SlideShare ist ein Scribd-Unternehmen logo
1 von 17
Dependability of IT Systems in
Municipal Emergency Management
         Kim Weyns, Martin Höst
Contents



     •   Background
     •   Research methodology
     •   Findings
         Future work: IDEM3
     •



Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
IT Systems in Municipal Emergency
Management

In the aftermath of a crisis (natural disaster,
blackout, terrorist attack, …) governmental
actors have an important role
           •      Crisis relief
           •      Information
           •      Sustaining normal operations
       => Dependence on IT systems



Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Dependability


If we are critically dependent on IT systems,
then the systems need to be trustworthy.

If we do not know whether the systems are
sufficiently dependable, we should not become
too dependent on them.




Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Dependability


We need two kinds of information
• How dependable is the system?
• How critically do we need the system?

       Hard to measure
       Changes over time
       Emergency situations ≠ normal situations


Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Example:

• Storm Gudrun, January 2005
• Non-functioning communication
  system delayed repairs and relief
  efforts
• GSM system
   – more critical than expected
   – more vulnerable than
      expected


                                                                Image: Banverket, storm damage after Gudrun


   Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Case study

•   What are municipalities doing today?
•   What methods do they use?
•   What do they have problems with?
•   Where is the most room for improvement?
                  – Testing?
                  – Defining requirements for their system?
                  – Risk analysis?
             Not much research available


Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Interviews


     Explorative case study:

     • Open interviews at two municipalities
     • With emergency managers and IT
       personnel
     • Collecting documents


Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Interview Analysis


Transcribed and analysed by categories:
• Organisation
• Risk analysis
• Communication
• Service level agreements (SLA)
• Practical examples and problems



Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Findings
  • System Responsibility
     – Specific systems
     – Common systems
  • Internal Communication
     – Lack of understanding
  • Service Level Agreements
     – No measurements
     – No guarantees


Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Findings (2)

   • Emergency Management
      – Planning, scenario analysis, …
        (SEMA)



   • Practical IT work
      – Maintenance, technical details, …



Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Common Problems

   •   Border responsibilities
   •   Lack of good tools and methods
   •   Lack of cooperation
   •   Lack of technical knowledge
   •   Fast evolution




Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Conclusions


• Better understanding of current situation
• Main problems identified:
   – Cooperation
   – Border responsibilities
• Most logical solution: through better
  cooperation




Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Future work : Maturity Model


IDEM3 (IT Dependability in Emergency Management
    Maturity Model)
•   Based on case study
•   Focus on cooperation needed to include information
    about the dependability of IT systems in emergency
    management and vice versa
•   Adapted based on feedback from experts and
    practitioners
•   Currently being evaluated in practical setting


Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Maturity Model (2)




Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
Questions?




Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009

Weitere ähnliche Inhalte

Ähnlich wie Dependability of IT Systems in Municipal Emergency Management

2013 06 04_5228_case_manager_overview__micha
2013 06 04_5228_case_manager_overview__micha2013 06 04_5228_case_manager_overview__micha
2013 06 04_5228_case_manager_overview__michaKatleen Aems
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
8 Ways Utility Networks Can Meet Data Demands
8 Ways Utility Networks Can Meet Data Demands8 Ways Utility Networks Can Meet Data Demands
8 Ways Utility Networks Can Meet Data DemandsSafe Software
 
Physical Climate Risk Analytics
Physical Climate Risk AnalyticsPhysical Climate Risk Analytics
Physical Climate Risk AnalyticsSharanjit Paddam
 
Modelling and Simulation of the response process for an emergency at the Grea...
Modelling and Simulation of the response process for an emergency at the Grea...Modelling and Simulation of the response process for an emergency at the Grea...
Modelling and Simulation of the response process for an emergency at the Grea...InfinIT - Innovationsnetværket for it
 
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereUsing Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereSafe Software
 
Software Eng. for Critical Systems - Traffic Controller
Software Eng. for Critical Systems - Traffic ControllerSoftware Eng. for Critical Systems - Traffic Controller
Software Eng. for Critical Systems - Traffic ControllerZiya Ilkem Erogul
 
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...EnergyTech2015
 
Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...
Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...
Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...Praxitelis Nikolaos Kouroupetroglou
 
E-Waste - How to face this issue with the Technology itself
E-Waste - How to face this issue with the Technology itselfE-Waste - How to face this issue with the Technology itself
E-Waste - How to face this issue with the Technology itselfBruno Croci
 
Risk management seminar -en
Risk management   seminar -enRisk management   seminar -en
Risk management seminar -enRolf Häsänen
 
Dylan Truong Presentation rev
Dylan Truong Presentation revDylan Truong Presentation rev
Dylan Truong Presentation revQuang Dung Truong
 
Introduction Centillien
Introduction CentillienIntroduction Centillien
Introduction CentillienGerard Kanters
 
Making Health IT A Team Player - VanQ 2009
Making Health IT A Team Player - VanQ 2009Making Health IT A Team Player - VanQ 2009
Making Health IT A Team Player - VanQ 2009Ken Wong
 
Why Computer Studies
Why Computer StudiesWhy Computer Studies
Why Computer StudiesSaimaRafiq
 
FORTRESS Cascading Effects presentation -Emergency Services Conference 2014
FORTRESS Cascading Effects presentation -Emergency Services Conference 2014FORTRESS Cascading Effects presentation -Emergency Services Conference 2014
FORTRESS Cascading Effects presentation -Emergency Services Conference 2014Trilateral Research
 
Irma Project Profile V 2.2
Irma Project Profile V 2.2Irma Project Profile V 2.2
Irma Project Profile V 2.2latifladid
 

Ähnlich wie Dependability of IT Systems in Municipal Emergency Management (20)

2013 06 04_5228_case_manager_overview__micha
2013 06 04_5228_case_manager_overview__micha2013 06 04_5228_case_manager_overview__micha
2013 06 04_5228_case_manager_overview__micha
 
Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)Welcome to International Journal of Engineering Research and Development (IJERD)
Welcome to International Journal of Engineering Research and Development (IJERD)
 
8 Ways Utility Networks Can Meet Data Demands
8 Ways Utility Networks Can Meet Data Demands8 Ways Utility Networks Can Meet Data Demands
8 Ways Utility Networks Can Meet Data Demands
 
Physical Climate Risk Analytics
Physical Climate Risk AnalyticsPhysical Climate Risk Analytics
Physical Climate Risk Analytics
 
Modelling and Simulation of the response process for an emergency at the Grea...
Modelling and Simulation of the response process for an emergency at the Grea...Modelling and Simulation of the response process for an emergency at the Grea...
Modelling and Simulation of the response process for an emergency at the Grea...
 
06.09.26.Handout
06.09.26.Handout06.09.26.Handout
06.09.26.Handout
 
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, AnywhereUsing Data Integration to Deliver Intelligence to Anyone, Anywhere
Using Data Integration to Deliver Intelligence to Anyone, Anywhere
 
Worldbank fmis
Worldbank fmisWorldbank fmis
Worldbank fmis
 
Software Eng. for Critical Systems - Traffic Controller
Software Eng. for Critical Systems - Traffic ControllerSoftware Eng. for Critical Systems - Traffic Controller
Software Eng. for Critical Systems - Traffic Controller
 
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
George Baker: Nuclear EMP and Solar GMD Effects, National Protection Impasse,...
 
Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...
Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...
Presentation - Msc Thesis - Machine Learning Techniques for Short-Term Electr...
 
E-Waste - How to face this issue with the Technology itself
E-Waste - How to face this issue with the Technology itselfE-Waste - How to face this issue with the Technology itself
E-Waste - How to face this issue with the Technology itself
 
Risk management seminar -en
Risk management   seminar -enRisk management   seminar -en
Risk management seminar -en
 
Dylan Truong Presentation rev
Dylan Truong Presentation revDylan Truong Presentation rev
Dylan Truong Presentation rev
 
Introduction Centillien
Introduction CentillienIntroduction Centillien
Introduction Centillien
 
Making Health IT A Team Player - VanQ 2009
Making Health IT A Team Player - VanQ 2009Making Health IT A Team Player - VanQ 2009
Making Health IT A Team Player - VanQ 2009
 
Why Computer Studies
Why Computer StudiesWhy Computer Studies
Why Computer Studies
 
Fraud detection by Denisa Banulescu-Radu
Fraud detection by Denisa Banulescu-Radu Fraud detection by Denisa Banulescu-Radu
Fraud detection by Denisa Banulescu-Radu
 
FORTRESS Cascading Effects presentation -Emergency Services Conference 2014
FORTRESS Cascading Effects presentation -Emergency Services Conference 2014FORTRESS Cascading Effects presentation -Emergency Services Conference 2014
FORTRESS Cascading Effects presentation -Emergency Services Conference 2014
 
Irma Project Profile V 2.2
Irma Project Profile V 2.2Irma Project Profile V 2.2
Irma Project Profile V 2.2
 

Kürzlich hochgeladen

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 

Kürzlich hochgeladen (20)

CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Dependability of IT Systems in Municipal Emergency Management

  • 1. Dependability of IT Systems in Municipal Emergency Management Kim Weyns, Martin Höst
  • 2. Contents • Background • Research methodology • Findings Future work: IDEM3 • Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 3. IT Systems in Municipal Emergency Management In the aftermath of a crisis (natural disaster, blackout, terrorist attack, …) governmental actors have an important role • Crisis relief • Information • Sustaining normal operations => Dependence on IT systems Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 4. Dependability If we are critically dependent on IT systems, then the systems need to be trustworthy. If we do not know whether the systems are sufficiently dependable, we should not become too dependent on them. Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 5. Dependability We need two kinds of information • How dependable is the system? • How critically do we need the system?  Hard to measure  Changes over time  Emergency situations ≠ normal situations Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 6. Example: • Storm Gudrun, January 2005 • Non-functioning communication system delayed repairs and relief efforts • GSM system – more critical than expected – more vulnerable than expected Image: Banverket, storm damage after Gudrun Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 7. Case study • What are municipalities doing today? • What methods do they use? • What do they have problems with? • Where is the most room for improvement? – Testing? – Defining requirements for their system? – Risk analysis?  Not much research available Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 8. Interviews Explorative case study: • Open interviews at two municipalities • With emergency managers and IT personnel • Collecting documents Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 9. Interview Analysis Transcribed and analysed by categories: • Organisation • Risk analysis • Communication • Service level agreements (SLA) • Practical examples and problems Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 10. Findings • System Responsibility – Specific systems – Common systems • Internal Communication – Lack of understanding • Service Level Agreements – No measurements – No guarantees Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 11. Findings (2) • Emergency Management – Planning, scenario analysis, … (SEMA) • Practical IT work – Maintenance, technical details, … Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 12. Common Problems • Border responsibilities • Lack of good tools and methods • Lack of cooperation • Lack of technical knowledge • Fast evolution Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 13. Conclusions • Better understanding of current situation • Main problems identified: – Cooperation – Border responsibilities • Most logical solution: through better cooperation Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 14. Future work : Maturity Model IDEM3 (IT Dependability in Emergency Management Maturity Model) • Based on case study • Focus on cooperation needed to include information about the dependability of IT systems in emergency management and vice versa • Adapted based on feedback from experts and practitioners • Currently being evaluated in practical setting Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 15. Maturity Model (2) Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 16. Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009
  • 17. Questions? Lund University / LTH / Department of Computer Science / ISCRAM 2009 / 13-5-2009