Weeks 3-4 Written Assignment (submit here)
Submit as single MS Word document.
Title each Part below. The minimum approximate length for both Parts should be 1500 words
Part 1 of 2 (refer to Week 3 Readings)
Evaluate arguments and theses by
Bellovin, Bradner, Diffie, Landau & Rexford (2011)
Saadawi & Jordan (2011) and
Specifically, respond to the following questions:
What do they have in common?
What are the differences is their assessment of cybersecurity and critical infrastructure protection?
How does FEMA’s Critical Infrastructure Protection Plan address key requirements set for by Clemente (2011)?
Conclude with a research or policy question for further research.
IMPORTANT! You must APA-utilize (cite, reference and list) all Week 3 Required Readings.
Part 2 of 2 (refer to Week 4 Readings)
Evaluate strengths and weakness
Findings and Lessons Learned in Xia, Becerra-Fernandez, Gudi, & Rocha-Mier (2011)
Information Fusion in Hennessy, Patterson & Lin (Eds.) (2003).
Can these findings be utilized in your city, county, state EOC. Why? Why not?
Conclude with a research or policy question for further research
You must APA-utilize (cite, reference and list) all Week 4 Required Readings.
Week 3 Readings
Required: Clemente, D. (2013). Cyber security and global interdependence: What is critical? Programme Report. February 2013. Chattam House.
Required: Bellovin, S. M., Bradner, S. O., Diffie, W, Landau, S. & Rexford, J. (2011). Can It Really Work? Problems with Extending EINSTEIN 3 to Critical Infrastructure. Harvard National Security Journal. 3.1, pp. 1-38.
Required: Saadawi, T & Jordan, J. Jr., (2011). eds. Cyber Infrastructure Protection. Strategic Studies Institute. Carlisle Barracks: U.S. Army War College (choose Chapter 1 Introduction and one chapter from each of the three Parts)
Required: FEMA (2013). National Infrastructure Protection Plan.
Week 4 Readings
Required: Xia, W., Becerra-Fernandez, I., Gudi, A., & Rocha-Mier, J. (2011). Emergency Management Task Complexity and Knowledge-Sharing Strategies. Cutter IT Journal, 24(1), pp. 20-25.
Required: Hennessy, Patterson & Lin (Eds.) (2003), Information Technology for Counterterrorism: Immediate Actions and Future Possibilities, Section 2 (Types of threats associated with information technology infrastructure), Section 3.2 Systems for Emergency Response and Section 4. National Academies Press. (it may take a few minutes to download and open).
Required: Zibuschka, J., Laufs, U. & Roßnagel, H. (2011). Towards ubiquitous emergency management systems. Modiquitous 2011 Proceedings.
Required: Amin, S., & Goldstein, M. P. (2008). Data against natural disasters: establishing effective systems for relief, recovery, and reconstruction. Washington DC: World Bank (it may take a minute or two do download).
Required: Becerra-Fernandez, I., Xia, W., Gudi, A. & Rocha, J. (2008). Task Characteristics, Knowledge Sharing and Integration, and Emergency Management Performance: Research Agenda and Challenges. Proceedings of the 5th International ISCRAM Conference – Washington, DC, USA, May 2008 (it may take a minute or two do download).