ASSURING HOMELAND SECURITY : CONTINUOUS MONITORING , CONTROL & ASSURANCE OF EMERGENCY PREPAREDNESS

This paper examines the potential relationships of Auditing and Emergency Preparedness with respect to the domain of the design of Emergency Response Information Systems. It proposes normative objectives for the integration of all these areas in the design of future organizational systems. It also proposes a series of steps to evolve in this direction and create a new interdisciplinary professional community to guide research and development for this field of endeavor.

[1]  Wendy A. Kellogg,et al.  Socially translucent systems: social proxies, persistent conversation, and the design of “babble” , 1999, CHI '99.

[2]  Walt Scacchi,et al.  Process Life Cycle Engineering: A Knowledge-Based Approach and Environment , 1997, Intell. Syst. Account. Finance Manag..

[3]  Bartel Van de Walle,et al.  The role of experts in decision making upon urgent countermeasures in nuclear emergency situations , 1999 .

[4]  Judy E. Scott,et al.  Managing risks in enterprise systems implementations , 2002, CACM.

[5]  Starr Roxanne Hiltz,et al.  Network Nation: Human Communication Via Computer , 1979 .

[6]  BARTEL VAN DE WALLE,et al.  TOWARDS GROUP AGREEMENT : THE SIGNIFICANCE OF PREFERENCE ANALYSIS , 2001 .

[7]  Leon J. Osterweil,et al.  Software processes are software too , 1987, ISPW.

[8]  Murray Turoff,et al.  Computer‐mediated communication requirements for group support , 1991 .

[9]  Ben Shneiderman,et al.  Book Reviews : Online Communities: A Case Study of the Office of the Future , 1984 .

[10]  Murray Turoff,et al.  Past and future emergency response information systems , 2002, CACM.

[11]  Omar El Sawy,et al.  Building an Information System Design Theory for Vigilant EIS , 1992, Inf. Syst. Res..

[12]  Joanne E. Hale,et al.  A Layered Communication Architecture for the Support of Crisis Response , 1997, J. Manag. Inf. Syst..

[13]  Christian Robottom Reis,et al.  An Overview of the Software Engineering Process and Tools in the Mozilla Project , 2002 .

[14]  Herbert Snyder,et al.  The Network Nation: Human Communication Via Computer , 1995 .

[15]  S. R. Hiltz The Network Nation , 1978 .

[16]  Starr Roxanne Hiltz,et al.  Social Decision Support Systems (SDSS) , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[17]  Bartel Van de Walle,et al.  A relational analysis of decision makers' preferences , 2003, Int. J. Intell. Syst..

[18]  Walt Scacchi,et al.  Supporting Software Development in Virtual Enterprises , 2006, J. Digit. Inf..

[19]  Walt Scacchi,et al.  Process modeling across the web information infrastructure , 2005, Softw. Process. Improv. Pract..

[20]  Leon J. Osterweil,et al.  A Process-Object Centered View of Software Environment Architecture , 1986, Advanced Programming Environments.

[21]  Mac Nason,et al.  Learning together online: Research on asynchronous learning networks , 2006, Education and Information Technologies.

[22]  G. Anthony Gorry,et al.  Creating a knowledge-sharing community: if you build it, will they come? , 2003, CACM.

[23]  Walt Scacchi Understanding software process redesign using modeling, analysis and simulation , 2000 .

[24]  Abbe Mowshowitz,et al.  On the theory of virtual organization , 1997 .

[25]  Robert M. Hayes,et al.  Systems analysis and design , 1970, ACM '70.

[26]  Steve Howard,et al.  Methods & tools: the rich picture: a tool for reasoning about work context , 1998, INTR.

[27]  Starr Roxanne Hiltz,et al.  What makes learning networks effective? , 2002, CACM.

[28]  Martin Fowler,et al.  Planning Extreme Programming , 2000 .

[29]  Kalle Lyytinen,et al.  Identifying Software Project Risks: An International Delphi Study , 2001, J. Manag. Inf. Syst..

[30]  Ken Peffers,et al.  How to identify new high-payoff information systems for the organization , 2003, CACM.

[31]  Paul Clements,et al.  Software architecture in practice , 1999, SEI series in software engineering.

[32]  Barry M. Staw,et al.  Threat-rigidity effects in organizational behavior: A multilevel analysis. , 1981 .

[33]  Leon J. Osterweil,et al.  Understanding process and the quest for deeper questions in software engineering research , 2003, ESEC/FSE-11.

[34]  H. A. Lingstone,et al.  The Delphi Method: Techniques and Applications , 1976 .

[35]  Andreas Girgensohn,et al.  Making web sites be places for social interaction , 2002, CSCW '02.

[36]  Walt Scacchi,et al.  Modeling and simulating software acquisition process architectures , 2001, J. Syst. Softw..

[37]  Yi Zhang,et al.  Modeling usage of an online research community , 2004 .

[38]  Abbe Mowshowitz,et al.  Virtual organization: toward a theory of societal transformation stimulated by information technology , 2003, UBIQ.

[39]  Catherine Brunner More than an Ounce of Prevention , 1965 .

[40]  Russell R. Dynes,et al.  Organizational Communications and Decision Making in Crises , 1976 .

[41]  J. Horsley,et al.  Toward a Synthesis Model for Crisis Communication in the Public Sector , 2002 .

[42]  Katherine Schipper,et al.  Discussion of "Opportunities for assurance services in the 21st century: A progress report of the Special Committee on Assurance Services:; , 1996 .

[43]  Miklos A. Vasarhelyi,et al.  Principles of Analytic Monitoring for Continuous Assurance , 2004 .

[44]  Delvin Grant,et al.  A wider view of business process reengineering , 2002, CACM.

[45]  Starr Roxanne Hiltz,et al.  Distributed Group Support Systems , 1993, MIS Q..

[46]  Xiang Yao,et al.  The Design of a Dynamic Emergency Response Management Information System (DERMIS) , 2004 .

[47]  P. Asmus,et al.  Reinventing Electric Utilities: Competition, Citizen Action, and Clean Power , 1996 .

[48]  Starr Roxanne Hiltz,et al.  Structuring computer-mediated communication systems to avoid information overload , 1985, CACM.

[49]  Miklos A. Vasarhelyi,et al.  Feasibility and Economics of Continuous Assurance , 2002 .

[50]  Fiona Fui-Hoon Nah,et al.  Critical factors for successful implementation of enterprise systems , 2001, Bus. Process. Manag. J..