{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T00:45:04Z","timestamp":1761007504601,"version":"build-2065373602"},"reference-count":52,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T00:00:00Z","timestamp":1326240000000},"content-version":"vor","delay-in-days":375,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc of Assoc for Info"],"published-print":{"date-parts":[[2011,1]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Information sharing is vital for the successful completion of a group task. It's significance is emphasized in situations where group members are drawn from different organizations, where members do not know each other and when they are making complex, time dependent decisions within an uncertain environmental context. In this paper we address information sharing in such a context focusing on multi\u2010agency collaboration when responding to a major incident. The research was informed by the use of third generation Activity Theory. The results are reported here using three dimensions; social, technological and temporal. The paper provides recommendations to system designers and policy makers regarding ways to improve information sharing among members of multi\u2010agency teams.<\/jats:p>","DOI":"10.1002\/meet.2011.14504801039","type":"journal-article","created":{"date-parts":[[2012,1,11]],"date-time":"2012-01-11T12:23:03Z","timestamp":1326284583000},"page":"1-10","source":"Crossref","is-referenced-by-count":11,"title":["Information sharing during multi\u2010agency major incidents"],"prefix":"10.1002","volume":"48","author":[{"given":"Jyoti Laxmi","family":"Mishra","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"David K.","family":"Allen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Alan D.","family":"Pearman","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"311","published-online":{"date-parts":[[2012,1,11]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.08.034"},{"key":"e_1_2_7_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21441"},{"key":"e_1_2_7_4_1","volume":"2004","author":"Anon","year":"2010","journal-title":"Emergency Response and Recovery\u2010 Non Statutory Guidance Accompanying the Civil Contingencies Act"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1207\/s15327884mca1101_3"},{"key":"e_1_2_7_6_1","doi-asserted-by":"crossref","unstructured":"Chaiken J. M. &Dormont P.(1978).A Patrol Ca r Allocation Model: Capabilities and Algorithms Management Science: INFORMS: Institute for Operations Research.","DOI":"10.1287\/mnsc.24.12.1291"},{"key":"e_1_2_7_7_1","doi-asserted-by":"publisher","DOI":"10.17705\/1jais.00153"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2008.01.001"},{"key":"e_1_2_7_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20521"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511620539"},{"key":"e_1_2_7_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3894(01)00270-9"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-5973.2005.00466.x"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.5465\/AMR.2007.25275511"},{"key":"e_1_2_7_14_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-5973.2006.00479.x"},{"key":"e_1_2_7_15_1","doi-asserted-by":"publisher","DOI":"10.1002\/aris.1440360105"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1177\/0894439303259887"},{"key":"e_1_2_7_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/249563"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-5973.2008.00551.x"},{"volume-title":"Learning by Expanding: An Activity\u2010Theoretical Approach to Developmental Research","year":"1987","author":"Engestr\u00f6m Y.","key":"e_1_2_7_19_1"},{"key":"e_1_2_7_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0933-3657(95)00012-U"},{"key":"e_1_2_7_21_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1008648532192"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1080\/13639080020028747"},{"key":"e_1_2_7_23_1","first-page":"345","volume-title":"Activity Theory and Social Practice","author":"Engestr\u00f6m Y.","year":"1999"},{"key":"e_1_2_7_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20019"},{"volume-title":"Management Science: INFORMS","year":"1973","author":"Fitzsimmons J. A.","key":"e_1_2_7_25_1"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0061470"},{"key":"e_1_2_7_27_1","doi-asserted-by":"publisher","DOI":"10.1037\/0022-3514.65.5.959"},{"key":"e_1_2_7_28_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.1040.0253"},{"key":"e_1_2_7_29_1","unstructured":"Haddow G. D. Bullock J. A. &Coppola D. P.(2008).Introduction to Emergency Management.Butterworth\u2010 Heinemann Elsvier Inc. Ox ford."},{"key":"e_1_2_7_30_1","unstructured":"Heide E. A. D.(1989).Disaster Response: Principles of Preparation and Coordination. CV Mosby St. Louis Available online athttp:\/\/orgmail2.coe\u2010dmha.org\/dr\/Download.htm."},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1540-6210.2006.00588.x"},{"volume-title":"Management Science: INFORMS","year":"1973","author":"Kolesar P.","key":"e_1_2_7_32_1"},{"key":"e_1_2_7_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.20117"},{"key":"e_1_2_7_34_1","doi-asserted-by":"crossref","unstructured":"Marshall C. C. &Bly S.(2004).Sharing Encountered Information: Digital Libraries Get a Social Life. Paper presented at the JCDL.","DOI":"10.1145\/996350.996401"},{"key":"e_1_2_7_35_1","doi-asserted-by":"publisher","DOI":"10.1108\/09653560210453416"},{"key":"e_1_2_7_36_1","unstructured":"Mishra J. L. Allen D. K. &Pearman A. P.(2011).Activity Theory as a Methodological and Analytical Framework for Information Practices in Emergency Management. Paper presented at the Information Systems for Crisis Response and Management (ISCRAM). Available Online at:http:\/\/www.iscramlive.org\/ISCRAM2011\/proceedings\/papers\/140.pdf"},{"issue":"3","key":"e_1_2_7_37_1","doi-asserted-by":"crossref","first-page":"601","DOI":"10.2307\/259297","article-title":"Understanding the Influence of National Culture on the Development of Trust","volume":"23","author":"Patricia M. D.","year":"1998","journal-title":"Academy of Management. The Academy of Management Review"},{"key":"e_1_2_7_38_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-6486.1988.tb00043.x"},{"key":"e_1_2_7_39_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-5973.00173"},{"key":"e_1_2_7_40_1","unstructured":"Rhodes K. A. &JenkinsJr W. O.(2007).First Responders: Much Work Remains to Improve Communications Interoperability: Gao\u201007\u2010301.GAO Reports 1."},{"key":"e_1_2_7_41_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-7717.2008.01081.x"},{"key":"e_1_2_7_42_1","doi-asserted-by":"publisher","DOI":"10.1111\/1468-5973.00195"},{"key":"e_1_2_7_43_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1468-5973.2007.00507.x"},{"key":"e_1_2_7_44_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-7717.2008.01071.x"},{"volume-title":"Management Science: INFORMS","year":"1969","author":"Savas E. S.","key":"e_1_2_7_45_1"},{"key":"e_1_2_7_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.lisr.2008.10.007"},{"key":"e_1_2_7_47_1","unstructured":"Secretariat C. C.(Civil Contingencies Act 2004). A Short Guide (Revised). Retrieved. fromwww.cabinetoffice.gov.uk\/media\/132428\/15mayshortgu ide.pdf."},{"issue":"4","key":"e_1_2_7_48_1","article-title":"Challenges in Sharing Information Effectively: Examples from Command and Control","volume":"11","author":"Sonnenwald D. H.","year":"2006","journal-title":"Information Research"},{"key":"e_1_2_7_49_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(99)00039-4"},{"issue":"1","key":"e_1_2_7_50_1","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1037\/0022-3514.53.1.81","article-title":"Effects of Information Load and Percentage of Shared Information on the Dissemination of Unshared Information during Group Discussion","volume":"53","author":"Stasser G.","year":"1987","journal-title":"Journal of Personality & Social Psychology"},{"key":"e_1_2_7_51_1","doi-asserted-by":"publisher","DOI":"10.1037\/1089-2699.2.1.18"},{"key":"e_1_2_7_52_1","doi-asserted-by":"publisher","DOI":"10.1002\/asi.21526"},{"key":"e_1_2_7_53_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872007X312478"}],"container-title":["Proceedings of the American Society for Information Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fmeet.2011.14504801039","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/meet.2011.14504801039","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,20]],"date-time":"2025-10-20T13:52:09Z","timestamp":1760968329000},"score":1,"resource":{"primary":{"URL":"https:\/\/asistdl.onlinelibrary.wiley.com\/doi\/10.1002\/meet.2011.14504801039"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,1]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,1]]}},"alternative-id":["10.1002\/meet.2011.14504801039"],"URL":"https:\/\/doi.org\/10.1002\/meet.2011.14504801039","archive":["Portico"],"relation":{},"ISSN":["0044-7870","1550-8390"],"issn-type":[{"type":"print","value":"0044-7870"},{"type":"electronic","value":"1550-8390"}],"subject":[],"published":{"date-parts":[[2011,1]]}}}