{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:16:41Z","timestamp":1754162201112,"version":"3.41.2"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030814687"},{"type":"electronic","value":"9783030814694"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-81469-4_16","type":"book-chapter","created":{"date-parts":[[2021,7,30]],"date-time":"2021-07-30T01:02:43Z","timestamp":1627606963000},"page":"193-205","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Opportunities and Challenges of ICT in Emergency Processes"],"prefix":"10.1007","author":[{"given":"Bettina","family":"Pospisil","sequence":"first","affiliation":[]},{"given":"Walter","family":"Seb\u00f6ck","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,7,31]]},"reference":[{"key":"16_CR1","volume-title":"Protecting Emergency Responders: Lessons Learned from Terrorist Attacks","author":"BA Jackson","year":"2002","unstructured":"Jackson, B.A., et al.: Protecting Emergency Responders: Lessons Learned from Terrorist Attacks. RAND Corporation, Santa Monica (2002)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Wyatt, S.: Non-users also matter: the construction of users and non-users of the Internet. In: Oudshoorn, N., Pinch, T. (eds.) How Users Matter. The Co-Construction of Users and Technology, pp. 67\u201379. MIT Press, Cambridge (2003)","DOI":"10.7551\/mitpress\/3592.003.0006"},{"issue":"1","key":"16_CR3","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1016\/s0160-791x(02)00062-3","volume":"25","author":"N Selwyn","year":"2003","unstructured":"Selwyn, N.: Apart from technology: understanding people\u2019s non-use of information and communication technologies in everyday life. Technol. Soc. 25(1), 99\u2013116 (2003). https:\/\/doi.org\/10.1016\/s0160-791x(02)00062-3","journal-title":"Technol. Soc."},{"issue":"3","key":"16_CR4","doi-asserted-by":"publisher","first-page":"761","DOI":"10.1287\/isre.1110.0387","volume":"23","author":"L Yang","year":"2012","unstructured":"Yang, L., Su, G., Yuan, H.: Design principles of integrated information platform for emergency responses: the case of 2008 Beijing Olympic Games. Inf. Syst. Res. 23(3), 761\u2013786 (2012). https:\/\/doi.org\/10.1287\/isre.1110.0387","journal-title":"Inf. Syst. Res."},{"issue":"6","key":"16_CR5","doi-asserted-by":"publisher","first-page":"728","DOI":"10.1111\/0033-3352.00143","volume":"61","author":"AK Donahue","year":"2001","unstructured":"Donahue, A.K., Philip, G.J.: A framework for analyzing emergency management with an application to federal budgeting. Public Adm. Rev. 61(6), 728\u2013740 (2001). https:\/\/doi.org\/10.1111\/0033-3352.00143","journal-title":"Public Adm. Rev."},{"issue":"S1","key":"16_CR6","doi-asserted-by":"publisher","first-page":"165","DOI":"10.2307\/3135011","volume":"45","author":"D McLoughlin","year":"1985","unstructured":"McLoughlin, D.: A Framework for integrated emergency management. Public Adm. Rev. 45(S1), 165\u2013172 (1985). https:\/\/doi.org\/10.2307\/3135011","journal-title":"Public Adm. Rev."},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"100012","DOI":"10.1016\/j.pdisas.2019.100012","volume":"2","author":"M Sakurai","year":"2019","unstructured":"Sakurai, M., Murayama, Y.: Information technologies and disaster management \u2013 benefits and issues. Prog. Disaster Sci. 2, 100012 (2019). https:\/\/doi.org\/10.1016\/j.pdisas.2019.100012","journal-title":"Prog. Disaster Sci."},{"issue":"1","key":"16_CR8","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1111\/j.1467-7717.2010.01192.x","volume":"35","author":"C Reddick","year":"2011","unstructured":"Reddick, C.: Information technology and emergency management: preparedness and planning in US states. Disasters 35(1), 45\u201361 (2011). https:\/\/doi.org\/10.1111\/j.1467-7717.2010.01192.x","journal-title":"Disasters"},{"issue":"4","key":"16_CR9","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1111\/j.0361-3666.2003.00237","volume":"27","author":"RW Perry","year":"2003","unstructured":"Perry, R.W., Lindell, M.: Preparedness for emergency response: guidelines for the emergency planning process. Disasters 27(4), 336\u2013350 (2003). https:\/\/doi.org\/10.1111\/j.0361-3666.2003.00237","journal-title":"Disasters"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Rao, R.R., Eisenberg, J., Schmitt T.: Improving Disaster Management: The Role of IT in Mitigation, Preparedness, Response, and Recovery. National Academies Press, Washington, D.C. (2007). http:\/\/dx.doi.org\/10.17226\/11824","DOI":"10.17226\/11824"},{"issue":"2","key":"16_CR11","doi-asserted-by":"publisher","first-page":"100","DOI":"10.1108\/ijes-03-2017-0012","volume":"7","author":"C Rogers","year":"2018","unstructured":"Rogers, C., Scally, E.: Police use of technology: Insights from the literature. Int. J. Emerg. Serv. 7(2), 100\u2013110 (2018). https:\/\/doi.org\/10.1108\/ijes-03-2017-0012","journal-title":"Int. J. Emerg. Serv."},{"key":"16_CR12","doi-asserted-by":"publisher","unstructured":"Witzel, A.: The problem-centered interview. Forum: Qual. Soc. Res. 1(1) (2000). https:\/\/doi.org\/10.17169\/fqs-1.1.1132. Article no. 22","DOI":"10.17169\/fqs-1.1.1132"},{"issue":"5","key":"16_CR13","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1080\/13645570701401370","volume":"11","author":"E Scheibelhofer","year":"2008","unstructured":"Scheibelhofer, E.: Combining narration-based interviews with topical interviews: methodological reflections on research practices. Int. J. Soc. Res. Methodol. 11(5), 403\u2013416 (2008). https:\/\/doi.org\/10.1080\/13645570701401370","journal-title":"Int. J. Soc. Res. Methodol."},{"key":"16_CR14","series-title":"A Practical Guide Through Qualitative Analysis","volume-title":"Constructing Grounded Theory","author":"K Charmaz","year":"2006","unstructured":"Charmaz, K.: Constructing Grounded Theory. A Practical Guide Through Qualitative Analysis, Sage Publications, London (2006)"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Rip, A., Robinson, D.K.R.: Constructive technology assessment and the methodology of insertion. In: Doorn, N., van de Poel, I., Schuurbiers, D., Gorman, M.E. (eds.) Early Engagement and New Technologies. Opening Up the Laboratory, pp. 37\u201353. Springer, Dodrecht (2014). http:\/\/dx.doi.org\/10.4324\/9780429465734-8","DOI":"10.1007\/978-94-007-7844-3_3"},{"issue":"1","key":"16_CR16","doi-asserted-by":"publisher","first-page":"153","DOI":"10.1177\/0306312706069439","volume":"37","author":"S Hilgartner","year":"2007","unstructured":"Hilgartner, S.: Overflow and containment in the aftermath of disaster. Soc. Stud. Sci. 37(1), 153\u2013158 (2007). https:\/\/doi.org\/10.1177\/0306312706069439","journal-title":"Soc. Stud. Sci."},{"issue":"2","key":"16_CR17","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1177\/1466802501001002001","volume":"1","author":"JBL Chan","year":"2001","unstructured":"Chan, J.B.L.: The technological game: how information technology is transforming police practice. Crim. Justice 1(2), 139\u2013159 (2001). https:\/\/doi.org\/10.1177\/1466802501001002001","journal-title":"Crim. Justice"},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Chies, S.: Change Management bei der Einf\u00fchrung neuer IT-Technologien: Mitarbeiter ins Boot holen \u2013 mit angewandter Psychologie. Springer Fachmedien, Wiesbaden (2016). http:\/\/dx.doi.org\/10.1007\/978-3-658-11635-4","DOI":"10.1007\/978-3-658-11635-4"},{"issue":"1","key":"16_CR19","doi-asserted-by":"publisher","first-page":"63","DOI":"10.4135\/9781452231266.n9","volume":"7","author":"WJ Orlikowski","year":"1996","unstructured":"Orlikowski, W.J.: Improvising organizational transformation over time \u2013 a situated change perspective. Inf. Syst. Res. 7(1), 63\u201392 (1996). https:\/\/doi.org\/10.4135\/9781452231266.n9","journal-title":"Inf. Syst. Res."},{"key":"16_CR20","doi-asserted-by":"crossref","unstructured":"Pospisil, B., Huber, E., Quirchmayr, G., Seb\u00f6ck, W.: Modus operandi in cybercrime. In: Khosrow-Pour, M. (ed.) Encyclopedia of Criminal Activities and the Deep Web, pp. 193\u2013209. IGI Global, web (2020). http:\/\/dx.doi.org\/10.4018\/978-1-5225-9715-5.ch013","DOI":"10.4018\/978-1-5225-9715-5.ch013"},{"issue":"3","key":"16_CR21","doi-asserted-by":"publisher","first-page":"298","DOI":"10.1525\/sp.1988.35.3.03a00070","volume":"35","author":"J Johnson","year":"1988","unstructured":"Johnson, J.: Mixing humans and nonhumans together: the sociology of a door-closer. Soc. Probl. 35(3), 298\u2013310 (1988). https:\/\/doi.org\/10.1525\/sp.1988.35.3.03a00070","journal-title":"Soc. Probl."},{"issue":"2","key":"16_CR22","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1177\/0306312712466186","volume":"43","author":"S Suryanarayanan","year":"2013","unstructured":"Suryanarayanan, S., Kleinman, D.L.: Be(e)coming experts: the controversy over insecticides in the honey bee colony collapse disorder. Soc. Stud. Sci. 43(2), 1\u201326 (2013). https:\/\/doi.org\/10.1177\/0306312712466186","journal-title":"Soc. Stud. Sci."},{"key":"16_CR23","doi-asserted-by":"crossref","unstructured":"Ericson, R.V., Haggerty, K.D.: Policing the Risk Society. University of Toronto Press, Toronto (1997). http:\/\/dx.doi.org\/10.3138\/9781442678590","DOI":"10.3138\/9781442678590"},{"issue":"6","key":"16_CR24","doi-asserted-by":"publisher","first-page":"1495","DOI":"10.1016\/j.apergo.2014.04.012","volume":"45","author":"J Xu","year":"2014","unstructured":"Xu, J., Le, K., Deitermann, A., Montague, E.: How different types of users develop trust in technology: a qualitative analysis of the antecedents of active and passive user trust in a shared technology. Appl. Ergon. 45(6), 1495\u20131503 (2014). https:\/\/doi.org\/10.1016\/j.apergo.2014.04.012","journal-title":"Appl. Ergon."},{"key":"16_CR25","doi-asserted-by":"crossref","unstructured":"Law, J.: Actor-network theory and material semiotics. In: Turner, B.S. (ed.) The New Blackwell Companion to Social Theory, pp. 141\u2013158. Blackwell Publishers, Oxford (2009). http:\/\/dx.doi.org\/10.1002\/9781444304992.ch7","DOI":"10.1002\/9781444304992.ch7"},{"key":"16_CR26","doi-asserted-by":"crossref","unstructured":"Michael, M.: Actor-Network Theory. Trials, Trails and Translations. Sage, London (2017). http:\/\/dx.doi.org\/10.4135\/9781473983045","DOI":"10.4135\/9781473983045"},{"key":"16_CR27","doi-asserted-by":"crossref","unstructured":"Mitchell, R.J., Lewis, S.: Intention is not method, belief is not evidence, rank is not proof. Ethical policing needs evidence-based decision making. Int. J. Emerg. Serv. 6(3), 188\u2013199 (2017). http:\/\/dx.doi.org\/10.1108\/ijes-04-2017-0018","DOI":"10.1108\/IJES-04-2017-0018"},{"issue":"3","key":"16_CR28","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1145\/1226736.1226761","volume":"50","author":"L Carver","year":"2007","unstructured":"Carver, L., Turoff, M.: Human-computer interaction: the human and computer as a team in emergency management information systems. Commun. ACM 50(3), 33\u201338 (2007). https:\/\/doi.org\/10.1145\/1226736.1226761","journal-title":"Commun. ACM"},{"issue":"14","key":"16_CR29","doi-asserted-by":"publisher","first-page":"1229","DOI":"10.1080\/10447318.2019.1619259","volume":"35","author":"C Stephanidis","year":"2019","unstructured":"Stephanidis, C., et al.: Seven HCI grand challenges. Int. J. Hum.-Comput. Interact. 35(14), 1229\u20131269 (2019). https:\/\/doi.org\/10.1080\/10447318.2019.1619259","journal-title":"Int. J. Hum.-Comput. Interact."},{"issue":"4","key":"16_CR30","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1007\/s12369-010-0062-y","volume":"2","author":"K Wasen","year":"2010","unstructured":"Wasen, K.: Replacement of highly educated surgical assistants by robot technology in working life: paradigm shift in the service sector. Int. J. Soc. Robot. 2(4), 431\u2013438 (2010). https:\/\/doi.org\/10.1007\/s12369-010-0062-y","journal-title":"Int. J. Soc. Robot."}],"container-title":["IFIP Advances in Information and Communication Technology","Information Technology in Disaster Risk Reduction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-81469-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,29]],"date-time":"2025-07-29T22:03:01Z","timestamp":1753826581000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-81469-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030814687","9783030814694"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-81469-4_16","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"31 July 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITDRR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology in Disaster Risk Reduction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sofia","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Bulgaria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"5","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itdrr2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/itdrr.unwe.bg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"52","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"35% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}