IDEAS home Printed from https://ideas.repec.org/a/gam/jsusta/v12y2020i12p5147-d375651.html
   My bibliography  Save this article

A Taxonomy of Crisis Management Functions

Author

Listed:
  • Todor Tagarev

    (Institute of Information and Communication Technologies, Bulgarian Academy of Sciences, 1113 Sofia, Bulgaria)

  • Valeri Ratchev

    (Institute of Information and Communication Technologies, Bulgarian Academy of Sciences, 1113 Sofia, Bulgaria)

Abstract

The management of crises triggered by natural or manmade events requires a concerted effort of various actors crossing institutional and geographic boundaries. Technological advances allow to make crisis management more effective, but innovation is hindered by dispersed and often disconnected knowledge on the lessons learned, gaps, and solutions. Taxonomies enable the search for information of potential interest. This article presents a taxonomy of crisis management functions, designed on the basis of a conceptual model integrating the concepts of hazard, vulnerability, risk, and community, and the main consequence- and management-based concepts. At its highest level, the taxonomy includes ten functional areas: preparatory (mitigation, capability development, and strategic adaptiveness), operational (protection, response, and recovery), and common (crisis communications and information management; command, control, and coordination; logistics; and security management). The taxonomy facilitates the navigation of online platforms and the matching of needs and solutions. It has broader applications, e.g., for structuring the assessment of the societal impact of crisis management solutions and as a framework for a comprehensive assessment of disaster risk reduction measures. While the taxonomy was developed within a research and innovation project supported by the European Union, it reflects and is compatible with established international concepts and classification schemes, and is thus applicable by a wider international community.

Suggested Citation

  • Todor Tagarev & Valeri Ratchev, 2020. "A Taxonomy of Crisis Management Functions," Sustainability, MDPI, vol. 12(12), pages 1-34, June.
  • Handle: RePEc:gam:jsusta:v:12:y:2020:i:12:p:5147-:d:375651
    as

    Download full text from publisher

    File URL: https://www.mdpi.com/2071-1050/12/12/5147/pdf
    Download Restriction: no

    File URL: https://www.mdpi.com/2071-1050/12/12/5147/
    Download Restriction: no
    ---><---

    References listed on IDEAS

    as
    1. M.‐Elisabeth Paté‐Cornell & Marshall Kuypers & Matthew Smith & Philip Keller, 2018. "Cyber Risk Management for Critical Infrastructure: A Risk Analysis Model and Three Case Studies," Risk Analysis, John Wiley & Sons, vol. 38(2), pages 226-241, February.
    2. Xiangyang Li & Charu Chandra & Jiun-Yan Shiau, 2009. "Developing taxonomy and model for security centric supply chain management," International Journal of Manufacturing Technology and Management, Inderscience Enterprises Ltd, vol. 17(1/2), pages 184-212.
    3. Montgomery Van Wart & Naim Kapucu, 2011. "Crisis Management Competencies," Public Management Review, Taylor & Francis Journals, vol. 13(4), pages 489-511, May.
    Full references (including those not matched with items on IDEAS)

    Citations

    Citations are extracted by the CitEc Project, subscribe to its RSS feed for this item.
    as


    Cited by:

    1. Weike Chen & Jing Dong & Chaohua Yan & Hui Dong & Ping Liu, 2021. "What Causes Waterlogging?—Explore the Urban Waterlogging Control Scheme through System Dynamics Simulation," Sustainability, MDPI, vol. 13(15), pages 1-21, July.
    2. Maria Polorecka & Jozef Kubas & Pavel Danihelka & Katarina Petrlova & Katarina Repkova Stofkova & Katarina Buganova, 2021. "Use of Software on Modeling Hazardous Substance Release as a Support Tool for Crisis Management," Sustainability, MDPI, vol. 13(1), pages 1-15, January.

    Most related items

    These are the items that most often cite the same works as this one and are cited by the same works as this one.
    1. Maria Polorecka & Jozef Kubas & Pavel Danihelka & Katarina Petrlova & Katarina Repkova Stofkova & Katarina Buganova, 2021. "Use of Software on Modeling Hazardous Substance Release as a Support Tool for Crisis Management," Sustainability, MDPI, vol. 13(1), pages 1-15, January.
    2. Daniel Woods & Mustafa Abdallah & Saurabh Bagchi & Shreyas Sundaram & Timothy Cason, 2022. "Network defense and behavioral biases: an experimental study," Experimental Economics, Springer;Economic Science Association, vol. 25(1), pages 254-286, February.
    3. Eric Carlström & Leif Inge Magnussen & Elsa Kristiansen & Johan Berlin & Jarle Løwe Sørensen, 2020. "Inter-Organisational Exercises in Dry and Wet Context—Why Do Maritime Response Organisations Gain More Knowledge from Exercises at Sea Than Those on Shore?," Sustainability, MDPI, vol. 12(14), pages 1-13, July.
    4. Bhattar, Poornachandratejasvi Laxman & Pindoriya, Naran M & Sharma, Anurag, 2024. "False data injection in distribution system: Attacker's perspective," International Journal of Critical Infrastructure Protection, Elsevier, vol. 45(C).
    5. Mark Bentley & Alec Stephenson & Peter Toscas & Zili Zhu, 2020. "A Multivariate Model to Quantify and Mitigate Cybersecurity Risk," Risks, MDPI, vol. 8(2), pages 1-21, June.
    6. Zhao, Yunfei & Huang, Linan & Smidts, Carol & Zhu, Quanyan, 2020. "Finite-horizon semi-Markov game for time-sensitive attack response and probabilistic risk assessment in nuclear power plants," Reliability Engineering and System Safety, Elsevier, vol. 201(C).
    7. Juliza Adira Mohd@Ariffin & Ahmad Aizuddin Md Rami & Nor Wahiza Abd Wahat & Nurfazreen Aina Muhamad Nasharudin, 2022. "The Effect of Transformational Leadership Style in Crisis Management: Does Gender Matter?," International Journal of Human Resource Studies, Macrothink Institute, vol. 12(2), pages 156171-1561, December.
    8. Vlacheas, Panagiotis & Stavroulaki, Vera & Demestichas, Panagiotis & Cadzow, Scott & Ikonomou, Demosthenes & Gorniak, Slawomir, 2013. "Towards end-to-end network resilience," International Journal of Critical Infrastructure Protection, Elsevier, vol. 6(3), pages 159-178.
    9. Chatzis, Petros & Stavrou, Eliana, 2022. "Cyber-threat landscape of border control infrastructures," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    10. repec:zib:zibaem:v:7:y:2023:i:2:p:38-48 is not listed on IDEAS
    11. Jarle Løwe Sørensen & Carina Halvorsen & Jens Petter W. Aas & Eric Carlström, 2020. "“Share Your Tools”—A Utility Study of a Norwegian Wildland-Fire Collaboration Exercise," Sustainability, MDPI, vol. 12(16), pages 1-12, August.
    12. Stright, Jim & Cheetham, Peter & Konstantinou, Charalambos, 2022. "Defensive cost–benefit analysis of smart grid digital functionalities," International Journal of Critical Infrastructure Protection, Elsevier, vol. 36(C).
    13. Frank Cremer & Barry Sheehan & Michael Fortmann & Arash N. Kia & Martin Mullins & Finbarr Murphy & Stefan Materne, 2022. "Cyber risk and cybersecurity: a systematic review of data availability," The Geneva Papers on Risk and Insurance - Issues and Practice, Palgrave Macmillan;The Geneva Association, vol. 47(3), pages 698-736, July.
    14. Natalie M. Scala & Allison C. Reilly & Paul L. Goethals & Michel Cukier, 2019. "Risk and the Five Hard Problems of Cybersecurity," Risk Analysis, John Wiley & Sons, vol. 39(10), pages 2119-2126, October.
    15. Alessandro Mazzoccoli, 2023. "Optimal Cyber Security Investment in a Mixed Risk Management Framework: Examining the Role of Cyber Insurance and Expenditure Analysis," Risks, MDPI, vol. 11(9), pages 1-14, August.
    16. Gabriel Kuper & Fabio Massacci & Woohyun Shim & Julian Williams, 2020. "Who Should Pay for Interdependent Risk? Policy Implications for Security Interdependence Among Airports," Risk Analysis, John Wiley & Sons, vol. 40(5), pages 1001-1019, May.
    17. Alessandro Mazzoccoli & Maurizio Naldi, 2022. "An Overview of Security Breach Probability Models," Risks, MDPI, vol. 10(11), pages 1-29, November.
    18. Suo, Weilan & Wang, Lin & Li, Jianping, 2021. "Probabilistic risk assessment for interdependent critical infrastructures: A scenario-driven dynamic stochastic model," Reliability Engineering and System Safety, Elsevier, vol. 214(C).
    19. Leilei Tang & Bonai Fan & Chengjiang Li & Gang Zhao, 2022. "Empirical Evaluation of the Environmental Emergency Management Capability of Local Governments in China," Sustainability, MDPI, vol. 14(11), pages 1-16, May.
    20. Loretta Mastroeni & Alessandro Mazzoccoli & Maurizio Naldi, 2022. "Pricing Cat Bonds for Cloud Service Failures," JRFM, MDPI, vol. 15(10), pages 1-18, October.

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:gam:jsusta:v:12:y:2020:i:12:p:5147-:d:375651. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    If CitEc recognized a bibliographic reference but did not link an item in RePEc to it, you can help with this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: MDPI Indexing Manager (email available below). General contact details of provider: https://www.mdpi.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.