{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,7]],"date-time":"2025-11-07T08:49:11Z","timestamp":1762505351652,"version":"3.38.0"},"reference-count":118,"publisher":"SAGE Publications","issue":"1","license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/journals.sagepub.com\/page\/policies\/text-and-data-mining-license"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["SIMULATION"],"published-print":{"date-parts":[[2008,1]]},"abstract":"<jats:p> The nation's emergency responders need to work in a coordinated, well-planned manner to best mitigate the impact of an emergency incident. They need to be trained and ready to act in view of the increased security threat. The training has been traditionally provided using live eXercises at great eXpense. Simulation and gaming systems could provide a wider range of training at a much lower cost. Integrated gaming and simulation systems should be used for training decision makers and responders on the same scenarios, preparing them to work together as a team. A large number of simulation and gaming tools are needed to address the huge number of scenarios that can be of interest for incident management. An efficient approach will be to develop a library of interoperable component models that can be assembled together in different combinations to represent a range of scenarios. Standard specifications of the component models are needed to stimulate the development. The specifications should allow for alternate competing implementations. This paper presents a conceptual architecture that partitions the incident management simulation and gaming solution space into standard components. Recent literature is surveyed to identify related models and\/or simulators where available for each defined component. The suggested components and the survey lay some preliminary groundwork in developing a holistic model of the incident response domain. <\/jats:p>","DOI":"10.1177\/0037549708088956","type":"journal-article","created":{"date-parts":[[2008,4,21]],"date-time":"2008-04-21T15:24:02Z","timestamp":1208791442000},"page":"3-25","source":"Crossref","is-referenced-by-count":14,"title":["Components of an Incident Management Simulation and Gaming Framework and Related Developments"],"prefix":"10.1177","volume":"84","author":[{"given":"Sanjay","family":"Jain","sequence":"first","affiliation":[{"name":"Department of Decision Sciences School of Business George Washington University Washington, DC 20052, USA,"}]},{"given":"Charles R.","family":"McLean","sequence":"additional","affiliation":[{"name":"Manufacturing Systems Integration Division Manufacturing Engineering Laboratory National Institute of Standards and Technology Gaithersburg, MD 20899-8260, USA"}]}],"member":"179","published-online":{"date-parts":[[2008,1,1]]},"reference":[{"volume-title":"Workshop Report, Relevant Standards and Tools, National Institute of Standards and Technology Internal Report, NISTIR-7071","author":"Jain, S.","key":"atypb1"},{"volume-title":"TOPOFF 3 Frequently Asked Questions","year":"2006","author":"Department of Homeland Security.","key":"atypb2"},{"volume-title":"Modeling and Simulation for Emergency Response, Lawrence Livermore National Laboratory","year":"1985","author":"Sullivan, Thomas J.","key":"atypb3"},{"volume-title":"Urban Security Project","year":"2001","author":"Lanl.","key":"atypb4"},{"volume-title":"Interdependent Infrastructure Modeling, Simulation, and Analysis Project (SOFIA)","year":"2000","author":"Lanl.","key":"atypb5"},{"volume-title":"Proceedings of the Seventeenth Workshop on Parallel and Distributed Simulation","author":"Steinman, J.S.","key":"atypb6"},{"volume-title":"Proceedings of the Interservice\/Industry Training, Simulation, and Education Conference (I\/ITSEC)","author":"Tolk, A.","key":"atypb7"},{"volume-title":"In Proceedings of the 2003 Winter Simulation Conference","author":"Bowers III, F.A.","key":"atypb8"},{"key":"atypb9","doi-asserted-by":"publisher","DOI":"10.1109\/NAECON.2000.894935"},{"volume-title":"The Dynamic Information Architecture System: An Advanced Simulation Framework For Military And Civilian Applications","year":"1998","author":"Campbell, A.P.","key":"atypb10"},{"volume-title":"In Proceedings of the 2000 Advanced Simulation Technologies Conference","author":"McLean, C.R.","key":"atypb11"},{"key":"atypb12","doi-asserted-by":"publisher","DOI":"10.2202\/1547-7355.1194"},{"volume-title":"National Response Plan","year":"2004","author":"U.S. Department of Homeland Security.","key":"atypb13"},{"key":"atypb14","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4471-0367-7_2"},{"volume-title":"IEEE 1516 Standard for Modeling and Simulation (M&S) High Level Architecture (HLA) - Framework and Rules","year":"2000","author":"Ieee.","key":"atypb15"},{"volume-title":"Creating Computer Simulations: An Introduction to the High Level Architecture","year":"1999","author":"Kuhl, F.","key":"atypb16"},{"key":"atypb17","doi-asserted-by":"publisher","DOI":"10.1109\/WSC.2000.899138"},{"volume-title":"Proceedings of the 16th Workshop on Parallel and Distributed Simulation","author":"Cai, W.","key":"atypb18"},{"volume-title":"Proceedings of 2005 Fall Simulation Interoperability Workshop, Simulation Interoperability and Standards Organization (SISO)","author":"M\u00f6ller, B.","key":"atypb19"},{"volume-title":"Huntsville Simulation Conference","author":"McGrath, D.","key":"atypb20"},{"volume-title":"Proceedings of the 15th International Conference on Distributed Computing Systems","author":"Greenhalgh, C.","key":"atypb21"},{"volume-title":"In Proceedings of 3rd Symposium on Networked Systems Design and Implementation","author":"Bharambe, A.","key":"atypb22"},{"key":"atypb23","doi-asserted-by":"publisher","DOI":"10.1088\/0967-1846\/5\/3\/002"},{"volume-title":"Proceedings of the Ninth IEEE International Symposium on Distributed Simulation and Real-Time Applications","author":"McGrath, D.","key":"atypb24"},{"volume-title":"Proceedings of the Spring 2004 Simulation Interoperability Workshop","author":"Page, E.H.","key":"atypb25"},{"key":"atypb26","doi-asserted-by":"publisher","DOI":"10.1177\/875647930600300104"},{"volume-title":"In Proceedings of 2007 Winter Simulation Conference","author":"Yilmaz, L.","key":"atypb27"},{"volume-title":"In Proceedings of 2007 Winter Simulation Conference","author":"Tolk, A.","key":"atypb28"},{"key":"atypb29","doi-asserted-by":"publisher","DOI":"10.1177\/0037549707085541"},{"volume-title":"Proceedings of 2006 Spring Simulation Interoperability Workshop, Simulation Interoperability and Standards Organization (SISO)","author":"Tolk, A.","key":"atypb30"},{"key":"atypb31","doi-asserted-by":"publisher","DOI":"10.1145\/259207.259235"},{"volume-title":"Massively Multiplayer Game Development","year":"2003","author":"Alexander, T.","key":"atypb32"},{"key":"atypb33","doi-asserted-by":"publisher","DOI":"10.7551\/mitpress\/3374.001.0001"},{"key":"atypb34","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-0526(199905\/06)4:5<41::AID-CPLX9>3.0.CO;2-F"},{"key":"atypb35","doi-asserted-by":"publisher","DOI":"10.1016\/j.autcon.2005.06.006"},{"key":"atypb36","doi-asserted-by":"publisher","DOI":"10.1109\/2945.928167"},{"volume-title":"Personal communication","year":"2006","author":"Thalmann, D.","key":"atypb37"},{"volume-title":"Proceedings of the 2006 Winter Simulation Conference","author":"Shendarkar, A.","key":"atypb38"},{"key":"atypb39","doi-asserted-by":"publisher","DOI":"10.1177\/0037549703253494"},{"key":"atypb40","doi-asserted-by":"publisher","DOI":"10.1080\/15472450490523892"},{"key":"atypb41","doi-asserted-by":"publisher","DOI":"10.1109\/TVT.2002.1002499"},{"key":"atypb42","doi-asserted-by":"publisher","DOI":"10.1016\/j.compbiomed.2005.12.002"},{"key":"atypb43","doi-asserted-by":"publisher","DOI":"10.1177\/0037549706074487"},{"key":"atypb44","doi-asserted-by":"publisher","DOI":"10.1177\/104687810103200209"},{"key":"atypb45","doi-asserted-by":"publisher","DOI":"10.1111\/j.0022-4146.2005.00365.x"},{"key":"atypb46","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2005.09.008"},{"key":"atypb47","doi-asserted-by":"publisher","DOI":"10.1016\/j.cageo.2005.10.023"},{"key":"atypb48","doi-asserted-by":"publisher","DOI":"10.1080\/13632460409350506"},{"key":"atypb49","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2006.03.001"},{"key":"atypb50","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2005.10.008"},{"key":"atypb51","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2004.07.005"},{"key":"atypb52","doi-asserted-by":"publisher","DOI":"10.1177\/0037549705052230"},{"key":"atypb53","doi-asserted-by":"publisher","DOI":"10.1177\/0037549704050918"},{"key":"atypb54","doi-asserted-by":"publisher","DOI":"10.1177\/1046878105284450"},{"key":"atypb55","doi-asserted-by":"publisher","DOI":"10.1080\/10473289.2007.10465329"},{"key":"atypb56","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlp.2005.06.006"},{"volume-title":"CT-Analyst: Portable Tool for Dispersion Prediction with Zero Delay and High Fidelity","year":"2002","author":"Boris, J.P.","key":"atypb57"},{"key":"atypb58","doi-asserted-by":"publisher","DOI":"10.1111\/j.0272-4332.2003.00387.x"},{"key":"atypb59","doi-asserted-by":"publisher","DOI":"10.1111\/j.1600-0668.2004.00318.x"},{"key":"atypb60","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)0733-9372(2004)130:9(932)"},{"key":"atypb61","doi-asserted-by":"publisher","DOI":"10.1007\/s10750-006-0411-x"},{"key":"atypb62","doi-asserted-by":"publisher","DOI":"10.1007\/s11284-005-0092-3"},{"key":"atypb63","doi-asserted-by":"publisher","DOI":"10.1046\/j.1365-2664.2001.00616.x"},{"key":"atypb64","doi-asserted-by":"publisher","DOI":"10.1177\/0037549706073698"},{"key":"atypb65","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)0733-9399(2003)129:11(1288)"},{"key":"atypb66","doi-asserted-by":"publisher","DOI":"10.1155\/2000\/538260"},{"key":"atypb67","doi-asserted-by":"publisher","DOI":"10.1016\/j.envsoft.2004.07.004"},{"key":"atypb68","doi-asserted-by":"publisher","DOI":"10.1016\/S1364-8152(03)00156-7"},{"key":"atypb69","doi-asserted-by":"publisher","DOI":"10.1177\/0037549704042730"},{"key":"atypb70","doi-asserted-by":"publisher","DOI":"10.1191\/0143624406bt152oa"},{"key":"atypb71","doi-asserted-by":"publisher","DOI":"10.1016\/j.atmosenv.2006.10.010"},{"key":"atypb72","doi-asserted-by":"publisher","DOI":"10.1080\/10473289.2007.10465311"},{"key":"atypb73","doi-asserted-by":"publisher","DOI":"10.1177\/0037549706068826"},{"key":"atypb74","doi-asserted-by":"publisher","DOI":"10.1177\/0037549706068943"},{"key":"atypb75","doi-asserted-by":"publisher","DOI":"10.1177\/003754970107600221"},{"key":"atypb76","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(02)00369-7"},{"volume-title":"Proceedings of 9th AGILE Conference on Geographic Information Science","author":"Tang, L.","key":"atypb77"},{"key":"atypb78","doi-asserted-by":"publisher","DOI":"10.1080\/0042098032000094432"},{"key":"atypb79","doi-asserted-by":"publisher","DOI":"10.1080\/09537280600866611"},{"key":"atypb80","doi-asserted-by":"publisher","DOI":"10.1287\/inte.1060.0257"},{"key":"atypb81","doi-asserted-by":"publisher","DOI":"10.1287\/inte.1060.0228"},{"key":"atypb82","doi-asserted-by":"publisher","DOI":"10.1177\/0037549707083111"},{"key":"atypb83","doi-asserted-by":"publisher","DOI":"10.1287\/inte.1060.0241"},{"key":"atypb84","doi-asserted-by":"publisher","DOI":"10.1504\/IJRAM.2006.009552"},{"key":"atypb85","doi-asserted-by":"publisher","DOI":"10.1177\/0002764204268987"},{"key":"atypb86","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)1527-6988(2002)3:1(19)"},{"issue":"2","key":"atypb87","volume":"7","author":"Raczynski, S.","year":"2004","journal-title":"Journal of Artificial Societies and Social Simulation"},{"issue":"2","key":"atypb88","volume":"6","author":"Tsvetovat, M.","year":"2005","journal-title":"Journal of Social Structure"},{"key":"atypb89","doi-asserted-by":"publisher","DOI":"10.1007\/s10588-006-7082-z"},{"key":"atypb90","doi-asserted-by":"publisher","DOI":"10.1080\/07408170600940005"},{"key":"atypb91","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.20178"},{"volume-title":"Using Agent-Based Distillations to Explore Logistics Support to Urban, Humanitarian Assistance\/Disaster Relief Operations","year":"2003","author":"Wolf, E.","key":"atypb92"},{"volume-title":"MANA: Map Aware Non-uniform Automata Version 2.0 User's Manual","year":"2002","author":"Stephen, R.T.","key":"atypb93"},{"key":"atypb94","doi-asserted-by":"publisher","DOI":"10.1016\/S0377-2217(03)00141-3"},{"key":"atypb95","doi-asserted-by":"publisher","DOI":"10.1108\/09574090610689952"},{"key":"atypb96","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRS.2006.889140"},{"key":"atypb97","doi-asserted-by":"publisher","DOI":"10.1109\/TPWRD.2006.877085"},{"key":"atypb98","doi-asserted-by":"publisher","DOI":"10.1016\/j.epsr.2006.06.008"},{"key":"atypb99","doi-asserted-by":"publisher","DOI":"10.1177\/0037549705053172"},{"key":"atypb100","doi-asserted-by":"publisher","DOI":"10.1177\/0037549705053167"},{"key":"atypb101","doi-asserted-by":"publisher","DOI":"10.1080\/07408170600865400"},{"key":"atypb102","doi-asserted-by":"publisher","DOI":"10.1177\/0037549704042860"},{"key":"atypb103","doi-asserted-by":"publisher","DOI":"10.1177\/0037549705052771"},{"key":"atypb104","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)0733-9488(2007)133:1(51)"},{"key":"atypb105","doi-asserted-by":"publisher","DOI":"10.1177\/0037549702078003528"},{"key":"atypb106","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2004.07.007"},{"key":"atypb107","doi-asserted-by":"publisher","DOI":"10.1177\/0037549706065544"},{"key":"atypb108","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2006.1637958"},{"key":"atypb109","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2005.07.007"},{"issue":"4","key":"atypb110","volume":"3","author":"Polsani, P.R.","year":"2003","journal-title":"Journal of Digital Information"},{"volume-title":"Incident Commander: A Crisis Training Simulation","year":"2007","author":"Breakaway Games.","key":"atypb111"},{"volume-title":"CNET Networks, Firefighter Command: Raging Inferno","year":"2007","key":"atypb112"},{"journal-title":"Wired","year":"2005","author":"Christopher, A.","key":"atypb113"},{"key":"atypb114","doi-asserted-by":"publisher","DOI":"10.1177\/1046878104266223"},{"key":"atypb115","doi-asserted-by":"publisher","DOI":"10.1016\/j.ssci.2005.12.006"},{"key":"atypb116","doi-asserted-by":"publisher","DOI":"10.1016\/S0747-5632(01)00027-9"},{"key":"atypb117","doi-asserted-by":"publisher","DOI":"10.1162\/105474600300040376"},{"key":"atypb118","doi-asserted-by":"publisher","DOI":"10.1177\/0037549707083109"}],"container-title":["SIMULATION"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0037549708088956","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/journals.sagepub.com\/doi\/pdf\/10.1177\/0037549708088956","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,3]],"date-time":"2025-03-03T03:41:40Z","timestamp":1740973300000},"score":1,"resource":{"primary":{"URL":"https:\/\/journals.sagepub.com\/doi\/10.1177\/0037549708088956"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,1]]},"references-count":118,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2008,1]]}},"alternative-id":["10.1177\/0037549708088956"],"URL":"https:\/\/doi.org\/10.1177\/0037549708088956","relation":{},"ISSN":["0037-5497","1741-3133"],"issn-type":[{"type":"print","value":"0037-5497"},{"type":"electronic","value":"1741-3133"}],"subject":[],"published":{"date-parts":[[2008,1]]}}}