{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,11]],"date-time":"2025-09-11T19:57:41Z","timestamp":1757620661250,"version":"3.44.0"},"publisher-location":"Cham","reference-count":45,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031971143"},{"type":"electronic","value":"9783031971150"}],"license":[{"start":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T00:00:00Z","timestamp":1754092800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T00:00:00Z","timestamp":1754092800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-031-97115-0_4","type":"book-chapter","created":{"date-parts":[[2025,8,1]],"date-time":"2025-08-01T06:02:05Z","timestamp":1754028125000},"page":"49-65","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Digitalization of\u00a0Table-Top Exercises: An Emergency Response Training Showcase"],"prefix":"10.1007","author":[{"given":"Anna","family":"Sumereder","sequence":"first","affiliation":[]},{"given":"Bernhard","family":"B\u00fcrger","sequence":"additional","affiliation":[]},{"given":"Robert","family":"Woitsch","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,2]]},"reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Arenkov, I., Tsenzharik, M., Vetrova, M.: Digital technologies in supply chain management. In: Proceedings of the International Conference on Digital Technologies in Logistics and Infrastructure (ICDTLI 2019). Atlantis Press (2019)","DOI":"10.2991\/icdtli-19.2019.78"},{"key":"4_CR2","doi-asserted-by":"publisher","first-page":"254","DOI":"10.1504\/IJEM.2018.094237","volume":"14","author":"C Bearman","year":"2018","unstructured":"Bearman, C., Rainbird, S., Brooks, B., Owen, C., Curnin, S.: A literature review of methods for providing enhanced operational oversight of teams in emergency management enhanced operational oversight of teams in emergency management. Int. J. Emergency Manage. 14, 254\u2013274 (2018)","journal-title":"Int. J. Emergency Manage."},{"key":"4_CR3","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1016\/j.ijdrr.2016.09.001","volume":"19","author":"R Beerens","year":"2016","unstructured":"Beerens, R., Tehler, H.: Scoping the field of disaster exercise evaluation - a literature overview and analysis. Int. J. Disaster Risk Red. 19, 413\u2013446 (2016)","journal-title":"Int. J. Disaster Risk Red."},{"issue":"5","key":"4_CR4","doi-asserted-by":"publisher","first-page":"578","DOI":"10.1007\/s13753-020-00286-7","volume":"11","author":"R Beerens","year":"2020","unstructured":"Beerens, R., Tehler, H., Pelzer, B.: How can we make disaster management evaluations more useful? an empirical study of dutch exercise evaluations. Int. J. Disaster Risk Sci. 11(5), 578\u2013591 (2020)","journal-title":"Int. J. Disaster Risk Sci."},{"issue":"1","key":"4_CR5","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1177\/003335490812300116","volume":"123","author":"PD Biddinger","year":"2008","unstructured":"Biddinger, P.D., et al.: On linkages: using exercises to identify systems-level preparedness challenges. Pub. Health Rep. 123(1), 96\u2013101 (2008)","journal-title":"Pub. Health Rep."},{"key":"4_CR6","unstructured":"BOC Group: ADONIS - Business Process Modelling. boc-group.com\/en\/adonis\/"},{"issue":"3","key":"4_CR7","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1111\/1468-5973.00190","volume":"10","author":"E Borodzicz","year":"2002","unstructured":"Borodzicz, E., Van Haperen, K.: Individual and group learning in crisis simulations. J. Contingencies Crisis Manage. 10(3), 139\u2013147 (2002)","journal-title":"J. Contingencies Crisis Manage."},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Chowdhury, N., Gkioulos, V.: A framework for developing tabletop cybersecurity exercises, pp. 116\u2013133. Springer. Cham (2023)","DOI":"10.1007\/978-3-031-25460-4_7"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Chowdhury, N., Katsikas, S., Gkioulos, V.: Modeling effective cybersecurity training frameworks: a delphi method-based study. Comput. Secur. 113 (2022)","DOI":"10.1016\/j.cose.2021.102551"},{"key":"4_CR10","unstructured":"CISA.gov: Cybersecurity tabletop exercise tips. www.cisa.gov\/sites\/default\/files\/publications\/Cybersecurity-Tabletop-Exercise-Tips_508c.pdf"},{"key":"4_CR11","volume-title":"Emergency Planning","author":"B Dillon","year":"2014","unstructured":"Dillon, B.: Emergency Planning, 2nd edn. Crisis and Disaster Management. Oxford University Press, Oxford (2014)","edition":"2"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Edz\u00e9n, S., Sein, M.: Designing theme-based tabletop exercise for identifying and dealing with coordination problems in emergencies. IJEM 12 (2016)","DOI":"10.1504\/IJEM.2016.074883"},{"key":"4_CR13","unstructured":"Endsley, M.R.: Situation awareness in dynamic human decision-making: theory. In: Gilson, R.D., Garland, D.J., Koonce, J.M. (eds.) Situational Awareness in Complex Systems: Proceedings of a Cahfa Conference. pp. 27\u201358. Embry-Riddle Aeronautical University Press (1994)"},{"key":"4_CR14","unstructured":"Ertan, A., Kuprys, A., Lillemets, P., Nordli, G.M.: Cyber exercises: a vision for nato. a cycon 2021 workshop summary report (2021). ccdcoe.org\/uploads\/2022\/07\/Cyber-Exercises-A-Vision-for-NATO-Summary-Doc-August-2021.pdf"},{"key":"4_CR15","unstructured":"Flin, R.H.: Sitting in the hot seat : leaders and teams for critical incident management. John Wiley & Sons Ltd (1996)"},{"key":"4_CR16","unstructured":"ICF Consulting Services Ltd: Literature review on the impact of digital technology on learning and teaching (2015)"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Karagiannis, D., Burzynski, P., Utz, W., Buchmann, R.A.: A metamodeling approach to support the engineering of modeling method requirements. In: 2019 IEEE 27th International Requirements Engineering Conference (RE). pp. 199\u2013210 (2019)","DOI":"10.1109\/RE.2019.00030"},{"key":"4_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1007\/3-540-45705-4_19","volume-title":"E-Commerce and Web Technologies","author":"D Karagiannis","year":"2002","unstructured":"Karagiannis, D., K\u00fchn, H.: Metamodelling Platforms. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds.) EC-Web 2002. LNCS, vol. 2455, pp. 182\u2013182. Springer, Heidelberg (2002). https:\/\/doi.org\/10.1007\/3-540-45705-4_19"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Karagiannis, D., Woitsch, R.: Knowledge engineering in business process management. In: vom Brocke, J., Rosemann, M. (eds.) Handbook on Business Process Management, vol.\u00a02. Springer (2010)","DOI":"10.1007\/978-3-642-01982-1_22"},{"key":"4_CR20","volume-title":"Kompetenz","author":"EM Kern","year":"2013","unstructured":"Kern, E.M., Hartung, T.: Zielorientiertes risikomanagement bei einsatzorganisationen. In: Kersten, W., Wittmann, J. (eds.) Kompetenz. Interdisziplinarit\u00e4t und Komplexit\u00e4t in der Betriebswirtschaftslehre. Springer Gabler, Wiesbaden (2013)"},{"key":"4_CR21","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1007\/978-3-031-19679-9_8","volume-title":"HCI International 2022 - Late Breaking Posters","author":"G Kvietinskait\u0117","year":"2022","unstructured":"Kvietinskait\u0117, G., Bukauskas, L., Krinickij, V.: Cyber security table-top exercise gamification with dynamic scenario for qualification assessment. In: Stephanidis, C., Antona, M., Ntoa, S., Salvendy, G. (eds.) HCI International 2022 - Late Breaking Posters, pp. 54\u201362. Springer Nature Switzerland, Cham (2022)"},{"key":"4_CR22","unstructured":"Leitner, M., et al.: Enabling exercises, education and research with a comprehensive cyber range. J. Wirel. Mob. Netw. Ubiquitous Comput. Depend. Appl. 12 (2021)"},{"key":"4_CR23","doi-asserted-by":"crossref","unstructured":"Leitner, M., et al.: Ait cyber range: Flexible cyber security environment for exercises, training and research. In: Proceedings of the 2020 European Interdisciplinary Cybersecurity Conference. EICC \u201920, Association for Computing Machinery, New York, NY, USA (2021)","DOI":"10.1145\/3424954.3424959"},{"issue":"2","key":"4_CR24","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1136\/emj.20.2.188","volume":"20","author":"C MacFarlane","year":"2003","unstructured":"MacFarlane, C., Benn, C.A.: Evaluation of emergency medical services systems: a classification to assist in determination of indicators. Emerg. Med. J. 20(2), 188\u2013191 (2003)","journal-title":"Emerg. Med. J."},{"key":"4_CR25","unstructured":"MEASURE Consortium: MEASURE Project. projekte.ffg.at\/projekt\/4491912"},{"issue":"2","key":"4_CR26","doi-asserted-by":"publisher","first-page":"124","DOI":"10.1111\/jpim.12466","volume":"36","author":"P Micheli","year":"2019","unstructured":"Micheli, P., Wilner, S., Bhatti, S.H., Mura, M., Beverland, M.B.: Doing design thinking: conceptual review, synthesis, and research agenda. J. Prod. Innov. Manag. 36(2), 124\u2013148 (2019)","journal-title":"J. Prod. Innov. Manag."},{"key":"4_CR27","unstructured":"MODAPTO Consortium: MODAPTO Project. modapto.eu"},{"key":"4_CR28","unstructured":"Moutenot, L., Berman, G., Marques, R.P., Smith, P., Busquim\u00a0e Silva, R.: Building capacity for computer security assurance activities through international cooperation (2022). psmth.github.io\/papers\/CN313-127-Akhras-et-al.pdf"},{"key":"4_CR29","unstructured":"OMiLAB: Digital Design Thinking using S2M. omilab.org\/activities\/scene2model"},{"key":"4_CR30","unstructured":"OpenStreetMap Foundation: OpenStreetMap. openstreetmap.org\/copyright"},{"key":"4_CR31","doi-asserted-by":"publisher","first-page":"115","DOI":"10.1108\/09653560210426795","volume":"11","author":"D Paton","year":"2002","unstructured":"Paton, D., Jackson, D.: Developing disaster management capability: an assessment centre approach. Disaster Prev. Manag. 11, 115\u2013122 (2002)","journal-title":"Disaster Prev. Manag."},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Pirola, F., Boucher, X., Wiesner, S., Pezzotta, G.: Digital technologies in product-service systems: a literature review and a research agenda. Comput. Industry 123 (2020)","DOI":"10.1016\/j.compind.2020.103301"},{"key":"4_CR33","volume-title":"Human Factors and Ergonomics of Prehospital Emergency Care","author":"S Pruchnicki","year":"2017","unstructured":"Pruchnicki, S., Dekker, S.: Resilience engineering in prehospital emergency medical services. In: Keebler, J.R., Lazzara, E.H., Misasi, P. (eds.) Human Factors and Ergonomics of Prehospital Emergency Care. CRC Press, Boca Raton, FL (2017)"},{"key":"4_CR34","unstructured":"Reuter, L., et al.: Supporting flexible and engaging computer security training courses with the online learners platform and hands-on exercises. IAEA International Conference on Computer Security in the Nuclear World: Security for Safety (2023)"},{"issue":"4","key":"4_CR35","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1108\/09653561211256198","volume":"21","author":"H Sinclair","year":"2012","unstructured":"Sinclair, H., Doyle, E.E., Johnston, D.M., Paton, D.: Assessing emergency management training and exercises. Disaster Prevent. Manage. Int. J. 21(4), 507\u2013521 (2012)","journal-title":"Disaster Prevent. Manage. Int. J."},{"key":"4_CR36","doi-asserted-by":"crossref","unstructured":"Sumereder, A., Woitsch, R.: igitization principles for application scenarios towards digital twins of organizations. Eccomas (2022)","DOI":"10.23967\/eccomas.2022.091"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Sumereder, A., Woitsch, R., B\u00fcrger, B.: Requirements derived from digitalization patterns. In: Navigating Unpredictability: Collaborative Networks in Non-linear Worlds. pp. 99\u2013114. IFIP Advances in Information and Communication Technology. Springer (2024)","DOI":"10.1007\/978-3-031-71743-7_7"},{"key":"4_CR38","unstructured":"The Object Management Group: Graphical notation for specifying business processes in a business process diagram. omg.org\/bpmn\/"},{"key":"4_CR39","unstructured":"Theodoridis, G., Georgescu, A., Garban, H.N.: Lessons from a didactic table-top exercise during a european training course. Int. J. Cyber Diplomacy 22 (2021). ijcd.ici.ro\/documents\/18\/2021_article_7.pdf"},{"key":"4_CR40","doi-asserted-by":"crossref","unstructured":"Timotheou, S., et al.: Impacts of digital technologies on education and factors influencing schools\u2019 digital capacity and transformation: a literature review. Educ. Inf. Technol. 28 (2022)","DOI":"10.1007\/s10639-022-11431-8"},{"key":"4_CR41","unstructured":"UN Office for Disaster Risk Reduction: Design and conduct of simulation exercises - simex: a companion for implementing sendai framework priority 4 on enhancing disaster. Sendai Framework for Disaster Risk Reduction 2015-2030 (2020)"},{"key":"4_CR42","volume-title":"Homeland Security Exercise and Evaluation Program (HSEEP)","author":"US Homeland Security","year":"2020","unstructured":"US Homeland Security: Homeland Security Exercise and Evaluation Program (HSEEP). US Department of Homeland Security, Washington, D.C. (2020)"},{"key":"4_CR43","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1287\/mnsc.46.2.186.11926","volume":"46","author":"V Venkatesh","year":"2000","unstructured":"Venkatesh, V., Davis, F.: A theoretical extension of the technology acceptance model: Four longitudinal field studies. Manage. Sci. 46, 186\u2013204 (2000)","journal-title":"Manage. Sci."},{"key":"4_CR44","doi-asserted-by":"crossref","unstructured":"Vykopal, J., \u010celeda, P., \u0160v\u00e1bensk\u00fd, V., Hofbauer, M., Hor\u00e1k, M.: Research and practice of delivering tabletop exercises. In: Proceedings of the 2024 on Innovation and Technology in Computer Science Education V. 1. p. 220\u2013226. ITiCSE 2024, Association for Computing Machinery, New York, NY, USA (2024)","DOI":"10.1145\/3649217.3653642"},{"key":"4_CR45","doi-asserted-by":"crossref","unstructured":"Wang, Y., Yang, Y., Qin, Z., Yang, Y., Li, J.: A literature review on the application of digital technology in achieving green supply chain management. Sustainability 15(11) (2023). www.mdpi.com\/2071-1050\/15\/11\/8564","DOI":"10.3390\/su15118564"}],"container-title":["IFIP Advances in Information and Communication Technology","Information Technology in Disaster Risk Reduction"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-97115-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,8]],"date-time":"2025-09-08T09:55:07Z","timestamp":1757325307000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-97115-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,2]]},"ISBN":["9783031971143","9783031971150"],"references-count":45,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-97115-0_4","relation":{},"ISSN":["1868-4238","1868-422X"],"issn-type":[{"type":"print","value":"1868-4238"},{"type":"electronic","value":"1868-422X"}],"subject":[],"published":{"date-parts":[[2025,8,2]]},"assertion":[{"value":"2 August 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ITDRR","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information Technology in Disaster Risk Reduction","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Krems an der Donau","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Austria","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2024","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"14 October 2024","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 October 2024","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"itdrr2024","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/itdrr.org\/conference\/itdrr2024","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}