Contents
- Masthead
-
Publicly AvailableMastheadOctober 19, 2013
- Research Articles
-
Requires Authentication UnlicensedIntegrating Federal Approaches to Post-Cyber Incident MitigationLicensedJuly 31, 2013
-
Requires Authentication UnlicensedCybersecurity and US Legislative Efforts to address CybercrimeLicensedApril 13, 2013
-
Requires Authentication UnlicensedThe Military’s Response to Domestic CBRNE IncidentsLicensedJuly 13, 2013
-
Requires Authentication UnlicensedBuilding Public Health Preparedness and Food and Agriculture Defense Capabilities Using Whole Community and One Health ConceptsLicensedMay 7, 2013
-
Requires Authentication UnlicensedSituated Response and Learning of Distributed Bushfire Coordinating TeamsLicensedApril 13, 2013
-
Requires Authentication UnlicensedA Critical Examination of the Assumptions Regarding Centralized Coordination in Large-Scale Emergency SituationsLicensedApril 13, 2013
-
Requires Authentication Unlicensed“Of Gods and Men”: Selected Print Media Coverage of Natural Disasters and Industrial Failures in Three Westminster CountriesLicensedApril 13, 2013
-
Requires Authentication UnlicensedSpontaneous Planning after the San Bruno Gas Pipeline Explosion: A Case Study of Anticipation and Improvisation during Response and Recovery OperationsLicensedApril 13, 2013
-
Requires Authentication UnlicensedUnderstanding Incident Response to Unplanned Releases at Chemical FacilitiesLicensedJuly 13, 2013
-
Requires Authentication UnlicensedA Study on the Responsiveness of Local Health Departments that Use FacebookLicensedJuly 13, 2013
-
Requires Authentication UnlicensedTexas takes on the TSA: The Constitutional Fight over Airport SecurityLicensedApril 19, 2013
-
Requires Authentication UnlicensedThe Gulf Oil Spill and Economic Impacts: Extending the National Interstate Economic Model (NIEMO) to Account for Induced ImpactsLicensedApril 13, 2013
-
Requires Authentication UnlicensedThe Economic Value of Water: Providing Confidence and Context to FEMA’s MethodologyLicensedApril 13, 2013
-
Requires Authentication UnlicensedDiffusion of Emergency Information during a Crisis within a UniversityLicensedApril 13, 2013
-
Requires Authentication UnlicensedResilience Building Policies and their Influence in Crisis Prevention, Absorption and RecoveryLicensedJuly 31, 2013
- Communication and News
-
Requires Authentication UnlicensedA Practitioner-Researcher Partnership to Develop and Deliver Operational Value of Threat, Risk and Vulnerability Assessment Training to meet the Requirements of Emergency RespondersLicensedJuly 13, 2013
-
Requires Authentication UnlicensedRegional Public-Private Interoperable Communications for Catastrophic Events Using a Cloud Computing Based PortalLicensedApril 19, 2013
-
Requires Authentication UnlicensedIt’s Never Too Late: Restructuring the Department of Homeland Security’s Regional FrameworkLicensedApril 13, 2013
-
Requires Authentication UnlicensedFinding the New High Ground in Cyber War: Malware as an Instrument of WarLicensedApril 13, 2013
- Opinions
-
Requires Authentication UnlicensedCybersecurity and Emergency Management: Encryption and the Inability to CommunicateLicensedApril 13, 2013
-
Requires Authentication UnlicensedAssessing the Chemical Facility Anti-Terrorism Standards after 5 Years: Achievements, Challenges, and Risks AheadLicensedJuly 13, 2013
- Book Review
-
Requires Authentication UnlicensedEmergency Management: The American Experience 1900–2010 (2nd Edition)LicensedApril 13, 2013