Author image not provided
 Chris W Johnson

Authors:
Add personal information
  Affiliation history
Bibliometrics: publication history
Average citations per article1.86
Citation Count82
Publication count44
Publication years1992-2015
Available for download13
Average downloads per article284.31
Downloads (cumulative)3,696
Downloads (12 Months)144
Downloads (6 Weeks)18
SEARCH
ROLE
Arrow RightAuthor only


AUTHOR'S COLLEAGUES
See all colleagues of this author

SUBJECT AREAS
See all subject areas




BOOKMARK & SHARE


44 results found Export Results: bibtexendnoteacmrefcsv

Result 1 – 20 of 44
Result page: 1 2 3

Sort by:

1 published by ACM
September 2015 ATACCS '15: Proceedings of the 5th International Conference on Application and Theory of Automation in Command and Control Systems
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 7,   Downloads (Overall): 21

Full text available: PDFPDF
The International Civil Aviation Organisation (ICAO) identify an Airprox to be a situation in which, in the opinion of a pilot or air traffic services personnel, the distance between aircraft as well as their relative positions and speed have been such that the safety of the aircraft involved may have ...
Keywords: Airprox, Risk Assessment, Aviation Safety, Human Computer Interaction, Air Traffic Management, Human Factors

2
September 2015 SAFECOMP 2015: Proceedings of the 34th International Conference on Computer Safety, Reliability, and Security - Volume 9337
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Many companies must report cyber-incidents to regulatory organisations, including the US Securities and Exchange Commission and the European Network and Information Security Agency. Unfortunately, these security systems have not been integrated with safety reporting schemes. This leads to confusion and inconsistency when, for example a cyber-attack undermines the safe operation ...
Keywords: Organisational resilience, Safety, Cyber-security, Accident analysis, Incident reporting

3
September 2015 SAFECOMP 2015: Proceedings of the 34th International Conference on Computer Safety, Reliability, and Security - Volume 9337
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 0

Intrusion detection systems IDS provide valuable tools to monitor for, and militate against, the impact of cyber-attacks. However, this paper identifies a range of theoretical and practical concerns when these software systems are integrated into safety-critical applications. Whitelist approaches enumerate the processes that can legitimately exploit system resources. Any other ...
Keywords: Intrusion detection, SCADA, Safety, Cyber-security

4 published by ACM
September 2014 SIN '14: Proceedings of the 7th International Conference on Security of Information and Networks
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 4,   Downloads (12 Months): 39,   Downloads (Overall): 173

Full text available: PDFPDF
Due to the rise of Cyber crime it is important to explore the Cyber security area. The threats are real and can cause severe damage to both the system and its clients. Many examples can be given; one of them is BitBucket which encountered a denial of service attack (based ...
Keywords: Cyber Security, Cyber Warfare, Intrusion Detection, Situation Awareness

5
June 2014 Proceedings of the 7th International Conference on Trust and Trustworthy Computing - Volume 8564
Publisher: Springer-Verlag New York, Inc.
Bibliometrics:
Citation Count: 1

Currently, the lessons learned from the security incidents are documented in add-hoc means such as lengthy security reports, free-style textual news letters, emails or informal meetings. This makes it difficult to effectively communicate security lessons among peers and organisations. The diagraming approach such as the Generic Security Template G.S.T. has ...

6 published by ACM
July 2013 SIGIR '13: Proceedings of the 36th international ACM SIGIR conference on Research and development in information retrieval
Publisher: ACM
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 3,   Downloads (12 Months): 22,   Downloads (Overall): 270

Full text available: PDFPDF
Social media provides a new and potentially rich source of information for emergency management services. However, extracting the relevant information from such streams poses a number of difficult challenges. In this short paper, we survey emergency management professionals to ascertain how social media is used when responding to incidents, the ...
Keywords: emergency management, information seeking

7
May 2012 ATACCS '12: Proceedings of the 2nd International Conference on Application and Theory of Automation in Command and Control Systems
Publisher: IRIT Press
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 0,   Downloads (12 Months): 7,   Downloads (Overall): 128

Full text available: PDFPDF
Systematic network monitoring can be the cornerstone for the dependable operation of safety-critical distributed systems. In this paper, we present our vision for informed anomaly detection through network monitoring and resilience measurements to increase the operators' visibility of ATM communication networks. We raise the question of how to determine the ...
Keywords: safety, network monitoring, ATM, automation

8
April 2012 ECIR'12: Proceedings of the 34th European conference on Advances in Information Retrieval
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 8

The Crisees demonstrator is a service that aggregates and collects social media streams to support Crisis Managment.

9
September 2010 SAFECOMP'10: Proceedings of the 29th international conference on Computer safety, reliability, and security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 0

Governments across Europe and North America have recently reviewed the ways in which they provide both the public and their own departments with access to electronic data. Information service architectures have been proposed as one important component of the new e-Governance visions. These web-based technologies offer huge benefits by defining ...
Keywords: e-governance, emergency planning, safety information, data integrity

10
September 2010 SAFECOMP'10: Proceedings of the 29th international conference on Computer safety, reliability, and security
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

Unmanned Airborne Systems (UAS) offer significant benefits for long duration missions. They can also be used in situations where it is inappropriate to expose aircrew to increased levels of risk. Partly in consequence, they continue to experience accident rates that are significantly higher than those for most conventional aircraft. It ...
Keywords: air traffic management, controlled airspace, UAS, safety, UAV

11
February 2009 Mobile Response: Second International Workshop on Mobile Information Technology for Emergency Response, MobileResponse 2008. Bonn, Germany, May 29-30, 2008, Revised Selected Papers
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 1

Many research teams have developed mobile computing architectures to support the emergency and rescue services in a range of civil contingencies. These proposals are based on innovative technologies and show considerable creativity in the design of their user interfaces. In contrast, this paper presents lessons learned from the 2007 UK ...
Keywords: mobile devices, national critical infrastructures, accident analysis

12
December 2007 SCS '07: Proceedings of the twelfth Australian workshop on Safety critical systems and software and safety-related programmable systems - Volume 86
Publisher: Australian Computer Society, Inc.
Bibliometrics:
Citation Count: 0
Downloads (6 Weeks): 1,   Downloads (12 Months): 14,   Downloads (Overall): 200

Full text available: PDFPDF
On the 28 th September 2003, a blackout affected more than 56 million people across Italy and areas of Switzerland. Estimates vary for the number of fatalities that were directly related to the loss of power. 30, 000 people were trapped on trains. Several hundred passengers were stranded on underground ...
Keywords: power distribution, infrastructure security

13 published by ACM
April 2007 CHI EA '07: CHI '07 Extended Abstracts on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 5,   Downloads (12 Months): 23,   Downloads (Overall): 498

Full text available: PDFPDF
While a significant effort is currently being undertaken by the CHI community in order to apply and extend current usability evaluation techniques to new kinds of interaction techniques very little has been done to improve the reliability of software offering these kinds of interaction techniques. As these new interaction techniques ...
Keywords: human error, reliability safety critical systems, safety, usability

14 published by ACM
April 2006 CHI EA '06: CHI '06 Extended Abstracts on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 1
Downloads (6 Weeks): 1,   Downloads (12 Months): 2,   Downloads (Overall): 423

Full text available: PDFPDF

15
November 2005 Cognition, Technology and Work: Volume 7 Issue 4, November 2005
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 4

This paper reviews the state-of-the-art in evacuation simulations. These interactive computer based tools have been developed to help the owners and designers of large public buildings to assess the risks that occupants might face during emergency egress. The development of the Glasgow Evacuation Simulator is used to illustrate the existing ...
Keywords: Accident analysis, Evacuation, Simulation, Human factors

16
July 2005 FM'05: Proceedings of the 2005 international conference on Formal Methods
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 2

Space missions force engineers to make complex trade-offs between many different constraints including cost, mass, power, functionality and reliability. These constraints create a continual need to innovate. Many advances rely upon software, for instance to control and monitor the next generation ‘electron cyclotron resonance' ion-drives for deep space missions.Programmers face ...

17
July 2005 DSVIS'05: Proceedings of the 12th international conference on Interactive Systems: design, specification, and verification
Publisher: Springer-Verlag
Bibliometrics:
Citation Count: 3

The quality of the design of an interactive safety-critical system can be enhanced by embedding data and knowledge from past experiences. Traditionally, this involves applying scenarios, usability analysis, or the use of metrics for risk analysis. In this paper, we present an approach that uses the information from incident investigations ...

18 published by ACM
April 2005 CHI '05: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 8
Downloads (6 Weeks): 2,   Downloads (12 Months): 12,   Downloads (Overall): 977

Full text available: PDFPDF
The collapse of buildings, such as terminal 2E at Paris' Charles de Gaule Airport, and of fires, such as the Rhode Island, Station Night Club tragedy, has focused public attention on the safety of large public buildings. Initiatives in the United States and in Europe have led to the development ...
Keywords: evacuation, safety, simulation, user modeling

19 published by ACM
April 2004 CHI EA '04: CHI '04 Extended Abstracts on Human Factors in Computing Systems
Publisher: ACM
Bibliometrics:
Citation Count: 3
Downloads (6 Weeks): 2,   Downloads (12 Months): 15,   Downloads (Overall): 581

Full text available: PDFPDF
Recent years have seen an increasing use of sophisticated interaction techniques in the field of command and control systems. The use of such techniques has been required in order to increase the bandwidth between the users and the systems and thus to help them deal efficiently to increasingly complex systems. ...
Keywords: human error, reliability, safety critical systems, usability

20
October 2003 Software—Practice & Experience: Volume 33 Issue 12, October 2003
Publisher: John Wiley & Sons, Inc.
Bibliometrics:
Citation Count: 2

Mishap investigations provide important information about adverse events and are intended to help avoid any recurrence of previous failures. However, the complexity of many safety critical systems poses new challenges for mishap analysis. Similarly, the recognition that many failures have complex, systemic causes has helped to widen the scope of ...
Keywords: SOHO, STAMP, causation, mishap investigation, accident investigation, software mishaps



The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2018 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us