IDEAS home Printed from https://ideas.repec.org/a/gam/jftint/v5y2013i2p205-236d25523.html
   My bibliography  Save this article

A Review of Cyber Threats and Defence Approaches in Emergency Management

Author

Listed:
  • George Loukas

    (School of Computing and Mathematical Sciences, University of Greenwich, Old Royal Naval College,SE10 9LS, London, UK)

  • Diane Gan

    (School of Computing and Mathematical Sciences, University of Greenwich, Old Royal Naval College,SE10 9LS, London, UK)

  • Tuan Vuong

    (School of Computing and Mathematical Sciences, University of Greenwich, Old Royal Naval College,SE10 9LS, London, UK)

Abstract

Emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery. Failure of these systems, whether accidental or because of malicious action, can have severe implications for emergency management. Accidental failures have been extensively documented in the past and significant effort has been put into the development and introduction of more resilient technologies. At the same time researchers have been raising concerns about the potential of cyber attacks to cause physical disasters or to maximise the impact of one by intentionally impeding the work of the emergency services. Here, we provide a review of current research on the cyber threats to communication, sensing, information management and vehicular technologies used in emergency management. We emphasise on open issues for research, which are the cyber threats that have the potential to affect emergency management severely and for which solutions have not yet been proposed in the literature.

Suggested Citation

  • George Loukas & Diane Gan & Tuan Vuong, 2013. "A Review of Cyber Threats and Defence Approaches in Emergency Management," Future Internet, MDPI, vol. 5(2), pages 1-32, May.
  • Handle: RePEc:gam:jftint:v:5:y:2013:i:2:p:205-236:d:25523
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/1999-5903/5/2/205/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/1999-5903/5/2/205/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. Jessie Walker, 2012. "Cyber Security Concerns for Emergency Management," Chapters, in: Burak Eksioglu (ed.), Emergency Management, IntechOpen.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Frank Cremer & Barry Sheehan & Michael Fortmann & Arash N. Kia & Martin Mullins & Finbarr Murphy & Stefan Materne, 2022. "Cyber risk and cybersecurity: a systematic review of data availability," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 47(3), pages 698-736, July.
    2. Virginia M. Romero & Eduardo B. Fernandez, 2023. "Towards a Reference Architecture for Cargo Ports," Future Internet, MDPI, vol. 15(4), pages 1-32, April.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.

      Corrections

      All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jftint:v:5:y:2013:i:2:p:205-236:d:25523. See general information about how to correct material in RePEc.

      If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

      If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

      If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

      For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

      Please note that corrections may take a couple of weeks to filter through the various RePEc services.

      IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.