Você está na página 1de 11

Journal of Business Continuity & Emergency Planning Volume 8 Number 1

Applying business intelligence innovations


to emergency management

Jeffrey Schlegelmilch* and Joseph Albanese


Received (in revised form): 12th March, 2014
‘ National Center for Disaster Preparedness, Earth Institute, Columbia University
215 West 125th Street, Suite 303, New York, NY 10027
Tel: 001 646 845 2318; E-mail: js4645@columbia.edu

Jeffrey Schlegelmilch is Manager, International INTRODUCTION


& non-Healthcare Business Sectors, at Yale New Business intelligence (BI) may be defined
Haven Health System Center for Emergency as a set of technologies used for collecting,
Preparedness and Disaster Response. assimilating, analysing and transforming
primary data into meaningful information
Joseph Albanese is Senior Scientific Advisor, for the purpose of informing, facilitating
Yale New Haven Health System Center for and, in some cases, improving business
Emergency Preparedness and Disaster decision making. The raw data inputs for
Response, and Assistant Clinical Professor o f BI may be derived from internal or exter­
Therapeutic Radiology and Pharmacology at nal sources, represent either structured or
Yale School o f Medicine. unstructured data and include quantitative
Jeffrey Schegelmilch
(numerical) as well as qualitative (text-
A bstract based) data sources. 1
The use o f business intelligence (BI) is common Early on, the internet, specifically the
among corporations in the private sector to world wide web, influenced the type, dis­
improve business decision making and create semination and sophistication of BI. In
insights fo r competitive advantage. Increasingly, recent years, the advent of tablet PCs and
emergency management agencies are using tools mobile computers, ease of access to wire­
and processes similar to B I systems. W ith a less networks, together with the availability
more thorough understanding o f the principles of data repositories, cloud applications and
o f B I and its supporting technologies, and a visualisation software has continued to
careful comparison to the business model o f spur the development of innovative BI
emergency management, this paper seeks to pro­ applications.2 The use of BI has become Joseph Albanese
vide insights into how lessons fro m the private common practice among corporations
sector can contribute to the development o f effec­ and, as such, its concepts and applications
tive and efficient emergency management B I are taught in many professional education
utilisation. programmes, whose target audience
includes private sector leaders in business
Keywords: business intelligence, emer­ administration. Journal o f Business Continuity
& Emergency Planning
gency management, emergency pre­ Emergency management is the disci­ Vol.8 No. l,p p . 31-40
© I lenry Stewart Publications,
paredness pline of preventing the loss of life and 1749-9216

Page 31
Applying business intelligence to emergency management

p ro p e rty and re sto rin g services in an m an ag e m en t’ w ere c o n d u c te d utilising


affected area strick en by a disaster. G oogle Scholar and W o rld C at jo u rn a l
Individuals responsible fo r em ergency search engines. R e le v a n t papers w ere
m anagem ent include organisation-based identified from the bibliographies o f
em ergency m anagers, em ployees o f public industry and peer-review ed publications,
agencies tasked w ith coo rdinating em er­ as well as citations fo u n d in conference
gency m anagem ent operations and those presentations. A dditionally, a targ eted
o f federal agencies tasked w ith the devel­ search o f co rporate websites for additional
o p m en t and m anagem ent o f national poli­ inform ation o n specific BI and em ergency
cies and strategic assets associated w ith m anagem ent solutions w ere utilised as
disaster readiness. This paper limits the def­ needed.
in itio n o f em ergency m anagem ent organ­ This paper analyses outcom es o f studies
isations to state, c o u n ty o r m unicipal that have exam ined the application o f BI
em ergency m an ag em en t agencies. T h e in private industry and, as appropriate,
te rm ‘private sector businesses’ refers to suggest a sim ilar application o f BI in
com panies that are privately ow ned by public service agencies responsible for
n ongovernm ental organisations o r publi- em ergency m anagem ent. T hese reco m ­
cally traded com panies, w hose principal m endations are based o n parallels in th e
interests are o th er than those associated operational requirem ents o f private indus­
w ith m anaging natural o r m an -m ad e try and public service agencies. It should
em ergencies. be em phasised th at recom m endations for
This paper describes how the basic the application o f BI in private service
principles o f BI and its su pporting tech ­ agencies are solely based o n sim ilarities
nologies m ay b e applied to em ergency that exist in the private industry; differ­
m anagem ent to facilitate critical decision ences, even significant ones, are n o t c o n ­
m aking and, ultimately, enhance disaster sidered herein. As such, p ro p o sed
prevention, m itigation, readiness, response suggestions should be considered as a
and recovery. R eco m m en d a tio n s are p ro ­ starting p o in t fo r fu rth e r discussions
vided based o n lessons from th e private regarding the use o f BI for the purposes o f
sectors use o f BI, for the developm ent o f em ergency m anagem ent decision m aking.
B i-lik e technologies, w h ic h can assist
decision-m aking processes for em ergency
m anagem ent purposes. BI: OVERVIEW
W h ile the term s ‘data’, ‘in fo rm atio n ’ and
‘kno w led g e’ are often used interch an g e­
METHODS ably, as they relate to BI, there are subtle
T h e analysis in this paper was co n ducted distinctions. In B I, these term s represent
by review o f the cu rren t evidence base on the various stages o f data m anipulation
topics related to BI and c o m p u ter infor­ along a co n tin u u m from seem ingly u n in ­
m atio n systems. C o n te m p o ra ry e m er­ telligible data to usable inform atio n or
gency m anagem ent d o ctrin e published by know ledge (see Figure 1).
th e U S g o v ernm ent provided th e founda­ T h e term ‘data’ refers to raw o r p rim ary
tio n for defining and understanding the inform ation. As th e raw data are m an ip u ­
role and structure o f em ergency m anage­ lated and given relevance in th e co n tex t o f
m e n t agencies. In addition to these d o cu ­ business operations (eg custom er profiling,
m ents, queries using th e keyw ords custom er support, m arket research, m arket
‘business in tellig e n ce’ and ‘em ergency segm entation, p roduct profitability, statisti-

Page 32
Schlegelmilch and Albanese

Figure 1
Transforming data
D e c is io n -M a k in g
to knowledge

S ynth es izin g

A n a lyzin g

S u m m a rizin g

O rg an izin g

C ollecting

Adapted from Breiter, A. and Light, D. (2006) ‘Data for school improvement: Factors for designing
effective information systems to support decision making in schools’, Educational Technology &
Society, Vol. 9, No. 3, pp. 203-217.

cal analysis and inventory and distribution constitute potential data sources. These
analysis, etc), they are transformed into data, too, must be collected and processed
‘information’. The information is further into a usable structure that allows for com­
analysed and interpreted to drive decision­ parison and analysis before it can be
making processes. At this stage, the infor­ manipulated to support managerial deci­
mation is referred to as ‘knowledge’ or sion making.
‘usable information’. The transition from Arguably, data warehouses form the
raw data to knowledge generally requires foundation of BI. Data warehouses are data
human analysis and subsequent application repositories designed to support an organi­
to the organisation’s business process(es).3 sation’s decision-making processes. A data
BI incorporates various decision sup­ warehouse serves as one unified data model
port systems (DSS),4 which are classified in which data from various and varied
into six broad categories: (1) model sources are compiled and organised in a
driven, (2) data driven, (3) communica­ uniform manner. While well-designed data
tions driven, (4) document driven, (5) warehouses offer the possibility to store
knowledge driven and (6) web-based.5 vast amounts of structured data, the data
Regardless o f the DSS used in BI, all alone do not immediately translate to
require data. The data are extracted from knowledge. Indeed, knowledge for
multiple sources, commonly using systems enhanced decision-making processes is
o f integrated applications to manage the created once the data have been inter­
business functions. For example, enterprise preted, typically after they have been sub­
resource planning systems and customer jected to data mining. The goal o f data
relationship management systems are two mining is to discover potentially useful pat­
such systems employed to extract, convert terns from data. Two common data-mining
and integrate enterprise-specific data. techniques for finding hidden patterns in
External sources such as websites, news data are classification (supervised learning)
articles and industry analysis reports also and clustering (unsupervised learning)

Page 33
Applying business intelligence to emergency management

Figure 2 ESI
capabilities and Organizational Inform ation
Bl Capabilites Insight Creation Presentation
Mem ory M anagem ent
tools.

- Data Warehousing
- Enterprise Resource - Online Analytical
Planning - Text Mining tools Processing (OLAP) Tools
- Business Analytics Tools
- Knowledge Repositories - Web Mining tools - Visualization tools
Bl Tools and - Data Mining
- Digital Content - Environmental Scanning - Digital Dashboards
Technologies - Real-time Decision Support
Management tools - Radio Frequency - Scorecarding tools
- Document Management Identification - Business Process
tools Management Tools

Adapted from Sabherwal R. and Becerra-Fernandez, I. (2011) ‘Business Intelligence: Practices,


Technologies and Management’, Wiley, Hoboken, NJ, p. 1,801.

analyses, using naive Bayes classifier or k- and begin to make sense of the vast quan­
nearest neighbour and k-means, hierarchi­ tities of dynamic information within and
cal clustering or density-based clustering across the enterprise.
algorithms, respectively. ’ Other data- Mega vendors, including Oracle, SAP,
mining approaches are sequence analysis, Microsoft and IBM, offer comprehensive
association, regression and visualisation.7 solutions for nearly all Bl capabilities.
The discovery of hidden patterns by Companies such as SAS, TIBCO and
mining data stored in the organisations Actuate, whose products afford fewer
data warehouse allows for the creation of wide-ranging features than those that are
insight to guide the enterprise and business sold by mega vendors, still offer robust
operations and uncover valuable customer applications for Bl purposes. Recently, the
information that can potentially lead to IT industry, which produces virtually all
competitive advantages.K,y Bl applications, has undergone significant
Various tools and technologies may be consolidation. Larger vendors, particularly
utilised to facilitate capabilities associated the mega vendors, have acquired many of
with Bl, namely: (1) organisational the small and mid-size vendors in an
memory, (2) information management, (3) effort to expand Bl divisions and capture
insight creation and (4) presentation.1 larger shares of the Bl market (eg
Examples of the tools that support each of Hyperion, Business Objects and Cognos
these capabilities are shown in Figure 2. were acquired by Oracle, SAP and IBM
The creation of a Bl system requires respectively).1
that companies are adept with information
technologies tools. Any company consid­
ering implementing Bl must also possess a EMERGENCY MANAGEMENT
thorough understanding of its information AGENCIES: MISSION AND
needs for decision support. Assuming that STRUCTURES
these conditions are met, an organisation For private companies, government and
must then define the scope of the Bl other public sector agencies, emergency
system development and overall strategy, management has one of three goals. At the
identify the sources of data and then select organisational level, companies conduct
the appropriate Bl tools to manipulate the internal emergency preparedness and busi­
data. At this point, the organisation can ness continuity activities to sustain essen­
design and implement the Bl system(s) tial operations in an emergency.

Page 34
Schlegelmilch and Albanese

Figure 3 Flow o f
J o In l F ie ld O t t l r e requests and
Federal A g tm le a and D epgrtm w ite' assistance during
large-scale
SSS* “ * ^ « / / incidents

inlrjiatRle Mutual AW
In te rs ta te M utual Aid
fE M A C y P rlw a te S e c to rf
NGO A s s is ta n c e

L o c a H o -L o c a l
M utual A id /
P riu s ls S e c to r/
WOO Assistance
C o o rd in atio n
C om m and

Source: US Department of Homeland Security and Federal Emergency Management Agency (2008)
‘National Incident Management Systems’ available at:
https://www.fema.gov/pdf/emergency/nims/NIMS_core.pdf (accessed 26th March, 2014).

E m ergency m anagem ent for public agen­ response and recovery activities b etw een
cies has th e same goal; how ever, readiness public and private sector agencies. From
activities em phasise th e p o ten tial for th e perspective o f developing a BI system
responding to unanticipated needs o f a to enhance jo in t decision m aking (the
disaster-stricken com m unity. For instance, focus o f this paper), this goal is perhaps the
in response to a h u rricane clean-up, health m ost challenging.
agencies m ust m aintain essential activities E m ergency m anagem ent organisations
(eg disease exposure follow -up), tem porar­ in th e U SA align preparedness and
ily expand and enhance existing functions response program m es w ith th e N ational
(eg in sp ect restaurants after p o w e r is In c id e n t M an ag em en t System (N IM S)
restored to allow reopening) and, p o te n ­ and the N ational R esponse Fram ew ork
tially, take o n entirely n ew operations typ­ (N R F ). N IM S provides guidance and
ically assigned to o th e r agencies that, standards fo r in cid en t m anagem ent,
because o f circum stances, are unavailable w hereas the N R F provides th e national-
to respond (eg wellness visits to residents level architecture and policy for incident
in h ig h-rise facilities, in the absence o f m an ag em en t . 12,13 It is im p o rtan t to note
electrical pow er). It should b e n o te d that th at these guidance docum ents are n o t
m any com panies also enhance th eir serv­ operational resource allocation plans, play-
ices in response to w idespread disasters . 11 books o r procedure docum ents intended
A th ird goal o f em ergency m anagem ent to predefine response activities fo r any one
involves th e co o rd in ation o f the disaster type o f em ergency incident.

Page 35
Applying business intelligence to emergency management

Figure 4 P la n n in g ness units are subsidiaries, franchises or


Emergency
o th e r sem i-au to n o m o u s business units.
management T a k in g C o r r e c tiv e
O r g a n iz in g F urther, these facilities rely o n a n e tw o rk
A c tio n
preparedness cycle

ttin g
— \ Cycle T rain
o f suppliers, channel p artn ers and o th e r
resource an d sales relationships.
E m erg e n cy m an ag e m en t agencies also
have interactions w ith suppliers (eg cots

\
E x e rc is in g
/
E q u ip p in g
and meals for shelters), su b -co n tracto rs
(eg tree rem oval services) and cu sto m er­
facing p artn ers (eg A m erican R e d Cross
op erated em ergency shelters) com parable
Source: United States, 2013 18 to those o f a p aren t com pany to its off­
site business units.
C onceptually, the em ergency m anage­
m en t process parallels that o f the business
W h o le -o f-c o m m u n ity em ergency developm ent cycle. F or instance, b o th th e
response to a disaster involves a coalition em ergency m an ag em en t and business
o f organisations that share overlapping dev elo p m en t processes follow iterative
goals. R esponse organisations include var­ cycles o f activities th at include planning,
ious agencies from local, state and federal organising, training, equipping, exercising,
governm ents that possess diverse capabili­ evaluating and taking corrective action
ties for responding to em ergencies, as well (see Figure 4 ).15 In this respect, b o th
as private sector orgam sations. In spite ot processes m ake allowances for continuous
co m m o n objectives, em ergency response quality im provem ent.
m andates for private and public response It is reasonable to consider em ergency
organisations can vary significantly, based m an ag em en t agencies as n etw o rk ed
o n the type, location and severity o f the organisations. T hese organisations include
em ergency, and, as such, often conflict. In form al and inform al com m unication n et­
o rd e r to m inim ise disorganisation and works and are designed for optim al flexi­
m axim ise harm onisation o f response oper­ bility and adaptability for dynam ic or
ations, em ergency m anagem ent agencies uncertain environm ents (such as disas­
(for exam ple, th e F ederal E m erg en cy ters).16 T h e ir structure relies o n netw orks
M anagem ent A gency (FEM A)) are tasked and pow er is distributed across th eir n e t­
w ith in teg ra tin g and co o rd in a tin g w ork. As a result, the n etw o rk is ideally
response activities am ong and betw een suited to respond to u n ex p ected events,
private and g o v ernm ent agencies. This bu t is inherently difficult to apply rigid
harm onisation o f response activities is car­ standards and accountability for tactical
rie d o u t from provisional em erg en cy systems.3
o peration centres (see Figure 3).
W h ile the m odel for em erg en cy m an ­
ag em en t and business m an ag em en t m ay EMERGENCY MANAGEMENT
seem in com patible at first glance, the ‘INTELLIGENCE’ SYSTEMS
responsibilities are n o t unlike those faced In recent years, there has b een a grow ing
by m any co rp o ratio n s. M any m o d e rn d em an d for softw are program s w h ich
c o rp o ra tio n s c o n d u c t o p eratio n s from facilitate collaboration across responding
cam puses th at are lo cated th ro u g h o u t th e agencies and organisations, allow users to
w orld. O fte n tim es, m any o f these busi­ track resources and access critical in fo rm a-

Page 36
Schlegelmilch and Albanese

tion over networks and centralised data automate and customise data uploads to
repositories. For the purpose of providing the system would be preferable. While this
the reader with context regarding the feature does in fact exist in the current
potential (and necessity) for developing version of the system, it is rarely employed
emergency management systems that will by users due to the cost and difficulty in
enhance emergency management deci­ creating data links with multiple organisa­
sion-making processes (much like BI sys­ tions that invariably employ different data
tems enhance business decision-making standards. System A has in the past
processes), an overview of emergency required the purchase of hardware but is
management systems currently in use and currently offered as a software as a service
their salient capabilities is given below. For (SaaS).
the purposes of the discussion, no identify­
ing information for these systems is System B
included and they are referred to as system System B was developed by a small IT
A, system B and system C. consulting firm and takes advantage of
new technologies, such as mobile plat­
forms and innovations in cloud-based
EM E R G E N C Y M A N A G E M E N T computing. The product is offered as a
SY STE M S SaaS. System B offers similar capabilities as
Below is a summary of three of the sys­ system A but, unlike system A, it is capable
tems in use today. of data transfers from multiple mobile
platforms, specifically smartphones and
System A hand-held PCs (tablets). In addition,
System A is perhaps the most widely used system A includes rudimentary project
platform. It includes resource status boards management modules to allow users to
and offers solutions for integrating with create dynamic response plans. This func­
FEMA standard emergency management tions much like a dashboard, in which
forms, volunteer management and other information continually changes as the
data-driven resource planning tools. event unfolds.
While, in part, system A’s popularity
among emergency management agencies System C
is based on its early market entry, the System C is similar to system A in its size
system’s capability to make stored data and popularity of use. System C, however,
readily available to emergency response contains several additional products devel­
agencies provides a competitive advantage oped to promote situational awareness,
over other systems. The system is hindered situational response and secure communi­
by a laborious (and antiquated) process for cations and collaboration. One of it main
data entry, which requires the user to enter features is that it meets the US
data manually, rather than allowing auto­ Department of Homeland Security cloud
matic data entry (eg automatic form entry, security standards for handling controlled
data capture, etc). For instance, entering unclassified information, ‘for official use
hospital bed status information requires only’ information and law enforcement
that users define the bed types that will be sensitive information. The company that
required for a medical surge situation and produces this solution is also a Microsoft
then manually enter information (eg bed Partner for Collaboration and Content.
numbers, type) at specified time periods. Like other emergency management appli­
The capability to easily and routinely cations, it is offered as a SaaS.

Page 37
Applying business intelligence to emergency management

Table 1: C o m p a riso n o f BI capabilities

B I capability element Private industry Emergency management

Organisational mem ory Data warehousing Forms and logs


Enterprise resource planning Incident after action reports
Knowledge repositories Financial tracking/expenditures
Digital content management tools Assistance requests
D ocum ent management tools

Information management Business analytics tools Information aggregators


Data mining Data aggregators
Real-tim e decision support — Manual
— Automated (emerging capability)

Insight creation Text mining tools Text mining capabilities (emerging


Web mining tools capability)
Environmental scanning
Radio frequency identification

Presentation Online analytical processing tools Text feeds


Visualisation tools Resource status boards
Digital dashboards
Scorecarding tools
Business process management tools

DYNAMICS OF EMERGENCY responsibility is to collect and d o cu m en t


MANAGEMENT SYSTEMS on-scene disaster-related in form atio n . A t
M ost com m ercially available em erg en cy least o n additional analyst th e n required to
m an ag em en t systems are offered as a m anage th e inflow o f data and to ensure
SaaS. T h is is likely because o f the lack o f th at the in fo rm atio n is properly updated
IT standards across organisations th at and dissem inated in a tim ely m anner.
respond to em ergencies and the n eed to R elative to BI m odels and the im p o r­
access th e system from m ultiple locations tance placed o n th em to guide business
an d devices. T h e SaaS m o d el also obviates decision m aking, n o n e o f the em ergency
th e n ee d fo r em erg en cy m an ag em en t m anagem ent technologies discussed above
agencies to develop and m ain tain a robust is afforded the same significance for em er­
IT infrastructure (hardw are, softw are and gency m anagem ent decision m aking, p er­
personnel). It should be n o te d th at the haps because n o n e approaches sim ilar
full capabilities o f th e systems in use are levels o f sophistication required for such a
likely g reater th an w h a t is b ein g realised task. Table 1. provides a side-by side co m ­
at th e user level. In practice, th e ir use is parison o f private industry and em ergency
o ften restricted to w eb-based discussion m anagem ent, based o n th e B I capabilities
forum s (chat room s) and a few dash­ illustrated in Figure 2.
boards w ith lim ited o r n o n -e x iste n t d rill­
d o w n capabilities.
In the cu rren t environm ent, in order to CONCLUSIONS AND FUTURE
m anage the data collection and analysis, DEVELOPMENT
em erg en cy m an ag em en t organisations T h e application o f BI for em erg en cy
require at least o n e analyst w h o is fam iliar m anagem ent agencies appears to over­
w ith the data-entry system and w hose sole em phasise the aggregation and consolida-

Page 38
Schlegelmilch and Albanese

tion o f inform ation for static presentation. bilities, com petition and impetus. Finally,
It under-emphasises the requirements for as new er technologies becom e m ore
data m anagem ent and insight creation. affordable and widely disseminated, m ore
Further, the sophistication o f the em er­ options for data integration and analysis
gency m anagement BI platforms is typi­ will becom e available. This includes alter­
cally lim ited to two-dim ensional analysis natives to cumbersome data warehouses
o f data using cumbersome processes, such and m ore affordable options for text
as end-user upload a n d /o r manual entry. m ining and other autom ated tools that can
Arguably, technology is not the limiting integrate disparate data sources in near real
factor in designing efficient systems. T he time.
same technology that is used to develop BI
models is also available to develop emer­ A cknowledgments
gency m anagem ent decision-m aking The authors wish to acknowledge the
applications. A second obstacle is the lack Connecticut Department of Public Health and
o f familiarity that emergency response Yale New Haven Health System for their
agencies have w ith data-processing continued support of the Yale New Haven
requirements for BI systems and how to Health System Center of Emergency
use the knowledge generated for insight Preparedness and Disaster Response. The
creation and decision-m aking purposes. authors are grateful to James Paturas of the Yale
T he development o f systems to aid deci­ New Haven Health System Center for
sion-m aking processes in emergency m an­ Emergency Preparedness and Disaster
agement using BI principles w ould benefit Response for his critical review of the
manuscript. Any opinions expressed in this
from a comprehensive developm ent
paper are those of the authors and do not
process that is guided and endorsed by
necessarily reflect those of the Yale New
authoritative em ergency m anagem ent Haven Health System or its affiliates.
agencies (such as FEMA), and gradually
integrated into the preparedness cycle and
R eferences
partner organisations. For instance, a careful
(1) Sabherwal, R. and Becerra-Fernandez, I.
review o f decision-m aking processes
(2011) ‘Business Intelligence: Practices,
during real or simulated emergencies and
Technologies, and Management’,Wiley,
types o f inform ation solicited during the Hoboken, NJ.
planning and organising phases o f pre­ (2) Chen, H. C., Chiang, R. H. L. and
paredness could better inform w hat data Storey,V. C. (2012) ‘Business intelligence
elements are required for the development and analytics: From big data to big
o f a rigorous decision-support system impact’, Mis Quarterly,Vol. 36, No. 4,
based on the private sector BI model. This pp. 1165-1188.
could also inform the development o f (3) Pearlson, K. and Saunders, C. S. (2013)
dashboards w ith drill-dow n capabilities ‘Managing and Using Information
and other analytic tools to support decision Systems: A Strategic Approach’,John
making and insight creation in real time. Wiley & Sons, Hoboken, NJ,
(4) Holstein, W. K. and Crnkovic,J. (2005)
Partnerships w ith vendors that offer
‘Measurement issues in decision support
mature and robust BI models may also
systems’, Encyclopedia of Information
provide an avenue for developing em er­ Science and Technology,Vol. IV,
gency m anagem ent systems to facilitate p p .1906-1911.
decision making. T he entry o f these com ­ (5) Hedgebeth, D. (2007) ‘Data-driven
panies into the em ergency m anagement decision making for the enterprise: an
m arket w ould introduce additional capa­ overview of business intelligence

Page 39
Applying business intelligence to emergency management

applications’, VINE,Vol. 37, No. 4, (11) Horwitz, S. (2009) ‘Wal-Mart to the


pp. 414—420. rescue: private enterprise’s response to
(6) Albanese, J., Martens, K., Karanitsa, L.V., Hurricane Katrina’, The Independent
et al. (2007) ‘Multivariate analysis of Review,Vol A3, No. 4, pp. 511-528.
low-dose radiation-associated changes in (12) US Department of Homeland Security
cytokine gene expression profiles using and Federal Emergency Management
microarray technology’, Experimental Agency (2008) ‘National Incident
Hematology,Vol. 35, No. 4 (Suppl. 1), Management System’, available at:
pp. 47—54. https://www.fema.gov/pdf/emergency/
(7) Han,J. and Kamber, M. (2006) ‘Data nims/NIMS_core.pdf (accessed 26th
mining: Concepts and Techniques’. 2nd March, 2014).
edn. Morgan Kaufmann Publishers, (13) US Department of Homeland Security
Burlington, MA. (2008) ‘National response framework’,
(8) Inmon, W. H. (1996) ‘The data available at: http://purl.access.gpo.gov/
warehouse and data mining’, GPO/LPS91897 (accessed 26th March,
Communications of the ACM, Vol. 39, 2014).
No. 11, pp. 49-50. (14) FEMA (2011) ‘A Whole Community
(9) Moayer, S. and Gardner, S. (2012) Approach to Emergency Management:
‘Integration of data mining within a Principles, Themes, and Pathways for
strategic knowledge management Action’, available at:
framework: A platform for competitive http:/ / www.emd.wa.gov/ about/
advantage in the Australian mining documents/FEMA_Whole_Community.
sector’, International Journal ofAdvanced pdf (accessed 7th March, 2014).
Computer Science and Applications, Vol. 8, (15) FEMA (2013) ‘Preparedness’, available at
No. 3, pp. 67-72. http:/ / www.fema.gov/preparedness-0
(10) Olszak, C. M. and Ewa, Z. (2007) (accessed 11th October, 2013).
‘Approach to building and implementing (16) Camarinha-Matos, L. M. (2009)
business intelligence systems’, ‘Collaborative networked organizations:
Interdisciplinary Journal of Information, Status and trends in manufacturing’,
Knowledge, and Management,Vol. 2, Annual Reviews in Control,Vol. 33,
pp. 134-148. pp. 199-208.

Page 40
Copyright of Journal of Business Continuity & Emergency Planning is the property of Henry
Stewart Publications LLP and its content may not be copied or emailed to multiple sites or
posted to a listserv without the copyright holder's express written permission. However, users
may print, download, or email articles for individual use.

Você também pode gostar