an Instrument of War
  24. Opinions
  25. Cybersecurity and Emergency Management: Encryption and the Inability to Communicate
  26. Assessing the Chemical Facility Anti-Terrorism Standards after 5 Years: Achievements, Challenges, and Risks Ahead
  27. Book Review
  28. Emergency Management: The American Experience 1900–2010 (2nd Edition)
Heruntergeladen am 23.9.2025 von https://www.degruyterbrill.com/document/doi/10.1515/jhsem-2012-0038/html
Button zum nach oben scrollen