Näytä suppeat kuvailutiedot

dc.contributor.authorSimola, Jussi
dc.contributor.authorLehto, Martti
dc.contributor.authorRajamäki, Jyri
dc.contributor.editorEze, Thaddeus
dc.contributor.editorSpeakman, Lee
dc.contributor.editorOnwubiko, Cyril
dc.date.accessioned2022-09-29T10:28:04Z
dc.date.available2022-09-29T10:28:04Z
dc.date.issued2021
dc.identifier.citationSimola, J., Lehto, M., & Rajamäki, J. (2021). Emergency Response Model as a part of the Smart Society. In T. Eze, L. Speakman, & C. Onwubiko (Eds.), <i>ECCWS 2021 : Proceeding of the 20th European Conference on Cyber Warfare and Security</i> (pp. 382-391). Academic Conferences International. Proceedings of the European Conference on Cyber Warfare and Security.
dc.identifier.otherCONVID_156772610
dc.identifier.urihttps://jyx.jyu.fi/handle/123456789/83378
dc.description.abstractCentralized hybrid emergency model with predictive emergency response functions are necessary when the purpose is to protect the critical infrastructure (CI). A shared common operational picture among Public Protection and Disaster Relief (PPDR) authorities means that a real-time communication link from the local level to the state-level exists. If a cyberattack would interrupt electricity transmission, telecommunication networks will discontinue operating. Cyberattack becomes physical in the urban and maritime area if an intrusion has not been detected. Hybrid threats require hybrid responses. The purpose of this qualitative research was to find out technological-related fundamental risks and challenges which are outside the official risk classification. The primary outcomes can be summarized so that there are crucial human based factors that affect the whole cyber-ecosystem. Cybersecurity maturity, operational preparedness, and decision making reliability are not separate parts of continuity management. If fundamental risk factors are not recognized, technical early warning solutions become useless. Therefore, decision-makers need reliable information for decision-making that does not expose them to hazards. One of the primary aims of hybrid influence is to change political decision-making. Practically, this means a need to rationalize organizational, administrative, and operative functions in public safety organizations. Trusted information sharing among decision-makers, intelligence authorities, and data protection authorities must be ensured by using Artificial Intelligence (AI) systems. In advanced design, protection of critical infrastructure would be ensured automatically as part of the cyber platform's functionalities where human-made decisions are also analyzed. Confidential information sharing to third parties becomes complicated when the weaknesses of crucial decision-making procedures have recognized. Citizens' confidence in the intelligent system activities may strengthen because of the decision making process's reliability. Existing emergency response services are dependent on human ability.en
dc.format.extent646
dc.format.mimetypeapplication/pdf
dc.language.isoeng
dc.publisherAcademic Conferences International
dc.relation.ispartofECCWS 2021 : Proceeding of the 20th European Conference on Cyber Warfare and Security
dc.relation.ispartofseriesProceedings of the European Conference on Cyber Warfare and Security
dc.rightsIn Copyright
dc.subject.othercritical infrastructure protection
dc.subject.othercyber ecosystem
dc.subject.otheremergency response
dc.subject.otherpublic protection and disaster relief
dc.subject.otherartificial intelligence
dc.titleEmergency Response Model as a part of the Smart Society
dc.typeconferenceObject
dc.identifier.urnURN:NBN:fi:jyu-202209294731
dc.contributor.laitosInformaatioteknologian tiedekuntafi
dc.contributor.laitosFaculty of Information Technologyen
dc.contributor.oppiaineTietojärjestelmätiedefi
dc.contributor.oppiaineInformation Systems Scienceen
dc.type.urihttp://purl.org/eprint/type/ConferencePaper
dc.relation.isbn978-1-912764-99-0
dc.type.coarhttp://purl.org/coar/resource_type/c_5794
dc.description.reviewstatuspeerReviewed
dc.format.pagerange382-391
dc.relation.issn2048-8602
dc.type.versionpublishedVersion
dc.rights.copyright© the authors
dc.rights.accesslevelopenAccessfi
dc.relation.conferenceEuropean Conference on Cyber Warfare and Security
dc.subject.ysotietoverkot
dc.subject.ysotoimintavalmius (organisaatiot)
dc.subject.ysoverkkohyökkäykset
dc.subject.ysotekoäly
dc.subject.ysokyberturvallisuus
dc.subject.ysoinfrastruktuurit
dc.subject.ysoviranomaiset
dc.subject.ysoturvallisuuspalvelut
dc.subject.ysovalmiussuunnittelu
dc.format.contentfulltext
jyx.subject.urihttp://www.yso.fi/onto/yso/p12936
jyx.subject.urihttp://www.yso.fi/onto/yso/p39509
jyx.subject.urihttp://www.yso.fi/onto/yso/p27466
jyx.subject.urihttp://www.yso.fi/onto/yso/p2616
jyx.subject.urihttp://www.yso.fi/onto/yso/p26189
jyx.subject.urihttp://www.yso.fi/onto/yso/p17539
jyx.subject.urihttp://www.yso.fi/onto/yso/p6946
jyx.subject.urihttp://www.yso.fi/onto/yso/p4082
jyx.subject.urihttp://www.yso.fi/onto/yso/p735
dc.rights.urlhttp://rightsstatements.org/page/InC/1.0/?language=en
dc.type.okmA4


Aineistoon kuuluvat tiedostot

Thumbnail

Aineisto kuuluu seuraaviin kokoelmiin

Näytä suppeat kuvailutiedot

In Copyright
Ellei muuten mainita, aineiston lisenssi on In Copyright