Verified Document

Network Centric Approach To Disaster Management Research Paper

Network-Centric Approach to Disaster Management Agencies involved in the preparation for, management of, and response to disasters require an enormous considerable amount of information in risk and emergency management, this kind of information is geographical and more often it does not reach the right people at the right time thus raising a concern on how such information can be organized in a way that it supports risk and emergency management more effectively and efficiently.

To address this concern organizations have to conceptualized the risk and emergency management practices which result in the concept of network-centric approach which means that all stakeholders in disaster management are connected and they have the capability to share and access relevant information. This concept can be made operational through the development of an information system and the exchange of geographical information within the system facilitated by the use of peer-to-peer networking joined with a client network server.

The network centric approach application level is presented by map and text forms to support...

et al., 2010)
On the other hand disasters are predominantly characterized by their contracted time scale, they are unpredictable thus resulting to equally unpredictable political, social and economical consequences. Every disaster in its own sense introduces a more dramatic change in the environment affected, at times there exists a decreased environmental transparency in informational content and the original information that was contained in that particular environment gets disrupted thus increasing the granularity of the environment thus knowledge gained through sharing information through a well connected network helps in mitigating the disaster.

There are several benefits associated with the solutions offered by network-centric operations, in this respect the implementation of this approach provides ground rescue teams such as law enforcement…

Sources used in this document:
References

Jeroen M.M. Neuvel & Henk J. Scholten & Adri van den Brink, (2010). From Spatial Data to Synchronized Actions: The Network-centric Organization of Spatial Decision Support for Risk and Emergency Management. Retrieved July 31, 2012 from http://www.feweb.vu.nl/gis/research/LUCAS/publications/docs/Neuvel_etal_From_spatial_data_to_synchronised_actions.pdf

von Lubitz, Beakley, Patircelli:( 2006). All hazards approach to network-centric disaster management: the role of information and knowledge management, and boyd's ooda loop in disaster leadership. Retrieved July 31, 2012 from http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.135.404&rep=rep1&type=pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Disaster Recovery Economic Impact of
Words: 4492 Length: 15 Document Type: Thesis

There is a modern emphasis, which has resulted from the experience of the economic impact of disaster, on a more extensive and 'distributed' mode of thinking about disaster recovery. This is an important factor that should be stressed as it has direct implications in terms of the economic aspects of disaster recovery planning in an increasingly networked and technologized contemporary working environment. This aspect is cogently expressed in a

Managing Human Elements in Aviation Safety A Multifaceted Analysis...
Words: 2996 Length: 10 Document Type: Analysis

Title: A Machine Learning Approach to Predicting Fatalities in Aviation Accidents: An ExaminationIntroductionSummary:The paper explores the deep use of machine learning algorithms to anticipate the occurrence of fatalities in aviation mishaps, concentrating primarily on the influence of human elements. The Aviation Safety Network (ASN) database forms the backbone of the study, from which models Model 1 and Model 2 are created, each investigating unique aspects of accident data.Model 1 engages

Information Security
Words: 3704 Length: 10 Document Type: Research Proposal

Security A broad definition of information security is given in ISO/IEC 17799 (2000) standard as: "The preservation of confidentiality (ensuring that information is accessible only to those authorized to have access), integrity (safeguarding the accuracy and completeness of information and processing methods), and availability (ensuring that authorized users have access to information and associated assets when required" (ISO/IEC 17799, 2000, p. viii). Prior to the computer and internet security emerged as we

Importance of the Alcan Case
Words: 5996 Length: 18 Document Type: Capstone Project

Alcan's continued revenue growth is the result of the combined success of increasing sales in four main business units, in addition to growth through acquisition. The cumulative effects of these two factors have served to create a profitable business and one where a highly decentralized organizational structure dominates (Chang, Wang, 2011). The catalyst of the organization becoming so decentralized is the continued revenue gains made across four businesses, each competing

High Tech Industry & Power
Words: 1483 Length: 4 Document Type: Research Paper

Impact of Potential Change Factors The potential change factors that both industries share is offshore production that is drastically re-shaping their value chains while also changing the structure of many industry participants from a supply chain standpoint. The outsourcing of tool manufacturing to India is forcing investment in quality management and compliance (Dangayach, Deshmukh, 2006) while in the high tech industry the change factors of Chinese manufacturing (Albrecht, Morgenstern, Xia, 2008)

Poor in Delivering Content and
Words: 3729 Length: 11 Document Type: Term Paper

Website Good Sites Microsoft.com The first indication that Microsoft.com is based on a strong WCM platform is the excellent division of specific areas of solutions, segments, and product sectors, all unified by common messaging and a consistency of content. The content in the site is current to the specific messaging of Microsoft today, including the launch of Windows Vista and the increased focus on Longhorn downloads for testing by beta testers. The content

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now