{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T17:17:47Z","timestamp":1743009467762,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030182922"},{"type":"electronic","value":"9783030182939"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-18293-9_7","type":"book-chapter","created":{"date-parts":[[2019,4,17]],"date-time":"2019-04-17T18:07:44Z","timestamp":1555524464000},"page":"67-80","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Adaptation of the Rules of the Models of Games with Nature for the Design of Safety Systems"],"prefix":"10.1007","author":[{"given":"Adrian","family":"Gill","sequence":"first","affiliation":[]},{"given":"Piotr","family":"Smoczy\u0144ski","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,18]]},"reference":[{"issue":"3","key":"7_CR1","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.gloenvcha.2006.02.006","volume":"16","author":"WN Adger","year":"2006","unstructured":"Adger, W.N.: Vulnerability. Glob. Environ. Chang. 16(3), 268\u2013281 (2006)","journal-title":"Glob. Environ. Chang."},{"key":"7_CR2","doi-asserted-by":"crossref","unstructured":"Aven, T.: Risk Analysis (2015)","DOI":"10.1002\/9781119057819"},{"issue":"11","key":"7_CR3","doi-asserted-by":"publisher","first-page":"1862","DOI":"10.1016\/j.ress.2009.06.003","volume":"94","author":"T Aven","year":"2009","unstructured":"Aven, T., Heide, B.: Reliability and validity of risk analysis. Reliab. Eng. Syst. Saf. 94(11), 1862\u20131868 (2009)","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"7_CR4","unstructured":"Cempel, C.: Teoria i in\u017cynieria system\u00f3w-zasady i zastosowania my\u015blenia systemowego. ITE Radom, Radom (2008)"},{"key":"7_CR5","unstructured":"Gill, A.: Koncepcja zastosowania regu\u0142 decyzyjnych w doborze \u015brodk\u00f3w redukcji ryzyka zagro\u017ce\u0144. Pr. Nauk. Politech. Warsz. Transp, pp.181\u2013190 (2013)"},{"key":"7_CR6","unstructured":"Gill, A., Kadzi\u0144ski, A.: Hazard identification model. In: Proceedings of 20th International Scientific Conference. Transport Means (5\u20137 October 2016, Juodkrante, Lithuania), pp. 885\u2013890. Kaunas University of Technology (2016)"},{"key":"7_CR7","doi-asserted-by":"publisher","unstructured":"Gill, A., Smoczy\u0144ski, P.: Layered model for convenient designing of safety system upgrades in railways. Saf. Sci., in press. https:\/\/doi.org\/10.1016\/j.ssci.2017.11.024","DOI":"10.1016\/j.ssci.2017.11.024"},{"key":"7_CR8","doi-asserted-by":"crossref","unstructured":"Girdner, N.: An integrated system safety model of the national airspace system. In: Proceedings of the Annual Reliability and Maintainability Symposium (2016)","DOI":"10.1109\/RAMS.2016.7448012"},{"issue":"3","key":"7_CR9","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1016\/j.ssci.2008.06.004","volume":"47","author":"L Harms-Ringdahl","year":"2009","unstructured":"Harms-Ringdahl, L.: Analysis of safety functions and barriers in accidents. Saf. Sci. 47(3), 353\u2013363 (2009)","journal-title":"Saf. Sci."},{"key":"7_CR10","unstructured":"Harms-Ringdahl, L.: Guide to safety analysis for accident prevention. IRS Riskhantering AB (2013)"},{"key":"7_CR11","doi-asserted-by":"publisher","first-page":"271","DOI":"10.1016\/j.aap.2014.07.017","volume":"74","author":"BP Hughes","year":"2015","unstructured":"Hughes, B.P., et al.: System theory and safety models in Swedish, UK, Dutch and Australian road safety strategies. Accid. Anal. Prev. 74, 271\u2013278 (2015)","journal-title":"Accid. Anal. Prev."},{"key":"7_CR12","unstructured":"J\u0119drzejczyk, Z., et al.: Badania operacyjne w przyk\u0142adach i zadaniach. PWN, Warszawa (2002)"},{"key":"7_CR13","unstructured":"Kadzi\u0144ski, A.: Studium wybranych aspekt\u00f3w niezawodno\u015bci system\u00f3w oraz obiekt\u00f3w pojazd\u00f3w szynowych (2013)"},{"key":"7_CR14","unstructured":"Kadzi\u0144ski, A., et al.: The concept of method and models for risk management of hazards generated at railway crossings. In: Proceedings of 20th International Scientific Conference. Transport Means (5\u20137 October 2016, Juodkrante, Lithuania), Kaunas, Lithunania, pp. 297\u2013302 (2016)"},{"key":"7_CR15","first-page":"14","volume":"149","author":"D Majchrzyk","year":"2016","unstructured":"Majchrzyk, D., Tarka, I.: Kable i przewody elektryczne przeznaczone do taboru szynowego. Pr. Inst. Kolejnictwa. 149, 14\u201321 (2016)","journal-title":"Pr. Inst. Kolejnictwa."},{"key":"7_CR16","doi-asserted-by":"crossref","unstructured":"Meyer, T., Reniers, G.: Engineering Risk Management. De Gruyter (2016)","DOI":"10.1515\/9783110418040"},{"key":"7_CR17","unstructured":"Sikora, W.: Badania operacyjne. Polskie Wydawnictwo Ekonomiczne (2008)"},{"issue":"4","key":"7_CR18","doi-asserted-by":"publisher","first-page":"1304","DOI":"10.1109\/JSYST.2014.2344048","volume":"10","author":"Y Sun","year":"2016","unstructured":"Sun, Y., et al.: Multilayered impact evaluation model for attacking missions. IEEE Syst. J. 10(4), 1304\u20131315 (2016)","journal-title":"IEEE Syst. J."},{"issue":"1","key":"7_CR19","first-page":"325","volume":"12","author":"EV Tsenina","year":"2016","unstructured":"Tsenina, E.V., et al.: Indication of competitiveness of the potential of the region through hurwitz and wald criteria. Glob. J. Pure Appl. Math. 12(1), 325\u2013335 (2016)","journal-title":"Glob. J. Pure Appl. Math."},{"issue":"1","key":"7_CR20","first-page":"7","volume":"1","author":"Z Turskis","year":"2009","unstructured":"Turskis, Z., et al.: Multi-criteria optimization system for decision making in construction design and management. Eng. Econ. 1(1), 7\u201317 (2009)","journal-title":"Eng. Econ."},{"key":"7_CR21","doi-asserted-by":"crossref","DOI":"10.1002\/9781118904589","volume-title":"Basic Guide to System Safety","author":"JW Vincoli","year":"2014","unstructured":"Vincoli, J.W.: Basic Guide to System Safety, 3rd edn. Wiley, Hoboken (2014)","edition":"3"},{"issue":"2","key":"7_CR22","doi-asserted-by":"publisher","first-page":"265","DOI":"10.2307\/1969022","volume":"46","author":"A Wald","year":"1945","unstructured":"Wald, A.: Statistical decision functions which minimize the maximum risk. Ann. Math. 46(2), 265\u2013280 (1945)","journal-title":"Ann. Math."},{"issue":"1","key":"7_CR23","first-page":"320","volume":"45","author":"X Wu","year":"2012","unstructured":"Wu, X., Du, R.: A solution to decision making under uncertainty. J. Theor. Appl. Inf. Technol. 45(1), 320\u2013324 (2012)","journal-title":"J. Theor. Appl. Inf. Technol."},{"issue":"4","key":"7_CR24","doi-asserted-by":"publisher","first-page":"575","DOI":"10.1007\/s10559-008-9028-6","volume":"44","author":"OA Yemets","year":"2008","unstructured":"Yemets, O.A., Ustian, N.Y.: Games with combinatorial constraints. Cybern. Syst. Anal. 44(4), 575\u2013581 (2008)","journal-title":"Cybern. Syst. Anal."},{"issue":"2","key":"7_CR25","doi-asserted-by":"crossref","first-page":"259","DOI":"10.15388\/Informatica.2003.020","volume":"14","author":"EK Zavadskas","year":"2003","unstructured":"Zavadskas, E.K., et al.: Development of software for multiple criteria evaluation. Informatica 14(2), 259\u2013272 (2003)","journal-title":"Informatica"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Technology in Disaster Risk Reduction"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-18293-9_7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,15]],"date-time":"2023-09-15T21:02:06Z","timestamp":1694811726000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-18293-9_7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030182922","9783030182939"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-18293-9_7","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"18 April 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITDRR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology in Disaster Risk Reduction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sofia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bulgaria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2017","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 October 2017","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 October 2017","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itdrr2017","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"43","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"16","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"2","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"n\/a","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}