Abstract
Communication is an integral part of emergency response, and improving the information dissemination network for crisis communication can save time, resources, and lives. In a foreign animal disease (FAD) outbreak, timeliness of detection and response are critical. An outbreak of foot-and-mouth disease, a particularly significant FAD, could cripple the agriculture economy. This research uses communication data from a FAD response exercise in Kansas to develop a reliable crisis communication network model, contributing a general method for creating an information dissemination network from empirical communication data. We then introduce a simulated annealing heuristic that identifies an alternative network structure that minimizes the time for information to reach all response participants. The resultant network structure reduces overall information transmission time by almost 90% and reveals actionable observations for improving FAD response communication. We find that not only can a crisis communication network be improved significantly, but also that the quantitative results support qualitative observations from early in the data extraction process. This paper adds original methods to the literature and opens the door for future quantitative work in the area of crisis communication and emergency response.
Appendix I
Network Model Example
Figure 10 shows an example network.
![Figure 10: Diagram of Example Network; Label on Arc (i,j) is wij and Label on Node i is [wi, $\boldsymbol{\lambda _i^{\max }}$λimax]](/document/doi/10.1515/jhsem-2017-0008/asset/graphic/j_jhsem-2017-0008_fig_010.jpg)
Figure 10:
Diagram of Example Network; Label on Arc (i,j) is wij and Label on Node i is [wi,
Table 7 gives the probability matrix for the example network in Figure 10.
Table 7:
Probability Matrix for Example Network.
P Matrix | A | B | C | D |
---|---|---|---|---|
A | 0 | 0.4 | 0.6 | 0 |
B | 1 | 0 | 0 | 0 |
C | 0 | 0.4 | 0.2 | 0.4 |
D | 0.6 | 0 | 0.4 | 0 |
To understand the informed time for a node and for the network, consider the following series of events using the example network in Figure 10. The information to be transmitted originates at node A, indicating that a member of A was the first to have this information and communicate it with someone else in the network. This means that λA = 1 at the start of the simulation while λB, λC, and λD are each 0. Because
Appendix II
Simulation Model Replications
The process for computing the appropriate number of simulation replications is based on (Devore 2016). To ensure with 95% confidence that the true average informed time is within 100 minutes of the observed average informed time from the simulation replications, an initial sample of 50 replications was taken. The required number of replications, r, comes from the following equation:
Appendix III
Simulation Model Validation
Table 8 shows the comparison for how long it took for nodes to be informed of a presumptive positive FMD in the actual exercise versus our simulation model. Comparing the exercise and simulation times of each row suggests that the simulation model is, indeed, representing this information flow in the network closely, particularly for the first seven nodes, where the times differ on average by less than 15 minutes. Additionally, the simulation replicates the sequence of the first three nodes perfectly, and the nine exercise nodes that received the information are represented in the first 13 nodes of the simulation.
Table 8:
First Informed Times for Presumptive Positive FMD and Inject 3 across 400 Replications.
Number of Nodes First Informed | Node | Exercise Time (min) | Node | Simulation Time (min) |
---|---|---|---|---|
1 | D | 0.00 | D | 0.00 |
2 | I | 0.00 | I | 25.78 |
3 | P | 0.00 | P | 41.51 |
4 | O | 54.00 | Q | 47.88 |
5 | G | 60.00 | B | 53.85 |
6 | N | 60.00 | R | 67.01 |
7 | F | 60.00 | G | 69.32 |
8 | K | 110.00 | F | 82.48 |
9 | H | 150.00 | L | 82.66 |
10 | H | 87.66 | ||
11 | K | 92.59 | ||
12 | O | 142.32 | ||
13 | N | 333.06 | ||
14 | J | 379.19 | ||
15 | C | 403.47 | ||
16 | A | 553.48 | ||
17 | E | 609.69 | ||
18 | M | 1029.17 |
The only other instance from the exercise with enough transmission documentation to analyze is when a bull with possible FMD is discovered in the Kansas State University College of Veterinary Medicine (L). This event most closely resembles inject 2 of the simulation where an individual producer (E) introduces information to the network. With this in mind, Table 9 shows the same comparison as the previous instance. All seven exercise nodes that received the information are represented within the first 11 nodes of the simulation. Also, the average difference in times for the individual nodes is less than 25 minutes. Thus, we conclude that the proposed simulation model is a valid representation of the crisis communication network from the exercise, and the remainder of the paper builds on this network simulation model.
Table 9:
First Informed Times for Bull at KSU CVM and Inject 2 Across 400 Replications.
Number of Nodes First Informed | Node | Exercise Time (min) | Node | Simulation Time (min) |
---|---|---|---|---|
1 | L | 0.00 | E | 0.00 |
2 | I | 0.00 | I | 42.54 |
3 | K | 108.00 | Q | 69.13 |
4 | G | 108.00 | B | 81.59 |
5 | B | 117.00 | G | 89.30 |
6 | R | 117.00 | L | 91.76 |
7 | H | 139.00 | R | 93.09 |
8 | F | 102.61 | ||
9 | K | 111.48 | ||
10 | P | 111.87 | ||
11 | H | 118.61 | ||
12 | O | 195.80 | ||
13 | D | 265.44 | ||
14 | J | 390.85 | ||
15 | N | 395.21 | ||
16 | M | 424.68 | ||
17 | C | 462.76 | ||
18 | A | 561.43 |
References
Ahuja, R. K., T. L.Magnanti, and J. B.Orlin. 1993. Network Flows: Theory, Algorithms, and Application, 1st ed. Upper Saddle River, NJ: Prentice Hall.Search in Google Scholar
Amaral, L. A. N., A. Scala, M. Barthelemy, and H. E. Stanley. 2000. “Classes of Small-World Networks.” Proceedings of the National Academy of Sciences of the United States of America 97 (21): 11149–11152.10.1073/pnas.200327197Search in Google Scholar
Animal and Plant Health Inspection Service. 2013a. Foot-and-Mouth Disease, Technical Report, United States Department of Agriculture. Safeguarding American Agriculture.Search in Google Scholar
Animal and Plant Health Inspection Service. 2013b. Foreign Animal Disease, Technical Report, United States Department of Agriculture. Safeguarding American Agriculture.Search in Google Scholar
Au, T. A. 2011. “Analysis of Command and Control Networks on Black Saturday.” Australian Journal of Emergency Management 26 (3): 20–29.Search in Google Scholar
Banta, J., B. Lenz, M. Pawlak, K. Laskoski, C. Seykora, B. Webber, H. Yun, and S. Ritchie. 2016. “Notes from the Field: Outbreak of Hand, Foot, and Mouth Disease Caused by Coxsackievirus a6 Among Basic Military Trainees–Texas, 2015.” Morbidity and Mortality Weekly Report 65 (26): 678–680.10.15585/mmwr.mm6526a3Search in Google Scholar
Barabasi, A., and R. Albert. 1999. “Emergence of Scaling in Random Networks.” Science 286 (5439): 509–512.10.1515/9781400841356.349Search in Google Scholar
Bent, R., and P. Van Hentenryck. 2006. “A Two-Stage Hybrid Algorithm for Pickup and delivery vehicle routing problems with time windows.” Computers & Operations Research 33 (4): 875–893.10.1007/978-3-540-45193-8_9Search in Google Scholar
Borgatti, S. P. 2005. “Centrality and Network Flow.” Social Networks 27 (1): 55–71.10.1016/j.socnet.2004.11.008Search in Google Scholar
Braithwaite, J. 2010. “Between-Group Behaviour in Health Care: Gaps, Edges, Boundaries, Disconnections, Weak Ties, Spaces and Holes. A Systematic Review.” BMC Health Services Research 10, 330.10.1186/1472-6963-10-330Search in Google Scholar
Breen, J. J., and D. R. Parrish. 2013. “GIS in Emergency Management Cultures: An Empirical Approach to Understanding Inter and Intra-Agency Communication During Emergencies.” Journal of Homeland Security and Emergency Management 10 (2): 477–495.10.1515/jhsem-2013-0014Search in Google Scholar
Callis, J. 1978. “National and International Foot and Mouth Disease Control Programmes in Panama, Central and North America.” British Veterinary Journal 134 (1): 10–15.10.1016/S0007-1935(17)33582-0Search in Google Scholar
Carpenter, T. E., J. M. O’Brien, A. D. Hagerman, and B. A. McCarl. 2011. “Epidemic and Economic Impacts of Delayed Detection of Foot-and-Mouth Disease: A Case Study of a simulated outbreak in California.” Journal of Veterinary Diagnostic Investigation 23 (1): 26–33.10.1177/104063871102300104Search in Google Scholar
Clayton, D., and M. Hills. 1993. Statistical Models in Epidemiology, 1st ed. Oxford: Oxford University Press.Search in Google Scholar
Department of Homeland Security. 2015. “Critical Infrastructure Sectors.” https://www.dhs.gov/critical-infrastructure-sectors.Search in Google Scholar
Diekmann, O., and J. A. P. Heesterbeek. 2000 Mathematical Epidemiology of Infectious Diseases: Model Building, Analysis and Interpretation 1st edJohn Wiley and Sons.Search in Google Scholar
Devore, J. L. 2016. Probability and Statistics for Engineering and the Sciences, 9th ed. Boston, MA: Cengage Learning.Search in Google Scholar
Elsass, H. J., J. M. McKenna, and J. Schildkraut. 2016. “Rethinking Crisis Communications on Campus: An Evaluation of Faculty and Staff Perceptions About Emergency Notification Systems.” Journal of Homeland Security and Emergency Management 13 (3): 329–349.10.1515/jhsem-2016-0047Search in Google Scholar
Freeman, L. C. 1977. “Set of Measures of Centrality Based on Betweenness.” Sociometry 40 (1): 35–41.10.2307/3033543Search in Google Scholar
Gao, L., C. Song, Z. Gao, A. L. Barabasi, J. P. Bagrow, and D. Wang. 2014. “Quantifying Information Flow During Emergencies.” Scientific Reports 4: 3997.10.1038/srep03997Search in Google Scholar
Garnett, J. L., and A. Kouzmin. 2007. “Communicating Throughout Katrina: Competing and Complementary Conceptual Lenses on Crisis Communication.” Public Administration Review 67: 171–188.10.1111/j.1540-6210.2007.00826.xSearch in Google Scholar
Gendreau, M., and J. Potvin. 2005. “Metaheuristics in Combinatorial Optimization.” Annals of Operations Research 140 (1): 189–213.10.1007/s10479-005-3971-7Search in Google Scholar
Girvan, M., and M. E. J. Newman. 2002. “Community Structure in Social and Biological Networks.” Proceedings of the National Academy of Sciences of the United States of America 99 (12): 7821–7826.10.1073/pnas.122653799Search in Google Scholar
Hamra, J., R. Wigand, L. Hossain, and C. Owen. 2014. “Network Effects on Learning During Emergency Events.” Knowledge Management Research & Practice 12 (4): 387–397.10.1057/kmrp.2012.65Search in Google Scholar
Houston, J. B., J. Hawthorne, M. F. Perreault, E. H. Park, M. G. Hode, M. R. Halliwell, S. E. T. McGowen, R. Davis, S. Vaid, J. A. McElderry, and S. A. Griffith. 2015. “Social Media and Disasters: A Functional Framework for Social Media Use in Disaster Planning, Response, and Research.” Disasters 39 (1): 1–22.10.1111/disa.12092Search in Google Scholar
Johnson, D. S., and L. A. McGeoch. 2003. “The Traveling Salesman Problem: A Case Study.” In Local Search in Combinatorial Optimization, edited by E. Aarts, and J. K. Lenstra, 216–309. New York: Princeton University Press.Search in Google Scholar
Kansas Department of Agriculture. 2012. Food and agriculture incident annex, Technical report. Kansas Response Plan.Search in Google Scholar
Kao, R. R., D. M. Green, J. Johnson, and I. Z. Kiss. 2007. “Disease Dynamics over Very Different Time-Scales: Foot-and-Mouth Disease and Scrapie on the Network of Livestock Movements in the UK.” Journal of the Royal Society Interface 4 (16): 907–916.10.1098/rsif.2007.1129Search in Google Scholar
Kennedy, W. G. 2012. “Modeling Human Behaviour in Agent-Based Modeling.” In Agent-Based Models of Geographical Systems, edited by A. J. Heppenstall, A. T. Crooks, L. M. See, and M. Batty, 167–179. New York: Springer.10.1007/978-90-481-8927-4_9Search in Google Scholar
Kirkpatrick, S., C. D. Gelatt, and M. P. Vecchi. 1983. “Optimization by Simulated Annealing.” Science 220 (4598): 671–680.10.1126/science.220.4598.671Search in Google Scholar
Law, A. M. 2007. Simulation Modeling and Analysis, 4th ed. New York: McGraw Hill.Search in Google Scholar
Lee, B., J. Park, P. Gordon, J. Moore, and H. W. Richardson. 2012. “Estimating the State-by-State Economic Impacts of a Foot-and-Mouth Disease Attack.” International Regional Science Review 35 (1): 26–47.10.1177/0160017610390939Search in Google Scholar
Leonard, G. S., C. Stewart, T. M. Wilson, J. N. Procter, B. J. Scott, H. J. Keys, G. E. Jolly, J. B. Wardman, S. J. Cronin, and S. K. McBride. 2014. “Integrating Multidisciplinary Science, Modelling and Impact Data into Evolving, Syn-event Volcanic Hazard Mapping and Communication: A Case Study from the 2012 Tongariro Eruption Crisis, New Zealand.” Journal of Volcanology and Geothermal Research 286: 208–232.10.1016/j.jvolgeores.2014.08.018Search in Google Scholar
Long, J. C., F. C. Cunningham, and J. Braithwaite. 2013. “Bridges, Brokers and Boundary Spanners in Collaborative Networks: A Systematic Review.” BMC Health Services Research 13: 158.10.1186/1472-6963-13-158Search in Google Scholar
Malet, D., and M. Korbitz. 2015. “Bioterrorism and Local Agency Preparedness: Results from an Experimental Study in Risk Communication.” Journal of Homeland Security and Emergency Management 12 (4): 861–873.10.1515/jhsem-2014-0107Search in Google Scholar
Pleuss, J. 2016. “Using Simulated Annealing to Improve the Information Dissemination Network Structure of a Foreign Animal Disease Outbreak Response.” Master’s thesis, Kansas State University.Search in Google Scholar
Popovich, M. L., J. M. Henderson, and J. Stinn. 2002. “Information Technology in the Age of Emergency Public Health Response.” IEEE Engineering in Medicine and Biology Magazine 21 (5): 48–55.10.1109/MEMB.2002.1044164Search in Google Scholar
Savoia, E., L. Lin, and K. Viswanath. 2013. “Communications in Public Health Emergency Preparedness: A Systematic Review of the Literature.” Biosecurity and Bioterrorism-Biodefense Strategy Practice and Science 11 (3): 170–184.10.1089/bsp.2013.0038Search in Google Scholar
Savoia, E., S. B. Massin-Short, A. M. Rodday, L. A. Aaron, M. A. Higdon, and M. A. Stoto. 2009. “Public Health Systems Research in Emergency Preparedness: A Review of the Literature.” American Journal of Preventive Medicine 37 (2): 150–156.10.1016/j.amepre.2009.03.023Search in Google Scholar
Seki, A., O. Saito, H. Nago, K. Suzuki, K. Tomishima, K. Saito, and H. Takemiya. 2015. “Development of a Software Platform for Providing Environmental Monitoring Data for the Fukushima Daiichi Nuclear Accident.” Radiation Protection Dosimetry 164 (1–2): 97–102.10.1093/rpd/ncu355Search in Google Scholar
Shakeri, H., F. D. Sahneh, C. Scoglio, P. Poggi-Corradini, and V. M. Preciado. 2015. “Optimal Information Dissemination Strategy to Promote Preventive Behaviors in Multilayer Epidemic Networks.” Mathematical Biosciences and Engineering 12 (3): 609–623.10.3934/mbe.2015.12.609Search in Google Scholar
Sharma, R. K., B. R. Gurjar, A. V. Singhal, S. R. Wate, S. P. Ghuge, and R. Agrawal. 2015. “Automation of Emergency Response for Petroleum Oil Storage Terminals.” Safety Science 72: 262–273.10.1016/j.ssci.2014.09.019Search in Google Scholar
Sjoberg, E., G. C. Barker, J. Landgren, I. Griberg, J. E. Skiby, A. Tubbin, A. von Stapelmohr, M. Harenstam, M. Jansson, and R. Knutsson. 2013. “Social Media and Its Dual Use in Biopreparedness: Communication and Visualization Tools in an Animal Bioterrorism Incident.” Biosecurity and Bioterrorism-Biodefense Strategy Practice and Science 11: S264–S275.10.1089/bsp.2013.0014Search in Google Scholar
Slavkovikj, V., S. Verstockt, S. V. Hoecke, and R. V. de Walle. 2014. “Review of Wildfire Detection Using Social Media.” Fire Safety Journal 68: 109–118.10.1016/j.firesaf.2014.05.021Search in Google Scholar
Song, X., and X. Yan. 2012. “Influencing Factors of Emergency Information Spreading in Online Social Networks: A Simulation Approach.” Journal of Homeland Security and Emergency Management 9 (1): 1–14.10.1515/1547-7355.1979Search in Google Scholar
Vidal, T., T. G. Crainic, M. Gendreau, and C. Prins. 2013. “Heuristics for Multi-attribute Vehicle Routing Problems: A Survey and Synthesis.” European Journal of Operational Research 231 (1): 1–21.10.1016/j.ejor.2013.02.053Search in Google Scholar
Yang, L., S. H. Yang, and L. Plotnick. 2013. “How the Internet of Things Technology Enhances Emergency Response Operations.” Technological Forecasting and Social Change 80 (9): 1854–1867.10.1016/j.techfore.2012.07.011Search in Google Scholar
Yoon, H., S. S. Yoon, H. Kim, Y. J. Kim, B. Kim, and S. H. Wee. 2013. “Estimation of the Infection Window for the 2010/2011 Korean Foot-and-Mouth Disease Outbreak.” Osong Public Health and Research Perspectives 4 (3): 127.10.1016/j.phrp.2013.04.010Search in Google Scholar
Youssef, M., and C. Scoglio. 2013. “Mitigation of Epidemics in Contact Networks through Optimal Contact Adaptation.” Mathematical Biosciences and Engineering 10 (4): 1227–1251.10.3934/mbe.2013.10.1227Search in Google Scholar
Zhao, K., J. Yen, L. M. Ngamassi, C. Maitland, and A. H. Tapia. 2012. “Simulating Inter-organizational Collaboration Network: A Multi-relational and Event-Based Approach.” Simulation-Transactions of the Society for Modeling and Simulation International 88 (5): 617–633.10.1177/0037549711421942Search in Google Scholar
©2018 Walter de Gruyter GmbH, Berlin/Boston