Next Article in Journal
Structure and Anonymity of the Bitcoin Transaction Graph
Next Article in Special Issue
Future Research on Cyber-Physical Emergency Management Systems
Previous Article in Journal
Digital Differentiation in Young People’s Internet Use—Eliminating or Reproducing Disability Stereotypes
Previous Article in Special Issue
A Concept for Support of Firefighter Frontline Communication
Open AccessReview

A Review of Cyber Threats and Defence Approaches in Emergency Management

School of Computing and Mathematical Sciences, University of Greenwich, Old Royal Naval College,SE10 9LS, London, UK
*
Author to whom correspondence should be addressed.
Future Internet 2013, 5(2), 205-236; https://doi.org/10.3390/fi5020205
Received: 17 February 2013 / Revised: 19 March 2013 / Accepted: 10 April 2013 / Published: 7 May 2013
(This article belongs to the Special Issue Emergency Management, Communications and the Internet)
Emergency planners, first responders and relief workers increasingly rely on computational and communication systems that support all aspects of emergency management, from mitigation and preparedness to response and recovery. Failure of these systems, whether accidental or because of malicious action, can have severe implications for emergency management. Accidental failures have been extensively documented in the past and significant effort has been put into the development and introduction of more resilient technologies. At the same time researchers have been raising concerns about the potential of cyber attacks to cause physical disasters or to maximise the impact of one by intentionally impeding the work of the emergency services. Here, we provide a review of current research on the cyber threats to communication, sensing, information management and vehicular technologies used in emergency management. We emphasise on open issues for research, which are the cyber threats that have the potential to affect emergency management severely and for which solutions have not yet been proposed in the literature. View Full-Text
Keywords: survey; pervasive computing; network-level security and protection; physical security; emergency management survey; pervasive computing; network-level security and protection; physical security; emergency management
Show Figures

Figure 1

MDPI and ACS Style

Loukas, G.; Gan, D.; Vuong, T. A Review of Cyber Threats and Defence Approaches in Emergency Management. Future Internet 2013, 5, 205-236.

AMA Style

Loukas G, Gan D, Vuong T. A Review of Cyber Threats and Defence Approaches in Emergency Management. Future Internet. 2013; 5(2):205-236.

Chicago/Turabian Style

Loukas, George; Gan, Diane; Vuong, Tuan. 2013. "A Review of Cyber Threats and Defence Approaches in Emergency Management" Future Internet 5, no. 2: 205-236.

Find Other Styles

Article Access Map by Country/Region

1
Only visits after 24 November 2015 are recorded.
Search more from Scilit
 
Search
Back to TopTop