SlideShare uma empresa Scribd logo
1 de 17
Dependability of IT Systems in
Municipal Emergency Management
         Kim Weyns, Martin Höst
Contents



     •   Background
     •   Research methodology
     •   Findings
         Future work: IDEM3
     •



Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
IT Systems in Municipal Emergency
Management

In the aftermath of a crisis (natural disaster,
blackout, terrorist attack, …) governmental
actors have an important role
           •      Crisis relief
           •      Information
           •      Sustaining normal operations
       => Dependence on IT systems



Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Dependability


If we are critically dependent on IT systems,
then the systems need to be trustworthy.

If we do not know whether the systems are
sufficiently dependable, we should not become
too dependent on them.




Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Dependability


We need two kinds of information
• How dependable is the system?
• How critically do we need the system?

       Hard to measure
       Changes over time
       Emergency situations ≠ normal situations


Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Example:

• Storm Gudrun, January 2005
• Non-functioning communication
  system delayed repairs and relief
  efforts
• GSM system
   – more critical than expected
   – more vulnerable than
      expected


                                                                Image: Banverket, storm damage after Gudrun


   Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Case study

•   What are municipalities doing today?
•   What methods do they use?
•   What do they have problems with?
•   Where is the most room for improvement?
                  – Testing?
                  – Defining requirements for their system?
                  – Risk analysis?
             Not much research available


Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Interviews


     Explorative case study:

     • Open interviews at two municipalities
     • With emergency managers and IT
       personnel
     • Collecting documents


Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Interview Analysis


Transcribed and analysed by categories:
• Organisation
• Risk analysis
• Communication
• Service level agreements (SLA)
• Practical examples and problems



Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Findings
  • System Responsibility
     – Specific systems
     – Common systems
  • Internal Communication
     – Lack of understanding
  • Service Level Agreements
     – No measurements
     – No guarantees


Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Findings (2)

   • Emergency Management
      – Planning, scenario analysis, …
        (SEMA)



   • Practical IT work
      – Maintenance, technical details, …



Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Common Problems

   •   Border responsibilities
   •   Lack of good tools and methods
   •   Lack of cooperation
   •   Lack of technical knowledge
   •   Fast evolution




Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Conclusions


• Better understanding of current situation
• Main problems identified:
   – Cooperation
   – Border responsibilities
• Most logical solution: through better
  cooperation




Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Future work : Maturity Model


IDEM3 (IT Dependability in Emergency Management
    Maturity Model)
•   Based on case study
•   Focus on cooperation needed to include information
    about the dependability of IT systems in emergency
    management and vice versa
•   Adapted based on feedback from experts and
    practitioners
•   Currently being evaluated in practical setting


Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Maturity Model (2)




Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Questions?




Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009

Mais conteúdo relacionado

Semelhante a Dependability of IT Systems in Municipal Emergency Management

2013 06 04_5228_case_manager_overview__micha
2013 06 04_5228_case_manager_overview__micha2013 06 04_5228_case_manager_overview__micha
2013 06 04_5228_case_manager_overview__michaKatleen Aems
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
8 Ways Utility Networks Can Meet Data Demands
8 Ways Utility Networks Can Meet Data Demands8 Ways Utility Networks Can Meet Data Demands
8 Ways Utility Networks Can Meet Data DemandsSafe Software
 
Physical Climate Risk Analytics
Physical Climate Risk AnalyticsPhysical Climate Risk Analytics
Physical Climate Risk AnalyticsSharanjit Paddam
 
Modelling and Simulation of the response process for an emergency at the Grea...
Modelling and Simulation of the response process for an emergency at the Grea...Modelling and Simulation of the response process for an emergency at the Grea...
Modelling and Simulation of the response process for an emergency at the Grea...InfinIT - Innovationsnetværket for it
 
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereUsing Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereSafe Software
 
Software Eng. for Critical Systems - Traffic Controller
Software Eng. for Critical Systems - Traffic ControllerSoftware Eng. for Critical Systems - Traffic Controller
Software Eng. for Critical Systems - Traffic ControllerZiya Ilkem Erogul
 
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...EnergyTech2015
 
Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...
Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...
Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...Praxitelis Nikolaos Kouroupetroglou
 
E-Waste - How to face this issue with the Technology itself
E-Waste - How to face this issue with the Technology itselfE-Waste - How to face this issue with the Technology itself
E-Waste - How to face this issue with the Technology itselfBruno Croci
 
Risk management seminar -en
Risk management   seminar -enRisk management   seminar -en
Risk management seminar -enRolf Häsänen
 
Dylan Truong Presentation rev
Dylan Truong Presentation revDylan Truong Presentation rev
Dylan Truong Presentation revQuang Dung Truong
 
Introduction Centillien
Introduction CentillienIntroduction Centillien
Introduction CentillienGerard Kanters
 
Making Health IT A Team Player - VanQ 2009
Making Health IT A Team Player - VanQ 2009Making Health IT A Team Player - VanQ 2009
Making Health IT A Team Player - VanQ 2009Ken Wong
 
Why Computer Studies
Why Computer StudiesWhy Computer Studies
Why Computer StudiesSaimaRafiq
 
FORTRESS Cascading Effects presentation -Emergency Services Conference 2014
FORTRESS Cascading Effects presentation -Emergency Services Conference 2014FORTRESS Cascading Effects presentation -Emergency Services Conference 2014
FORTRESS Cascading Effects presentation -Emergency Services Conference 2014Trilateral Research
 

Semelhante a Dependability of IT Systems in Municipal Emergency Management (20)

2013 06 04_5228_case_manager_overview__micha
2013 06 04_5228_case_manager_overview__micha2013 06 04_5228_case_manager_overview__micha
2013 06 04_5228_case_manager_overview__micha
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
8 Ways Utility Networks Can Meet Data Demands
8 Ways Utility Networks Can Meet Data Demands8 Ways Utility Networks Can Meet Data Demands
8 Ways Utility Networks Can Meet Data Demands
 
Physical Climate Risk Analytics
Physical Climate Risk AnalyticsPhysical Climate Risk Analytics
Physical Climate Risk Analytics
 
Modelling and Simulation of the response process for an emergency at the Grea...
Modelling and Simulation of the response process for an emergency at the Grea...Modelling and Simulation of the response process for an emergency at the Grea...
Modelling and Simulation of the response process for an emergency at the Grea...
 
06.09.26.Handout
06.09.26.Handout06.09.26.Handout
06.09.26.Handout
 
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereUsing Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
 
Worldbank fmis
Worldbank fmisWorldbank fmis
Worldbank fmis
 
Software Eng. for Critical Systems - Traffic Controller
Software Eng. for Critical Systems - Traffic ControllerSoftware Eng. for Critical Systems - Traffic Controller
Software Eng. for Critical Systems - Traffic Controller
 
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
 
Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...
Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...
Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...
 
Crisis Management
Crisis ManagementCrisis Management
Crisis Management
 
E-Waste - How to face this issue with the Technology itself
E-Waste - How to face this issue with the Technology itselfE-Waste - How to face this issue with the Technology itself
E-Waste - How to face this issue with the Technology itself
 
Risk management seminar -en
Risk management   seminar -enRisk management   seminar -en
Risk management seminar -en
 
Dylan Truong Presentation rev
Dylan Truong Presentation revDylan Truong Presentation rev
Dylan Truong Presentation rev
 
Introduction Centillien
Introduction CentillienIntroduction Centillien
Introduction Centillien
 
Making Health IT A Team Player - VanQ 2009
Making Health IT A Team Player - VanQ 2009Making Health IT A Team Player - VanQ 2009
Making Health IT A Team Player - VanQ 2009
 
Why Computer Studies
Why Computer StudiesWhy Computer Studies
Why Computer Studies
 
Fraud detection by Denisa Banulescu-Radu
Fraud detection by Denisa Banulescu-Radu Fraud detection by Denisa Banulescu-Radu
Fraud detection by Denisa Banulescu-Radu
 
FORTRESS Cascading Effects presentation -Emergency Services Conference 2014
FORTRESS Cascading Effects presentation -Emergency Services Conference 2014FORTRESS Cascading Effects presentation -Emergency Services Conference 2014
FORTRESS Cascading Effects presentation -Emergency Services Conference 2014
 

Último

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity PlanDatabarracks
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 

Último (20)

Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
How to write a Business Continuity Plan
How to write a Business Continuity PlanHow to write a Business Continuity Plan
How to write a Business Continuity Plan
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 

Dependability of IT Systems in Municipal Emergency Management

  • 1. Dependability of IT Systems in Municipal Emergency Management Kim Weyns, Martin Höst
  • 2. Contents • Background • Research methodology • Findings Future work: IDEM3 • Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 3. IT Systems in Municipal Emergency Management In the aftermath of a crisis (natural disaster, blackout, terrorist attack, …) governmental actors have an important role • Crisis relief • Information • Sustaining normal operations => Dependence on IT systems Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 4. Dependability If we are critically dependent on IT systems, then the systems need to be trustworthy. If we do not know whether the systems are sufficiently dependable, we should not become too dependent on them. Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 5. Dependability We need two kinds of information • How dependable is the system? • How critically do we need the system?  Hard to measure  Changes over time  Emergency situations ≠ normal situations Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 6. Example: • Storm Gudrun, January 2005 • Non-functioning communication system delayed repairs and relief efforts • GSM system – more critical than expected – more vulnerable than expected Image: Banverket, storm damage after Gudrun Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 7. Case study • What are municipalities doing today? • What methods do they use? • What do they have problems with? • Where is the most room for improvement? – Testing? – Defining requirements for their system? – Risk analysis?  Not much research available Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 8. Interviews Explorative case study: • Open interviews at two municipalities • With emergency managers and IT personnel • Collecting documents Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 9. Interview Analysis Transcribed and analysed by categories: • Organisation • Risk analysis • Communication • Service level agreements (SLA) • Practical examples and problems Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 10. Findings • System Responsibility – Specific systems – Common systems • Internal Communication – Lack of understanding • Service Level Agreements – No measurements – No guarantees Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 11. Findings (2) • Emergency Management – Planning, scenario analysis, … (SEMA) • Practical IT work – Maintenance, technical details, … Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 12. Common Problems • Border responsibilities • Lack of good tools and methods • Lack of cooperation • Lack of technical knowledge • Fast evolution Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 13. Conclusions • Better understanding of current situation • Main problems identified: – Cooperation – Border responsibilities • Most logical solution: through better cooperation Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 14. Future work : Maturity Model IDEM3 (IT Dependability in Emergency Management Maturity Model) • Based on case study • Focus on cooperation needed to include information about the dependability of IT systems in emergency management and vice versa • Adapted based on feedback from experts and practitioners • Currently being evaluated in practical setting Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 15. Maturity Model (2) Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 16. Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 17. Questions? Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009