Searched for: subject%3A%22Human%255C%2Band%255C%2BOperational%255C%2BModelling%22
(1 - 20 of 31)

Pages

document
Friedman, D. (author), Brouwer, A.M. (author), Nijholt, A. (author)
ACM SIGAI; ACM SIGCHI
article 2017
document
Global Forum on Cyber Expertise (GFCE) (author)
conference paper 2017
document
van de Kuijt, J.T. (author)
Onlangs heeft minister Hennis-Plasschaert het belang aangekaart van het vervangen van de Walrus-klasse onderzeeboot. De minister onderkent in haar visie dat de onderzeeboot zeer geschikt is voor het verzamelen, analyseren en delen van inlichtingen. Dit artikel gaat in op de inlichtingentaak van de Nederlandse onderzeeboot. Uit onderzoek blijkt...
article 2016
document
Luiijf, H.A.M. (author)
bookPart 2016
document
de Jong, S. (author), Klein, A. (author), Smelik, R.M. (author), van Wermeskerken, F.J.P. (author)
The domain of Defense, Safety & Security offers interesting applications and research challenges for agent-based simulation of human behavior in urban environments. For example, virtual training of military personnel often requires complex urban scenarios to align with the current nature of operations. Previous research has focused on the...
conference paper 2016
document
de Jong, S. (author), Klein, A. (author), Smelik, R.M. (author), van Wermeskerken, F.J.P. (author)
Motivated by many potential applications within the domain of Defense, Safety & Security, we present an approach for the injection of incidents (e.g., an arrest following a shop lifting) in a running, large-scale urban simulation. Incidents are generated within desired user constraints such as what should happen, where, and when. We believe that...
conference paper 2016
document
van den Homberg, M.J.C. (author), Neef, R.M. (author)
Large scale natural and man-made disasters are complex events involving many stakeholders. Despite the structures the national and international humanitarian system provide, still many collaboration and information gaps between stakeholders, levels of operations and phases in the disaster management cycle occur. In the recovery phase,...
article 2015
document
van den Berg, T. (author), Lutz, R. (author)
The US Department of Defense (DoD) Architecture Framework (DoDAF) provides a common approach for architecture description development. The primary use of DoDAF is capability development and system acquisition in the military domain. Although DoDAF was not designed to support the development of simulation environments, many of the artifacts...
conference paper 2015
document
van den Homberg, M.J.C. (author), Cumiskey, L. (author), Oprins, E.A.P.B. (author), Suarez, P. (author), van der Hulst, A.H. (author)
This paper applies a Game-based Learning Evaluation Model (GEM) to assess whether the early warning - early action serious game "Ready!" is an effective component to add to existing Disaster Risk Reduction (DRR) training curricula, facilitated by NGO staff and applied at the community level. We developed a paper-based survey with 17 five-level...
conference paper 2015
document
Treurniet, W. (author), van Buul, K. (author)
Complex and multifaceted problems such as emergencies typically require coordinated effort by a network of different organisations. These networks typically rely less on formal hierarchical structures and instead have a stronger focus on allowing the dynamics to emerge in the process of collaboration. A balance has to be achieved between the...
conference paper 2015
document
Luiijf, H.A.M. (author)
article 2015
document
Peters, R. (author), van Os, N. (author), Spaling, G. (author), Willems, R.F.W.M. (author)
Op 20, 21 en 22 mei vond in Zwijndrecht het Dominocongres plaats. Domino adresseert de uitdaging van een “common operational picture” bij een groot overstromingsincident en de rol van informatiemanagement. Het IFV en de regio Zuid-Holland Zuid traden op als gastheer van een aantal geschakelde evenementen. Het geheel starte met een “VERA...
article 2015
document
van Rest, J.H.C. (author)
public lecture 2015
document
Luiijf, H.A.M. (author)
bookPart 2015
document
Luiijf, H.A.M. (author), Theocharidou, M. (author), Rome, E. (author)
CIPedia© http://www.cipedia.eu is a Wiki-based body of common knowledge for the wide international community of critical infrastructure (CI) protection and resilience stakeholders such as policy makers, researchers, governmental agencies, emergency management organizations, CI operators, and even the public.
article 2015
document
Zielstra, A. (author), Luiijf, H.A.M. (author), Duijnhoven, H.L. (author)
All stakeholders in cyber security and resilience have obligations; it is time to end the period of loose, non-binding collaborations, say Annemarie Zielstra, Eric Luiijf and Hanneke Duijnhoven, in this call for nations to work more closely together
article 2015
document
Luiijf, H.A.M. (author)
Bij ontwikkelaars en gebruikers in de ICT-wereld staat veiligheid zelden bovenaan als het gaat om de belangrijkste producteigenschappen. Op de eerste plaats moet het gewoon werken. Vervolgens moet het zoveel mogelijk kunnen. En het mag natuurlijk niet te ingewikkeld zijn. Of het ook veilig is? Dat zal toch wel? Nu tegenwoordig zo ongeveer alles...
article 2015
document
Luiijf, H.A.M. (author), Klaver, M.H.A. (author)
With respect to critical information and communication technologies (ICT), nations most often declare their national critical infrastructure to include telecommunication services and in some cases critical services offered by key Internet Service Providers (ISP). This paper debates whether nations, their policy-makers, legislation and regulation...
article 2015
document
Kooij-Janic, M. (author), Verweij, E.D.N. (author)
Alle bedrijven lopen risico’s, waardoor er een kans bestaat dat bedrijven hun verplichtingen naar hun stakeholders - zoals klanten of aandeelhouders - niet meer kunnen nakomen en daardoor zelf schade leiden. Het is dus van vitaal belang dat bedrijven de relevante risico’s identificeren en vervolgens managen. De stap in het risicomanagementproces...
article 2015
document
Luiijf, H.A.M. (author)
Ter ondersteuning van de internationale cyber security gemeenschap ontwikkelde TNO drie producten voor de vierde Global Conference on Cyber Space: From Awareness to action: bridging the gaps in 10 steps, Sharing Cyber Security Information en Cyber Security of Industrial Control Systems (ICS).
article 2015
Searched for: subject%3A%22Human%255C%2Band%255C%2BOperational%255C%2BModelling%22
(1 - 20 of 31)

Pages