Best Practices in Wireless Emergency

ix 1 WEA Best Practices 1 2 WEA “Go Live” Checklist 3 3 WEA Training and Drilling Guide 9 4 WEA Governance Guide 17 5 WEA Cybersecurity Risk Management Strategy 24 Appendix Methods in Best Practices 32

[1]  Robert M. Davison,et al.  The balanced scorecard: a foundation for the strategic management of information systems , 1999, Decis. Support Syst..

[2]  Thomas Pyzdek,et al.  The Six Sigma handbook : a complete guide for green belts, black belts, and managers at all levels , 2014 .

[3]  Bob McFeeley,et al.  IDEAL: A User's Guide for Software Process Improvement. , 1996 .

[4]  Kathryn Kloby,et al.  Aligning Government Performance and Community Outcome Measurement: A Recent Study Profiles Leading Government Programs in Washington and Oregon, and Offers Recommendations for Outcome-Oriented Systems , 2009 .

[5]  David A. Garvin,et al.  Learning in Action: A Guide to Putting the Learning Organization to Work , 2000 .

[6]  Gillian Lewando-Hundt,et al.  Evaluating the dissemination of health promotion research , 2004 .

[7]  Kai Yang,et al.  Design for Six Sigma : A Roadmap for Product Development , 2003 .

[8]  Paul Clements,et al.  Models for Evaluating and Improving Architecture Competence , 2008 .

[9]  Isao Kato,et al.  Toyota Kaizen Methods: Six Steps to Improvement , 2010 .

[10]  Patrick Traynor Characterizing the Security Implications of Third-Party Emergency Alert Systems over Cellular Text Messaging Services , 2012, IEEE Transactions on Mobile Computing.

[11]  Margaret Thorogood,et al.  Evaluating Health Promotion: Practice and Methods , 2010 .

[12]  Alain Wegmann,et al.  Adapt and Adopt: An Experiment in Making Best Practices Adequate in an Organization , 2007 .

[13]  Dennis S. Mileti,et al.  Communication of Emergency Public Warnings: A Social Science Perspective and State-of-the-Art Assessment , 1990 .

[14]  Gabriel Szulanski Exploring internal stickiness: Impediments to the transfer of best practice within the firm , 1996 .

[15]  Joseph P Elm,et al.  Wireless Emergency Alerts: New York City Demonstration , 2013 .

[16]  A. Griffin PDMA Research on New Product Development Practices: Updating Trends and Benchmarking Best Practices , 1997 .

[17]  J. Motwani,et al.  A quality competitiveness index for benchmarking , 1999 .

[18]  Christopher J. Alberts,et al.  Managing Information Security Risks: The OCTAVE Approach , 2002 .

[19]  Steve Lipner,et al.  Security development lifecycle , 2010, Datenschutz und Datensicherheit - DuD.

[20]  J. Chilingerian Evaluating physician efficiency in hospitals : a multivariate analysis of best practices , 1995 .

[21]  Tom DeMarco,et al.  A defined process for project post mortem review , 1996, IEEE Software.

[22]  Richard Turner,et al.  CMMI Distilled: A Practical Introduction to Integrated Process Improvement , 2001 .

[23]  Arnošt Veselý,et al.  Theory and Methodology of Best Practice Research: A Critical Review of the Current State , 2011 .