{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T21:09:40Z","timestamp":1760044180335,"version":"3.40.3"},"publisher-location":"Cham","reference-count":26,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030489380"},{"type":"electronic","value":"9783030489397"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-48939-7_15","type":"book-chapter","created":{"date-parts":[[2020,6,3]],"date-time":"2020-06-03T23:09:32Z","timestamp":1591225772000},"page":"168-181","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cyber Crisis Management Roles \u2013 A Municipality Responsibility Case Study"],"prefix":"10.1007","author":[{"given":"Grethe","family":"\u00d8stby","sequence":"first","affiliation":[]},{"given":"Basel","family":"Katt","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,6,4]]},"reference":[{"key":"15_CR1","unstructured":"Bruer, A.: Ny unders\u00f8kelse: Stort etterslep p\u00e5 mellomlederes IT-kompetanse i offentlig sector. digi. no, 09 August 2017"},{"key":"15_CR2","unstructured":"Bauger\u00f8d Stokke, O.P.: Advarer it-sjefer mot effektivitet. Computerworld, 23 March 2009"},{"key":"15_CR3","unstructured":"Office of the Auditor General of Norway, admin report nb. 1 (2018)"},{"key":"15_CR4","unstructured":"NOU 13 Lysne commitee: Digital vulnerability \u2013 safe society (2015)"},{"key":"15_CR5","unstructured":"NorSIS: The study of municipalities common need of competence-center to deal with handling ICT-security incidents (2017)"},{"key":"15_CR6","unstructured":"Lagadec, P.: Preventing Chaos in a Crisis Strategies for Prevention, Control and Damage Limitation (1993). Preface: tools for thinking about, preventing, and managing crisis ix"},{"key":"15_CR7","unstructured":"DSB: Municipality Guidance, Emergency Duty (2017)"},{"issue":"2","key":"15_CR8","first-page":"1","volume":"9","author":"B Walker","year":"2004","unstructured":"Walker, B., Holling, C.S., Carpenter, S.R., Kinzig, A.: Resilience, adaptability and transformability in social\u2013ecological systems. Ecol. Soc. 9(2), 1\u20139 (2004)","journal-title":"Ecol. Soc."},{"issue":"1","key":"15_CR9","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1111\/j.1468-5973.2007.00501.x","volume":"15","author":"M De Bruijne","year":"2007","unstructured":"De Bruijne, M., Van Eeten, M.: Systems that should have failed: critical infrastructure protection in an institutionally fragmented environment. J. Contingencies Crisis Manag. 15(1), 18\u201329 (2007)","journal-title":"J. Contingencies Crisis Manag."},{"key":"15_CR10","unstructured":"De Guzman, E.M.: Towards total disaster risk management approach (2002)"},{"issue":"1","key":"15_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1108\/17595901011026454","volume":"1","author":"R Haigh","year":"2010","unstructured":"Haigh, R., Amaratunga, D.: An integrative review of the built environment discipline\u2019s role in the development of society\u2019s resilience to disasters. Int. J. Disaster Resil. Built Environ. 1(1), 11\u201324 (2010)","journal-title":"Int. J. Disaster Resil. Built Environ."},{"key":"15_CR12","unstructured":"Anderson, E.: How to comly with the 5 functions of the NIST cybersecurity framework. Forecoun (2017). https:\/\/www.secmatters.com\/blog\/how-to-comply-with-the-5-functions-of-the-nist-cybersecurity-framework"},{"key":"15_CR13","doi-asserted-by":"crossref","unstructured":"Kulikova, O., Heil, R., Van Den Berg, J., Pieters, W.: Cyber Crisis Management: a decision-support framework for disclosing security incident information. In: Proceedings of the 2012 ASE International Conference on Cyber Security, CyberSecurity 2012, pp. 103\u2013112 (2013)","DOI":"10.1109\/CyberSecurity.2012.20"},{"key":"15_CR14","unstructured":"FEMA: The Federal Emergency Management Agency Publication 1 (2016)"},{"issue":"4","key":"15_CR15","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1016\/j.cose.2011.12.010","volume":"31","author":"SL Pfleeger","year":"2012","unstructured":"Pfleeger, S.L., Caputo, D.D.: Leveraging behavioral science to mitigate cyber security risk. Comput. Secur. 31(4), 597\u2013611 (2012)","journal-title":"Comput. Secur."},{"key":"15_CR16","series-title":"Proceedings of the I-ESA Conferences","doi-asserted-by":"publisher","first-page":"13","DOI":"10.1007\/978-3-319-04948-9_2","volume-title":"Enterprise Interoperability VI","author":"WMP van der Aalst","year":"2014","unstructured":"van der Aalst, W.M.P.: Data scientist: the engineer of the future. In: Mertins, K., B\u00e9naben, F., Poler, R., Bourri\u00e8res, J.-P. (eds.) Enterprise Interoperability VI. PIC, vol. 7, pp. 13\u201326. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-04948-9_2"},{"issue":"4","key":"15_CR17","doi-asserted-by":"publisher","first-page":"895","DOI":"10.1093\/jopart\/mun033","volume":"19","author":"DP Moynihan","year":"2009","unstructured":"Moynihan, D.P.: The network governance of crisis response: case studies of incident command systems. J. Public Adm. Res. Theory 19(4), 895\u2013915 (2009)","journal-title":"J. Public Adm. Res. Theory"},{"key":"15_CR18","unstructured":"FEMA: National incident management system (2017)"},{"key":"15_CR19","unstructured":"Locke, G., Gallagher, P.D.: Managing Information Security Risk Organization, Mission, and Information System View Joint Task Force Transformation Initiative, pp. 800\u2013839. NIST Special Publication (2011)"},{"issue":"3","key":"15_CR20","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1111\/gove.12309","volume":"31","author":"S Boeke","year":"2018","unstructured":"Boeke, S.: National cyber crisis management: different European approaches. Governance 31(3), 449\u2013464 (2018)","journal-title":"Governance"},{"key":"15_CR21","unstructured":"Kowalski, S.: IT insecurity: a multi-disciplinary inquiry. Stockholm University (1994)"},{"key":"15_CR22","doi-asserted-by":"crossref","unstructured":"Kuechler, W., Vaishnavi, V.: A framework for theory development in design science research: multiple perspectives (2012)","DOI":"10.17705\/1jais.00300"},{"key":"15_CR23","doi-asserted-by":"crossref","unstructured":"Karokola, G.R.: A framework for Securing e-Government Services: the case of Tanzania. Stockholm University (2012)","DOI":"10.1109\/HICSS.2013.208"},{"key":"15_CR24","unstructured":"Justis-og beredskapsdepartementet: Lov om kommunal beredskapsplikt, sivile beskyttelsestiltak og Sivilforsvaret (sivilbeskyttelsesloven). Norwegian Government (2010)"},{"key":"15_CR25","unstructured":"DSB: Guidance to holistic risk and vulnerability assessment in the municipality. DSB (2019)"},{"key":"15_CR26","unstructured":"Norwegian government, FOR-2011-08-22-894. Norwegian Government (2011)"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Technology in Disaster Risk Reduction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-48939-7_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,4]],"date-time":"2024-06-04T00:03:40Z","timestamp":1717459420000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-48939-7_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030489380","9783030489397"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-48939-7_15","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"4 June 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITDRR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology in Disaster Risk Reduction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Kyiv","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ukraine","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itdrr2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/itdrr.unwe.bg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"53","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"32% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}