{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T10:07:05Z","timestamp":1775470025771,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031342066","type":"print"},{"value":"9783031342073","type":"electronic"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"DOI":"10.1007\/978-3-031-34207-3_14","type":"book-chapter","created":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T19:01:38Z","timestamp":1685300498000},"page":"215-229","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Cyber Security Policies in Crisis Response: Exploring the Predicament of Creating Safe But Workable Systems"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0009-0009-3178-9132","authenticated-orcid":false,"given":"Joshua","family":"Stassen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4517-7259","authenticated-orcid":false,"given":"Ali","family":"Pirannejad","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8324-956X","authenticated-orcid":false,"given":"Kenny","family":"Meesters","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,5,29]]},"reference":[{"key":"14_CR1","doi-asserted-by":"publisher","first-page":"124134","DOI":"10.1109\/ACCESS.2020.3006172","volume":"8","author":"S Hakak","year":"2020","unstructured":"Hakak, S., Khan, W., Imran, M., Choo, K.: Have you been a victim of COVID-19-related cyber incidents? Survey, taxonomy and mitigation strategies. IEEE Access 8, 124134\u2013124144 (2020)","journal-title":"IEEE Access"},{"key":"14_CR2","unstructured":"Samonas, S., Coss, D.: The CIA strikes back: redefining confidentiality, integrity and availability in security. J. Inf. Syst. Secur. 10(3) (2014)"},{"key":"14_CR3","unstructured":"IBM: Cyber Security Intelligence Index (2014). Retrieved from IBM security services: https:\/\/i.crn.com\/sites\/default\/files\/ckfinderimages\/userfiles\/images\/crn\/custom\/IBMSecurityServices2014.PDF"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Anderson, J.: Computer security technology planning study (1972)","DOI":"10.21236\/AD0772806"},{"key":"14_CR5","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1108\/ICS-01-2021-0008","volume":"30","author":"R Khatib","year":"2021","unstructured":"Khatib, R., Barki, H.: How different rewards tend to influence employee non-compliance with information security policies. Inf. Comput. Secur. 30, 97\u2013116 (2021)","journal-title":"Inf. Comput. Secur."},{"issue":"3\u20134","key":"14_CR6","doi-asserted-by":"publisher","first-page":"190","DOI":"10.1016\/j.im.2012.04.002","volume":"49","author":"A Vance","year":"2012","unstructured":"Vance, A., Siponen, M., Pahnila, S.: Motivating IS security compliance: insights from habit and protection motivation theory. Inf. Manage. 49(3\u20134), 190\u2013198 (2012)","journal-title":"Inf. Manage."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Pham, H., Brennan, L., Richardson, J.: Review of behavioural theories in security compliance and research challenge. In: Informating Science and Information Technology Education Conference, pp. 65\u201376 (2017)","DOI":"10.28945\/3722"},{"key":"14_CR8","unstructured":"Ertan, A., Crossland, G., Health, C., Denny, D., Jensen, R.: Everyday Cyber Security in Organisations (2020)"},{"key":"14_CR9","doi-asserted-by":"crossref","unstructured":"Kirlappos, I., Parkin, S., Sasse, M.: Learning from \u201cshadow security\u201d: why understanding non-compliance provides the basis for effective security (2014)","DOI":"10.14722\/usec.2014.23007"},{"issue":"3","key":"14_CR10","doi-asserted-by":"publisher","first-page":"233","DOI":"10.1080\/01449290903121386","volume":"29","author":"L Tam","year":"2010","unstructured":"Tam, L., Glassman, M., Vandenwauver, M.: The psychology of password management: a tradeoff between security and convenience. Behav. Inf. Technol. 29(3), 233\u2013244 (2010)","journal-title":"Behav. Inf. Technol."},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Tari, F., Ozok, A., Holden, S.: A comparison of perceived and real shoulder-surfing risks between alphanumeric and graphical passwords. In: Proceedings of the Second Symposium on Usable Privacy and Security, pp. 56\u201366. ACM (2006)","DOI":"10.1145\/1143120.1143128"},{"issue":"4","key":"14_CR12","doi-asserted-by":"publisher","first-page":"1151","DOI":"10.1057\/s41284-016-0083-9","volume":"30","author":"D Stitilis","year":"2017","unstructured":"Stitilis, D., Pakutinskas, P., Malinauskaite, I.: EU and NATO cybersecurity strategies and national cyber security strategies: a comparative analysis. Secur. J. 30(4), 1151\u20131168 (2017)","journal-title":"Secur. J."},{"issue":"6","key":"14_CR13","doi-asserted-by":"publisher","first-page":"476","DOI":"10.1016\/j.cose.2009.01.003","volume":"28","author":"E Albrechtsen","year":"2009","unstructured":"Albrechtsen, E., Hovden, J.: The information security digital divide between information security managers and users. Comput. Secur. 28(6), 476\u2013490 (2009)","journal-title":"Comput. Secur."},{"issue":"3","key":"14_CR14","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1226736.1226760","volume":"50","author":"B Van de Walle","year":"2007","unstructured":"Van de Walle, B., Turoff, M.: Emergency reponse information systems: emerging trends and technologies. Commun. ACM 50(3), 29\u201331 (2007)","journal-title":"Commun. ACM"},{"key":"14_CR15","doi-asserted-by":"publisher","first-page":"101887","DOI":"10.1016\/j.ijdrr.2020.101887","volume":"51","author":"V Nespeca","year":"2020","unstructured":"Nespeca, V., Comes, T., Meesters, K., Brazier, T.: Towards coordinated self-organization: an actor-centered framework for the design of disaster management information systems. Int. J. Disaster Risk Reduction 51, 101887 (2020)","journal-title":"Int. J. Disaster Risk Reduction"},{"issue":"11","key":"14_CR16","doi-asserted-by":"publisher","first-page":"2484","DOI":"10.1111\/poms.13236","volume":"29","author":"T Comes","year":"2020","unstructured":"Comes, T., Van de Walle, B., Van Wassenhove, L.: The coordination-information bubble in humanitarian response: theoretical foundations and empirical investigations. Prod. Oper. Manag. 29(11), 2484\u20132507 (2020)","journal-title":"Prod. Oper. Manag."},{"key":"14_CR17","unstructured":"Darcy, J., Stobaugh, H., Walker, P., Maxwell, D.: The use of evidence in humanitarian decision making. ACAPS Operational Learning Paper (2013)"},{"key":"14_CR18","doi-asserted-by":"publisher","first-page":"1013","DOI":"10.1016\/j.ijdrr.2018.09.001","volume":"31","author":"A Solinska Nowak","year":"2018","unstructured":"Solinska Nowak, A., et al.: An overview of serious games for disaster risk management \u2013 prospects and limitations for informing actions to arrest increasing risk. Int. J. Disaster Risk Reduction 31, 1013\u20131029 (2018)","journal-title":"Int. J. Disaster Risk Reduction"},{"issue":"6","key":"14_CR19","doi-asserted-by":"publisher","first-page":"825","DOI":"10.1177\/1046878109346456","volume":"40","author":"I Mayer","year":"2009","unstructured":"Mayer, I.: The gaming of policy and the politics of gaming: a review. Simul. Gaming 40(6), 825\u2013862 (2009)","journal-title":"Simul. Gaming"},{"key":"14_CR20","unstructured":"Meesters, K., Olthof, I., Van de Walle, B.: Disaster in my backyard: a serious game to improve community disaster resilience. In: Proceedings of the European Conference on Games Based Learning, vol. 2, pp. 714\u2013722 (2014)"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"Grimm, P.: Social desirability bias. Wiley International Encyclopedia of Marketing (2010)","DOI":"10.1002\/9781444316568.wiem02057"},{"key":"14_CR22","unstructured":"United Nations: 2021 floods: UN researchers aim to better prepare for climate risks (2022). Retrieved from unric: https:\/\/unric.org\/en\/2021-floods-un-researchers-aim-to-better-prepare-for-climate-risks\/"},{"issue":"4","key":"14_CR23","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1177\/1049732316665344","volume":"27","author":"M Hennink","year":"2017","unstructured":"Hennink, M., Kaiser, B., Marconi, V.: Code saturation versus meaning saturation: how many interviews are enough? Qual. Health Res. 27(4), 591\u2013608 (2017)","journal-title":"Qual. Health Res."}],"container-title":["IFIP Advances in Information and Communication Technology","Information Technology in Disaster Risk Reduction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-34207-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,28]],"date-time":"2023-05-28T19:03:22Z","timestamp":1685300602000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-34207-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031342066","9783031342073"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-34207-3_14","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"value":"1868-4238","type":"print"},{"value":"1868-422X","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"29 May 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITDRR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology in Disaster Risk Reduction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Krisitansand","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Norway","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2022","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12 October 2022","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2022","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"7","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itdrr2022","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/itdrr2022.com\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"70% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}