Escolar Documentos
Profissional Documentos
Cultura Documentos
Page 31
Applying business intelligence to emergency management
Page 32
Schlegelmilch and Albanese
Figure 1
Transforming data
D e c is io n -M a k in g
to knowledge
S ynth es izin g
A n a lyzin g
S u m m a rizin g
O rg an izin g
C ollecting
Adapted from Breiter, A. and Light, D. (2006) ‘Data for school improvement: Factors for designing
effective information systems to support decision making in schools’, Educational Technology &
Society, Vol. 9, No. 3, pp. 203-217.
cal analysis and inventory and distribution constitute potential data sources. These
analysis, etc), they are transformed into data, too, must be collected and processed
‘information’. The information is further into a usable structure that allows for com
analysed and interpreted to drive decision parison and analysis before it can be
making processes. At this stage, the infor manipulated to support managerial deci
mation is referred to as ‘knowledge’ or sion making.
‘usable information’. The transition from Arguably, data warehouses form the
raw data to knowledge generally requires foundation of BI. Data warehouses are data
human analysis and subsequent application repositories designed to support an organi
to the organisation’s business process(es).3 sation’s decision-making processes. A data
BI incorporates various decision sup warehouse serves as one unified data model
port systems (DSS),4 which are classified in which data from various and varied
into six broad categories: (1) model sources are compiled and organised in a
driven, (2) data driven, (3) communica uniform manner. While well-designed data
tions driven, (4) document driven, (5) warehouses offer the possibility to store
knowledge driven and (6) web-based.5 vast amounts of structured data, the data
Regardless o f the DSS used in BI, all alone do not immediately translate to
require data. The data are extracted from knowledge. Indeed, knowledge for
multiple sources, commonly using systems enhanced decision-making processes is
o f integrated applications to manage the created once the data have been inter
business functions. For example, enterprise preted, typically after they have been sub
resource planning systems and customer jected to data mining. The goal o f data
relationship management systems are two mining is to discover potentially useful pat
such systems employed to extract, convert terns from data. Two common data-mining
and integrate enterprise-specific data. techniques for finding hidden patterns in
External sources such as websites, news data are classification (supervised learning)
articles and industry analysis reports also and clustering (unsupervised learning)
Page 33
Applying business intelligence to emergency management
Figure 2 ESI
capabilities and Organizational Inform ation
Bl Capabilites Insight Creation Presentation
Mem ory M anagem ent
tools.
- Data Warehousing
- Enterprise Resource - Online Analytical
Planning - Text Mining tools Processing (OLAP) Tools
- Business Analytics Tools
- Knowledge Repositories - Web Mining tools - Visualization tools
Bl Tools and - Data Mining
- Digital Content - Environmental Scanning - Digital Dashboards
Technologies - Real-time Decision Support
Management tools - Radio Frequency - Scorecarding tools
- Document Management Identification - Business Process
tools Management Tools
analyses, using naive Bayes classifier or k- and begin to make sense of the vast quan
nearest neighbour and k-means, hierarchi tities of dynamic information within and
cal clustering or density-based clustering across the enterprise.
algorithms, respectively. ’ Other data- Mega vendors, including Oracle, SAP,
mining approaches are sequence analysis, Microsoft and IBM, offer comprehensive
association, regression and visualisation.7 solutions for nearly all Bl capabilities.
The discovery of hidden patterns by Companies such as SAS, TIBCO and
mining data stored in the organisations Actuate, whose products afford fewer
data warehouse allows for the creation of wide-ranging features than those that are
insight to guide the enterprise and business sold by mega vendors, still offer robust
operations and uncover valuable customer applications for Bl purposes. Recently, the
information that can potentially lead to IT industry, which produces virtually all
competitive advantages.K,y Bl applications, has undergone significant
Various tools and technologies may be consolidation. Larger vendors, particularly
utilised to facilitate capabilities associated the mega vendors, have acquired many of
with Bl, namely: (1) organisational the small and mid-size vendors in an
memory, (2) information management, (3) effort to expand Bl divisions and capture
insight creation and (4) presentation.1 larger shares of the Bl market (eg
Examples of the tools that support each of Hyperion, Business Objects and Cognos
these capabilities are shown in Figure 2. were acquired by Oracle, SAP and IBM
The creation of a Bl system requires respectively).1
that companies are adept with information
technologies tools. Any company consid
ering implementing Bl must also possess a EMERGENCY MANAGEMENT
thorough understanding of its information AGENCIES: MISSION AND
needs for decision support. Assuming that STRUCTURES
these conditions are met, an organisation For private companies, government and
must then define the scope of the Bl other public sector agencies, emergency
system development and overall strategy, management has one of three goals. At the
identify the sources of data and then select organisational level, companies conduct
the appropriate Bl tools to manipulate the internal emergency preparedness and busi
data. At this point, the organisation can ness continuity activities to sustain essen
design and implement the Bl system(s) tial operations in an emergency.
Page 34
Schlegelmilch and Albanese
Figure 3 Flow o f
J o In l F ie ld O t t l r e requests and
Federal A g tm le a and D epgrtm w ite' assistance during
large-scale
SSS* “ * ^ « / / incidents
inlrjiatRle Mutual AW
In te rs ta te M utual Aid
fE M A C y P rlw a te S e c to rf
NGO A s s is ta n c e
L o c a H o -L o c a l
M utual A id /
P riu s ls S e c to r/
WOO Assistance
C o o rd in atio n
C om m and
Source: US Department of Homeland Security and Federal Emergency Management Agency (2008)
‘National Incident Management Systems’ available at:
https://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf (accessed 26th March, 2014).
E m ergency m anagem ent for public agen response and recovery activities b etw een
cies has th e same goal; how ever, readiness public and private sector agencies. From
activities em phasise th e p o ten tial for th e perspective o f developing a BI system
responding to unanticipated needs o f a to enhance jo in t decision m aking (the
disaster-stricken com m unity. For instance, focus o f this paper), this goal is perhaps the
in response to a h u rricane clean-up, health m ost challenging.
agencies m ust m aintain essential activities E m ergency m anagem ent organisations
(eg disease exposure follow -up), tem porar in th e U SA align preparedness and
ily expand and enhance existing functions response program m es w ith th e N ational
(eg in sp ect restaurants after p o w e r is In c id e n t M an ag em en t System (N IM S)
restored to allow reopening) and, p o te n and the N ational R esponse Fram ew ork
tially, take o n entirely n ew operations typ (N R F ). N IM S provides guidance and
ically assigned to o th e r agencies that, standards fo r in cid en t m anagem ent,
because o f circum stances, are unavailable w hereas the N R F provides th e national-
to respond (eg wellness visits to residents level architecture and policy for incident
in h ig h-rise facilities, in the absence o f m an ag em en t . 12,13 It is im p o rtan t to note
electrical pow er). It should b e n o te d that th at these guidance docum ents are n o t
m any com panies also enhance th eir serv operational resource allocation plans, play-
ices in response to w idespread disasters . 11 books o r procedure docum ents intended
A th ird goal o f em ergency m anagem ent to predefine response activities fo r any one
involves th e co o rd in ation o f the disaster type o f em ergency incident.
Page 35
Applying business intelligence to emergency management
ttin g
— \ Cycle T rain
o f suppliers, channel p artn ers and o th e r
resource an d sales relationships.
E m erg e n cy m an ag e m en t agencies also
have interactions w ith suppliers (eg cots
\
E x e rc is in g
/
E q u ip p in g
and meals for shelters), su b -co n tracto rs
(eg tree rem oval services) and cu sto m er
facing p artn ers (eg A m erican R e d Cross
op erated em ergency shelters) com parable
Source: United States, 2013 18 to those o f a p aren t com pany to its off
site business units.
C onceptually, the em ergency m anage
m en t process parallels that o f the business
W h o le -o f-c o m m u n ity em ergency developm ent cycle. F or instance, b o th th e
response to a disaster involves a coalition em ergency m an ag em en t and business
o f organisations that share overlapping dev elo p m en t processes follow iterative
goals. R esponse organisations include var cycles o f activities th at include planning,
ious agencies from local, state and federal organising, training, equipping, exercising,
governm ents that possess diverse capabili evaluating and taking corrective action
ties for responding to em ergencies, as well (see Figure 4 ).15 In this respect, b o th
as private sector orgam sations. In spite ot processes m ake allowances for continuous
co m m o n objectives, em ergency response quality im provem ent.
m andates for private and public response It is reasonable to consider em ergency
organisations can vary significantly, based m an ag em en t agencies as n etw o rk ed
o n the type, location and severity o f the organisations. T hese organisations include
em ergency, and, as such, often conflict. In form al and inform al com m unication n et
o rd e r to m inim ise disorganisation and works and are designed for optim al flexi
m axim ise harm onisation o f response oper bility and adaptability for dynam ic or
ations, em ergency m anagem ent agencies uncertain environm ents (such as disas
(for exam ple, th e F ederal E m erg en cy ters).16 T h e ir structure relies o n netw orks
M anagem ent A gency (FEM A)) are tasked and pow er is distributed across th eir n e t
w ith in teg ra tin g and co o rd in a tin g w ork. As a result, the n etw o rk is ideally
response activities am ong and betw een suited to respond to u n ex p ected events,
private and g o v ernm ent agencies. This bu t is inherently difficult to apply rigid
harm onisation o f response activities is car standards and accountability for tactical
rie d o u t from provisional em erg en cy systems.3
o peration centres (see Figure 3).
W h ile the m odel for em erg en cy m an
ag em en t and business m an ag em en t m ay EMERGENCY MANAGEMENT
seem in com patible at first glance, the ‘INTELLIGENCE’ SYSTEMS
responsibilities are n o t unlike those faced In recent years, there has b een a grow ing
by m any co rp o ratio n s. M any m o d e rn d em an d for softw are program s w h ich
c o rp o ra tio n s c o n d u c t o p eratio n s from facilitate collaboration across responding
cam puses th at are lo cated th ro u g h o u t th e agencies and organisations, allow users to
w orld. O fte n tim es, m any o f these busi track resources and access critical in fo rm a-
Page 36
Schlegelmilch and Albanese
tion over networks and centralised data automate and customise data uploads to
repositories. For the purpose of providing the system would be preferable. While this
the reader with context regarding the feature does in fact exist in the current
potential (and necessity) for developing version of the system, it is rarely employed
emergency management systems that will by users due to the cost and difficulty in
enhance emergency management deci creating data links with multiple organisa
sion-making processes (much like BI sys tions that invariably employ different data
tems enhance business decision-making standards. System A has in the past
processes), an overview of emergency required the purchase of hardware but is
management systems currently in use and currently offered as a software as a service
their salient capabilities is given below. For (SaaS).
the purposes of the discussion, no identify
ing information for these systems is System B
included and they are referred to as system System B was developed by a small IT
A, system B and system C. consulting firm and takes advantage of
new technologies, such as mobile plat
forms and innovations in cloud-based
EM E R G E N C Y M A N A G E M E N T computing. The product is offered as a
SY STE M S SaaS. System B offers similar capabilities as
Below is a summary of three of the sys system A but, unlike system A, it is capable
tems in use today. of data transfers from multiple mobile
platforms, specifically smartphones and
System A hand-held PCs (tablets). In addition,
System A is perhaps the most widely used system A includes rudimentary project
platform. It includes resource status boards management modules to allow users to
and offers solutions for integrating with create dynamic response plans. This func
FEMA standard emergency management tions much like a dashboard, in which
forms, volunteer management and other information continually changes as the
data-driven resource planning tools. event unfolds.
While, in part, system A’s popularity
among emergency management agencies System C
is based on its early market entry, the System C is similar to system A in its size
system’s capability to make stored data and popularity of use. System C, however,
readily available to emergency response contains several additional products devel
agencies provides a competitive advantage oped to promote situational awareness,
over other systems. The system is hindered situational response and secure communi
by a laborious (and antiquated) process for cations and collaboration. One of it main
data entry, which requires the user to enter features is that it meets the US
data manually, rather than allowing auto Department of Homeland Security cloud
matic data entry (eg automatic form entry, security standards for handling controlled
data capture, etc). For instance, entering unclassified information, ‘for official use
hospital bed status information requires only’ information and law enforcement
that users define the bed types that will be sensitive information. The company that
required for a medical surge situation and produces this solution is also a Microsoft
then manually enter information (eg bed Partner for Collaboration and Content.
numbers, type) at specified time periods. Like other emergency management appli
The capability to easily and routinely cations, it is offered as a SaaS.
Page 37
Applying business intelligence to emergency management
Page 38
Schlegelmilch and Albanese
tion o f inform ation for static presentation. bilities, com petition and impetus. Finally,
It under-emphasises the requirements for as new er technologies becom e m ore
data m anagem ent and insight creation. affordable and widely disseminated, m ore
Further, the sophistication o f the em er options for data integration and analysis
gency m anagement BI platforms is typi will becom e available. This includes alter
cally lim ited to two-dim ensional analysis natives to cumbersome data warehouses
o f data using cumbersome processes, such and m ore affordable options for text
as end-user upload a n d /o r manual entry. m ining and other autom ated tools that can
Arguably, technology is not the limiting integrate disparate data sources in near real
factor in designing efficient systems. T he time.
same technology that is used to develop BI
models is also available to develop emer A cknowledgments
gency m anagem ent decision-m aking The authors wish to acknowledge the
applications. A second obstacle is the lack Connecticut Department of Public Health and
o f familiarity that emergency response Yale New Haven Health System for their
agencies have w ith data-processing continued support of the Yale New Haven
requirements for BI systems and how to Health System Center of Emergency
use the knowledge generated for insight Preparedness and Disaster Response. The
creation and decision-m aking purposes. authors are grateful to James Paturas of the Yale
T he development o f systems to aid deci New Haven Health System Center for
sion-m aking processes in emergency m an Emergency Preparedness and Disaster
agement using BI principles w ould benefit Response for his critical review of the
manuscript. Any opinions expressed in this
from a comprehensive developm ent
paper are those of the authors and do not
process that is guided and endorsed by
necessarily reflect those of the Yale New
authoritative em ergency m anagem ent Haven Health System or its affiliates.
agencies (such as FEMA), and gradually
integrated into the preparedness cycle and
R eferences
partner organisations. For instance, a careful
(1) Sabherwal, R. and Becerra-Fernandez, I.
review o f decision-m aking processes
(2011) ‘Business Intelligence: Practices,
during real or simulated emergencies and
Technologies, and Management’,Wiley,
types o f inform ation solicited during the Hoboken, NJ.
planning and organising phases o f pre (2) Chen, H. C., Chiang, R. H. L. and
paredness could better inform w hat data Storey,V. C. (2012) ‘Business intelligence
elements are required for the development and analytics: From big data to big
o f a rigorous decision-support system impact’, Mis Quarterly,Vol. 36, No. 4,
based on the private sector BI model. This pp. 1165-1188.
could also inform the development o f (3) Pearlson, K. and Saunders, C. S. (2013)
dashboards w ith drill-dow n capabilities ‘Managing and Using Information
and other analytic tools to support decision Systems: A Strategic Approach’,John
making and insight creation in real time. Wiley & Sons, Hoboken, NJ,
(4) Holstein, W. K. and Crnkovic,J. (2005)
Partnerships w ith vendors that offer
‘Measurement issues in decision support
mature and robust BI models may also
systems’, Encyclopedia of Information
provide an avenue for developing em er Science and Technology,Vol. IV,
gency m anagem ent systems to facilitate p p .1906-1911.
decision making. T he entry o f these com (5) Hedgebeth, D. (2007) ‘Data-driven
panies into the em ergency m anagement decision making for the enterprise: an
m arket w ould introduce additional capa overview of business intelligence
Page 39
Applying business intelligence to emergency management
Page 40
Copyright of Journal of Business Continuity & Emergency Planning is the property of Henry
Stewart Publications LLP and its content may not be copied or emailed to multiple sites or
posted to a listserv without the copyright holder's express written permission. However, users
may print, download, or email articles for individual use.